Quantization for Physical Layer Security

Size: px
Start display at page:

Download "Quantization for Physical Layer Security"

Transcription

1 Quntiztion for Physicl Lyer Security On Grur, Nzi Islm, nd Werner Henkel Jcobs University Bremen Electricl Engineering nd Computer Science Bremen, Germny Emils: {o.grur, Abstrct We propose multi-level CSI quntiztion nd key reconcilition scheme for physicl lyer security. The noisy wireless chnnel estimtes obtined by the users first run through trnsformtion, prior to the quntiztion step. This enbles the definition of gurd bnds round the quntiztion boundries, tilored for specific efficiency nd not compromising the uniformity required t the output of the quntizer. Our construction results in n better key disgreement nd initil key genertion rte trde-off when compred to other level-crossing quntiztion methods. I. INTRODUCTION AND MOTIVATION Due to the inherently rndom nture of the brodcst wireless chnnel, extensive reserch efforts hve been directed, over the lst decde, towrds the genertion of encryption keys t the physicl lyer. As opposed to cryptogrphic security tht relies on limited computtionl resources of potentil evesdroppers, s well s key exchnge mechnism, physicl lyer security ims t providing users shring wireless chnnel with symmetric keys tht cn be used for encryption/decryption, without relying on preexistent key distribution infrstructure. The originl principle dtes bck to the one-time pd, described by Vernm [] in 96, where plintext is encrypted with previously known secret key through modulr ddition. If the key is truly rndom nd s long s the plintext messge, n evesdropper without ccess to the key cnnot decrypt the messge. Shnnon, lter on, formulted this finding in informtion-theoretic terms [], i.e., the vilbility of the ciphertext t the evesdropper does not provide ny id in guessing the plintext messge if the entropy of the key is lrger or equl to the entropy of the messge. Although this finding hs been widely known, the key distribution, long with the requirement of the lrge key length, constituted the prcticl limittions for which much of the reserch focus hs shifted towrds clssic cryptogrphic schemes over the lst century. The interest in informtiontheoretic security hs risen gin, long with the dvncements in d-hoc networks, such s wireless sensor networks (WSN), nd Internet of Things (IoT), where the ssumption of key distribution infrstructure, on which computtionl security relies, is unfesible. A thorough survey on recent physicl lyer key genertion dvncements cn be found in [3]. Our contribution in this pper focuses on the quntiztion nd reconcilition of correlted chnnel estimtes obtined by two users. Unlike other works [4], [5], we use the complex chnnel stte informtion (CSI) for key genertion, nd quntize the rel nd imginry prts jointly. In obtining the complex CSI, prsitic ntenn rry is used t one of the users, in order to generte rtificil fding nd to ensure high degree of chnnel rndomness, even in lineof-sight (LOS) or sttic environments. We lso propose trnsformtion tht mps the complex chnnel estimtes to the unit squre, prior to vector quntiztion step, whose purpose is multifold. First, the trnsformtion we propose fcilittes the use of well-known, low-complexity vector quntizers, such s Linde-Buzo-Grey (LBG) [6], by providing uniformly distributed quntizer output, even for higher level quntiztion. Second, we show how such trnsformtion enbles the strightforwrd construction of gurd bnds round the quntiztion boundries, without scrificing the uniformity of the quntizer output. Such gurd bnds re introduced s key reconcilition method, with the purpose of excluding the mesurement smples most likely to be erroneous due to independent noise on both sides or circuitry imperfections. Our findings show tht in the cse of very strong correltion between the legitimte user mesurements, for fixed key genertion rte, higher level quntiztion with wider gurd bnds is preferred to lower level quntiztion with nrrow gurd bnds. Section IV show the performnce improvement of our scheme to previous methods described in literture. A. Requirements for Physicl Lyer Key Genertion Three min requirements need to be fulfilled for physicl lyer key genertion, chnnel reciprocity, rndomness, nd sptil decorreltion. If we denote by h AB the forwrd chnnel from Alice to Bob, nd by h BA the reverse chnnel from Bob to Alice, s shown in Fig., the chnnel reciprocity principle implies h AB h BA c. This is true to some extent for TDD systems, such s 8., WiMAX, LTE, etc.. As long s the coherence time of the chnnel is lrger thn the mesurement time, the two users, Alice nd Bob, cn send previously known pilot signls in consecutive time slots in order to obtin their vectors of chnnel estimtes, â c + n, ˆb c + n b, where â nd ˆb denote the estimte vectors t Alice, nd Bob, respectively. n, nd n b represent the independent noise vectors ffecting the user estimtes, rising from different trnsceiver circuitry, nd possible vritions of the chnnel during the non-simultneous mesurement slots. Although they re correlted, strightforwrd quntiztion of the mesurement vectors will likely

