Novel Logical Method for Security Analysis of Electronic Payment Protocols. Technology, No.47, Yanwachi street, Changsha, Hunan, China

Size: px
Start display at page:

Download "Novel Logical Method for Security Analysis of Electronic Payment Protocols. Technology, No.47, Yanwachi street, Changsha, Hunan, China"

Transcription

1 Novl Logicl thod for Scurity Anlysis of Elctronic Pymnt Protocols Yi Liu, Xingtong Liu, Li Zhng, Jin Wng nd hojing Tng ollg of Elctronic Scinc nd Enginring, Ntionl Univrsity of Dfns Tchnology, No.47, Ynwchi strt, hngsh, Hunn, hin Abstrct Elctronic pymnt protocols ply vitl rol in lctronic commrc scurity, which is ssntil for scur oprtion of lctronic commrc ctivitis. Forml mthod is n ffctiv wy to vrify th scurity of protocols. But currnt forml mthod lcks th dscription nd nlysis of timlinss in lctronic pymnt protocols. In ordr to improv nlysis bility, novl pproch to nlyz scurity proprtis such s ccountbility, firnss nd timlinss in lctronic pymnt protocols is proposd in this ppr. This pproch xtnds n xisting logicl mthod by dding concis tim xprssion nd nlysis mthod. It nbls to dscrib th vnt tim, nd xtnds th tim chrctristics of logicl infrnc ruls. W nlyzd th Ntbill protocol with th nw pproch nd found tht th firnss of th protocol is not stisfid, du to timlinss problm. Th rsult illustrts th nw pproch is bl to nlyz th ky proprtis of lctronic pymnt protocols. Furthrmor, th nw pproch cn b introducd to nlyz othr tim proprtis of cryptogrphic protocols. Kywords: lctronic pymnt protocol; forml nlysis; ccountbility; firnss; timlinss; logic rsoning; 1

2 1. Introduction In rcnt yrs, n xplosion of srvics providd ovr th Intrnt hs grt importnc of humn dily lif. Ths srvics r incrsingly trnsfrring customrs privt nd finncil informtion ovr th ntwork. A novl proof mthodology to vrify scur routing protocols hs bn proposd by hn (hn t l. 2015). Anothr ctgory of ntwork protocols to protct lgitimt intrsts btwn trdrs lso nd to b vrifid with dditionl scurity proprtis. Elctronic pymnt protocols provid tchnicl ssurnc for scurity of lctronic commrc. Snsitiv informtion such s crdit crd numbrs nd pssword dpnds on th scurity of lctronic pymnt protocols. Th nlysis nd rsrch on th scurity of lctronic pymnt protocols hs bcom n importnt issu in th fild of informtion scurity (Ptrick t l. 2016). omprd with othr scurity protocols, ccountbility, firnss nd timlinss r dditionl scurity proprtis in lctronic pymnt protocols. Accountbility cn provid sufficint vidnc to rsolv possibl futur disputs ftr th xcution of protocol. It mns tht ll prtis cnnot rpudit wht thy hv don. Firnss nsurs tht no on cn gin n dvntg ovr othr prticipnts by misbhving, which mns ithr both th prticipnts rciv wht thy xpct or nothing. Timlinss provids constrint of intrvls during vry stp in protocol rgultion to void th tim diffrnc utilizing by ttckrs. Forml nlysis is n ffctiv mthod to vrify lctronic pymnt protocols thnks to its strict nd ffctiv chrctristics. But currnt forml mthods for nlysis of lctronic pymnt protocols lck th dscription nd nlysis of timlinss. Our pproch focuss on th dscription nd nlysis of thr scurity proprtis bov. W dd concis tim xprssion nd nlysis mthod to xisting logicl mthod. Th logic 2

3 rsoning prt in th procss of th objctiv proof is bsd on Qin-Zhou logic mthod (Qing 2005; Zhou t l. 2001), nd th tim clculus prt utilizs th mthod of lgbr nd st thory. Th logicl mthod nd th lgbric mthod r two indpndnt prts. Thy will not intrfr with ch othr or undrmin th corrctnss of th originl mthod. Th Ntbill protocol is nlysd with th our mthod, nd th rsult shows tht th protocol dos not stisfy firnss du to timlinss problm. Thn w lbortd tht th dfct cn b fixd with crful spcifiction of vnt tim nd witing tim. Th rst of this ppr is orgnizd s follows. Sction 2 introducs rltd work in this r. Sction 3 dscribs th concpts nd dfinitions of th novl logicl mthod. Th logic nlysis procdur is introducd in Sction 4. Th nlysis procss of th Ntbill protocol is illustrtd in Sction 5. Sction 6 concluds this ppr nd outlins our futur studis. 2. Rltd work Forml mthods hv lrdy bn usd for scurity nlysis of lctronic pymnt protocols for dcds (Kilr 1996). Thy cn b dividd into thr ctgoris s logic rsoning, modl chcking nd thorm proving. 2.1 Logic rsoning Logic rsoning is n importnt forml nlysis mthod of lctronic pymnt protocols up to prsnt. Kilr logic (Kilr 1996) is th first nlysis mthod dsignd for lctronic pymnt protocols, which is minly usd to nlys ccountbility. But it ignord firnss in lctronic pymnt protocols. Volkr xtndd Autlog logic to b bl to nlys ccountbility (Volkr nd Hik 1998). Th fmous Pyword nd SET protocol r nlysd s xmpls. Qing-Zhou logic ws proposd for th nlysis of ccountbility nd firnss togthr (Qing 2005; Zhou t l. 2001). Li ddd th tim 3

4 fctor in SVO logic to mk it bl to nlys th timlinss of protocols (Li nd Luo 2006). Wn put forwrd modling nd nlysis mthod of lctronic pymnt protocols bsd on gm logic (Wn t l. 2007). hn combind logic rsoning with strnd spc modl, introducing nw logic nlysis mthod of lctronic pymnt protocols (hn 2010). A mthod pplying Kilr logic in compositionl nlysis is prsntd by Go for nlysing th ccountbility nd firnss of lctronic pymnt protocols (Go t l. 2013). 2.2 odl chcking Th chrctristic of modl chcking is sy to mnipult. Krmr pply modlchckr OHA which supports th ltrnting trnsition systms nd th ltrnting tmporl logic to nlys ccountbility (Stv 2004). Xi utilizd finit utomton to nlys ISI protocol nd IBS protocol (Xi nd Zhng 2004). Guo combind communiction finit stt mchin with som nw logic ruls bsd on Qing-Zhou logic to nlys scurity proprtis of lctronic pymnt protocols (Guo t l. 2010). Liu proposd n xtndd dtrministic finit utomton which cn lso nlys scurity proprtis such s ccountbility nd firnss (Liu t l. 2013). Nvrthlss, du to th stt spc of th modl chcking mthod is limitd, vn if no ttck mthod hs bn found, it dos not mn th corrctnss of protocols. 2.3 Thorm proving Thorm proving is rgrdd s n ccurt mthod for scurity of cryptogrphic protocols. Pp intgrtd logic with procss clculi for nlysing lctronic pymnt protocols (Pp t l. 2001). hun usd olourd Ptri Nts to nlyz th Intrnt Opn Trding Protocol (hun nd Jonthn 2004). Bll nlysd th purchs protocol of SET with Isbll nd th inductiv mthod (Gimpolo t l. 2006). Guttmn 4

5 pplid strnd spc mthod to nlys th firnss of fir xchng protocols (Guttmn 2012). Guo proposd tchniqu for modlling nd vrifying fir-chng lctronic pymnt protocols (Guo t l. 2009). On th othr hnd, thorm proving mthod is complictd nd difficult to vrify complx protocols. 3. oncpts nd dfinitions Th dfinitions nd symbols usd in th nw pproch r dnotd s follows: Tbl 1. Bsic symbols A,B Prtis prticipt in protocol. { m } K iphrtxt of mssg m ncryptd with scrt ky K. TTP Trustd third prty. K Dul ky of K. m ssg trnsfrrd in protocol. (m, n) K EOO T Th public ky of prty A, which is usd to vrify th digitl signtur of A. Th non-rpudition vidnc tht is providd to th rcivr in lctronic pymnt protocols, which is usd to prov tht th sndr hs snt th mssg. Tim of vnt. 3.1 Tim systm 1 K EOR ssg m is combind with mssg n. Th privt ky corrsponding to K. Th non-rpudition vidnc tht is providd to th sndr in lctronic pymnt protocols, which is usd to prov tht th rcivr hs rcivd th mssg. W dnot th tim whn vnt occurs by dding condition in th formul lngug, lik A m. T is tim xprssion. This dfinition introducd th dscription of th occurrnc tim of snding nd rciving mssg. Th tim xprssion is dfind s follows: 1. x stnds for constnt tim lmnt. 2. X stnds for vribl tim lmnt. 3. X TS mns tim binding xprssion, whil TS is th scop of X. 4. [T] is tim xprssion, whil T is tim binding xprssion. 5

