Quantization for Physical Layer Security
|
|
- Dustin Jefferson
- 6 years ago
- Views:
Transcription
1 Quntiztion for Physicl Lyer Security On Grur, Nzi Islm, nd Werner Henkel Jcobs University Bremen Electricl Engineering nd Computer Science Bremen, Germny Emils: {o.grur, Abstrct We propose multi-level CSI quntiztion nd key reconcilition scheme for physicl lyer security. The noisy wireless chnnel estimtes obtined by the users first run through trnsformtion, prior to the quntiztion step. This enbles the definition of gurd bnds round the quntiztion boundries, tilored for specific efficiency nd not compromising the uniformity required t the output of the quntizer. Our construction results in n better key disgreement nd initil key genertion rte trde-off when compred to other level-crossing quntiztion methods. I. INTRODUCTION AND MOTIVATION Due to the inherently rndom nture of the brodcst wireless chnnel, extensive reserch efforts hve been directed, over the lst decde, towrds the genertion of encryption keys t the physicl lyer. As opposed to cryptogrphic security tht relies on limited computtionl resources of potentil evesdroppers, s well s key exchnge mechnism, physicl lyer security ims t providing users shring wireless chnnel with symmetric keys tht cn be used for encryption/decryption, without relying on preexistent key distribution infrstructure. The originl principle dtes bck to the one-time pd, described by Vernm [] in 96, where plintext is encrypted with previously known secret key through modulr ddition. If the key is truly rndom nd s long s the plintext messge, n evesdropper without ccess to the key cnnot decrypt the messge. Shnnon, lter on, formulted this finding in informtion-theoretic terms [], i.e., the vilbility of the ciphertext t the evesdropper does not provide ny id in guessing the plintext messge if the entropy of the key is lrger or equl to the entropy of the messge. Although this finding hs been widely known, the key distribution, long with the requirement of the lrge key length, constituted the prcticl limittions for which much of the reserch focus hs shifted towrds clssic cryptogrphic schemes over the lst century. The interest in informtiontheoretic security hs risen gin, long with the dvncements in d-hoc networks, such s wireless sensor networks (WSN), nd Internet of Things (IoT), where the ssumption of key distribution infrstructure, on which computtionl security relies, is unfesible. A thorough survey on recent physicl lyer key genertion dvncements cn be found in [3]. Our contribution in this pper focuses on the quntiztion nd reconcilition of correlted chnnel estimtes obtined by two users. Unlike other works [4], [5], we use the complex chnnel stte informtion (CSI) for key genertion, nd quntize the rel nd imginry prts jointly. In obtining the complex CSI, prsitic ntenn rry is used t one of the users, in order to generte rtificil fding nd to ensure high degree of chnnel rndomness, even in lineof-sight (LOS) or sttic environments. We lso propose trnsformtion tht mps the complex chnnel estimtes to the unit squre, prior to vector quntiztion step, whose purpose is multifold. First, the trnsformtion we propose fcilittes the use of well-known, low-complexity vector quntizers, such s Linde-Buzo-Grey (LBG) [6], by providing uniformly distributed quntizer output, even for higher level quntiztion. Second, we show how such trnsformtion enbles the strightforwrd construction of gurd bnds round the quntiztion boundries, without scrificing the uniformity of the quntizer output. Such gurd bnds re introduced s key reconcilition method, with the purpose of excluding the mesurement smples most likely to be erroneous due to independent noise on both sides or circuitry imperfections. Our findings show tht in the cse of very strong correltion between the legitimte user mesurements, for fixed key genertion rte, higher level quntiztion with wider gurd bnds is preferred to lower level quntiztion with nrrow gurd bnds. Section IV show the performnce improvement of our scheme to previous methods described in literture. A. Requirements for Physicl Lyer Key Genertion Three min requirements need to be fulfilled for physicl lyer key genertion, chnnel reciprocity, rndomness, nd sptil decorreltion. If we denote by h AB the forwrd chnnel from Alice to Bob, nd by h BA the reverse chnnel from Bob to Alice, s shown in Fig., the chnnel reciprocity principle implies h AB h BA c. This is true to some extent for TDD systems, such s 8., WiMAX, LTE, etc.. As long s the coherence time of the chnnel is lrger thn the mesurement time, the two users, Alice nd Bob, cn send previously known pilot signls in consecutive time slots in order to obtin their vectors of chnnel estimtes, â c + n, ˆb c + n b, where â nd ˆb denote the estimte vectors t Alice, nd Bob, respectively. n, nd n b represent the independent noise vectors ffecting the user estimtes, rising from different trnsceiver circuitry, nd possible vritions of the chnnel during the non-simultneous mesurement slots. Although they re correlted, strightforwrd quntiztion of the mesurement vectors will likely
2 result in key mismtch between the users, nd n dditionl step of key reconcilition needs to be performed. The chnnel mesurements cn represent either chnnel stte informtion (CSI), or received signl strength informtion (RSSI). The CSI mesurements cn refer to either the chnnel impulse response or frequency response, contining both mplitude nd phse informtion. RSSI, in contrst, refers to n verge of the received power for the whole pcket nd cn be seen s more corse-grined, compred to the instntneous CSI vlues. Although CSI-bsed key genertion hs been shown to significntly outperform RSSI-bsed key genertion [7], RSSI dt hs been used in most of the previously proposed key genertion schemes bsed on its vilbility from most off-the-shelf WiFi crds. Sptil decorreltion. If pssive evesdropper, Eve, is locted few wvelengths wy from ny of the legitimte users, the chnnel smples estimted by Eve, ê, will exhibit low correltion to the forwrd nd reverse chnnel smples estimted by Alice nd