2 result in key mismtch between the users, nd n dditionl step of key reconcilition needs to be performed. The chnnel mesurements cn represent either chnnel stte informtion (CSI), or received signl strength informtion (RSSI). The CSI mesurements cn refer to either the chnnel impulse response or frequency response, contining both mplitude nd phse informtion. RSSI, in contrst, refers to n verge of the received power for the whole pcket nd cn be seen s more corse-grined, compred to the instntneous CSI vlues. Although CSI-bsed key genertion hs been shown to significntly outperform RSSI-bsed key genertion [7], RSSI dt hs been used in most of the previously proposed key genertion schemes bsed on its vilbility from most off-the-shelf WiFi crds. Sptil decorreltion. If pssive evesdropper, Eve, is locted few wvelengths wy from ny of the legitimte users, the chnnel smples estimted by Eve, ê, will exhibit low correltion to the forwrd nd reverse chnnel smples estimted by Alice nd Bob. Hence, most of the rndomly generted key bits will be secure with respect to Eve. In order to support this clim, we refer the reders to the work in [8] [], where theoreticl nd experimentl pproches hve been tken in deriving the mount of key informtion tht leks to the evesdropper, depending on its seprtion distnce. Even smll mount of informtion leked is of serious concern nd is highly dependent on Eve s position nd reltive distnce to the legitimte users, thus further processing methods such s dvntge distilltion nd privcy mplifiction [], [], re required. An initil key K N of length N, obtined by Alice nd Bob, is reduced to shorter key of length R, i.e., K R, through the use of hsh function g, known by ll prties, such tht the lekge H(K R ê, g) is diminished. In here, we hence ignore the effect of pssive Eve, by ssuming sufficient evesdropper seprtion, s well s privcy mplifiction fter the quntiztion step. We re lso not concerned here with the possibility of ctive jmming ttcks. Rndomness. A lrge degree of rndomness ensures the existence of lrge key pool fter quntiztion, mking it more computtionlly prohibitive for the evesdropper to resort to brute-force ttcks. If the reciprocl wireless chnnel does not exhibit high degree of fding, rtificil fding cn be induced through the use of prsitic ntenn rrys, s we discuss in Section II-A. It should be noted tht the uncertinty t the evesdropper is mximum when the key is uniformly distributed over its lphbet. For compring different pproches, we follow the frmework of [3], with the following metrics. ) Correltion Coefficient: We use the Person correltion coefficient, ρ, s mesure of the degree of reciprocity of two sequences, â [â â N ] T nd ˆb [ˆb ˆb N ] T. ) Key Disgreement Rte (KDR): The key disgreement rte is defined s the verge rtio between the key symbols found in disgreement between Alice nd Bob to the overll number of symbols. We shll distinguish ccordingly between symbol nd bit disgreement rte in subsequent sections. 3) Initil Key Genertion Rte (IKGR): We define the symbol IKGR s the verge of the rtio between the number of symbols used for key genertion fter quntiztion to the totl number of symbols fed to the quntizer. For multilevel quntiztions, i.e., N q, the bit IKGR is obtined by multiplying the symbol IKGR with the number of bits per symbol. II. SYSTEM DESCRIPTION A. RECAP Antenns for Chnnel Rndomiztion The wireless chnnel between the users does not only include the propgtion chnnel, but lso the rdition chrcteristics of the trnsmit/receive ntenns. The chnnel cn be seen s time-vrying if the propgtion chnnel is multipth rich nd one of the nodes is moving. However, in the cse of line-of-sight (LOS) chnnel, reconfigurble perture ntenn rrys (RECAPs) cn be used. A RECAP ntenn consists of reconfigurble elements (REs), confined to physicl perture [8], [4]. Ech RE cn be in number of sttes, e.g., by vrying cpcitive lods. B. System Model Figure depicts the system model. We consider one of the legitimte users, e.g., Alice, to be equipped with RECAP ntenn with 4 prsitic reconfigurble elements (REs), nd one feed element, shown in ornge. Bob nd Eve re ech equipped with single dipole ntenn. The perceived chnnel distribution, s seen by the users, when RECAP ntenn is used, depends on the number of REs tht re ctive, s well s on the number of sttes. Although using RECAP ntenns for creting rtificil fding does not lwys led to norml chnnel distribution, when the number of reconfigurble elements of the rry is lrge, the number of sttes is lrge, nd the reflection coefficient is controlled, s discussed in [5], the distribution is very close to complex Gussin, with the rel nd imginry prts i.i.d.. The chnnel distributions obtined for the RECAP configurtions in Fig., re shown subsequently, in Fig. 3. For the rest of this work, we ssume the chnnel to follow normlized complex Gussin distribution, with the rel nd imginry prts i.i.d., s obtined for the N RE 4 RECAP configurtion. Additionl detils on how the chnnel mesurements used in this work were obtined, long with study on the number of secure bits s function of multipth nd evesdropper ntenn seprtion, cn be found in [6], [7]. Fig.. System Model

3 Fig.. RECAP configurtions;, 4, 8, 6, 4 ctive reconfigurble elements (REs); feed element in ornge, ctive REs in blue, inctive REs in green Fig. 3. Complex chnnel pdfs given different RECAP configurtions;, 4, 8, 6, 4 ctive reconfigurble elements (REs) The first step in the key genertion nd reconcilition process is the chnnel probing phse, in which both Alice nd Bob obtin their length N vectors of complex CSI estimtes, nmely nd b. Note tht throughout this pper, bold lowercse nottions re used for vectors, while the noisy estimtes re indicted by theˆ symbol. If c x + jy denotes complex chnnel smple, x A + j y A nd b x B + j y B represent the noisy estimtes of the chnnel smple c t Alice, nd Bob, respectively, with x A, y A, x B, y B denoting the estimtes of the rel nd imginry components. All nottions re summrized in Tble I, for convenience. TABLE I N OTATIONS Nottion c x + jy x [x xn ]T y [y yn ]T x A + jy A b x B + jy B x A x + nx y A y + ny x B x + nxb y B y + nyb u u x + ju y u b u xb + ju yb σ σn σn b σ σ + σn σb σ + σn b Ri (u x, u y ) (u xb, u yb ) (nux, nuy ) Description vector of chnnel smples (complex) vector of chnnel smples (rel prt) vector of chnnel smples (imginry prt) vector of complex chnnel estimtes t Alice, [ N ]T vector of complex chnnel estimtes t Bob, b [b b N ]T mesurement estimtes of x t Alice mesurement estimtes of y t Alice mesurement estimtes of x t Bob mesurement estimtes of y t Bob trnsformed vector (uniform domin) trnsformed vector b (uniform domin) vrince of x, y (chnnel vrince) noise vrince t Alice noise vrince t Bob vrince of (t Alice) vrince of b (t Bob) number of quntiztion regions ith quntiztion region rel nd imginry components of Alice s smple fter trnsformtion rel nd imginry components of Bob s smple b fter trnsformtion to uniform domin rndom vribles describing the rel nd imginry noise components, respectively, ffecting complex smple c x + jy, fter trnsformtion to uniform domin C. Uniform Trnsformtion Hving obtined their sequences of nlog complex chnnel estimtes, both Alice nd Bob first pply trnsformtion of the dt, before quntizing, s follows: u x x A y A erfc ; u y erfc. ) (σ + σn ) (σ + σn () u x nd u y correspond to the rel nd imginry components of smple fter the trnsformtion, t Alice, likewise u xb nd u yb for Bob. Since the estimtes x A nd y A re ech distributed ccording to zero-men Gussin pdf with, the trnsformed smples u x nd vrince σ σ + σn u y will ech follow uniform distribution in (, ). Thus, the vector of complex estimtes, in the originl domin, will now be mpped into vector u, uniformly distributed in the unit squre, fter trnsformtion. We refer to the domin fter trnsformtion s the uniform domin. Performing such trnsformtion of the dt before quntiztion is motivted by the reduced complexity of the vector quntiztion, s well s the computtion of the gurd bnd widths. Our gol now is to find n equl-re prtitioning of the unit squre into quntiztion regions, while mintining low probbility tht chnnel smple is quntized to different regions by Alice nd Bob, due to independent noise effects. The equl-re constrint is required to ensure uniform distribution of the quntized key symbols. We first turn our ttention to the noise distribution fter trnsformtion. Since nx nd ny were normlly distributed before trnsformtion with mens x nd y, nd vrinces σnx σny σn, their mrginl pdfs fter trnsformtion re found to be (x+σ erfc (nux )) σ (erfc (nux )) σn f (nux x) e (), σn The mrginl pdf for the imginry noise component is similr to the one in (). The noise t Alice, round the point of