6 Th constnt tim lmnt is rprsntd by lowr cs t, nd th vrint tim lmnt is rprsntd by cpitl lttr T. Tim binding xprssion is vribl tim lmnt X with crtin vlu of constnt tim lmnt s t( t TS). In logicl formul, th tim xprssion [X I] cn b bbrvitd to [X], nd [X {x}] cn b bbrvitd to [x], whr x is constnt tim lmnt or vribl tim lmnt with bound vlu. Th vlu of vribl tim lmnt is bound to th first oprtion in its formul. 3.2 Protocol nd nvironmnt TTP(Trustd third prty) is spcil prty, which is rgrdd s fir trustd third prty. Th bnk or th rbitrtion orgniztion cn ct s TTP. In gnrl, w ssum tht ll prtis r dishonst xcpt for TTP. Thy my intrrupt th xcution of protocols rbitrrily. ommuniction chnnl is ithr rlibl or unrlibl, dpnding on th spcific oprting nvironmnt. Usully, th communiction chnnl btwn gnrl prtis is unrlibl, whil it btwn th TTP nd othr prtis is rcovrbl which mns th mssg will b trnsmittd vntully. Protocol sttmnt dfins wht mssg should b snt nd rcivd by prtis in th currnt round s follows: A B : m mns A snt mssg m to B. 3.3 Possssion st O stnds for th possssion st of prty A prticipting in protocol. Assuming th protocol bgins from T 0, th initil possssion st of A is O ( T 0 ). Whn protocol runs to T, th possssion st of A bcoms O ( T ). Bsids, w dfin O ( T ) is th finl x x possssion st of A t th nd of protocol. Th possssion st of A contins th 6

7 informtion inhritd from lst stp nd th mssg which is rcivd or gnrtd t prsnt. It vris conscutivly with th xcution of protocol until O O ( T ). Th possssion st of A chngs from O( Ty) to O( Tx) ( Ty Tx ), which mns T y is th momnt bfor T x. It follows th following ruls: (1) Whn th xcution of protocol sttmnt is A B : m x, O ( T ) O ( T ) { m} if m is nw mssg gnrtd by A, which mns m O ( T ). x y Othrwis, O ( T ) O ( T ) if m is not nw mssg gnrtd by A nd m O ( T ). x y (2) Whn th xcution of protocol sttmnt is B A : m x whil m O ( T ), O ( T ) O ( T ) { m}. Othrwis, O ( T ) O ( T ). x y 4. Logic nlysis mthod 4.1 Logic componnt x y Our mthod consists of th following fiv logic componnts: (1) A x. A cn mk othrs bliv in formul x by prforming sris of oprtions without lking ny scrt; (2) A m. A snds mssg m. Th following impliction is stblishd in th procss of nlysis: A ( m, n) => A m (1) It mns, A snds mssg m whil A snds mssg (m, n). (3) A m. A posssss mssg m. (4) A m. A rcivd mssg m. Th following impliction is stblishd s th scond componnt: A ( m, n) => A m (2) y y y 7

8 K (5) A. K is th public ky of A, which is usd to vrify th mssg signd by its privt ky 4.2 Axiom systm 1 K. Th xiom systm consists of 1 infrnc rul nd 6 xioms. Th infrnc rul is s follows: ( ) ( ( ) ) => (3) It illustrts cn b obtind from nd ( ). rprsnts cn b dducd from th formul sts. indicts is thorm, which mns is stblishd ll th tim. Th infrnc rul bov indicts tht is thorm if is thorm nd contins. Th 6 xioms r s follows: A1. A x A y => A ( x y) A2. A x (x=>y) => A y A3. A { m} 1 x A K b K b B t x T => A B m t [ T T T ] Y Y X A4. A B { m} k x A B k Y => A B m t mx( TX, T Y) A5. A m => A m A6. A { m} K A K => A m Th proof procdur of protocol proprtis is dividd into two prts. Th first prt is clld logicl rsoning nd th scond prt is clld tim clculus. Th purpos of this procdur is to prov tht th rsult obtind from logic rsoning stisfis th tim constrints spcifid in tim clculus. 4.3 Protocol nlysis procdur Protocol nlysis consists of 5 stps s shown in Figur 1. 8

9 (1)List th initil possssion sts of ch prty in protocol. (2)List th initil Assumptions of th protocol. (3)List EOO nd EOR, nd nlys whthr thy mt th rquirmnt of ccountbility. (4)Anlys whthr EOO O is st b( T) EOR O( T) up t th nd of protocol. (5)Anlys whthr t th nd. T EOO O ( T ) if nd only if EOR O ( T ) b 5. Th Ntbill Protocol nlysis Figur 1. Procdur of protocol nlysis Th Ntbill protocol is n lctronic pymnt protocol proposd by Profssor J.D.Tygr in rngi llon Univrsity for trding digitl goods, including thr prticipnts: customr, mrchnt nd th Ntbill srvr (Sirbu nd Tygr 1995). Its min stps r s follows: (1) : T ( ),{ PRD, TID} K 1 (2) :{ ProductID, Pric, TID} K 2 (3) : T ( ),{ TID} K 3 (4) :{ Goods } k,{ h({ Goods } k ), EPOID } K 4 (5) : T ( ),{{ EPO} 1} K 5 (6) N : TN ( ),{{{ EPO} 1, Acct, k} 1} K N 6 (7) N :{{ Rcipt} 1,{ EPOID, Acct} } 7 KN K K K KN KN (8) :{{ Rcipt} 1,{ EPOID, Acct} } 8 KN KN K 9

10 , nd N rprsnt th customr, th mrchnt nd th Ntbill srvr rspctivly. T ( ) is usd to prov to, nd to stblish shrd sssion ky K. Th function of TN ( ) is similr to T ( ). PRD(Product Rqust Dt) is product rqust dt. TID is trnsction s ID nd ProductID is product s ID. Pric stnds for th pric th mrchnt rquird. Goods is th spcific contnt of trnsmittd goods. EPO is lctronic purchs ordr, th plin prt of which compriss customr idntifiction idntity, ProductID, Pric,, h({ Goods} k ) nd h(prd). h(m) stnds for th hsh vlu of m. Th ncryption prt includs pymnt instruction which cn only b rd by th Ntbill srvr such s th customr ccount. EPOID is lctronic pymnt ID, which is th globlly uniqu idntifir nd will b usd to uniquly idntify th trnsction in th dtbs of Ntbill. Acct nd Acct stnd for th customr nd mrchnt s ccount rspctivly. Rcipt includs th Rsult whthr to ccpt this pymnt or not, which is rturnd from th Ntbill srvr. Th nlysis procdur of th Ntbill protocol is dtild in th nxt subsction. 5.1 List th initil possssion sts. At th initil tim of protocol oprtion, th initil stts of nd r 1 O ( T0 ) { K, K, K, KN, K, KN} 1 ( 0) {,,, N,, N} K K K K O T K K K K K K N N (, N,, N) N N ( K, K N, K, K N) 5.2 List th crdibl ssumptions T1: A N k A B k Assum tht th Ntbill srvr is fully in ccordnc with th protocol rgultion nd will not do nything hrmful to ny prty. If A cn prov tht N hs snt k to him, h cn prov tht th othr prty B hs snt k. 10

