Further Research on Registration System with Vandermonde Matrix
|
|
- Dayna Carson
- 5 years ago
- Views:
Transcription
1 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 614 Further Research o Registratio System with Vadermode Matrix Nig Huag 1, Xia-tog Huag 2, Jig-i Re 3, Xia-we He 2, Yag Liu 2 1 Ceter of Moder Educatioa Techoogy, Gaa Nma Uiversity Gazhou, , Chia hgzjx@qqcom 2 Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity Gazhou, , Chia 3 Coege of Commuicatio ad Media, Gaa Nma Uiversity Gazhou, , Chia Abstract We propose a improved software registratio system from our previous research Our improvemets are maiy as foows (1) Chagig basic fied to make the scheme suitabe f a characters (2) Chagig ecryptio ad decryptio fmuae to make the scheme me compex (3) Usig the techique of etter decompositio ad compositio to make the scheme me deceptive to a possibe adversary (4) Usig mobie phoe i the system to ehace the security Experimeta resuts ad aaysis show that the improvemets are successfu ad the scheme is viabe ad secure Keywds: software, registratio, Vadermode matrix 1 Itroductio Copy protectio f computer software started a og cat-ad-mouse strugge betwee pubishers ad crackers These were (ad are) programmers who woud defeat copy protectio o software as a hobby, add their aias to the tite scree, ad the distribute the cracked product to the etwk BBSes Iteret sites that speciaized i distributig uauthized copies of software [1] Research o the topic ever eds I [2], we proposed a scheme of registratio with Vadermode matrix i a Gaois fied GF (p), which is a appicatio of Hi cipher [8] I this paper, we further discuss the improvemets of the method Our improvemets are maiy as foows (1) Usig the Gaois fied GF (2 m ) istead of GF (p) to make the scheme suitabe f a characters (2) Usig matrix equatio V 1 X+C istead of V 1 X to make the scheme me compex (3) Usig the techique of etter decompositio ad compositio to make the scheme me deceptive to a possibe adversary (4) Usig mobie phoe i the system to ehace the security The rest of the paper is gaized as foows I Sectio 2, we briefy itroduce our igia research i GF (p) I Sectio 3, we propose some ove ideas to improve our igia scheme I Sectio 4, we desig the registratio system I Sectio 5, we give experimeta resuts ad aaysis We cocude the paper i Sectio 6 2 Origia Scheme Agree o permissio cotro character strig such as P ROF ESSIONALV ERSION o both sides of the ved ad user The we take differet characters µ 1, µ 2,,, µ, from hard id [7] to create a Vadermode matrix i a Gaois fied GF (p), where p is a prime That is V = V (µ 1, µ 2,, µ ) µ = 1 µ 2 µ mod p (1) µ 1 1 µ 1 2 µ 1 The we obtai a determiat fmua det(v ) = (p + µ i µ j ) mod p (2) 1 i<j Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
2 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 615 It foows from µ i s are differet from each other that V is ivertibe The fast computatio of the iverse of V is A = V 1 (µ 1, µ 2,, µ ) = HL mod p (3) where H is a upper triaguar matrix ad L a ower triaguar oe The eemets of each ca be obtaied from recursive fmuae Let X = (x 1, x 2,, x ) T be the pai text, defie a iear mappig: X (y 1, y 2, y ) T = V X mod p (4) as a ecryptio agithm, which is equivaet to the foowig iear fuctios: y 1 = x 1 + x x y 2 = µ 1 x 1 + µ 2 x µ x mod p (5) y = µ 1 1 x 1 + µ 1 2 x µ 1 x The decryptio agithm is X = V 1 AY mod p (6) which is equivaet to the foowig iear fuctios: x 1 = a 11 y 1 + a 12 y a 1 y x 2 = a 21 y 1 + a 22 y a 2 y mod p (7) x = a 1 y 1 + a 2 y a y I der to miimize the set of ecessary fmuae o the user s side, we use A = V 1 o the ved s side as the