4 coordintes (x, y) will hve distribution, fter the trnsformtion, which will depend on the (x, y) positions in the originl domin. The rel nd imginry noise pdfs t Bob re obtined by substituting σ with σ b in (). Figure 4 shows the mrginl pdf of the noise fter trnsformtion (rel dimension only), from (), for vrious positions of (x, y) in the originl domin. As (x, y) vry from the inside of the circulrly symmetric Gussin towrds the periphery, the mrginl noise pdfs fter trnsformtion hve nrrower vrince towrds the edges of the unit squre. reltive frequency of n ux Uniform domin noise distribution fter trnsformtion n ux x.3 (simultion) x.3 (theoreticl) x.5 (simultion) x.5 (theoreticl) x (simultion) x (theoreticl) x.5 (simultion) x.5 (theoreticl) x.3 (simultion) x.3 (theoreticl) Fig. 4. Mrginl PDF of the noise fter trnsformtion to uniform domin; rel component only. The circulr mrkers correspond to the theoreticl curves, s given in (), while the lines correspond to the pdf estimtes from simultions. After the trnsformtion phse, both Alice nd Bob re redy to proceed with the vector quntiztion. We will first proceed with describing the vector quntiztion scheme chosen nd then describe the computtion of the gurd bnds. III. QUANTIZATION One of the most widely used vector quntiztion schemes is the Linde-Buzo-Gry (LBG) lgorithm [6]. Its widespred is consequence of the fct tht is hs very low implementtion complexity nd it outperforms other vector quntizers in prcticl situtions. LBG is the discrete version of the Lloyd- Mx quntizer, nd, unlike Lloyd-Mx, it does not require closed form expression of the input density, but n initil trining vector tht is itertively prtitioned into N q clusters. We show in Fig. 5 the difference in output distribution when we pply the LBG quntiztion to circulrly symmetric Gussin input nd when we pply it to uniformly distributed input, s the one obtined fter our trnsformtion in (). With n increse in the number of quntiztion regions, the uniformity of the output is not preserved when LBG quntiztion is pplied directly to the estimte vectors, without first performing the trnsformtion. Hence, the proposed trnsformtion is importnt for key genertion. A. Gurd Bnd Construction The second rgument for such trnsformtion is tht once the coordintes of the vertices of the Voronoi cells re obtined, the computtion of the gurd bnds is strightforwrd. Since the quntiztion cells re now equl-re polygons tessellting the unit squre, we cn design gurd bnds round the quntiztion boundries strting from certin efficiency. We define efficiency η to represent the rtio of points tht fll outside the gurd bnds to the overll number of points. Due to the uniform distribution of the smples Fig. 5. Output distribution cross quntiztion regions for uniform nd normlly distributed LBG trining sets; () N q 3; (b) N q 6 fter trnsformtion, the efficiency η A useful A Asqure gb, where A gb is the totl re of the gurd bnds. Since we re interested in preserving the uniformity of the output symbols, even fter the construction of the gurd bnds, we require tht n re of η N q is ssigned to the gurd bnds within ech quntiztion region. It should be noted, however, tht lthough the quntiztion regions should hve equl res in the unit squre, this does not imply equl widths of the gurd bnds cross the regions. If we let (v x, v y ) denote the vectors holding the rel nd imginry coordintes of the vertices of certin region R i, the coordintes of the inner polygon representing the useful region of cell R i cn be computed using the theorem of similr polygons, s follows: v xrescled η(v x µ vx ) + µ vx, v yrescled η(v y µ vy ) + µ vy, (3) where µ v is the men of vector v. For illustrtion purposes, we show in Fig. 6 () the LBG quntiztion regions, long with the corresponding gurd bnds, for N q 8, nd n efficiency η.8. Fig. 6 (b) shows the sme points tht hve been quntized in the uniform domin, fter being trnsformed bck to the originl domin. This is shown to illustrte the fct tht n equivlent quntiztion in the originl domin would hve non-liner gurd bnds. Note tht our method does not require such n inverse trnsformtion of the points, nd both Alice nd Bob generte their keys by quntizing their trnsformed complex vectors û nd û b, respectively. The gurd bnd construction is lso possible in the originl domin, however, more complicted. For the simplest cse of the binry quntiztion, when the dt is quntized in the originl domin, with the quntiztion boundry consisting of stright line going through the origin, the gurd bnds of width r round the quntiztion line re computed by solving η π(σ + σn) r r e ˆx A +ŷ A (σ +σ n ) dˆx A dŷ A. (4) However, for lrger number of Voronoi cells, with rbitrry quntiztion boundries, (4) becomes much more complex, mking even individul numericl solutions for the gurd bnd