11 T2: A B h( m) A B m According to th protocol, th sndr snds h(m) for th chcksum of mssg m. Th sndr is bl to clcult th chcksum only whn th sndr owns th mssg m. So if A cn prov tht B hs snt h(m), thn A cn prov tht B hs snt mssg m. 5.3 List EOO nd EOR: EOO= ({ h({ Goods} )},{ k} ) k K 1 KN EOR= ({ h({ Goods} )},{ k} ) k K 1 1 K N Assum tht EOO O ( T ) is stblishd t th nd of protocol. Thn ({ h({ Goods} )},{ k} ) O ( T ) is stisfid, which mns { h({ Goods } k)} K k K 1 K N t T nd {} k 1 K N. K Sinc { h({ Goods } k)} K, nd xiom A3, thn h({ Goods} k ) t [ T T T ]. According to T2, w obtin { Goods} k t [ T T T ] (4) Sinc {} k 1, K N K N N nd xiom A3,thn N k t [ T T T ]. According to th crdibl ssumption T1, w obtin k t [ T T T ] (5) Du to formul (4), (5) nd xiom A4, w will gt Goods t mx( T, T ) [ T T T ] [ T T T ] (6) Assum tht EOR O ( T ) is stisfid t th nd of th protocol, which mns { h({ Goods} )} nd {} k 1 r stisfid. Thn ccording to k 1 K K N K N N, xiom A3 nd crdibl ssumption T1, w obtin 11

12 k t [ T T T ] (7) Sinc K, xiom A3 nd crdibl ssumption T2, w will gt { Goods} k t [ T T T ]. Du to formul (7) nd xiom A6, w will gt Goods t mx( T, T ) [ T T T ] [ T T T ] (8) Thrfor, th dsign of EOO nd EOR in th Ntbill protocol cn mt th rquirmnt of ccountbility. 5.4 Anlysis of ccountbility Vrify whthr nd cn obtin th pproprit vidnc t th nd of protocol. Aftr th fourth stp of th protocol, O T O T h Goods [ T 4 T 4 T ], thn { h({ Goods } )} O ( T ). ( 4) ( 3) { ({ } k )} K k K Whn th lst stp of th protocol is finishd, O T O T Rcipt [ T 8 T 8 T ]. Bcus of K, w obtin ( 8) ( 7) {{ } 1} K K N { Rcipt} O ( T ), nd { k} 1 O ( T ). Thn EOO O ( T ) is stisfid. 1 KN KN Similrly, ccording to th fifth stp of th protocol, w will gt { h({ Goods} )} O ( T ). And { k} 1 O ( T ) will b obtind ftr th svnth k 1 K KN stp. Thn w will gt EOR O ( T ). Thrfor, EOO O ( T ) EOR O ( T ) is stisfid whn th protocol finishs. (5)Anlysis of firnss Th firnss objctiv is: EOO O ( T ) if nd only if EOR O ( T ) k All prtis in protocol will wit for th nxt stp ftr th lst on. If thr is no rspons, th protocol will trmint ftr crtin priod of tim t nd clr th k 12

13 protocol rcords bfor. For chiving firnss, th following conditions hv to b stisfid: k x {} k 1 y ( T x T y T x t ) (9) {{ } 1} K K N K N { h({ Goods} )} x {} k 1 y ( T x T y T x t ) (10) k 1 K K N t is th witing tim ftr th xcuts th 6th stp of th protocol. t is th witing tim ftr xcuts th 5th stp. Sinc N is in full ccordnc with th rgultion of protocol, formul (9) must b stblishd. In formul (10), Tx = T 5, Ty = T7 T5 t5 t6, t 5 nd t 6 r th tim dly ftr th 5th stp nd th 6th stp. So w must mk t 5 t 6 t to mk formul (10) stblishd. But thr is no rstrict bout th rltionship mong t 5, t 6 nd t. Thr is possibility to mk t 5 t 6 t no mttr wht th constnt t is spcifid. For xmpl, if prforms th 5th stp in ccordnc with th rgultion, could snd {{ EPO} 1} K N to N ftr it is timout nd cquir th vidnc to prov hs rcivd th product Goods. But hs dltd { Goods bcus of timout. Evn though hs rcivd Rcipt } k nd th ky k, h couldn t dcrypt th ciphrtxt to obtin th product Goods. Thn th fomul (10) cn t b stblishd, which mns th protocol cn t chiv th firnss objctiv. Th min rson is tht th implmnttion of th protocol dos not hv spcific constrints on th rlvnt vnt tim in th procss. In ordr to mk up for th dfct, w should crfully rgult th vnt tim nd th witing tim of th xcution of protocol. 5 onclusion Th nlysis rsult of Ntbill protocol show tht th protocol dos not stisfy firnss bcus of timlinss problm. Th procss illustrts how th nw pproch is pplid K 13

14 to nlys th tmporl rltion btwn vnts in lctronic pymnt protocols. It is not simpl logic mthod, but n intgrtd pproch. Th nw pproch is pproprit to guid th dsign of lctronic pymnt protocols nd fix th dfcts of originl protocols. Th nxt stp of our rsrch is to nlys othr lctronic pymnt protocols with our mthod which r widly usd in lctronic commrc. At th sm tim, w will furthr study utomtd nlysis tools to mk it convnint for dsign nd nlysis of lctronic pymnt protocols. Acknowldgmnts This work ws sponsord by th Ntionl Nturl Scinc Foundtion of hin (Projct No ). Rfrncs hun, O., Jonthn, B., An Improvd Forml Spcifiction of th Intrnt Opn Trding Protocol. In: Procdings of th 2004 A symposium on Applid computing. Nicosi, yprus hn, L., Nw Logic of Anlyzing Elctronic ommrc Scurity Protocols. omputr Scinc 37 (10), hn,., Ji, L., Xu, Ho., Luo,., Zhou, W., Loo, B., A Progrm Logic for Vrifying Scur Routing Protocols. Logicl thods in omputr Scinc 11 (4), Gimpolo, B., Fbio,., Lwrnc,.P., Vrifying th SET Purchs Protocols. Journl of Automtd Rsoning 36 (2), Guo, Y., Ding, L., Zhou, Y., Guo, L., Anlysis for E-commrc Protocols Bsd on ProVrif. Journl on ommunictions 30 (3),

15 Guo, H., Li, Z., Zhung, L., Ji, H., Nw Approch for Anlyzing of E-commrc Protocol. omputr Scinc 37 (8), Guttmn, J.D., Stt nd Progrss in Strnd Spcs: Proving Fir Exchng. Journl of Automtd Rsoning Go, Y., Png D., Tng, P., A Forml Anlysis thod for Optimistic Fir Exchng Protocol. Journl of onvrgnc Informtion Tchnology 8 (3), Kilr, R., Accountbility in lctronic pymnt protocols. IEEE Trnsction on Softwr Enginring 22 (5), Stv, K., Forml Anlysis of Optimistic Fir Exchng Protocols. Univrsit Libr d Bruxlls, Brussls, Blgium. Sirbu,., Tygr, J., NtBill: n intrnt commrc systm optimizd for ntwork dlivrd srvics. IEEE Prsonl ommunictions 2 (4), Li, B., Luo, J., Forml Anlysis of Timlinss in Non-Rpudition Protocols. Journl of Softwr 17 (7), Liu, W.,, S., Si, Y., H, G., A ombining Dtrministic Finit Automton with Logic Ruls Approch for Anlyzing of E-commrc Protocol. Journl of hins omputr Systms 34 (3), Pp,., Brmr, O., Hl, J., Shnoi, S., Forml Anlysis of E-ommrc Protocols. In: Procdings of th 5th Intrntionl Symposium on Autonomous Dcntrlizd Systms Ptrick,., Simk, F.S., Fng, H., Rfund ttcks on Bitcoin's Pymnt Protocol. In: Procdings of th 20th Finncil ryptogrphy nd Dt Scurity. Brbdos. Qing, S., A Forml thod for Anlyzing Elctronic pymnt protocols. Journl of Softwr 16 (10),

16 Volkr, K., Hik, N., A Sound Logic for Anlysing Elctronic pymnt protocols. In: th 5th Europn Symposium on Rsrch in omputr Scurity Louvin-l-Nuv. Brlin, Hidlbrg Wn, J., Zhng,., Zhng, H., Forml Anlysis of Elctronic Pymnt Protocols Bsd on Gm Logic. icrolctronics omputr 24 (9), Xi, X., Zhng, H., Firnss Rsrch of Elctronic ommrc Pying Protocols Bsd on Finit Automton odl. omputr Applictions 24 (6), Zhou, D., Qing, S., Zhou Z., A nw pproch for th nlysis of lctronic pymnt protocols. Journl of Softwr 12 (9),

Lecture 11 Waves in Periodic Potentials Today: Questions you should be able to address after today s lecture:

Lecture 11 Waves in Periodic Potentials Today: Questions you should be able to address after today s lecture: Lctur 11 Wvs in Priodic Potntils Tody: 1. Invrs lttic dfinition in 1D.. rphicl rprsnttion of priodic nd -priodic functions using th -xis nd invrs lttic vctors. 3. Sris solutions to th priodic potntil Hmiltonin