Bob. Hence, most of the rndomly generted key bits will be secure with respect to Eve. In order to support this clim, we refer the reders to the work in [8] [], where theoreticl nd experimentl pproches hve been tken in deriving the mount of key informtion tht leks to the evesdropper, depending on its seprtion distnce. Even smll mount of informtion leked is of serious concern nd is highly dependent on Eve s position nd reltive distnce to the legitimte users, thus further processing methods such s dvntge distilltion nd privcy mplifiction [], [], re required. An initil key K N of length N, obtined by Alice nd Bob, is reduced to shorter key of length R, i.e., K R, through the use of hsh function g, known by ll prties, such tht the lekge H(K R ê, g) is diminished. In here, we hence ignore the effect of pssive Eve, by ssuming sufficient evesdropper seprtion, s well s privcy mplifiction fter the quntiztion step. We re lso not concerned here with the possibility of ctive jmming ttcks. Rndomness. A lrge degree of rndomness ensures the existence of lrge key pool fter quntiztion, mking it more computtionlly prohibitive for the evesdropper to resort to brute-force ttcks. If the reciprocl wireless chnnel does not exhibit high degree of fding, rtificil fding cn be induced through the use of prsitic ntenn rrys, s we discuss in Section II-A. It should be noted tht the uncertinty t the evesdropper is mximum when the key is uniformly distributed over its lphbet. For compring different pproches, we follow the frmework of [3], with the following metrics. ) Correltion Coefficient: We use the Person correltion coefficient, ρ, s mesure of the degree of reciprocity of two sequences, â [â â N ] T nd ˆb [ˆb ˆb N ] T. ) Key Disgreement Rte (KDR): The key disgreement rte is defined s the verge rtio between the key symbols found in disgreement between Alice nd Bob to the overll number of symbols. We shll distinguish ccordingly between symbol nd bit disgreement rte in subsequent sections. 3) Initil Key Genertion Rte (IKGR): We define the symbol IKGR s the verge of the rtio between the number of symbols used for key genertion fter quntiztion to the totl number of symbols fed to the quntizer. For multilevel quntiztions, i.e., N q, the bit IKGR is obtined by multiplying the symbol IKGR with the number of bits per symbol. II. SYSTEM DESCRIPTION A. RECAP Antenns for Chnnel Rndomiztion The wireless chnnel between the users does not only include the propgtion chnnel, but lso the rdition chrcteristics of the trnsmit/receive ntenns. The chnnel cn be seen s time-vrying if the propgtion chnnel is multipth rich nd one of the nodes is moving. However, in the cse of line-of-sight (LOS) chnnel, reconfigurble perture ntenn rrys (RECAPs) cn be used. A RECAP ntenn consists of reconfigurble elements (REs), confined to physicl perture [8], [4]. Ech RE cn be in number of sttes, e.g., by vrying cpcitive lods. B. System Model Figure depicts the system model. We consider one of the legitimte users, e.g., Alice, to be equipped with RECAP ntenn with 4 prsitic reconfigurble elements (REs), nd one feed element, shown in ornge. Bob nd Eve re ech equipped with single dipole ntenn. The perceived chnnel distribution, s seen by the users, when RECAP ntenn is used, depends on the number of REs tht re ctive, s well s on the number of sttes. Although using RECAP ntenns for creting rtificil fding does not lwys led to norml chnnel distribution, when the number of reconfigurble elements of the rry is lrge, the number of sttes is lrge, nd the reflection coefficient is controlled, s discussed in [5], the distribution is very close to complex Gussin, with the rel nd imginry prts i.i.d.. The chnnel distributions obtined for the RECAP configurtions in Fig., re shown subsequently, in Fig. 3. For the rest of this work, we ssume the chnnel to follow normlized complex Gussin distribution, with the rel nd imginry prts i.i.d., s obtined for the N RE 4 RECAP configurtion. Additionl detils on how the chnnel mesurements used in this work were obtined, long with study on the number of secure bits s function of multipth nd evesdropper ntenn seprtion, cn be found in [6], [7]. Fig.. System Model
3 Fig.. RECAP configurtions;, 4, 8, 6, 4 ctive reconfigurble elements (REs); feed element in ornge, ctive REs in blue, inctive REs in green Fig. 3. Complex chnnel pdfs given different RECAP configurtions;, 4, 8, 6, 4 ctive reconfigurble elements (REs) The first step in the key genertion nd reconcilition process is the chnnel probing phse, in which both Alice nd Bob obtin their length N vectors of complex CSI estimtes, nmely nd b. Note tht throughout this pper, bold lowercse nottions re used for vectors, while the noisy estimtes re indicted by theˆ symbol. If c x + jy denotes complex chnnel smple, x A + j y A nd b x B + j y B represent the noisy estimtes of the chnnel smple c t Alice, nd Bob, respectively, with x A, y A, x B, y B denoting the estimtes of the rel nd imginry components. All nottions re summrized in Tble I, for convenience. TABLE I N OTATIONS Nottion c x + jy x [x xn ]T y [y yn ]T x A + jy A b x B + jy B x A x + nx y A y + ny x B x + nxb y B y + nyb u u x + ju y u b u xb + ju yb σ σn σn b σ σ + σn σb σ + σn b Ri (u x, u y ) (u xb, u yb ) (nux, nuy ) Description vector of chnnel smples (complex) vector of chnnel smples (rel prt) vector of chnnel smples (imginry prt) vector of complex chnnel estimtes t Alice, [ N ]T vector of complex chnnel estimtes t Bob, b [b b N ]T mesurement estimtes of x t Alice mesurement estimtes of y t Alice mesurement estimtes of x t Bob mesurement estimtes of y t Bob trnsformed vector (uniform domin) trnsformed vector b (uniform domin) vrince of x, y (chnnel vrince) noise vrince t Alice noise vrince t Bob vrince of (t Alice) vrince of b (t Bob) number of quntiztion regions ith quntiztion region rel nd imginry components of Alice s smple fter trnsformtion rel nd imginry components of Bob s smple b fter trnsformtion to uniform domin rndom vribles describing the rel nd imginry noise components, respectively, ffecting complex smple c x + jy, fter trnsformtion