5 widths in the originl domin prcticlly unfesible. Note tht regrdless of the domin chosen, neither the quntiztion nor the gurd bnd reconcilition should ffect the uniformity t the output of the quntizer. Previous quntiztion nd 8; LBG VQ with GBs (uniform domin) P b 8; points fter inverse trnsformtion points outside GBs points inside GBs points outside GBs points inside GBs.6.5 uy.7 y x ux Fig. 6. () Linde-Buzo-Gry (LBG) quntiztion of the uniformly distributed squre; points tht fll in the gurd bnds in blue, points outside gurd bnds in green. This plot ws generted for n efficiency η.8; (b) equivlent positions in the originl domin. reconcilition schemes hve tken different pproches. We briefly describe some of the more relevnt previous results, since we will use them s bsis of comprison to our method in Section IV. However, most of the results vilble in the literture discuss binry quntiztion schemes nd do not tke dvntge of quntizing the rel nd imginry components of the complex chnnel jointly, s we propose. Aono [4] drops RSSI vlues below threshold, chosen s the medin, nd communictes the positions of the discrded smples to the other prty. In [8], Tope computes the difference in RSSI vlues nd relies on two thresholds to exclude points tht will likely result in key mismtch. Similrly, in the work of Mthur et l. [5], Alice nd Bob check for successive blocks of m smples tht fll bove or below two thresholds, q+, nd q. Jn et l. [4] proposed both multibit nd single bit dptive secret bit genertion (ASBG) lgorithm, which is modifiction of the work of Mthur [5]. In contrst, the quntizer proposed by Jn, however, divides the mesurements into smller block lengths nd clcultes the thresholds for ech block seprtely, resulting in fster dpttion to shifts in the RSSI men vlue over time. Unlike ll of the bove methods, we strt from fine-grined CSI mesurements, following complex circulrly symmetric distribution, s explined in Section II-A. B. Key Disgreement Rtes The symbol mismtch probbility P ( Ri b / Ri ) between Alice nd Bob cn be computed s follows: P b c i j,j i c i j,j i p(b Rj, Ri, c)dc P (b Rj, Ri c)p(c)dc P (b Rj c)p ( Ri c)p(c)dc.5.3 i j,j i.5.8 c.9 P (b Rj, Ri ) i j,j i (5) Note tht P denotes probbility, while the lowercse p refers to probbility density function. For the simplest cse, with two quntiztion regions, with the quntiztion boundry t x, the bit mismtch probbility, or bit disgreement rte (BDR), is derived in (6)-(9), where R is from (, ), R is from (, ), nd R R R. Note tht, b, nd c re ll complex vribles, so ny integrtion is in rel nd imginry dimensions. For binry quntiztion,, due to the symmetry of the quntiztion, it is sufficient to integrte only the long the rel components of the vribles, nmely x A, x B, nd x, s shown in (9). P b N P b P ( R, b R ) + P ( R, b R ) P ( R c)p (b R c)p(c)dc N P b N c R (6) (7) p( c)p(b c)p(c)d db dc (8) c R b R R IV. R ESULTS For fir evlution of the quntiztion nd reconcilition performnces, we show simultion results for the bit disgreement rte (BDR) versus the correltion coefficient. We provide results for both the binry quntiztion,, s well s multibit quntiztion, 4 nd 8. One interesting spect is whether ny dvntge cn be chieved by using higher level quntiztion, e.g., extrcting multiple bits from single CSI smple, while fixing the initil key genertion rte. In Fig. 7, we show the bit disgreement rtes (BDR) versus correltion for vrious efficiency curves, for two quntiztion regions, nd the sme BDR plotted ginst the SNR in Fig. 8. For binry quntiztion we investigte three scenrios: Method quntizes the user estimtes with line through the middle of the originl domin, i.e., no trnsformtion is pplied. Method splits the originl domin into two eqully probble regions by using circle of pproprite rdius. Method 3 trnsforms the user estimtes to the unit squre, before quntizing with line t ux.5. A mximum key genertion rte of, for the binry quntiztion cse, is chieved for the cse when the gurd bnd widths re zero. As confirmed by simultions, for the binry quntiztion, methods nd 3 hve, of course, the sme performnce, nd surpss Method. For four quntiztion regions, 4, we hve considered four options. Method quntizes the originl dt by splitting the originl domin with four squres intersecting in the origin. Method uses 4 concentric circles to quntize the Gussin estimtes. The rdii of the concentric This is equivlent to LBG quntiztion in the uniform domin for