More information

TOPIC 5: INTEGRATION

TOPIC 5: INTEGRATION TOPIC 5: INTEGRATION. Th indfinit intgrl In mny rspcts, th oprtion of intgrtion tht w r studying hr is th invrs oprtion of drivtion. Dfinition.. Th function F is n ntidrivtiv (or primitiv) of th function

More information

Theoretical Study on the While Drilling Electromagnetic Signal Transmission of Horizontal Well

Theoretical Study on the While Drilling Electromagnetic Signal Transmission of Horizontal Well 7 nd ntrntionl Confrnc on Softwr, Multimdi nd Communiction Enginring (SMCE 7) SBN: 978--6595-458-5 Thorticl Study on th Whil Drilling Elctromgntic Signl Trnsmission of Horizontl Wll Y-huo FAN,,*, Zi-ping

More information

FSA. CmSc 365 Theory of Computation. Finite State Automata and Regular Expressions (Chapter 2, Section 2.3) ALPHABET operations: U, concatenation, *

FSA. CmSc 365 Theory of Computation. Finite State Automata and Regular Expressions (Chapter 2, Section 2.3) ALPHABET operations: U, concatenation, * CmSc 365 Thory of Computtion Finit Stt Automt nd Rgulr Exprssions (Chptr 2, Sction 2.3) ALPHABET oprtions: U, conctntion, * otin otin Strings Form Rgulr xprssions dscri Closd undr U, conctntion nd * (if

More information

INTEGRALS. Chapter 7. d dx. 7.1 Overview Let d dx F (x) = f (x). Then, we write f ( x)

INTEGRALS. Chapter 7. d dx. 7.1 Overview Let d dx F (x) = f (x). Then, we write f ( x) Chptr 7 INTEGRALS 7. Ovrviw 7.. Lt d d F () f (). Thn, w writ f ( ) d F () + C. Ths intgrls r clld indfinit intgrls or gnrl intgrls, C is clld constnt of intgrtion. All ths intgrls diffr y constnt. 7..

More information

CSE303 - Introduction to the Theory of Computing Sample Solutions for Exercises on Finite Automata

CSE303 - Introduction to the Theory of Computing Sample Solutions for Exercises on Finite Automata CSE303 - Introduction to th Thory of Computing Smpl Solutions for Exrciss on Finit Automt Exrcis 2.1.1 A dtrministic finit utomton M ccpts th mpty string (i.., L(M)) if nd only if its initil stt is finl

More information

Construction of asymmetric orthogonal arrays of strength three via a replacement method

Construction of asymmetric orthogonal arrays of strength three via a replacement method isid/ms/26/2 Fbruary, 26 http://www.isid.ac.in/ statmath/indx.php?modul=prprint Construction of asymmtric orthogonal arrays of strngth thr via a rplacmnt mthod Tian-fang Zhang, Qiaoling Dng and Alok Dy

More information

Last time: introduced our first computational model the DFA.

Last time: introduced our first computational model the DFA. Lctur 7 Homwork #7: 2.2.1, 2.2.2, 2.2.3 (hnd in c nd d), Misc: Givn: M, NFA Prov: (q,xy) * (p,y) iff (q,x) * (p,) (follow proof don in clss tody) Lst tim: introducd our first computtionl modl th DFA. Tody

More information

, between the vertical lines x a and x b. Given a demand curve, having price as a function of quantity, p f (x) at height k is the curve f ( x,

, between the vertical lines x a and x b. Given a demand curve, having price as a function of quantity, p f (x) at height k is the curve f ( x, Clculus for Businss nd Socil Scincs - Prof D Yun Finl Em Rviw vrsion 5/9/7 Chck wbsit for ny postd typos nd updts Pls rport ny typos This rviw sht contins summris of nw topics only (This rviw sht dos hv

More information

Weighted Matching and Linear Programming

Weighted Matching and Linear Programming Wightd Mtching nd Linr Progrmming Jonthn Turnr Mrch 19, 01 W v sn tht mximum siz mtchings cn b found in gnrl grphs using ugmnting pths. In principl, this sm pproch cn b pplid to mximum wight mtchings.

More information

Chapter 16. 1) is a particular point on the graph of the function. 1. y, where x y 1

Chapter 16. 1) is a particular point on the graph of the function. 1. y, where x y 1 Prctic qustions W now tht th prmtr p is dirctl rltd to th mplitud; thrfor, w cn find tht p. cos d [ sin ] sin sin Not: Evn though ou might not now how to find th prmtr in prt, it is lws dvisl to procd

More information

Multi-Section Coupled Line Couplers

Multi-Section Coupled Line Couplers /0/009 MultiSction Coupld Lin Couplrs /8 Multi-Sction Coupld Lin Couplrs W cn dd multipl coupld lins in sris to incrs couplr ndwidth. Figur 7.5 (p. 6) An N-sction coupld lin l W typiclly dsign th couplr

More information

ME 522 PRINCIPLES OF ROBOTICS. FIRST MIDTERM EXAMINATION April 19, M. Kemal Özgören

ME 522 PRINCIPLES OF ROBOTICS. FIRST MIDTERM EXAMINATION April 19, M. Kemal Özgören ME 522 PINCIPLES OF OBOTICS FIST MIDTEM EXAMINATION April 9, 202 Nm Lst Nm M. Kml Özgörn 2 4 60 40 40 0 80 250 USEFUL FOMULAS cos( ) cos cos sin sin sin( ) sin cos cos sin sin y/ r, cos x/ r, r 0 tn 2(

More information

Errata for Second Edition, First Printing

Errata for Second Edition, First Printing Errt for Scond Edition, First Printing pg 68, lin 1: z=.67 should b z=.44 pg 71: Eqution (.3) should rd B( R) = θ R 1 x= [1 G( x)] pg 1: Eqution (.63) should rd B( R) = x= R = θ ( x R) p( x) R 1 x= [1

More information

Errata for Second Edition, First Printing

Errata for Second Edition, First Printing Errt for Scond Edition, First Printing pg 68, lin 1: z=.67 should b z=.44 pg 1: Eqution (.63) should rd B( R) = x= R = θ ( x R) p( x) R 1 x= [1 G( x)] = θp( R) + ( θ R)[1 G( R)] pg 15, problm 6: dmnd of

More information

Enforcement of Opacity Security Properties Using Insertion Functions

Enforcement of Opacity Security Properties Using Insertion Functions Enforcmnt of Opcity Scurity Proprtis Using Insrtion Functions Yi-Chin Wu nd Stéphn Lfortun EECS Dprtmnt, Univrsity of Michign CDC 12 Dc. 13 th, 2012 Motivtion Scurity nd privcy concrns in onlin srvics

More information

Minimum Spanning Trees

Minimum Spanning Trees Minimum Spnning Trs Minimum Spnning Trs Problm A town hs st of houss nd st of rods A rod conncts nd only houss A rod conncting houss u nd v hs rpir cost w(u, v) Gol: Rpir nough (nd no mor) rods such tht:

More information

Section 3: Antiderivatives of Formulas

Section 3: Antiderivatives of Formulas Chptr Th Intgrl Appli Clculus 96 Sction : Antirivtivs of Formuls Now w cn put th is of rs n ntirivtivs togthr to gt wy of vluting finit intgrls tht is ct n oftn sy. To vlut finit intgrl f(t) t, w cn fin

More information

Notes on Finite Automata Department of Computer Science Professor Goldberg Textbooks: Introduction to the Theory of Computation by Michael Sipser

Notes on Finite Automata Department of Computer Science Professor Goldberg Textbooks: Introduction to the Theory of Computation by Michael Sipser Nots on Finit Automt Dprtmnt of Computr Scinc Profssor Goldrg Txtooks: Introduction to th Thory of Computtion y Michl Sipsr Elmnts of th Thory of Computtion y H. Lwis nd C. Ppdimitriou Ths nots contin

More information

The Angular Momenta Dipole Moments and Gyromagnetic Ratios of the Electron and the Proton

The Angular Momenta Dipole Moments and Gyromagnetic Ratios of the Electron and the Proton Journl of Modrn hysics, 014, 5, 154-157 ublishd Onlin August 014 in SciRs. htt://www.scir.org/journl/jm htt://dx.doi.org/.436/jm.014.51415 Th Angulr Momnt Diol Momnts nd Gyromgntic Rtios of th Elctron

More information

(Upside-Down o Direct Rotation) β - Numbers

(Upside-Down o Direct Rotation) β - Numbers Amrican Journal of Mathmatics and Statistics 014, 4(): 58-64 DOI: 10593/jajms0140400 (Upsid-Down o Dirct Rotation) β - Numbrs Ammar Sddiq Mahmood 1, Shukriyah Sabir Ali,* 1 Dpartmnt of Mathmatics, Collg

More information

Linear Algebra Existence of the determinant. Expansion according to a row.