ecryptio key whie V o the user s side as the decryptio key O the ved s side, we take the permissio cotro strig as the pai text X We compute V 1 X mod p as the cipher text O the user s side, we use X = V Y mod p to verify the registratio Our igia scheme takes p = 37 as the moduus, choose 10 umbers ad 26 capita etters ad the symbo $ Lower case etters are coverted to upper oes Other symbos are iged The key space is (37 + 1) f a give 3 Improved Scheme 31 Basic fied of the scheme To make the scheme uiversa, we defie our computatio i the fied GF (2 m ) I fact, GF (2 m ) is cogruet to Z 2 [x]/f(x), where Z 2 [x] is the poyomia rig over Z 2, f(x) is a primitive poyomia of Z 2 [x] I Z 2 [x]/f(x), the additio of poyomias α(x) ad β(x) is defied by σ(x) = α(x) + β(x)with the character of Z 2 beig 2, f arbitrary α(x) Z 2 [x], we have α(x) + α(x) = 0The mutipicatio of poyomias ad is defied by π(x) = α(x) + β(x) mod f(x)see me detais i [4, 5, 6] If we take m = 8,GF (2 8 ) is just the etter set of exteded ASCII This meas we ca use every symbo i a pai text However, that wi cause the probem of upritabe etters i the registratio strig We use the decompositio of etters to sove this probem by spittig a etter ito two, each is i the rage of {0, 1, 2,, 9, A, B, C, D, E, F } Furtherme, we pus each vaue with A i the geeratio of a registratio strig F exampe, if a etter with the vaue 0 is used f a registratio strig, we reay see it as A Simiary, we see B f vaue 1, C f vaue 2 through P f vaue F This ca easiy be reaized i C aguage Suppose c is i the cipher text, the decompositio ad coversio is expressed by c 1 = c/0x10 + A c 2 = c%0x10 + A This method aso icreases the compexity of the ecryptio Bravo! It actuay butters both sides of our bread 32 Fast computatio of V 1 = HL We deveop the method i [3] to use it i GF (2 m ) Let L be the matrix whose rows are associated with the coefficiets of the poyomias ψ 1 (s) = 1 (8) ψ i = (s + µ j )ψ i 1 (s) L ca be deoted by L(1, s,, s 1 ) T = (ψ 1 (s), ψ 2 (s),, ψ (s)) T L = (9) 1 2 Let ii = 1, ij = 0(i j) (10) i+1,1 = (µ i ) i,j 1 i+1,j = i,j 1 j = 2, 3,, i, i = 1, 2,, (11) Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
3 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 616 Let the iitia vect h = (c 1, c 2,, c ) T be determied from the partia fractio expasio 1 (s + µ 1 ) (s + µ ) = c c s + µ 1 s + µ Deote H by h ij = Deote d(s) by Let H = (h 1, h 2,, h ) T (12) { 1 ψ j+1 (µi) if i j 0, if i > j (13) d(s) = (µ 1 + s, µ 2 + s,, µ + s) T (14) h i 1 = h i d(µ i ), i =, 1,, 2 (15) edig at h 1 = (1, 0,, 0) T The right side of (14) is the ier product of h i ad d(µ i ), ie, if u = (u 1, u 2,, u ) T,v = (v 1, v 2,, v ) T the h i d(µ i ) = (u 1 v 1, u 2 v 2,, u v ) T (16) It foows that the fmuae to compute the eemets i the upper triaguar matrix H are give by { 1 ψ h ij = j+1 (µi), if i j (17) 0, if i > j where is the matrix cotaiig cipher text This is equivaet to m groups of iear mappigs as foows y 11 = a 11 x a 1 x 1 + c 11 y 21 = a 21 x a 2 x 1 + c 21 (21) y 1 = a 1 x a 2 x 1 + c 1 y 12 = a 11 x a 1 x 2 + c 12 y 22 = a 21 x a 2 x 2 + c 22 (22) y 2 = a 1 x a 2 x 2 + c 2 y 1m = a 11 x 1m + + a 1 x m + c 1m y 2m = a 21 x 1m + + a 2 x m + c 2m (23) y m = a 1 x 1m + + a 2 x m + c m I the fied of character 2, the decryptio is expressed as foows X = V (Y C) = V (Y + C) This is equivaet to m groups of iear mappigs as foows ψ j+1(µ i ) = j 1 k=1,k i (µ i + µ k ) (18) 33 Improvemets of the iear mappigs x 11 = y y1 x 21 = µ 1 y µ y1 x 1 = µ 1 1 y µ 1 y 1 (24) I the fied GF (2 8 ), Let x 11 x 12 x 1m x X = 21 x 22 x 2m (19) x 1 x 2 x m be the pai text, ad c 11 c 12 c 1m c C = 21 c 22 c 2m (20) c 1 c 2 c m be the same size as XThe V 1 X + C x 12 = y y2 x 22 = µ 1 y µ y2 x 2 = µ 1 1 y µ 1 y 2 x 1m = y1m + + ym x 2m = µ 1 y1m + + µ ym x m = µ 1 1 y1m + + µ 1 where y ij = y ij c ij = y ij + c ij y m (25) (26) This cipher is obviousy me compex compared with the igia oe The security is ehaced Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