6 Initil Key Genertion Rte (IKGR) Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Bit Disgreement Rte (BDR) Pâ ˆb σn σ nb σ Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) correltion coefficient Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) correltion coefficient Fig. 7. Bit disgreement rte versus correltion for different initil key genertion rtes; N q 4 6 Method 3: line (uniform domin) Method : line (originl domin) Method : circle (originl domin) Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) 3 4 Fig. 8. Bit disgreement rtes nd the corresponding IKGRs for N q circles re computed such tht the output of the quntiztion is uniformly distributed. Methods 3 nd 4 first trnsform the dt to the uniform domin. Method 3 is similr to Method, however, the quntiztion with four squres is done in the uniform domin, insted of the originl one. Method 4 is the LBG quntiztion in the uniform domin, tht we hve described in the previous sections. Figure 9 shows the BDR versus the correltion coefficient for different key genertion rtes. Note tht since we now consider bits/symbol, n e (ˆx A x) σn e (ˆx B x) σn b e x σ dˆx A dˆx B dx (9) IKGR of corresponds to n efficiency η when no points re discrded, i.e., gurd bnd widths re zero. Our findings show identicl performnce for the quntiztion with four squres, whether it is done in the uniform domin, nd the Linde-Buzo-Gry quntiztion cse. Agin, the concentric quntiztion shows the worst performnce. Figure shows the BDR versus the SNR for N q 4 for different key genertion rtes. Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Method : 4 squres GB (originl domin). Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) correltion coefficient ρ correltion coefficient ρ Fig. 9. Bit disgreement rtes versus correltion for different initil key genertion rtes; N q 4 We illustrte, in Fig., performnce comprison between our work nd previous quntiztion nd reconcilition schemes, following the frmework discussed in [3]. We compre our LBG results for the cse of N q nd N q 3 with the multibit scheme proposed by Jn [4]. As shown in Fig., with the initil key genertion fixed, IKGR, our -bit LBG quntiztion shows n improvement over the corresponding -bit quntiztion of Jn, regrdless of the vlue of the correltion coefficient. However, by incresing the number of bits extrcted per CSI symbol, i.e., 3 bits/symbol, performnce increse in terms of BDR is chievble only for high correltion vlues, compred to the cse of extrcting only bits/symbol. The schemes proposed by Tope nd Murer exhibit low BDR, however, they lso hve very low initil key genertion rtes. Nevertheless, if we fix our IKGR to similr vlues s shown of the other schemes in Fig., our LBG methd is dvntgeous is terms of BDR when compred to ll the other quntiztion schemes. V. CONCLUSION Insted of simply pplying the quntiztion to the CSI estimte vectors tht Alice nd Bob obtin, we first pply trnsformtion of the dt tht leds to uniform distribution. The dvntge of performing such trnsformtion

7 Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Method 4: LBG GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) 3 4 Fig.. Bit disgreement rtes versus SNR for different initil key genertion rtes; N q 4 Fig.. Bit disgreement Rte (BDR) nd Initil Key Genertion Rte (IKGR) versus correltion - comprison to previous works of the complex dt, enbles us to use well known vector quntizer, such s Linde-Buzo-Gry [6], to prtition the uniform domin into equl-re regions nd to esily construct the gurd bnds round the quntiztion boundries, for fixed key genertion rte. Our proposed method tkes dvntge of the joint quntiztion of the rel nd complex CSI components nd discrds the smples tht re most likely to result in key mismtches, without disturbing the uniformity requirement t the output of the quntizer. Our method shows better performnce in terms of bit disgreement nd initil key genertion rtes compred to other previous quntiztion nd reconcilition schemes currently vilble, while lso benefiting from low implementtion complexity. REFERENCES [] G. Vernm, Cipher Printing Telegrph Systems for Secret Wire nd Rdio Telegrphic Communictions, Journl of the AIEE, vol. 45, p. 95, 96. [] C. Shnnon, Communiction Theory of Secrecy Systems, Bell System Technicl Journl, vol. 8, no. 4, pp , 949. [3] J. Zhng, T. Duong, A. Mrshll, nd R. Woods, Key Genertion from Wireless Chnnels: A Review, IEEE Access, vol. 4, pp., 6. [4] S. Jn, S. N. Premnth, M. Clrk, S. Kser, N. Ptwri, nd S. Krishnmurthy, On the Effectiveness of Secret Key Extrction from Wireless Signl Strength in Rel Environments, in Mobile Communictions (MobiCom9), (Beijing), pp., 9. [5] S. Mthur, W. Trppe, N. Mndym, C. Ye, nd A. Reznik, Rdio- Telepthy: Extrcting Secret Key from n Unuthenticted Wireless Chnnel, Proceedings of the 4th ACM interntionl conference on Mobile computing nd networking - MobiCom 8, p. 8, 8. [6] Y. Linde, A. Buzo, nd R. M. Gry, An Algorithm for Vector Quntizer Design, IEEE Trnsctions on Communictions, vol. 8, pp , jn 98. [7] Y. Liu, S. C. Drper, nd A. M. Syeed, Exploiting Chnnel Diversity in Secret Key Genertion from Multipth Fding Rndomness, IEEE Trnsctions on Informtion Forensics nd Security, vol. 7, no. 5, pp ,. [8] R. Mehmood nd J. W. Wllce, Experimentl Assessment of Secret Key Genertion using Prsitic Reconfigurble Aperture Antenns, Proceedings of 6th Europen Conference on Antenns nd Propgtion, EuCAP, no., pp. 5 55,. [9] R. Mehmood, J. W. Wllce, nd M. A. Jensen, Experimentl Chrcteriztion of Chnnel-Bsed Key Estblishment using Reconfigurble Antenns, 8th Europen Conference on Antenns nd Propgtion, EuCAP 4, no. EuCAP, pp , 4. [] A. J. Pierrot, R.. Chou, nd M. R. Bloch, Experimentl Aspects of Secret Key Genertion in Indoor Wireless Environments, in IEEE 4th Workshop on Signl Processing Advnces in Wireless Communictions (SPAWC), pp , 3. [] U. Murer nd S. Wolf, Secret-Key Agreement over Unuthenticted Public Chnnels- Prt III: Privcy Amplifiction, IEEE Trnsctions on Informtion Theory, vol. 49, pp , 3. [] C. H. Bennett, G. Brssrd, C. Crkpeu, U. M. Murer, nd S. Member, Generlized Privcy Amplifiction, vol. 4, no. 6, pp , 995. [3] R. Guillume, C. Zenger, A. Mueller, C. Pr, nd A. Czylwik, Fir Comprison nd Evlution of Quntiztion Schemes for PHY-bsed Key Genertion, OFDM 4, 9th Interntionl OFDM Workshop 4 (InOWo 4); Proceedings of, pp. 5, 4. [4] T. Aono, K. Higuchi, T. Ohir, B. Komiym, nd H. Ssok, Wireless Secret Key Genertion Exploiting Rectnce-Domin Sclr Response of Multipth Fding Chnnels, IEEE Trnsctions on Antenns nd Propgtion, vol. 53, pp , nov 5. [5] R. Mehmood nd J. W. Wllce, Wireless Security Enhncement using Prsitic Reconfigurble Aperture Antenns, in Europen Antenns Propgtion Conference, (Rome, Itly), pp , pr. [6] J. W. Wllce nd R. K. Shrm, Automtic Secret Keys From Reciprocl MIMO Wireless Chnnels: Mesurement nd Anlysis, IEEE Trnsctions on Informtion Forensics nd Security, vol. 5, pp , sep. [7] R. Mehmood, J. W. Wllce, nd M. A. Jensen, Key Estblishment Employing Reconfigurble Antenns: Impct of Antenn Complexity, IEEE Trnsctions on Wireless Communictions, vol. 3, pp , nov 4. [8] M. A. Tope nd J. C. Mcechen, Unconditionlly Secure Communictions over Fding Chnnels, Militry Communictions Conference, vol., no. c, pp ,.