Linear Algebra Existence of the determinant. Expansion according to a row. Lir Algbr 2270 1 Existc of th dtrmit. Expsio ccordig to row. W dfi th dtrmit for 1 1 mtrics s dt([]) = (1) It is sy chck tht it stisfis D1)-D3). For y othr w dfi th dtrmit s follows. Assumig th dtrmit

More information

Instructions for Section 1

Instructions for Section 1 Instructions for Sction 1 Choos th rspons tht is corrct for th qustion. A corrct nswr scors 1, n incorrct nswr scors 0. Mrks will not b dductd for incorrct nswrs. You should ttmpt vry qustion. No mrks

More information

TuLiP: A Software Toolbox for Receding Horizon Temporal Logic Planning & Computer Lab 2

TuLiP: A Software Toolbox for Receding Horizon Temporal Logic Planning & Computer Lab 2 TuLiP: A Softwar Toolbox for Rcding Horizon Tmporal Logic Planning & Computr Lab 2 Nok Wongpiromsarn Richard M. Murray Ufuk Topcu EECI, 21 March 2013 Outlin Ky Faturs of TuLiP Embddd control softwar synthsis

More information

HIGHER ORDER DIFFERENTIAL EQUATIONS

HIGHER ORDER DIFFERENTIAL EQUATIONS Prof Enriqu Mtus Nivs PhD in Mthmtis Edution IGER ORDER DIFFERENTIAL EQUATIONS omognous linr qutions with onstnt offiints of ordr two highr Appl rdution mthod to dtrmin solution of th nonhomognous qution

More information

Finite Automata. d: Q S Q. Finite automaton is M=(Q, S, d, q 0, F) Ex: an FA that accepts all odd-length strings of zeros: q 0 q 1. q i. q k.

Finite Automata. d: Q S Q. Finite automaton is M=(Q, S, d, q 0, F) Ex: an FA that accepts all odd-length strings of zeros: q 0 q 1. q i. q k. Finit Automt Bsic id: FA is mchin tht chngs stts whil procssing symols, on t tim. Finit st of stts: Q = {q 0, q 1, q 3,..., q k } Trnsition function: Initil stt: Finl stts: d: Q S Q q 0 Q F Q Finit utomton

More information

Walk Like a Mathematician Learning Task:

Walk Like a Mathematician Learning Task: Gori Dprtmnt of Euction Wlk Lik Mthmticin Lrnin Tsk: Mtrics llow us to prform mny usful mthmticl tsks which orinrily rquir lr numbr of computtions. Som typs of problms which cn b on fficintly with mtrics

More information

Ch 1.2: Solutions of Some Differential Equations

Ch 1.2: Solutions of Some Differential Equations Ch 1.2: Solutions of Som Diffrntil Equtions Rcll th fr fll nd owl/mic diffrntil qutions: v 9.8.2v, p.5 p 45 Ths qutions hv th gnrl form y' = y - b W cn us mthods of clculus to solv diffrntil qutions of

More information

DISTORTION OF PROBABILITY MODELS

DISTORTION OF PROBABILITY MODELS ISTORTION OF PROBABILITY MOELS VÁVRA Frntišk (ČR), NOVÝ Pvl (ČR), MAŠKOVÁ Hn (ČR), NETRVALOVÁ Arnoštk (ČR) Abstrct. Th proposd ppr dls with on o possibl mthods or modlling th rltion o two probbility modls

More information

Chapter 10. The singular integral Introducing S(n) and J(n)

Chapter 10. The singular integral Introducing S(n) and J(n) Chaptr Th singular intgral Our aim in this chaptr is to rplac th functions S (n) and J (n) by mor convnint xprssions; ths will b calld th singular sris S(n) and th singular intgral J(n). This will b don

More information

cycle that does not cross any edges (including its own), then it has at least

cycle that does not cross any edges (including its own), then it has at least W prov th following thorm: Thorm If a K n is drawn in th plan in such a way that it has a hamiltonian cycl that dos not cross any dgs (including its own, thn it has at last n ( 4 48 π + O(n crossings Th

More information

Higher order derivatives

Higher order derivatives Robrto s Nots on Diffrntial Calculus Chaptr 4: Basic diffrntiation ruls Sction 7 Highr ordr drivativs What you nd to know alrady: Basic diffrntiation ruls. What you can larn hr: How to rpat th procss of

More information

The Course covers: Lexical Analysis Syntax Analysis Semantic Analysis Runtime environments Code Generation Code Optimization. CS 540 Spring 2013 GMU 2

The Course covers: Lexical Analysis Syntax Analysis Semantic Analysis Runtime environments Code Generation Code Optimization. CS 540 Spring 2013 GMU 2 CS 540 Spring 2013 Th Cours covrs: Lxicl Anlysis Syntx Anlysis Smntic Anlysis Runtim nvironmnts Cod Gnrtion Cod Optimiztion CS 540 Spring 2013 GMU 2 Pr-rquisit courss Strong progrmming ckground in C, C++

More information

UNIT # 08 (PART - I)

UNIT # 08 (PART - I) . r. d[h d[h.5 7.5 mol L S d[o d[so UNIT # 8 (PRT - I CHEMICL INETICS EXERCISE # 6. d[ x [ x [ x. r [X[C ' [X [[B r '[ [B [C. r [NO [Cl. d[so d[h.5 5 mol L S d[nh d[nh. 5. 6. r [ [B r [x [y r' [x [y r'

More information

Winter 2016 COMP-250: Introduction to Computer Science. Lecture 23, April 5, 2016

Winter 2016 COMP-250: Introduction to Computer Science. Lecture 23, April 5, 2016 Wintr 2016 COMP-250: Introduction to Computr Scinc Lctur 23, April 5, 2016 Commnt out input siz 2) Writ ny lgorithm tht runs in tim Θ(n 2 log 2 n) in wors cs. Explin why this is its running tim. I don

More information

The Matrix Exponential

The Matrix Exponential Th Matrix Exponntial (with xrciss) by Dan Klain Vrsion 28928 Corrctions and commnts ar wlcom Th Matrix Exponntial For ach n n complx matrix A, dfin th xponntial of A to b th matrix () A A k I + A + k!

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN Intrnational Journal of Scintific & Enginring Rsarch, Volum 6, Issu 7, July-25 64 ISSN 2229-558 HARATERISTIS OF EDGE UTSET MATRIX OF PETERSON GRAPH WITH ALGEBRAI GRAPH THEORY Dr. G. Nirmala M. Murugan

More information

The Matrix Exponential

The Matrix Exponential Th Matrix Exponntial (with xrciss) by D. Klain Vrsion 207.0.05 Corrctions and commnts ar wlcom. Th Matrix Exponntial For ach n n complx matrix A, dfin th xponntial of A to b th matrix A A k I + A + k!

More information

CONTINUITY AND DIFFERENTIABILITY

CONTINUITY AND DIFFERENTIABILITY MCD CONTINUITY AND DIFFERENTIABILITY NCERT Solvd mpls upto th sction 5 (Introduction) nd 5 (Continuity) : Empl : Chck th continuity of th function f givn by f() = + t = Empl : Emin whthr th function f

More information

Integration Continued. Integration by Parts Solving Definite Integrals: Area Under a Curve Improper Integrals

Integration Continued. Integration by Parts Solving Definite Integrals: Area Under a Curve Improper Integrals Intgrtion Continud Intgrtion y Prts Solving Dinit Intgrls: Ar Undr Curv Impropr Intgrls Intgrtion y Prts Prticulrly usul whn you r trying to tk th intgrl o som unction tht is th product o n lgric prssion

More information

Lecture contents. Bloch theorem k-vector Brillouin zone Almost free-electron model Bands Effective mass Holes. NNSE 508 EM Lecture #9

Lecture contents. Bloch theorem k-vector Brillouin zone Almost free-electron model Bands Effective mass Holes. NNSE 508 EM Lecture #9 Lctur contnts Bloch thorm -vctor Brillouin zon Almost fr-lctron modl Bnds ffctiv mss Hols Trnsltionl symmtry: Bloch thorm On-lctron Schrödingr qution ch stt cn ccommo up to lctrons: If Vr is priodic function:

More information

Lecture 2: Discrete-Time Signals & Systems. Reza Mohammadkhani, Digital Signal Processing, 2015 University of Kurdistan eng.uok.ac.