to uniform domin C. Uniform Trnsformtion Hving obtined their sequences of nlog complex chnnel estimtes, both Alice nd Bob first pply trnsformtion of the dt, before quntizing, s follows: u x x A y A erfc ; u y erfc. ) (σ + σn ) (σ + σn () u x nd u y correspond to the rel nd imginry components of smple fter the trnsformtion, t Alice, likewise u xb nd u yb for Bob. Since the estimtes x A nd y A re ech distributed ccording to zero-men Gussin pdf with, the trnsformed smples u x nd vrince σ σ + σn u y will ech follow uniform distribution in (, ). Thus, the vector of complex estimtes, in the originl domin, will now be mpped into vector u, uniformly distributed in the unit squre, fter trnsformtion. We refer to the domin fter trnsformtion s the uniform domin. Performing such trnsformtion of the dt before quntiztion is motivted by the reduced complexity of the vector quntiztion, s well s the computtion of the gurd bnd widths. Our gol now is to find n equl-re prtitioning of the unit squre into quntiztion regions, while mintining low probbility tht chnnel smple is quntized to different regions by Alice nd Bob, due to independent noise effects. The equl-re constrint is required to ensure uniform distribution of the quntized key symbols. We first turn our ttention to the noise distribution fter trnsformtion. Since nx nd ny were normlly distributed before trnsformtion with mens x nd y, nd vrinces σnx σny σn, their mrginl pdfs fter trnsformtion re found to be (x+σ erfc (nux )) σ (erfc (nux )) σn f (nux x) e (), σn The mrginl pdf for the imginry noise component is similr to the one in (). The noise t Alice, round the point of
4 coordintes (x, y) will hve distribution, fter the trnsformtion, which will depend on the (x, y) positions in the originl domin. The rel nd imginry noise pdfs t Bob re obtined by substituting σ with σ b in (). Figure 4 shows the mrginl pdf of the noise fter trnsformtion (rel dimension only), from (), for vrious positions of (x, y) in the originl domin. As (x, y) vry from the inside of the circulrly symmetric Gussin towrds the periphery, the mrginl noise pdfs fter trnsformtion hve nrrower vrince towrds the edges of the unit squre. reltive frequency of n ux Uniform domin noise distribution fter trnsformtion n ux x.3 (simultion) x.3 (theoreticl) x.5 (simultion) x.5 (theoreticl) x (simultion) x (theoreticl) x.5 (simultion) x.5 (theoreticl) x.3 (simultion) x.3 (theoreticl) Fig. 4. Mrginl PDF of the noise fter trnsformtion to uniform domin; rel component only. The circulr mrkers correspond to the theoreticl curves, s given in (), while the lines correspond to the pdf estimtes from simultions. After the trnsformtion phse, both Alice nd Bob re redy to proceed with the vector quntiztion. We will first proceed with describing the vector quntiztion scheme chosen nd then describe the computtion of the gurd bnds. III. QUANTIZATION One of the most widely used vector quntiztion schemes is the Linde-Buzo-Gry (LBG) lgorithm [6]. Its widespred is consequence of the fct tht is hs very low implementtion complexity nd it outperforms other vector quntizers in prcticl situtions. LBG is the discrete version of the Lloyd- Mx quntizer, nd, unlike Lloyd-Mx, it does not require closed form expression of the input density, but n initil trining vector tht is itertively prtitioned into N q clusters. We show in Fig. 5 the difference in output distribution when we pply the LBG quntiztion to circulrly symmetric Gussin input nd when we pply it to uniformly distributed input, s the one obtined fter our trnsformtion in (). With n increse in the number of quntiztion regions, the uniformity of the output is not preserved when LBG quntiztion is pplied directly to the estimte vectors, without first performing the trnsformtion. Hence, the proposed trnsformtion is importnt for key genertion. A. Gurd Bnd Construction The second rgument for such trnsformtion is tht once the coordintes of the vertices of the Voronoi cells re obtined, the computtion of the gurd bnds is strightforwrd. Since the quntiztion cells re now equl-re polygons tessellting the unit squre, we cn design gurd bnds round the quntiztion boundries strting from certin efficiency. We define efficiency η to represent the rtio of points tht fll outside the gurd bnds to the overll number of points. Due to the uniform distribution of the smples Fig. 5. Output distribution cross quntiztion regions for uniform nd normlly distributed LBG trining sets; () N q 3; (b) N q 6 fter trnsformtion, the efficiency η A useful A Asqure gb, where A gb is the totl re of the gurd bnds. Since we re interested in preserving the uniformity of the output symbols, even fter the construction of the gurd bnds, we require tht n re of η N q is ssigned to the gurd bnds within ech quntiztion region. It should be noted, however, tht lthough the quntiztion regions should hve equl res in the unit squre, this does not imply equl widths of the gurd bnds cross the regions. If we let (v x, v y ) denote the vectors holding the rel nd imginry coordintes of the vertices of certin region R i, the coordintes of the inner polygon representing the useful region of cell R i cn be computed using the theorem of similr polygons, s follows: v xrescled η(v x µ vx ) + µ vx, v yrescled η(v y µ vy ) + µ vy, (3) where µ v is the men of vector v. For illustrtion purposes, we show in Fig. 6 () the LBG quntiztion regions, long with the corresponding gurd bnds, for N q 8, nd n efficiency η.8. Fig. 6 (b) shows the sme points tht hve been quntized in the uniform domin, fter being trnsformed bck to the originl domin. This is shown to illustrte the fct tht n equivlent quntiztion in the originl domin would hve non-liner gurd bnds. Note tht our method does not require such n inverse trnsformtion of the points, nd both Alice nd Bob generte their keys by quntizing their trnsformed complex vectors û nd û b, respectively. The gurd bnd construction is lso possible in the originl domin, however, more complicted. For the simplest cse of the binry quntiztion, when the dt is quntized in the originl domin, with the quntiztion boundry consisting of stright line going through the origin, the gurd bnds of width r round the quntiztion line re computed by solving η π(σ + σn) r r e ˆx A +ŷ A (σ +σ n ) dˆx A dŷ A. (4) However, for lrger number of Voronoi cells, with rbitrry quntiztion boundries, (4) becomes much more complex, mking even individul numericl solutions for the gurd bnd