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Numerical integration

Numerical integration 2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter

More information

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

X Z Y Table 1: Possibles values for Y = XZ. 1, p

X Z Y Table 1: Possibles values for Y = XZ. 1, p ECE 534: Elements of Informtion Theory, Fll 00 Homework 7 Solutions ll by Kenneth Plcio Bus October 4, 00. Problem 7.3. Binry multiplier chnnel () Consider the chnnel Y = XZ, where X nd Z re independent

More information

#6A&B Magnetic Field Mapping

#6A&B Magnetic Field Mapping #6A& Mgnetic Field Mpping Gol y performing this lb experiment, you will: 1. use mgnetic field mesurement technique bsed on Frdy s Lw (see the previous experiment),. study the mgnetic fields generted by

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits.

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits. Tutoril 4 Exercises on Differentil Entropy. Evlute the differentil entropy h(x) f ln f for the following: () The uniform distribution, f(x) b. (b) The exponentil density, f(x) λe λx, x 0. (c) The Lplce

More information

Monte Carlo method in solving numerical integration and differential equation

Monte Carlo method in solving numerical integration and differential equation Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The

More information

A New Receiver for Chaotic Digital Transmissions: The Symbolic Matching Approach

A New Receiver for Chaotic Digital Transmissions: The Symbolic Matching Approach A New Receiver for Chotic Digitl Trnsmissions: The Symbolic Mtching Approch Gilles BUREL nd Stéphne AZOU LEST, Université de Bretgne Occidentle CS 93837, 29238 BREST cede 3, Frnce Abstrct : Chotic digitl

More information

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018 Physics 201 Lb 3: Mesurement of Erth s locl grvittionl field I Dt Acquisition nd Preliminry Anlysis Dr. Timothy C. Blck Summer I, 2018 Theoreticl Discussion Grvity is one of the four known fundmentl forces.

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Math 426: Probability Final Exam Practice

Math 426: Probability Final Exam Practice Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil

More information

Probabilistic Investigation of Sensitivities of Advanced Test- Analysis Model Correlation Methods

Probabilistic Investigation of Sensitivities of Advanced Test- Analysis Model Correlation Methods Probbilistic Investigtion of Sensitivities of Advnced Test- Anlysis Model Correltion Methods Liz Bergmn, Mtthew S. Allen, nd Dniel C. Kmmer Dept. of Engineering Physics University of Wisconsin-Mdison Rndll

More information

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007 A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information

CS667 Lecture 6: Monte Carlo Integration 02/10/05

CS667 Lecture 6: Monte Carlo Integration 02/10/05 CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of

More information

Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy *

Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy * Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy * Howrd M. Heys Electricl Engineering, Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John

More information

Exercise 5.5: Large-scale log-normal fading

Exercise 5.5: Large-scale log-normal fading Exercise 5.5: Lrge-scle log-norml fding Since the system is designed to hndle propgtion loss of 135 db, outge will hppen when the propgtion loss is 8 db higher thn the deterministic loss of 17 db 135 17

More information

The steps of the hypothesis test

The steps of the hypothesis test ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of

More information

Non-Linear & Logistic Regression

Non-Linear & Logistic Regression Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find

More information

Section 11.5 Estimation of difference of two proportions

Section 11.5 Estimation of difference of two proportions ection.5 Estimtion of difference of two proportions As seen in estimtion of difference of two mens for nonnorml popultion bsed on lrge smple sizes, one cn use CLT in the pproximtion of the distribution

More information

Chapter 5 : Continuous Random Variables

Chapter 5 : Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

potentials A z, F z TE z Modes We use the e j z z =0 we can simply say that the x dependence of E y (1)

potentials A z, F z TE z Modes We use the e j z z =0 we can simply say that the x dependence of E y (1) 3e. Introduction Lecture 3e Rectngulr wveguide So fr in rectngulr coordintes we hve delt with plne wves propgting in simple nd inhomogeneous medi. The power density of plne wve extends over ll spce. Therefore

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Local orthogonality: a multipartite principle for (quantum) correlations

Local orthogonality: a multipartite principle for (quantum) correlations Locl orthogonlity: multiprtite principle for (quntum) correltions Antonio Acín ICREA Professor t ICFO-Institut de Ciencies Fotoniques, Brcelon Cusl Structure in Quntum Theory, Bensque, Spin, June 2013

More information

Industrial Electrical Engineering and Automation

Industrial Electrical Engineering and Automation CODEN:LUTEDX/(TEIE-719)/1-7/(7) Industril Electricl Engineering nd Automtion Estimtion of the Zero Sequence oltge on the D- side of Dy Trnsformer y Using One oltge Trnsformer on the D-side Frncesco Sull