Lecture 2: Discrete-Time Signals & Systems. Reza Mohammadkhani, Digital Signal Processing, 2015 University of Kurdistan eng.uok.ac. Lctur 2: Discrt-Tim Signals & Systms Rza Mohammadkhani, Digital Signal Procssing, 2015 Univrsity of Kurdistan ng.uok.ac.ir/mohammadkhani 1 Signal Dfinition and Exampls 2 Signal: any physical quantity that

More information

MIP Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Λ

MIP Formulation for Robust Resource Allocation in Dynamic Real-Time Systems Λ MIP Formultion for Robust Rsourc Alloction in Dynmic Rl-Tim Systms Λ Sthvidh Grtphol nd Viktor K. Prsnn Univrsity of Southrn Cliforni Dprtmnt of EE-Systms Los Angls, CA 90089-2562 USA fgrtphol, prsnng@usc.du

More information

LINEAR DELAY DIFFERENTIAL EQUATION WITH A POSITIVE AND A NEGATIVE TERM

LINEAR DELAY DIFFERENTIAL EQUATION WITH A POSITIVE AND A NEGATIVE TERM Elctronic Journal of Diffrntial Equations, Vol. 2003(2003), No. 92, pp. 1 6. ISSN: 1072-6691. URL: http://jd.math.swt.du or http://jd.math.unt.du ftp jd.math.swt.du (login: ftp) LINEAR DELAY DIFFERENTIAL

More information

1 Minimum Cut Problem

1 Minimum Cut Problem CS 6 Lctur 6 Min Cut and argr s Algorithm Scribs: Png Hui How (05), Virginia Dat: May 4, 06 Minimum Cut Problm Today, w introduc th minimum cut problm. This problm has many motivations, on of which coms

More information

Continuous Random Variables: Basics

Continuous Random Variables: Basics Continuous Rndom Vrils: Bsics Brlin Chn Dprtmnt o Computr Scinc & Inormtion Enginring Ntionl Tiwn Norml Univrsit Rrnc: - D.. Brtss, J. N. Tsitsilis, Introduction to roilit, Sctions 3.-3.3 Continuous Rndom

More information

Homotopy perturbation technique

Homotopy perturbation technique Comput. Mthods Appl. Mch. Engrg. 178 (1999) 257±262 www.lsvir.com/locat/cma Homotopy prturbation tchniqu Ji-Huan H 1 Shanghai Univrsity, Shanghai Institut of Applid Mathmatics and Mchanics, Shanghai 272,

More information

DFA (Deterministic Finite Automata) q a

DFA (Deterministic Finite Automata) q a Big pictur All lngugs Dcidl Turing mchins NP P Contxt-fr Contxt-fr grmmrs, push-down utomt Rgulr Automt, non-dtrministic utomt, rgulr xprssions DFA (Dtrministic Finit Automt) 0 q 0 0 0 0 q DFA (Dtrministic

More information

The Equitable Dominating Graph

The Equitable Dominating Graph Intrnational Journal of Enginring Rsarch and Tchnology. ISSN 0974-3154 Volum 8, Numbr 1 (015), pp. 35-4 Intrnational Rsarch Publication Hous http://www.irphous.com Th Equitabl Dominating Graph P.N. Vinay

More information

Mutually Independent Hamiltonian Cycles of Pancake Networks

Mutually Independent Hamiltonian Cycles of Pancake Networks Mutually Indpndnt Hamiltonian Cycls of Pancak Ntworks Chng-Kuan Lin Dpartmnt of Mathmatics National Cntral Univrsity, Chung-Li, Taiwan 00, R O C discipl@ms0urlcomtw Hua-Min Huang Dpartmnt of Mathmatics

More information

Slide 1. Slide 2. Slide 3 DIGITAL SIGNAL PROCESSING CLASSIFICATION OF SIGNALS

Slide 1. Slide 2. Slide 3 DIGITAL SIGNAL PROCESSING CLASSIFICATION OF SIGNALS Slid DIGITAL SIGAL PROCESSIG UIT I DISCRETE TIME SIGALS AD SYSTEM Slid Rviw of discrt-tim signals & systms Signal:- A signal is dfind as any physical quantity that varis with tim, spac or any othr indpndnt

More information

TOPOLOGY DESIGN OF STRUCTURE LOADED BY EARTHQUAKE. Vienna University of Technology

TOPOLOGY DESIGN OF STRUCTURE LOADED BY EARTHQUAKE. Vienna University of Technology Bluchr Mchanical Enginring Procdings May 2014, vol. 1, num. 1 www.procdings.bluchr.com.br/vnto/10wccm TOPOLOGY DESIG OF STRUCTURE LOADED BY EARTHQUAKE P. Rosko 1 1 Cntr of Mchanics and Structural Dynamics,

More information

SECTION where P (cos θ, sin θ) and Q(cos θ, sin θ) are polynomials in cos θ and sin θ, provided Q is never equal to zero.

SECTION where P (cos θ, sin θ) and Q(cos θ, sin θ) are polynomials in cos θ and sin θ, provided Q is never equal to zero. SETION 6. 57 6. Evaluation of Dfinit Intgrals Exampl 6.6 W hav usd dfinit intgrals to valuat contour intgrals. It may com as a surpris to larn that contour intgrals and rsidus can b usd to valuat crtain

More information

UNTYPED LAMBDA CALCULUS (II)

UNTYPED LAMBDA CALCULUS (II) 1 UNTYPED LAMBDA CALCULUS (II) RECALL: CALL-BY-VALUE O.S. Basic rul Sarch ruls: (\x.) v [v/x] 1 1 1 1 v v CALL-BY-VALUE EVALUATION EXAMPLE (\x. x x) (\y. y) x x [\y. y / x] = (\y. y) (\y. y) y [\y. y /

More information

Derangements and Applications

Derangements and Applications 2 3 47 6 23 Journal of Intgr Squncs, Vol. 6 (2003), Articl 03..2 Drangmnts and Applications Mhdi Hassani Dpartmnt of Mathmatics Institut for Advancd Studis in Basic Scincs Zanjan, Iran mhassani@iasbs.ac.ir

More information

Limits Indeterminate Forms and L Hospital s Rule

Limits Indeterminate Forms and L Hospital s Rule Limits Indtrmint Forms nd L Hospitl s Rul I Indtrmint Form o th Tp W hv prviousl studid its with th indtrmint orm s shown in th ollowin mpls: Empl : Empl : tn [Not: W us th ivn it ] Empl : 8 h 8 [Not:

More information

This Week. Computer Graphics. Introduction. Introduction. Graphics Maths by Example. Graphics Maths by Example

This Week. Computer Graphics. Introduction. Introduction. Graphics Maths by Example. Graphics Maths by Example This Wk Computr Grphics Vctors nd Oprtions Vctor Arithmtic Gomtric Concpts Points, Lins nd Plns Eploiting Dot Products CSC 470 Computr Grphics 1 CSC 470 Computr Grphics 2 Introduction Introduction Wh do

More information

On spanning trees and cycles of multicolored point sets with few intersections

On spanning trees and cycles of multicolored point sets with few intersections On spanning trs and cycls of multicolord point sts with fw intrsctions M. Kano, C. Mrino, and J. Urrutia April, 00 Abstract Lt P 1,..., P k b a collction of disjoint point sts in R in gnral position. W

More information

Application of Vague Soft Sets in students evaluation

Application of Vague Soft Sets in students evaluation Availabl onlin at www.plagiarsarchlibrary.com Advancs in Applid Scinc Rsarch, 0, (6):48-43 ISSN: 0976-860 CODEN (USA): AASRFC Application of Vagu Soft Sts in studnts valuation B. Chtia*and P. K. Das Dpartmnt

More information

Multi-channel Dual Clocks three-dimensional probability Random Multiple Access protocol for Wireless Public Bus Networks based on RTS/CTS mechanism

Multi-channel Dual Clocks three-dimensional probability Random Multiple Access protocol for Wireless Public Bus Networks based on RTS/CTS mechanism MATE Wb of onfrncs 44, 00 ( 06 DO: 0.05/ mtcconf/ 06 4400 Ownd by th uthors, publishd by EDP Scincs, 06 Multi-chnnl Dul locks thr-dimnsionl probbility ndom Multipl Accss protocol for Wirlss Public us Ntworks

More information

Oppgavesett kap. 6 (1 av..)