5 widths in the originl domin prcticlly unfesible. Note tht regrdless of the domin chosen, neither the quntiztion nor the gurd bnd reconcilition should ffect the uniformity t the output of the quntizer. Previous quntiztion nd 8; LBG VQ with GBs (uniform domin) P b 8; points fter inverse trnsformtion points outside GBs points inside GBs points outside GBs points inside GBs.6.5 uy.7 y x ux Fig. 6. () Linde-Buzo-Gry (LBG) quntiztion of the uniformly distributed squre; points tht fll in the gurd bnds in blue, points outside gurd bnds in green. This plot ws generted for n efficiency η.8; (b) equivlent positions in the originl domin. reconcilition schemes hve tken different pproches. We briefly describe some of the more relevnt previous results, since we will use them s bsis of comprison to our method in Section IV. However, most of the results vilble in the literture discuss binry quntiztion schemes nd do not tke dvntge of quntizing the rel nd imginry components of the complex chnnel jointly, s we propose. Aono [4] drops RSSI vlues below threshold, chosen s the medin, nd communictes the positions of the discrded smples to the other prty. In [8], Tope computes the difference in RSSI vlues nd relies on two thresholds to exclude points tht will likely result in key mismtch. Similrly, in the work of Mthur et l. [5], Alice nd Bob check for successive blocks of m smples tht fll bove or below two thresholds, q+, nd q. Jn et l. [4] proposed both multibit nd single bit dptive secret bit genertion (ASBG) lgorithm, which is modifiction of the work of Mthur [5]. In contrst, the quntizer proposed by Jn, however, divides the mesurements into smller block lengths nd clcultes the thresholds for ech block seprtely, resulting in fster dpttion to shifts in the RSSI men vlue over time. Unlike ll of the bove methods, we strt from fine-grined CSI mesurements, following complex circulrly symmetric distribution, s explined in Section II-A. B. Key Disgreement Rtes The symbol mismtch probbility P ( Ri b / Ri ) between Alice nd Bob cn be computed s follows: P b c i j,j i c i j,j i p(b Rj, Ri, c)dc P (b Rj, Ri c)p(c)dc P (b Rj c)p ( Ri c)p(c)dc.5.3 i j,j i.5.8 c.9 P (b Rj, Ri ) i j,j i (5) Note tht P denotes probbility, while the lowercse p refers to probbility density function. For the simplest cse, with two quntiztion regions, with the quntiztion boundry t x, the bit mismtch probbility, or bit disgreement rte (BDR), is derived in (6)-(9), where R is from (, ), R is from (, ), nd R R R. Note tht, b, nd c re ll complex vribles, so ny integrtion is in rel nd imginry dimensions. For binry quntiztion,, due to the symmetry of the quntiztion, it is sufficient to integrte only the long the rel components of the vribles, nmely x A, x B, nd x, s shown in (9). P b N P b P ( R, b R ) + P ( R, b R ) P ( R c)p (b R c)p(c)dc N P b N c R (6) (7) p( c)p(b c)p(c)d db dc (8) c R b R R IV. R ESULTS For fir evlution of the quntiztion nd reconcilition performnces, we show simultion results for the bit disgreement rte (BDR) versus the correltion coefficient. We provide results for both the binry quntiztion,, s well s multibit quntiztion, 4 nd 8. One interesting spect is whether ny dvntge cn be chieved by using higher level quntiztion, e.g., extrcting multiple bits from single CSI smple, while fixing the initil key genertion rte. In Fig. 7, we show the bit disgreement rtes (BDR) versus correltion for vrious efficiency curves, for two quntiztion regions, nd the sme BDR plotted ginst the SNR in Fig. 8. For binry quntiztion we investigte three scenrios: Method quntizes the user estimtes with line through the middle of the originl domin, i.e., no trnsformtion is pplied. Method splits the originl domin into two eqully probble regions by using circle of pproprite rdius. Method 3 trnsforms the user estimtes to the unit squre, before quntizing with line t ux.5. A mximum key genertion rte of, for the binry quntiztion cse, is chieved for the cse when the gurd bnd widths re zero. As confirmed by simultions, for the binry quntiztion, methods nd 3 hve, of course, the sme performnce, nd surpss Method. For four quntiztion regions, 4, we hve considered four options. Method quntizes the originl dt by splitting the originl domin with four squres intersecting in the origin. Method uses 4 concentric circles to quntize the Gussin estimtes. The rdii of the concentric This is equivlent to LBG quntiztion in the uniform domin for
6 Initil Key Genertion Rte (IKGR) Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Bit Disgreement Rte (BDR) Pâ ˆb σn σ nb σ Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) correltion coefficient Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) correltion coefficient Fig. 7. Bit disgreement rte versus correltion for different initil key genertion rtes; N q 4 6 Method 3: line (uniform domin) Method : line (originl domin) Method : circle (originl domin) Method : line (originl domin) Method : circle (originl domin) Method 3: line (uniform domin) 3 4 Fig. 8. Bit disgreement rtes nd the corresponding IKGRs for N q circles re computed such tht the output of the quntiztion is uniformly distributed. Methods 3 nd 4 first trnsform the dt to the uniform domin. Method 3 is similr to Method, however, the quntiztion with four squres is done in the uniform domin, insted of the originl one. Method 4 is the LBG quntiztion in the uniform domin, tht we hve described in the previous sections. Figure 9 shows the BDR versus the correltion coefficient for different key genertion rtes. Note tht since we now consider bits/symbol, n e (ˆx A x) σn e (ˆx B x) σn b e x σ dˆx A dˆx B dx (9) IKGR of corresponds to n efficiency η when no points re discrded, i.e., gurd bnd widths re zero. Our findings show identicl performnce for the quntiztion with four squres, whether it is done in the uniform domin, nd the Linde-Buzo-Gry quntiztion cse. Agin, the concentric quntiztion shows the worst performnce. Figure shows the BDR versus the SNR for N q 4 for different key genertion rtes. Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Method : 4 squres GB (originl domin). Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) correltion coefficient ρ correltion coefficient ρ Fig. 9. Bit disgreement rtes versus correltion for different initil key genertion rtes; N q 4 We illustrte, in Fig., performnce comprison between our work nd previous quntiztion nd reconcilition schemes, following the frmework discussed in [3]. We compre our LBG results for the cse of N q nd N q 3 with the multibit scheme proposed by Jn [4]. As shown in Fig., with the initil key genertion fixed, IKGR, our -bit LBG quntiztion shows n improvement over the corresponding -bit quntiztion of Jn, regrdless of the vlue of the correltion coefficient. However, by incresing the number of bits extrcted per CSI symbol, i.e., 3 bits/symbol, performnce increse in terms of BDR is chievble only for high correltion vlues, compred to the cse of extrcting only bits/symbol. The schemes proposed by Tope nd Murer exhibit low BDR, however, they lso hve very low initil key genertion rtes. Nevertheless, if we fix our IKGR to similr vlues s shown of the other schemes in Fig., our LBG methd is dvntgeous is terms of BDR when compred to ll the other quntiztion schemes. V. CONCLUSION Insted of simply pplying the quntiztion to the CSI estimte vectors tht Alice nd Bob obtin, we first pply trnsformtion of the dt tht leds to uniform distribution. The dvntge of performing such trnsformtion
7 Bit Disgreement Rte (BDR) Initil Key Genertion Rte (IKGR) Method 4: LBG GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method : 4 squres GB (originl domin) Method : 4 concentric circles GB (originl domin) Method 3: 4 squres GB (uniform domin) Method 4: LBG GB (uniform domin) 3 4 Fig.. Bit disgreement rtes versus SNR for different initil key genertion rtes; N q 4 Fig.. Bit disgreement Rte (BDR) nd Initil Key Genertion Rte (IKGR) versus correltion - comprison to previous works of the complex dt, enbles us to use well known vector quntizer, such s Linde-Buzo-Gry [6], to prtition the uniform domin into equl-re regions nd to esily construct the gurd bnds round the quntiztion boundries, for fixed key genertion rte. Our proposed method tkes dvntge of the joint quntiztion of the rel nd complex CSI components nd discrds the smples tht re most likely to result in key mismtches, without disturbing the uniformity requirement t the output of the quntizer. Our method shows better performnce in terms of bit disgreement nd initil key genertion rtes compred to other previous quntiztion nd reconcilition schemes currently vilble, while lso benefiting from low implementtion complexity. REFERENCES [] G. Vernm, Cipher Printing Telegrph Systems for Secret Wire nd Rdio Telegrphic Communictions, Journl of the AIEE, vol. 45, p. 95, 96. [] C. Shnnon, Communiction Theory of Secrecy Systems, Bell System Technicl Journl, vol. 8, no. 4, pp , 949. [3] J. Zhng, T. Duong, A. Mrshll, nd R. Woods, Key Genertion from Wireless Chnnels: A Review, IEEE Access, vol. 4, pp., 6. [4] S. Jn, S. N. Premnth, M. Clrk, S. Kser, N. Ptwri, nd S. Krishnmurthy, On the Effectiveness of Secret Key Extrction from Wireless Signl Strength in Rel Environments, in Mobile Communictions (MobiCom9), (Beijing), pp., 9. [5] S. Mthur, W. Trppe, N. Mndym, C. Ye, nd A. Reznik, Rdio- Telepthy: Extrcting Secret Key from n Unuthenticted Wireless Chnnel, Proceedings of the 4th ACM interntionl conference on Mobile computing nd networking - MobiCom 8, p. 8, 8. [6] Y. Linde, A. Buzo, nd R. M. Gry, An Algorithm for Vector Quntizer Design, IEEE Trnsctions on Communictions, vol. 8, pp , jn 98. [7] Y. Liu, S. C. Drper, nd A. M. Syeed, Exploiting Chnnel Diversity in Secret Key Genertion from Multipth Fding Rndomness, IEEE Trnsctions on Informtion Forensics nd Security, vol. 7, no. 5, pp ,. [8] R. Mehmood nd J. W. Wllce, Experimentl Assessment of Secret Key Genertion using Prsitic Reconfigurble Aperture Antenns, Proceedings of 6th Europen Conference on Antenns nd Propgtion, EuCAP, no., pp. 5 55,. [9] R. Mehmood, J. W. Wllce, nd M. A. Jensen, Experimentl Chrcteriztion of Chnnel-Bsed Key Estblishment using Reconfigurble Antenns, 8th Europen Conference on Antenns nd Propgtion, EuCAP 4, no. EuCAP, pp , 4. [] A. J. Pierrot, R.. Chou, nd M. R. Bloch, Experimentl Aspects of Secret Key Genertion in Indoor Wireless Environments, in IEEE 4th Workshop on Signl Processing Advnces in Wireless Communictions (SPAWC), pp , 3. [] U. Murer nd S. Wolf, Secret-Key Agreement over Unuthenticted Public Chnnels- Prt III: Privcy Amplifiction, IEEE Trnsctions on Informtion Theory, vol. 49, pp , 3. [] C. H. Bennett, G. Brssrd, C. Crkpeu, U. M. Murer, nd S. Member, Generlized Privcy Amplifiction, vol. 4, no. 6, pp , 995. [3] R. Guillume, C. Zenger, A. Mueller, C. Pr, nd A. Czylwik, Fir Comprison nd Evlution of Quntiztion Schemes for PHY-bsed Key Genertion, OFDM 4, 9th Interntionl OFDM Workshop 4 (InOWo 4); Proceedings of, pp. 5, 4. [4] T. Aono, K. Higuchi, T. Ohir, B. Komiym, nd H. Ssok, Wireless Secret Key Genertion Exploiting Rectnce-Domin Sclr Response of Multipth Fding Chnnels, IEEE Trnsctions on Antenns nd Propgtion, vol. 53, pp , nov 5. [5] R. Mehmood nd J. W. Wllce, Wireless Security Enhncement using Prsitic Reconfigurble Aperture Antenns, in Europen Antenns Propgtion Conference, (Rome, Itly), pp , pr. [6] J. W. Wllce nd R. K. Shrm, Automtic Secret Keys From Reciprocl MIMO Wireless Chnnels: Mesurement nd Anlysis, IEEE Trnsctions on Informtion Forensics nd Security, vol. 5, pp , sep. [7] R. Mehmood, J. W. Wllce, nd M. A. Jensen, Key Estblishment Employing Reconfigurble Antenns: Impct of Antenn Complexity, IEEE Trnsctions on Wireless Communictions, vol. 3, pp , nov 4. [8] M. A. Tope nd J. C. Mcechen, Unconditionlly Secure Communictions over Fding Chnnels, Militry Communictions Conference, vol., no. c, pp ,.