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses

More information

Probability Distributions for Gradient Directions in Uncertain 3D Scalar Fields

Probability Distributions for Gradient Directions in Uncertain 3D Scalar Fields Technicl Report 7.8. Technische Universität München Probbility Distributions for Grdient Directions in Uncertin 3D Sclr Fields Tobis Pfffelmoser, Mihel Mihi, nd Rüdiger Westermnn Computer Grphics nd Visuliztion

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Extended nonlocal games from quantum-classical games

Extended nonlocal games from quantum-classical games Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement

More information

1 Probability Density Functions

1 Probability Density Functions Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our

More information

15. Quantisation Noise and Nonuniform Quantisation

15. Quantisation Noise and Nonuniform Quantisation 5. Quntistion Noise nd Nonuniform Quntistion In PCM, n nlogue signl is smpled, quntised, nd coded into sequence of digits. Once we hve quntised the smpled signls, the exct vlues of the smpled signls cn

More information

Intro to Nuclear and Particle Physics (5110)

Intro to Nuclear and Particle Physics (5110) Intro to Nucler nd Prticle Physics (5110) Feb, 009 The Nucler Mss Spectrum The Liquid Drop Model //009 1 E(MeV) n n(n-1)/ E/[ n(n-1)/] (MeV/pir) 1 C 16 O 0 Ne 4 Mg 7.7 14.44 19.17 8.48 4 5 6 6 10 15.4.41

More information

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (

More information

Emission of K -, L - and M - Auger Electrons from Cu Atoms. Abstract

Emission of K -, L - and M - Auger Electrons from Cu Atoms. Abstract Emission of K -, L - nd M - uger Electrons from Cu toms Mohmed ssd bdel-rouf Physics Deprtment, Science College, UEU, l in 17551, United rb Emirtes ssd@ueu.c.e bstrct The emission of uger electrons from

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Patch Antennas. Chapter Resonant Cavity Analysis

Patch Antennas. Chapter Resonant Cavity Analysis Chpter 4 Ptch Antenns A ptch ntenn is low-profile ntenn consisting of metl lyer over dielectric sustrte nd ground plne. Typiclly, ptch ntenn is fed y microstrip trnsmission line, ut other feed lines such

More information

Applicable Analysis and Discrete Mathematics available online at

Applicable Analysis and Discrete Mathematics available online at Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Chemistry 36 Dr Jen M Stndrd Problem Set 3 Solutions 1 Verify for the prticle in one-dimensionl box by explicit integrtion tht the wvefunction ψ ( x) π x is normlized To verify tht ψ ( x) is normlized,

More information

Best Approximation. Chapter The General Case

Best Approximation. Chapter The General Case Chpter 4 Best Approximtion 4.1 The Generl Cse In the previous chpter, we hve seen how n interpolting polynomil cn be used s n pproximtion to given function. We now wnt to find the best pproximtion to given

More information

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Binry Rte Dtortion With Side Informtion: The Asymmetric Correltion Chnnel Cse Andrei Sechele, Smuel Cheng, Adrin Muntenu, nd Nikos Deliginn Deprtment of Electronics nd Informtics, Vrije Universiteit Brussel,

More information

Supplementary Information for Directional Reflective Surface Formed via Gradient- Impeding Acoustic Meta-surfaces

Supplementary Information for Directional Reflective Surface Formed via Gradient- Impeding Acoustic Meta-surfaces Supplementry Informtion for Directionl Reflective Surfce Formed vi Grdient- Impeding Acoustic Met-surfces Kyungjun Song 1*, Jedo Kim 2, Hur Shin 1, Jun-Hyuk Kwk 1, Seong-Hyun Lee 3,Tesung Kim 4 1 Deprtment

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

Conservation Law. Chapter Goal. 5.2 Theory

Conservation Law. Chapter Goal. 5.2 Theory Chpter 5 Conservtion Lw 5.1 Gol Our long term gol is to understnd how mny mthemticl models re derived. We study how certin quntity chnges with time in given region (sptil domin). We first derive the very

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

Exam 1 Solutions (1) C, D, A, B (2) C, A, D, B (3) C, B, D, A (4) A, C, D, B (5) D, C, A, B

Exam 1 Solutions (1) C, D, A, B (2) C, A, D, B (3) C, B, D, A (4) A, C, D, B (5) D, C, A, B PHY 249, Fll 216 Exm 1 Solutions nswer 1 is correct for ll problems. 1. Two uniformly chrged spheres, nd B, re plced t lrge distnce from ech other, with their centers on the x xis. The chrge on sphere

More information

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

FEM ANALYSIS OF ROGOWSKI COILS COUPLED WITH BAR CONDUCTORS

FEM ANALYSIS OF ROGOWSKI COILS COUPLED WITH BAR CONDUCTORS XIX IMEKO orld Congress Fundmentl nd Applied Metrology September 6 11, 2009, Lisbon, Portugl FEM ANALYSIS OF ROGOSKI COILS COUPLED ITH BAR CONDUCTORS Mirko Mrrcci, Bernrdo Tellini, Crmine Zppcost University

More information

Week 10: Line Integrals

Week 10: Line Integrals Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.