Oppgavesett kap. 6 (1 av..) Oppgvstt kp. 6 (1 v..) hns.brnn@go.uio.no Problm 1 () Wht is homognous nucltion? Why dos Figur 6.2 in th book show tht w won't gt homognous nucltion in th tmosphr? ˆ Homognous nucltion crts cloud droplts

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY HAYSTACK OBSERVATORY WESTFORD, MASSACHUSETTS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY HAYSTACK OBSERVATORY WESTFORD, MASSACHUSETTS VSRT MEMO #05 MASSACHUSETTS INSTITUTE OF TECHNOLOGY HAYSTACK OBSERVATORY WESTFORD, MASSACHUSETTS 01886 Fbrury 3, 009 Tlphon: 781-981-507 Fx: 781-981-0590 To: VSRT Group From: Aln E.E. Rogrs Subjct: Simplifid

More information

CS 361 Meeting 12 10/3/18

CS 361 Meeting 12 10/3/18 CS 36 Mting 2 /3/8 Announcmnts. Homwork 4 is du Friday. If Friday is Mountain Day, homwork should b turnd in at my offic or th dpartmnt offic bfor 4. 2. Homwork 5 will b availabl ovr th wknd. 3. Our midtrm

More information

Abstract Interpretation. Lecture 5. Profs. Aiken, Barrett & Dill CS 357 Lecture 5 1

Abstract Interpretation. Lecture 5. Profs. Aiken, Barrett & Dill CS 357 Lecture 5 1 Abstract Intrprtation 1 History On brakthrough papr Cousot & Cousot 77 (?) Inspird by Dataflow analysis Dnotational smantics Enthusiastically mbracd by th community At last th functional community... At

More information

Observer Bias and Reliability By Xunchi Pu

Observer Bias and Reliability By Xunchi Pu Obsrvr Bias and Rliability By Xunchi Pu Introduction Clarly all masurmnts or obsrvations nd to b mad as accuratly as possibl and invstigators nd to pay carful attntion to chcking th rliability of thir

More information

Elements of Statistical Thermodynamics

Elements of Statistical Thermodynamics 24 Elmnts of Statistical Thrmodynamics Statistical thrmodynamics is a branch of knowldg that has its own postulats and tchniqus. W do not attmpt to giv hr vn an introduction to th fild. In this chaptr,

More information

CIVL 8/ D Boundary Value Problems - Rectangular Elements 1/7

CIVL 8/ D Boundary Value Problems - Rectangular Elements 1/7 CIVL / -D Boundr Vlu Prolms - Rctngulr Elmnts / RECANGULAR ELEMENS - In som pplictions, it m mor dsirl to us n lmntl rprsnttion of th domin tht hs four sids, ithr rctngulr or qudriltrl in shp. Considr

More information

10. The Discrete-Time Fourier Transform (DTFT)

10. The Discrete-Time Fourier Transform (DTFT) Th Discrt-Tim Fourir Transform (DTFT Dfinition of th discrt-tim Fourir transform Th Fourir rprsntation of signals plays an important rol in both continuous and discrt signal procssing In this sction w

More information

On the number of pairs of positive integers x,y H such that x 2 +y 2 +1, x 2 +y 2 +2 are square-free

On the number of pairs of positive integers x,y H such that x 2 +y 2 +1, x 2 +y 2 +2 are square-free arxiv:90.04838v [math.nt] 5 Jan 09 On th numbr of pairs of positiv intgrs x,y H such that x +y +, x +y + ar squar-fr S. I. Dimitrov Abstract In th prsnt papr w show that thr xist infinitly many conscutiv

More information

CPSC 665 : An Algorithmist s Toolkit Lecture 4 : 21 Jan Linear Programming

CPSC 665 : An Algorithmist s Toolkit Lecture 4 : 21 Jan Linear Programming CPSC 665 : An Algorithmist s Toolkit Lctur 4 : 21 Jan 2015 Lcturr: Sushant Sachdva Linar Programming Scrib: Rasmus Kyng 1. Introduction An optimization problm rquirs us to find th minimum or maximum) of

More information

General Notes About 2007 AP Physics Scoring Guidelines

General Notes About 2007 AP Physics Scoring Guidelines AP PHYSICS C: ELECTRICITY AND MAGNETISM 2007 SCORING GUIDELINES Gnral Nots About 2007 AP Physics Scoring Guidlins 1. Th solutions contain th most common mthod of solving th fr-rspons qustions and th allocation

More information

Abstract Interpretation: concrete and abstract semantics

Abstract Interpretation: concrete and abstract semantics Abstract Intrprtation: concrt and abstract smantics Concrt smantics W considr a vry tiny languag that manags arithmtic oprations on intgrs valus. Th (concrt) smantics of th languags cab b dfind by th funzcion

More information

Category Theory Approach to Fusion of Wavelet-Based Features

Category Theory Approach to Fusion of Wavelet-Based Features Catgory Thory Approach to Fusion of Wavlt-Basd Faturs Scott A. DLoach Air Forc Institut of Tchnology Dpartmnt of Elctrical and Computr Enginring Wright-Pattrson AFB, Ohio 45433 Scott.DLoach@afit.af.mil

More information

Behavioral Automata Composition for Automatic Topology Independent Verification of Parameterized Systems

Behavioral Automata Composition for Automatic Topology Independent Verification of Parameterized Systems Bhavioral Automata Composition for Automatic Topology Indpndnt Vrification of Paramtrizd Systms Youssf Hanna Samik Basu Hridsh Rajan Computr Scinc, Iowa Stat Univrsity 226 Atanasoff Hall, Ams, IA, USA

More information

On the Role of Fitness, Precision, Generalization and Simplicity in Process Discovery

On the Role of Fitness, Precision, Generalization and Simplicity in Process Discovery On th Rol of Fitnss, Prcision, Gnrliztion n Simplicity in Procss Discovry Joos Buijs Bouwijn vn Dongn Wil vn r Alst http://www.win.tu.nl/coslog/ Avncs in Procss ining ny procss iscovry n conformnc chcking

More information

CSE 373: AVL trees. Warmup: Warmup. Interlude: Exploring the balance invariant. AVL Trees: Invariants. AVL tree invariants review

CSE 373: AVL trees. Warmup: Warmup. Interlude: Exploring the balance invariant. AVL Trees: Invariants. AVL tree invariants review rmup CSE 7: AVL trs rmup: ht is n invrint? Mihl L Friy, Jn 9, 0 ht r th AVL tr invrints, xtly? Disuss with your nighor. AVL Trs: Invrints Intrlu: Exploring th ln invrint Cor i: xtr invrint to BSTs tht

More information

Transitional Probability Model for a Serial Phases in Production

Transitional Probability Model for a Serial Phases in Production Jurnal Karya Asli Lorkan Ahli Matmatik Vol. 3 No. 2 (2010) pag 49-54. Jurnal Karya Asli Lorkan Ahli Matmatik Transitional Probability Modl for a Srial Phass in Production Adam Baharum School of Mathmatical

More information

Propositional Logic. Combinatorial Problem Solving (CPS) Albert Oliveras Enric Rodríguez-Carbonell. May 17, 2018

Propositional Logic. Combinatorial Problem Solving (CPS) Albert Oliveras Enric Rodríguez-Carbonell. May 17, 2018 Propositional Logic Combinatorial Problm Solving (CPS) Albrt Olivras Enric Rodríguz-Carbonll May 17, 2018 Ovrviw of th sssion Dfinition of Propositional Logic Gnral Concpts in Logic Rduction to SAT CNFs

More information

The van der Waals interaction 1 D. E. Soper 2 University of Oregon 20 April 2012

The van der Waals interaction 1 D. E. Soper 2 University of Oregon 20 April 2012 Th van dr Waals intraction D. E. Sopr 2 Univrsity of Orgon 20 pril 202 Th van dr Waals intraction is discussd in Chaptr 5 of J. J. Sakurai, Modrn Quantum Mchanics. Hr I tak a look at it in a littl mor

More information

Content Based Status Updates

Content Based Status Updates Contnt Basd Status Updats li Najm LTHI, PFL, Lausann, Switzrland mail: li.najm@pfl.ch Rajai Nassr LTHI, PFL, Lausann, Switzrland mail: rajai.nassr@pfl.ch mr Tlatar LTHI, PFL, Lausann, Switzrland mail:

More information

Estimation of apparent fraction defective: A mathematical approach

Estimation of apparent fraction defective: A mathematical approach Availabl onlin at www.plagiarsarchlibrary.com Plagia Rsarch Library Advancs in Applid Scinc Rsarch, 011, (): 84-89 ISSN: 0976-8610 CODEN (USA): AASRFC Estimation of apparnt fraction dfctiv: A mathmatical

More information

Properties of Phase Space Wavefunctions and Eigenvalue Equation of Momentum Dispersion Operator

Properties of Phase Space Wavefunctions and Eigenvalue Equation of Momentum Dispersion Operator Proprtis of Phas Spac Wavfunctions and Eignvalu Equation of Momntum Disprsion Oprator Ravo Tokiniaina Ranaivoson 1, Raolina Andriambololona 2, Hanitriarivo Rakotoson 3 raolinasp@yahoo.fr 1 ;jacqulinraolina@hotmail.com

More information

4.2 Design of Sections for Flexure

4.2 Design of Sections for Flexure 4. Dsign of Sctions for Flxur This sction covrs th following topics Prliminary Dsign Final Dsign for Typ 1 Mmbrs Spcial Cas Calculation of Momnt Dmand For simply supportd prstrssd bams, th maximum momnt

More information

Why the Junction Tree Algorithm? The Junction Tree Algorithm. Clique Potential Representation. Overview. Chris Williams 1.

Why the Junction Tree Algorithm? The Junction Tree Algorithm. Clique Potential Representation. Overview. Chris Williams 1. Why th Juntion Tr lgorithm? Th Juntion Tr lgorithm hris Willims 1 Shool of Informtis, Univrsity of Einurgh Otor 2009 Th JT is gnrl-purpos lgorithm for omputing (onitionl) mrginls on grphs. It os this y

More information

Ch. 24 Molecular Reaction Dynamics 1. Collision Theory

Ch. 24 Molecular Reaction Dynamics 1. Collision Theory Ch. 4 Molcular Raction Dynamics 1. Collision Thory Lctur 16. Diffusion-Controlld Raction 3. Th Matrial Balanc Equation 4. Transition Stat Thory: Th Eyring Equation 5. Transition Stat Thory: Thrmodynamic

More information

Recall that by Theorems 10.3 and 10.4 together provide us the estimate o(n2 ), S(q) q 9, q=1

Recall that by Theorems 10.3 and 10.4 together provide us the estimate o(n2 ), S(q) q 9, q=1 Chaptr 11 Th singular sris Rcall that by Thorms 10 and 104 togthr provid us th stimat 9 4 n 2 111 Rn = SnΓ 2 + on2, whr th singular sris Sn was dfind in Chaptr 10 as Sn = q=1 Sq q 9, with Sq = 1 a q gcda,q=1

More information

(2) If we multiplied a row of B by λ, then the value is also multiplied by λ(here lambda could be 0). namely

(2) If we multiplied a row of B by λ, then the value is also multiplied by λ(here lambda could be 0). namely . DETERMINANT.. Dtrminnt. Introution:I you think row vtor o mtrix s oorint o vtors in sp, thn th gomtri mning o th rnk o th mtrix is th imnsion o th prlllppi spnn y thm. But w r not only r out th imnsion,

More information

A Prey-Predator Model with an Alternative Food for the Predator, Harvesting of Both the Species and with A Gestation Period for Interaction

A Prey-Predator Model with an Alternative Food for the Predator, Harvesting of Both the Species and with A Gestation Period for Interaction Int. J. Opn Problms Compt. Math., Vol., o., Jun 008 A Pry-Prdator Modl with an Altrnativ Food for th Prdator, Harvsting of Both th Spcis and with A Gstation Priod for Intraction K. L. arayan and. CH. P.

More information

Basic Polyhedral theory

Basic Polyhedral theory Basic Polyhdral thory Th st P = { A b} is calld a polyhdron. Lmma 1. Eithr th systm A = b, b 0, 0 has a solution or thr is a vctorπ such that π A 0, πb < 0 Thr cass, if solution in top row dos not ist

More information

Engineering 323 Beautiful HW #13 Page 1 of 6 Brown Problem 5-12

Engineering 323 Beautiful HW #13 Page 1 of 6 Brown Problem 5-12 Enginring Bautiful HW #1 Pag 1 of 6 5.1 Two componnts of a minicomputr hav th following joint pdf for thir usful liftims X and Y: = x(1+ x and y othrwis a. What is th probability that th liftim X of th

More information

Random Access Techniques: ALOHA (cont.)

Random Access Techniques: ALOHA (cont.) Random Accss Tchniqus: ALOHA (cont.) 1 Exampl [ Aloha avoiding collision ] A pur ALOHA ntwork transmits a 200-bit fram on a shard channl Of 200 kbps at tim. What is th rquirmnt to mak this fram collision

More information

Multi-agent based protection system for distribution system with DG

Multi-agent based protection system for distribution system with DG Multi- bsd protction systm for distribution systm with DG JIN SHAGN, NENGLING TAI, QI LIU Dprtmnt of Elctricl Powr Enginring Shnghi JioTong Univrsity NO.800, DongChun Rod, Shnghi CHINA fctsj@sjtu.du.cn

More information

a b c cat CAT A B C Aa Bb Cc cat cat Lesson 1 (Part 1) Verbal lesson: Capital Letters Make The Same Sound Lesson 1 (Part 1) continued...

a b c cat CAT A B C Aa Bb Cc cat cat Lesson 1 (Part 1) Verbal lesson: Capital Letters Make The Same Sound Lesson 1 (Part 1) continued... Progrssiv Printing T.M. CPITLS g 4½+ Th sy, fun (n FR!) wy to tch cpitl lttrs. ook : C o - For Kinrgrtn or First Gr (not for pr-school). - Tchs tht cpitl lttrs mk th sm souns s th littl lttrs. - Tchs th

More information

Garnir Polynomial and their Properties

Garnir Polynomial and their Properties Univrsity of Cliforni, Dvis Dprtmnt of Mthmtis Grnir Polynomil n thir Proprtis Author: Yu Wng Suprvisor: Prof. Gorsky Eugny My 8, 07 Grnir Polynomil n thir Proprtis Yu Wng mil: uywng@uvis.u. In this ppr,

More information

Vehicle Routing Problem with Simultaneous Pickup and Delivery in Cross-Docking Environment

Vehicle Routing Problem with Simultaneous Pickup and Delivery in Cross-Docking Environment Vhicl Routing Problm with Simultanous Picup and Dlivry in Cross-Docing Environmnt Chiong Huang and Yun-Xi Liu Abstract This study will discuss th vhicl routing problm with simultanous picup and dlivry

More information

The Open Economy in the Short Run

The Open Economy in the Short Run Economics 442 Mnzi D. Chinn Spring 208 Social Scincs 748 Univrsity of Wisconsin-Madison Th Opn Economy in th Short Run This st of nots outlins th IS-LM modl of th opn conomy. First, it covrs an accounting

More information

Module graph.py. 1 Introduction. 2 Graph basics. 3 Module graph.py. 3.1 Objects. CS 231 Naomi Nishimura

Module graph.py. 1 Introduction. 2 Graph basics. 3 Module graph.py. 3.1 Objects. CS 231 Naomi Nishimura Moul grph.py CS 231 Nomi Nishimur 1 Introution Just lik th Python list n th Python itionry provi wys of storing, ssing, n moifying t, grph n viw s wy of storing, ssing, n moifying t. Bus Python os not

More information

A False History of True Concurrency

A False History of True Concurrency A Fals History of Tru Concurrncy Javir Esparza Sofwar Rliability and Scurity Group Institut for Formal Mthods in Computr Scinc Univrsity of Stuttgart. Th arly 6s. 2 Abstract Modls of Computation in th

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grdy mthods Prudn Wong http://www.s.liv..uk/~pwong/thing/omp108/01617 Coin Chng Prolm Suppos w hv 3 typs of oins 10p 0p 50p Minimum numr of oins to mk 0.8, 1.0, 1.? Grdy mthod Lrning outoms Undrstnd wht

More information

Where k is either given or determined from the data and c is an arbitrary constant.

Where k is either given or determined from the data and c is an arbitrary constant. Exponntial growth and dcay applications W wish to solv an quation that has a drivativ. dy ky k > dx This quation says that th rat of chang of th function is proportional to th function. Th solution is

More information