4 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 34 Use of mobie phoe as a receiver I our igia scheme, we assumed that the user got the registratio strig vie web service emai Now we propose the registratio strig ca aso be received as a message via a mobie phoe Step1 The user pays f the software ad submits persoa ifmatio, eg hard id, ame, mobie phoe umber to the server via web Step2 The server checks the submissio Step3 The sever creates a registratio strig Step4 The server seds the registratio strig to the user s mobie phoe via wireess tue Step5 The user reads the message ad register the software The fow of the process is show by Fig Registratio steps 617 Agithm: Step1 Seects differet eemets from id, fms a ew id1 Step2 Creates matrices of ower triaguar L ad upper triaguar H from id1 as show i subsectio 32 Step3 Computes the iverse of Vadermode matrix V 1 = HL Step4 Appeds ecessary dots to the permissio cotro strig p1 to fit the dimesio, puts the resut i p2 Step5 Puts p2 ito matrix X ad creates a matrix C from ame which matches dimesios i step4, usig the eemets of ame circuary x11 x12 x1m x21 x22 x2m X= x1 x2 xm c11 c21 C= c12 c22 c1m c2m c1 c2 cm Step6 Computes V 1 X + C Fig Registratio steps Step7 Decomposes Y ad adds 0 A0 to each eemet respectivey to update Y Step8 Takes eemets from Y to create a registratio strig ike r = xxxxxx xxxxxx xxxxxx 4 Registratio scheme Set preimiary coditios o both sides of the ved ad user: A character strig as a permissio cotro strig p1 dimesio 41 The Creatio of registratio strig The user submits the message as foows Hard id(id f sht), ame, mobie phoe umber(mph f sht) O the ved s side, the server computes as foows: Iput: id, ame, mph Output:Registratio strig ike r = xxxxxx xxxxxx xxxxxx The the server seds the registratio strig above to the user s mobie phoe via wireess tue 42 The use of registratio strig Readig the registratio strig from mobie phoe, the user keys i to register the software Iput: Registratio strig ike r = xxxxxx xxxxxx xxxxxx Output: T RU E/F ALSE Agithm: Step1 Takes eemets from r to create a matrix Y Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
5 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 618 Step2 Miuses A from each eemet of Y to update Y Step3 I the same way as step6 i ast subsectio, creates matrix C Step4 I the fied of character 2, computes Y C = Y + C Step5 Computes Vadermode matrix V from oca hardware id, id 1 Step6 Computes X = V (Y C) = V (Y + C) to get a possibe pai text Step7 Obtais p 2 from X Step8 Removes redudat dots if there are ay at the ed to get p 1 Step9 Compares p 1 with the preimiary oe Step10 The resut is T RUE F ALSE If the verificatio is successfu, the registratio wi be approved, otherwise it wi be defied A registered software picks up the registratio strig automaticay ad verifies it accdig to the above routie to decide which fuctios the software ca use 5 Experimeta resuts ad aaysis Embeds i the software o both sides of the ved ad user: p 1 = V IP versio as a permissio cotro strig Agree o dimesio = 6 51 The Creatio of registratio strig The user submits the messages as foowsid = 5V P 0567Q, ame = Aice, mph = O the ved s side, the server computes as foows Iput: id = 5V P 0567Q, ame = Aice Output: r = GEP CBJ LBDNF G P IMAMA