More information

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15 Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril

More information

APPLICATIONS OF THE DEFINITE INTEGRAL

APPLICATIONS OF THE DEFINITE INTEGRAL APPLICATIONS OF THE DEFINITE INTEGRAL. Volume: Slicing, disks nd wshers.. Volumes by Slicing. Suppose solid object hs boundries extending from x =, to x = b, nd tht its cross-section in plne pssing through

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner

More information

12 TRANSFORMING BIVARIATE DENSITY FUNCTIONS

12 TRANSFORMING BIVARIATE DENSITY FUNCTIONS 1 TRANSFORMING BIVARIATE DENSITY FUNCTIONS Hving seen how to trnsform the probbility density functions ssocited with single rndom vrible, the next logicl step is to see how to trnsform bivrite probbility

More information

MIXED MODELS (Sections ) I) In the unrestricted model, interactions are treated as in the random effects model:

MIXED MODELS (Sections ) I) In the unrestricted model, interactions are treated as in the random effects model: 1 2 MIXED MODELS (Sections 17.7 17.8) Exmple: Suppose tht in the fiber breking strength exmple, the four mchines used were the only ones of interest, but the interest ws over wide rnge of opertors, nd

More information

13: Diffusion in 2 Energy Groups

13: Diffusion in 2 Energy Groups 3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups

More information

A New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation

A New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation Xiodong Zhung A ew Sttistic Feture of the Short-Time Amplitude Spectrum Vlues for Humn s Unvoiced Pronuncition IAODOG ZHUAG 1 1. Qingdo University, Electronics & Informtion College, Qingdo, 6671 CHIA Abstrct:

More information

Pi evaluation. Monte Carlo integration

Pi evaluation. Monte Carlo integration Pi evlution y 1 1 x Computtionl Physics 2018-19 (Phys Dep IST, Lisbon) Fernndo Bro (311) Monte Crlo integrtion we wnt to evlute the following integrl: F = f (x) dx remember tht the expecttion vlue of the

More information

THE INTERVAL LATTICE BOLTZMANN METHOD FOR TRANSIENT HEAT TRANSFER IN A SILICON THIN FILM

THE INTERVAL LATTICE BOLTZMANN METHOD FOR TRANSIENT HEAT TRANSFER IN A SILICON THIN FILM ROMAI J., v.9, no.2(2013), 173 179 THE INTERVAL LATTICE BOLTZMANN METHOD FOR TRANSIENT HEAT TRANSFER IN A SILICON THIN FILM Alicj Piseck-Belkhyt, Ann Korczk Institute of Computtionl Mechnics nd Engineering,

More information

The Wave Equation I. MA 436 Kurt Bryan

The Wave Equation I. MA 436 Kurt Bryan 1 Introduction The Wve Eqution I MA 436 Kurt Bryn Consider string stretching long the x xis, of indeterminte (or even infinite!) length. We wnt to derive n eqution which models the motion of the string

More information

Name Solutions to Test 3 November 8, 2017

Name Solutions to Test 3 November 8, 2017 Nme Solutions to Test 3 November 8, 07 This test consists of three prts. Plese note tht in prts II nd III, you cn skip one question of those offered. Some possibly useful formuls cn be found below. Brrier

More information

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b. Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn

More information

arxiv: v2 [math.pr] 31 Jan 2018

arxiv: v2 [math.pr] 31 Jan 2018 CENTER OF MASS AND THE OPTIMAL QUANTIZERS FOR SOME CONTINUOUS AND DISCRETE UNIFORM DISTRIBUTIONS MRINAL KANTI ROYCHOWDHURY rxiv:77.6v [mth.pr] Jn 8 Abstrct. In this pper, we first consider flt plte (clled

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

PHYS Summer Professor Caillault Homework Solutions. Chapter 2

PHYS Summer Professor Caillault Homework Solutions. Chapter 2 PHYS 1111 - Summer 2007 - Professor Cillult Homework Solutions Chpter 2 5. Picture the Problem: The runner moves long the ovl trck. Strtegy: The distnce is the totl length of trvel, nd the displcement

More information

Numerical Integration

Numerical Integration Chpter 5 Numericl Integrtion Numericl integrtion is the study of how the numericl vlue of n integrl cn be found. Methods of function pproximtion discussed in Chpter??, i.e., function pproximtion vi the

More information

Chapter 14. Matrix Representations of Linear Transformations

Chapter 14. Matrix Representations of Linear Transformations Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn

More information

NUMERICAL INTEGRATION

NUMERICAL INTEGRATION NUMERICAL INTEGRATION How do we evlute I = f (x) dx By the fundmentl theorem of clculus, if F (x) is n ntiderivtive of f (x), then I = f (x) dx = F (x) b = F (b) F () However, in prctice most integrls

More information

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014 SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.

More information

The Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve.

The Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve. Clculus Li Vs The Fundmentl Theorem of Clculus. The Totl Chnge Theorem nd the Are Under Curve. Recll the following fct from Clculus course. If continuous function f(x) represents the rte of chnge of F

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Conducting Ellipsoid and Circular Disk

Conducting Ellipsoid and Circular Disk 1 Problem Conducting Ellipsoid nd Circulr Disk Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 (September 1, 00) Show tht the surfce chrge density σ on conducting ellipsoid,

More information

The Moving Center of Mass of a Leaking Bob

The Moving Center of Mass of a Leaking Bob The Moving Center of Mss of Leking Bob rxiv:1002.956v1 [physics.pop-ph] 21 Feb 2010 P. Arun Deprtment of Electronics, S.G.T.B. Khls College University of Delhi, Delhi 110 007, Indi. Februry 2, 2010 Abstrct

More information

The Properties of Stars

The Properties of Stars 10/11/010 The Properties of Strs sses Using Newton s Lw of Grvity to Determine the ss of Celestil ody ny two prticles in the universe ttrct ech other with force tht is directly proportionl to the product

More information

Mathematics. Area under Curve.

Mathematics. Area under Curve. Mthemtics Are under Curve www.testprepkrt.com Tle of Content 1. Introduction.. Procedure of Curve Sketching. 3. Sketching of Some common Curves. 4. Are of Bounded Regions. 5. Sign convention for finding

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

A Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE

A Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE Southwestern U.S. Ground Motion Chrcteriztion Senior Seismic Hzrd Anlysis Committee Level 3 Workshop #2 October 22-24, 2013 A Brief Review on Akkr, Sndikky nd Bommer (ASB13 GMPE Sinn Akkr Deprtment of

More information

1B40 Practical Skills

1B40 Practical Skills B40 Prcticl Skills Comining uncertinties from severl quntities error propgtion We usully encounter situtions where the result of n experiment is given in terms of two (or more) quntities. We then need

More information