New data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More informationNumerical integration
2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter
More informationGeneralized Fano and non-fano networks
Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in
More informationX Z Y Table 1: Possibles values for Y = XZ. 1, p
ECE 534: Elements of Informtion Theory, Fll 00 Homework 7 Solutions ll by Kenneth Plcio Bus October 4, 00. Problem 7.3. Binry multiplier chnnel () Consider the chnnel Y = XZ, where X nd Z re independent
More information#6A&B Magnetic Field Mapping
#6A& Mgnetic Field Mpping Gol y performing this lb experiment, you will: 1. use mgnetic field mesurement technique bsed on Frdy s Lw (see the previous experiment),. study the mgnetic fields generted by
More informationTests for the Ratio of Two Poisson Rates
Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson
More informationStudent Activity 3: Single Factor ANOVA
MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether
More informationThe Regulated and Riemann Integrals
Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue
More informationTutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits.
Tutoril 4 Exercises on Differentil Entropy. Evlute the differentil entropy h(x) f ln f for the following: () The uniform distribution, f(x) b. (b) The exponentil density, f(x) λe λx, x 0. (c) The Lplce
More informationMonte Carlo method in solving numerical integration and differential equation
Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The
More informationA New Receiver for Chaotic Digital Transmissions: The Symbolic Matching Approach
A New Receiver for Chotic Digitl Trnsmissions: The Symbolic Mtching Approch Gilles BUREL nd Stéphne AZOU LEST, Université de Bretgne Occidentle CS 93837, 29238 BREST cede 3, Frnce Abstrct : Chotic digitl
More informationPhysics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018
Physics 201 Lb 3: Mesurement of Erth s locl grvittionl field I Dt Acquisition nd Preliminry Anlysis Dr. Timothy C. Blck Summer I, 2018 Theoreticl Discussion Grvity is one of the four known fundmentl forces.
More informationChapter 0. What is the Lebesgue integral about?
Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More informationMath 1B, lecture 4: Error bounds for numerical methods
Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the
More informationGoals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite
Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite
More informationMath 426: Probability Final Exam Practice
Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by
More informationCMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature
CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy
More informationChapter 4 Contravariance, Covariance, and Spacetime Diagrams
Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz
More informationLecture 3 Gaussian Probability Distribution
Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil
More informationProbabilistic Investigation of Sensitivities of Advanced Test- Analysis Model Correlation Methods
Probbilistic Investigtion of Sensitivities of Advnced Test- Anlysis Model Correltion Methods Liz Bergmn, Mtthew S. Allen, nd Dniel C. Kmmer Dept. of Engineering Physics University of Wisconsin-Mdison Rndll
More informationA REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007
A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationLecture 14: Quadrature
Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl
More informationCS667 Lecture 6: Monte Carlo Integration 02/10/05
CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of
More informationCryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy *
Cryptnlysis of Substitution-Permuttion Networks Using Key-Dependent Degenercy * Howrd M. Heys Electricl Engineering, Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John
More informationExercise 5.5: Large-scale log-normal fading
Exercise 5.5: Lrge-scle log-norml fding Since the system is designed to hndle propgtion loss of 135 db, outge will hppen when the propgtion loss is 8 db higher thn the deterministic loss of 17 db 135 17
More informationThe steps of the hypothesis test
ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of
More informationNon-Linear & Logistic Regression
Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find
More informationSection 11.5 Estimation of difference of two proportions
ection.5 Estimtion of difference of two proportions As seen in estimtion of difference of two mens for nonnorml popultion bsed on lrge smple sizes, one cn use CLT in the pproximtion of the distribution
More informationChapter 5 : Continuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll
More informationCredibility Hypothesis Testing of Fuzzy Triangular Distributions
666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct
More informationAcceptance Sampling by Attributes
Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire
More informationpotentials A z, F z TE z Modes We use the e j z z =0 we can simply say that the x dependence of E y (1)
3e. Introduction Lecture 3e Rectngulr wveguide So fr in rectngulr coordintes we hve delt with plne wves propgting in simple nd inhomogeneous medi. The power density of plne wve extends over ll spce. Therefore
More informationMath 8 Winter 2015 Applications of Integration
Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl
More informationLocal orthogonality: a multipartite principle for (quantum) correlations
Locl orthogonlity: multiprtite principle for (quntum) correltions Antonio Acín ICREA Professor t ICFO-Institut de Ciencies Fotoniques, Brcelon Cusl Structure in Quntum Theory, Bensque, Spin, June 2013
More informationIndustrial Electrical Engineering and Automation
CODEN:LUTEDX/(TEIE-719)/1-7/(7) Industril Electricl Engineering nd Automtion Estimtion of the Zero Sequence oltge on the D- side of Dy Trnsformer y Using One oltge Trnsformer on the D-side Frncesco Sull