AIHJN E Agithm: Step1 Seects differet eemets from id, fms a ew id 1 : id 1 = 5V P 067Q Step2 Creates ower triaguar ad upper triaguar matrices: L = ad H = BE A 2B B0 CC DF BE A2 8B B A Step3 ComputesV 1 = HL 07 A3 C0 A A5 10 BA F 5 D3 06 = B1 AA F 0 D7 F E 73 CD F D A F D BF 5C 7B 7B AD Step4 Appeds 2 dots to the permissio cotro strig to fit the dimesio, p 2 = V IP versio Step5 Puts p 2, ame ito matrices: V s I i X = P o v 50 6F 76 6E e 65 2E r 72 2E the A C = i c e A i c e A 6C which matche dimesio i step4 Step6 Computes 64 F 8 F 2 C0 19 C0 B1 08 3D D4 Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
6 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 619 Step7 Decomposes Y ad adds A to each eemet respectivey to get G L P A E B I I P D M H C N A J B F M N J G A E Step8 Takes eemets from Y to create a registratio strig: r = GEP CBJ LBDNF G P IMAMA AIHJNE The the server seds the registratio strig to the user s mobie phoe via wireess tue 52 The use of registratio strig Readig the registratio strig from mobie phoe, the user keys i to register the software Iput: r = GEP CBJ LBDNF G P IMAMA AIHJN E Output: T RUE/F ALSE Agithm: Step1 Takes eemets from r = GEP CBJ LBDNF G P IMAMA AIHJN E to get a matrix G L P A E B I I P D M H C N A J B F M N J G A E Step2 Miuses A from each eemet of Y to get a ew matrix 64 F 8 F 2 C0 19 C0 B1 08 3D D4 Step3 I the same way as step5 i ast subsectio, creates A i 6C 69 C = i c c e e A A Step4 I the fied of character 2, computes E A9 Y C = Y + C = 70 A3 D2 6D B8 Step5 Computes Vadermode matrix V = 96 D9 CD D0 5F AF 0B DA F 0 CB CA 33 B4 6D CD 5D A1 from oca hardware id = 5V P 0567Q, id1 = 5V P 067Q Step6 Computes a possibe pai text X = V (Y C) = V (Y + C) V s I i = 50 6F 76 6E P o v 65 2E e 72 2E r Step7 Obtais p 2 = V IP versio from X Step8 Removes 2 redudat dots at the ed to get p 1 = V IP versio Step9 Compares p 1 with the preimiary oe Step10 The resut is T RUE 53 Aaysis of the resuts I our ove scheme, the computatios are perfmed i GF (2 8 ) to make the scheme suitabe f the whoe exteded ASCII tabe Meawhie, the key space expads from (37 + 1) f a give ( ) The uses of mobie phoe, user s ame, the decompositio ad compositio of etters aso ehace the cipher Experimeta resuts show the success of the scheme 6 Cocusios It foows from Experimeta resuts ad aaysis that the ove scheme is ehaced We get better resuts i our further research Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
7 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 620 Ackowedgemets 1)The auths woud ike to express their thaks to the hard wk of the edits ad reviewers of this paper 2)This wk was suppted by the fud from Natura Sciece of Jiagxi Provice of Chia uder Grat No20114BAB The auths woud ike to express their thaks to the Committee of the fud Refereces [1] Copy protectio f computer software, protectio2012 [2] N Huag, Permissio cotro of software based o registratio system with Vadermode matrix i a Gaois fied,i Istrumetatio & Measuremet, Ses Netwk ad Automatio (IMSNA), 2012 Iteratioa Symposium o, 2012, Vo 2, pp [3] SH Hou, ad E Hou, Triaguar Facts of the Iverse of Vadermode Matrices, I Proceedigs of the Iteratioa MutiCoferece of Egieers ad Computer Scietists 2008 Vo 2, IMECS 2008, pp19-21 [4] Darre Hakerso, Afred Meezes ad Scott VastoeGuide to Eiptic Curve Cryptography, Beri:Spriger,2003 [5] Roberto M Avazi, Heri Cohe, Christophe Doche,Gerhard Frey, Taja Lage, Kim Nguye, ad Frederik Vercautere, Hadbook of eiptic ad hypereiptic curve cryptography, Lodo:Tay & Fracis Group,2006 [6] Wiiam JGibert ad WKeith Nichoso, Moder Aegbra with Appicatios,Secod EditioNew Jersy:Joh Wiey &Sos,Ic,2003 [7] SDS Moteiro ad RF Erbacher, Exempifyig Attack Idetificatio ad Aaysis i a Nove Fesicay Viabe Sysog Mode,I Washigto:IEEE Computer Society,Proceedigs of the Third Iteratioa Wkshop o Systematic Approaches to Digita Fesic Egieerig,2008,pp57-68 [8] L S Hi, Cryptography i a Agebraic Aphabet, The America Mathematica Mothy, Vo 36, No 6 (Ju - Ju, 1929), pp Nig Huag, b i 1958, received Master s degree i appied mathematics ad computer sciece from Jiagxi Uiversity, Chia i 1991, awarded sei egieer of the Idustria ad Commercia Bak of Chia i 2001 He is ow with Ceter of Moder Educatioa Techoogy, Gaa Nma Uiversity, Gazhou, Chia,as a associate profess His research iterests icude ifmatio security ad digita campus Xia-tog Huag, b i 1966, received Doct s degree i computatioa mathematics from Hua Uiversity, Chia i 2006 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou, Chia as a profess His research iterests icude computatioa mathematics ad ifmatio security Jig-i Re, b i 1980, received Master s degree i computer sciece from Wuha Uiversity of Techoogy, Chia i 2006 She is ow with Coege of Commuicatio ad Media, Gaa Nma Uiversity, Gazhou, Chia, as a ecturer Her research iterests icude Iteiget computatio ad simuatio Xia-we He, b i 1974, received Master s degree i computer sciece from Nachag Uiversity, Chia i 2007 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou,Chia, as a associate profess His research iterests icude etwk security ad image recogitio Yag Liu, b i 1972, received Master s degree i computer sciece from Nachag Uiversity, Chia i 2007 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou,Chia, as a ecturer His research iterests icude agithm optimizatio ad image recogitio Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved
Optimizing Triangular Parabolic Fuzzy EOQ Model with Shortage Using Nearest Interval Approximation
Iteratioa Joura o Future Revoutio i Computer Sciece & Commuicatio Egieerig ISSN: 454-448 Voume: 3 Issue: 9 96 Optimizig Triaguar Paraboic Fuzzy EO Mode with Shortage Usig Nearest Iterva Approximatio Faritha
More informationIntroduction to FFT Processors. Chih-Wei Liu VLSI Signal Processing Lab Department of Electronics Engineering National Chiao-Tung University
Itroductio to FFT Processors Chihei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa ChiaoTug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm
More informationIntroduction to FFT Processors
Itroductio to FFT Processors Chih-ei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa Chiao-Tug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm
More informationInternational Journal of Pure and Applied Sciences and Technology
It J Pure App Sci Techo 6( (0 pp7-79 Iteratioa Joura of Pure ad Appied Scieces ad Techoogy ISS 9-607 Avaiabe oie at wwwijopaasati Research Paper Reatioship Amog the Compact Subspaces of Rea Lie ad their
More informationMINKOWSKI SET OPERATORS. Daniela VELICHOVÁ
Te Joura of Pois Society for Geometry ad Egieerig Grapics Voume 4 (013), 45-49 45 MINKOWSKI SET OPERATORS Daiea VELICHOVÁ Sova Uiversity of Tecoogy, Istitute of Matematics ad Pysics, Nám. Sobody 17, 81
More informationLU Decomposition Method
SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio
More informationCreating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA
Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by
More informationModified Self-Organizing Map for Optical Flow Clustering System
Proceedigs of the 7th WSEAS Iteratioa Coferece o Siga, Speech ad Image Processig, Beijig, Chia, September -7, 7 6 Modified Sef-Orgaizig Map for Optica Fow Custerig System B. DOUNGCHATOM, P. KUMSAWAT, K.