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More informationFig. 1. Open-Loop and Closed-Loop Systems with Plant Variations
ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses
More informationProbability Distributions for Gradient Directions in Uncertain 3D Scalar Fields
Technicl Report 7.8. Technische Universität München Probbility Distributions for Grdient Directions in Uncertin 3D Sclr Fields Tobis Pfffelmoser, Mihel Mihi, nd Rüdiger Westermnn Computer Grphics nd Visuliztion
More informationUnit #9 : Definite Integral Properties; Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationExtended nonlocal games from quantum-classical games
Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement
More information1 Probability Density Functions
Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our
More information15. Quantisation Noise and Nonuniform Quantisation
5. Quntistion Noise nd Nonuniform Quntistion In PCM, n nlogue signl is smpled, quntised, nd coded into sequence of digits. Once we hve quntised the smpled signls, the exct vlues of the smpled signls cn
More informationIntro to Nuclear and Particle Physics (5110)
Intro to Nucler nd Prticle Physics (5110) Feb, 009 The Nucler Mss Spectrum The Liquid Drop Model //009 1 E(MeV) n n(n-1)/ E/[ n(n-1)/] (MeV/pir) 1 C 16 O 0 Ne 4 Mg 7.7 14.44 19.17 8.48 4 5 6 6 10 15.4.41
More informationSolution for Assignment 1 : Intro to Probability and Statistics, PAC learning
Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (
More informationEmission of K -, L - and M - Auger Electrons from Cu Atoms. Abstract
Emission of K -, L - nd M - uger Electrons from Cu toms Mohmed ssd bdel-rouf Physics Deprtment, Science College, UEU, l in 17551, United rb Emirtes ssd@ueu.c.e bstrct The emission of uger electrons from
More information8 Laplace s Method and Local Limit Theorems
8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved
More informationHere we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.
Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous
More informationW. We shall do so one by one, starting with I 1, and we shall do it greedily, trying
Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)
More information5.7 Improper Integrals
458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the
More informationPatch Antennas. Chapter Resonant Cavity Analysis
Chpter 4 Ptch Antenns A ptch ntenn is low-profile ntenn consisting of metl lyer over dielectric sustrte nd ground plne. Typiclly, ptch ntenn is fed y microstrip trnsmission line, ut other feed lines such
More informationApplicable Analysis and Discrete Mathematics available online at
Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING
More informationSUMMER KNOWHOW STUDY AND LEARNING CENTRE
SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties
More informationProblem Set 3 Solutions
Chemistry 36 Dr Jen M Stndrd Problem Set 3 Solutions 1 Verify for the prticle in one-dimensionl box by explicit integrtion tht the wvefunction ψ ( x) π x is normlized To verify tht ψ ( x) is normlized,
More informationBest Approximation. Chapter The General Case
Chpter 4 Best Approximtion 4.1 The Generl Cse In the previous chpter, we hve seen how n interpolting polynomil cn be used s n pproximtion to given function. We now wnt to find the best pproximtion to given
More informationBinary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case
Binry Rte Dtortion With Side Informtion: The Asymmetric Correltion Chnnel Cse Andrei Sechele, Smuel Cheng, Adrin Muntenu, nd Nikos Deliginn Deprtment of Electronics nd Informtics, Vrije Universiteit Brussel,
More informationSupplementary Information for Directional Reflective Surface Formed via Gradient- Impeding Acoustic Meta-surfaces
Supplementry Informtion for Directionl Reflective Surfce Formed vi Grdient- Impeding Acoustic Met-surfces Kyungjun Song 1*, Jedo Kim 2, Hur Shin 1, Jun-Hyuk Kwk 1, Seong-Hyun Lee 3,Tesung Kim 4 1 Deprtment
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct
More informationTHE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.
THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem
More informationConservation Law. Chapter Goal. 5.2 Theory
Chpter 5 Conservtion Lw 5.1 Gol Our long term gol is to understnd how mny mthemticl models re derived. We study how certin quntity chnges with time in given region (sptil domin). We first derive the very
More informationContinuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht
More informationExam 1 Solutions (1) C, D, A, B (2) C, A, D, B (3) C, B, D, A (4) A, C, D, B (5) D, C, A, B
PHY 249, Fll 216 Exm 1 Solutions nswer 1 is correct for ll problems. 1. Two uniformly chrged spheres, nd B, re plced t lrge distnce from ech other, with their centers on the x xis. The chrge on sphere
More informationA Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System
SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed
More informationReinforcement Learning
Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm
More informationFEM ANALYSIS OF ROGOWSKI COILS COUPLED WITH BAR CONDUCTORS
XIX IMEKO orld Congress Fundmentl nd Applied Metrology September 6 11, 2009, Lisbon, Portugl FEM ANALYSIS OF ROGOSKI COILS COUPLED ITH BAR CONDUCTORS Mirko Mrrcci, Bernrdo Tellini, Crmine Zppcost University
More informationWeek 10: Line Integrals
Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.
More informationPhysics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15
Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril
More informationAPPLICATIONS OF THE DEFINITE INTEGRAL
APPLICATIONS OF THE DEFINITE INTEGRAL. Volume: Slicing, disks nd wshers.. Volumes by Slicing. Suppose solid object hs boundries extending from x =, to x = b, nd tht its cross-section in plne pssing through
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationDuality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.
Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we
More informationPhysics 116C Solution of inhomogeneous ordinary differential equations using Green s functions
Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner
More information12 TRANSFORMING BIVARIATE DENSITY FUNCTIONS
1 TRANSFORMING BIVARIATE DENSITY FUNCTIONS Hving seen how to trnsform the probbility density functions ssocited with single rndom vrible, the next logicl step is to see how to trnsform bivrite probbility
More informationMIXED MODELS (Sections ) I) In the unrestricted model, interactions are treated as in the random effects model:
1 2 MIXED MODELS (Sections 17.7 17.8) Exmple: Suppose tht in the fiber breking strength exmple, the four mchines used were the only ones of interest, but the interest ws over wide rnge of opertors, nd
More information13: Diffusion in 2 Energy Groups
3: Diffusion in Energy Groups B. Rouben McMster University Course EP 4D3/6D3 Nucler Rector Anlysis (Rector Physics) 5 Sept.-Dec. 5 September Contents We study the diffusion eqution in two energy groups
More informationA New Statistic Feature of the Short-Time Amplitude Spectrum Values for Human s Unvoiced Pronunciation
Xiodong Zhung A ew Sttistic Feture of the Short-Time Amplitude Spectrum Vlues for Humn s Unvoiced Pronuncition IAODOG ZHUAG 1 1. Qingdo University, Electronics & Informtion College, Qingdo, 6671 CHIA Abstrct:
More informationPi evaluation. Monte Carlo integration
Pi evlution y 1 1 x Computtionl Physics 2018-19 (Phys Dep IST, Lisbon) Fernndo Bro (311) Monte Crlo integrtion we wnt to evlute the following integrl: F = f (x) dx remember tht the expecttion vlue of the
More informationTHE INTERVAL LATTICE BOLTZMANN METHOD FOR TRANSIENT HEAT TRANSFER IN A SILICON THIN FILM
ROMAI J., v.9, no.2(2013), 173 179 THE INTERVAL LATTICE BOLTZMANN METHOD FOR TRANSIENT HEAT TRANSFER IN A SILICON THIN FILM Alicj Piseck-Belkhyt, Ann Korczk Institute of Computtionl Mechnics nd Engineering,
More informationThe Wave Equation I. MA 436 Kurt Bryan
1 Introduction The Wve Eqution I MA 436 Kurt Bryn Consider string stretching long the x xis, of indeterminte (or even infinite!) length. We wnt to derive n eqution which models the motion of the string
More informationName Solutions to Test 3 November 8, 2017
Nme Solutions to Test 3 November 8, 07 This test consists of three prts. Plese note tht in prts II nd III, you cn skip one question of those offered. Some possibly useful formuls cn be found below. Brrier
More informationWe partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.
Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn
More informationarxiv: v2 [math.pr] 31 Jan 2018
CENTER OF MASS AND THE OPTIMAL QUANTIZERS FOR SOME CONTINUOUS AND DISCRETE UNIFORM DISTRIBUTIONS MRINAL KANTI ROYCHOWDHURY rxiv:77.6v [mth.pr] Jn 8 Abstrct. In this pper, we first consider flt plte (clled
More informationReversals of Signal-Posterior Monotonicity for Any Bounded Prior
Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood
More informationNUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.
NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with
More informationPHYS Summer Professor Caillault Homework Solutions. Chapter 2
PHYS 1111 - Summer 2007 - Professor Cillult Homework Solutions Chpter 2 5. Picture the Problem: The runner moves long the ovl trck. Strtegy: The distnce is the totl length of trvel, nd the displcement
More informationNumerical Integration
Chpter 5 Numericl Integrtion Numericl integrtion is the study of how the numericl vlue of n integrl cn be found. Methods of function pproximtion discussed in Chpter??, i.e., function pproximtion vi the
More informationChapter 14. Matrix Representations of Linear Transformations
Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn
More informationNUMERICAL INTEGRATION
NUMERICAL INTEGRATION How do we evlute I = f (x) dx By the fundmentl theorem of clculus, if F (x) is n ntiderivtive of f (x), then I = f (x) dx = F (x) b = F (b) F () However, in prctice most integrls
More informationSOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014
SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.
More informationThe Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve.
Clculus Li Vs The Fundmentl Theorem of Clculus. The Totl Chnge Theorem nd the Are Under Curve. Recll the following fct from Clculus course. If continuous function f(x) represents the rte of chnge of F
More information7.2 The Definite Integral
7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where
More informationConducting Ellipsoid and Circular Disk
1 Problem Conducting Ellipsoid nd Circulr Disk Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 (September 1, 00) Show tht the surfce chrge density σ on conducting ellipsoid,
More informationThe Moving Center of Mass of a Leaking Bob
The Moving Center of Mss of Leking Bob rxiv:1002.956v1 [physics.pop-ph] 21 Feb 2010 P. Arun Deprtment of Electronics, S.G.T.B. Khls College University of Delhi, Delhi 110 007, Indi. Februry 2, 2010 Abstrct
More informationThe Properties of Stars
10/11/010 The Properties of Strs sses Using Newton s Lw of Grvity to Determine the ss of Celestil ody ny two prticles in the universe ttrct ech other with force tht is directly proportionl to the product
More informationMathematics. Area under Curve.
Mthemtics Are under Curve www.testprepkrt.com Tle of Content 1. Introduction.. Procedure of Curve Sketching. 3. Sketching of Some common Curves. 4. Are of Bounded Regions. 5. Sign convention for finding
More informationHow to simulate Turing machines by invertible one-dimensional cellular automata
How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex
More informationCS 188 Introduction to Artificial Intelligence Fall 2018 Note 7
CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees
More informationA Brief Review on Akkar, Sandikkaya and Bommer (ASB13) GMPE
Southwestern U.S. Ground Motion Chrcteriztion Senior Seismic Hzrd Anlysis Committee Level 3 Workshop #2 October 22-24, 2013 A Brief Review on Akkr, Sndikky nd Bommer (ASB13 GMPE Sinn Akkr Deprtment of
More information1B40 Practical Skills
B40 Prcticl Skills Comining uncertinties from severl quntities error propgtion We usully encounter situtions where the result of n experiment is given in terms of two (or more) quntities. We then need
More information