More information6.081 March Lecture 6
Review exampe : Aut Zeda s ba accout growig from some iitia baace y [ ] y[.05y[ y[ ].05y[ Natura frequecy is.05 soutio grows as.05 Review exampe : Your robot from ab d d right d eft ] δtθ[ θ[ ] θ[ δtk
More informationCS425 Project Assignment
CS425 Project Assigmet Tue the TPC-H queries i a database of your choice What is TPC-H? Idustry stadard bechmark for testig database performace for compex SQL Decisio support Aaytics Ad-hoc TPC-H specificatio
More informationILP Problem Formulation
ILP Probem Formuatio Ajay Kr. Dhamija (N-1/MBA PT 2006-09) Abstract Iteger iear programmig is a very importat cass of probems, both agorithmicay ad combiatoriay.foowig are some of the probems i computer
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationFuzzy Logic Module of Convolutional Neural Network for Handwritten Digits Recognition
Joura of Physics: Coferece Series PAPER OPEN ACCESS Fuzzy Logic Modue of Covoutioa Neura Network for Hadwritte Digits Recogitio To cite this artice: E.A. Popko ad I.A. Weistei 2016 J. Phys.: Cof. Ser.
More informationComparison of B-Spline and Zernike fitting techniques in complex wavefront surfaces
Pease verify that () a pages are preset, () a figures are acceptabe, (3) a fots ad specia characters are correct, ad (4) a text ad figures fit withi the Compariso of B-Spie ad Zerike fittig techiques i
More informationAccuracy Improvement in Camera Calibration
Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationEmbedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements
Proceedigs of IEEE Rea-Time Systems Symposium (RTSS), pp. 201-211, Dec. 2002. Embedded System Desig Framework for Miimizig Code Size ad Guarateeig Rea-Time Requiremets Isik Shi, Isup Lee Dept. of Computer
More informationThe analysis of image characteristics on the base of energy features of the wavelet transform
The aaysis of image characteristics o the base of eergy features of the waveet trasform S A Lyasheva 1, M V Medvedev 1, M P Sheymovich 1 ad V V Mokshi 1 1 Kaza Natioa Research Techica Uiversity -KAI, K.
More informationCounting the Number of Minimum Roman Dominating Functions of a Graph
Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationAn Improvement of the Basic El-Gamal Public Key Cryptosystem
Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationOn Multicast Path Finding Algorithms
Pubished i Proceedigs of INFOCOM 91, pp. 1274-1283, Miami, Forida, Apri 7-11, 1991. O Muticast Path Fidig Agorithms Chig-Hua Chow Be Commuicatios Research 445 South Street, MRE 2Q231 Morristow, NJ 07960-1910
More informationRecursion. A problem solving technique where an algorithm is defined in terms of itself. A recursive method is a method that calls itself
Recursio 1 A probem sovig techique where a agorithm is defied i terms of itsef A recursive method is a method that cas itsef A recursive agorithm breaks dow the iput or the search space ad appies the same
More informationThe Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum
Advaced Materials Research Olie: 04-05-3 ISSN: 66-8985, Vols. 96-930, pp 463-467 doi:0.408/www.scietific.et/amr.96-930.463 04 Tras Tech Publicatios, Switzerlad The Research Based o Fuzzy Slidig Mode Cotrol
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationChapter 10 : Concurrency Control
Chapter 10 : Cocurrecy Cotro modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Ituitio of Lock-based Protocos Trasactios have to
More informationBezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only
Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of
More informationCS425 Summer 2016 Jason Arnold Chapter 4: Introduction to SQL
CS425 Summer 2016 Jaso Arod Chapter 4: Itroductio to SQL Modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Chapter 4: Itroductio
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationA Very Simple Approach for 3-D to 2-D Mapping
A Very Simple Approach for -D to -D appig Sadipa Dey (1 Ajith Abraham ( Sugata Sayal ( Sadipa Dey (1 Ashi Software Private Limited INFINITY Tower II 10 th Floor Plot No. - 4. Block GP Salt Lake Electroics
More informationProbability of collisions in Soft Input Decryption
Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.
More informationSD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.
SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More informationOn Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract
O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationLecture 18. Optimization in n dimensions
Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationA Note on Least-norm Solution of Global WireWarping
A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract
More informationTheory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators
Theory of Fuzzy Soft Matrix ad its Multi Criteria i Decisio Makig Based o Three Basic t-norm Operators Md. Jalilul Islam Modal 1, Dr. Tapa Kumar Roy 2 Research Scholar, Dept. of Mathematics, BESUS, Howrah-711103,
More informationCS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python
CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about
More informationEvaluation of Support Vector Machine Kernels for Detecting Network Anomalies
Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe
More informationOntology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection
2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationFuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations
Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationThe golden search method: Question 1
1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())
More informationOLYMPIAD 2 MOCK TEST
More Practice - More Score This readies the studets for cofidety tackig differet types of questios ad prepares them adequatey for ay Regioa / Natioa / Iteratioa Oympiad. The saiet features of this series
More informationWavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)
Wavelet Trasform CSE 49 G Itroductio to Data Compressio Witer 6 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter
More informationA Selected Primer on Computer Vision: Geometric and Photometric Stereo & Structured Light
A Seected Primer o Computer Visio: Geometric ad Photometric Stereo & Structured Light CS334 Sprig 2012 Daie G. Aiaga Departmet of Computer Sciece Purdue Uiversit Defiitios Camera geometr (=motio) Give
More informationx x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the
COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,
More informationSecond-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems
Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationISSN (Print) Research Article. *Corresponding author Nengfa Hu
Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com
More informationarxiv: v2 [cs.ds] 24 Mar 2018
Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationAnalysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c
Advaced Materials Research Olie: 2013-01-25 IN: 1662-8985, Vol. 659, pp 196-201 doi:10.4028/www.scietific.et/amr.659.196 2013 Tras Tech Publicatios, witzerlad Aalysis of Class Desig Couplig Based o Iformatio
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationName Date Hr. ALGEBRA 1-2 SPRING FINAL MULTIPLE CHOICE REVIEW #2
Name Date Hr. ALGEBRA - SPRING FINAL MULTIPLE CHOICE REVIEW # 5. Which measure of ceter is most appropriate for the followig data set? {7, 7, 75, 77,, 9, 9, 90} Mea Media Stadard Deviatio Rage 5. The umber
More information5.3 Recursive definitions and structural induction
/8/05 5.3 Recursive defiitios ad structural iductio CSE03 Discrete Computatioal Structures Lecture 6 A recursively defied picture Recursive defiitios e sequece of powers of is give by a = for =0,,, Ca
More informationcondition w i B i S maximum u i
ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationA Liver Level Set (LLS) Algorithm for Extracting Liver s Volume Containing Disconnected Regions Automatically
46 IJCSNS Iteratioa Joura of Computer Sciece ad Network Security, VOL.8 No.1, December 008 A Liver Leve Set (LLS) Agorithm for Extractig Liver s Voume Cotaiig Discoected Regios Automaticay Puteri Suhaiza
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationAN EFFECTIVE EXACT ALGORITHM FOR ONE PARTICULAR CASE OF THE TRAVELING-SALESMAN PROBLEM Panishev A.V., Plechystyy D.D.
Iteratioa Joura "Iforatio Theories & Aicatios" Vo 55 AN EFFECTIVE EXACT ALGOITHM FO ONE PATICULA CASE OF THE TAVELING-SALESMAN POBLEM Paishev AV Pechystyy DD Abstract: The artice resets the exact agorith
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationSECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More informationNovel Encryption Schemes Based on Catalan Numbers
D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: 48-96 www.iera.com Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha
More informationArea As A Limit & Sigma Notation
Area As A Limit & Sigma Notatio SUGGESTED REFERENCE MATERIAL: As you work through the problems listed below, you should referece Chapter 5.4 of the recommeded textbook (or the equivalet chapter i your
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationNew Fuzzy Color Clustering Algorithm Based on hsl Similarity
IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper
More informationA METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER
Proceedigs of the Sixth Iteratioal Coferece o Machie Learig ad Cyberetics, Hog Kog, 9- August 7 A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER AI-MIN YANG,, XIN-GUANG LI, LING-MIN JIANG,YONG-MEI
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationEigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1
Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces
More informationRobust Digital Image Cryptosystem Based on Nonlinear Dynamics of Compound Sine and Cosine Chaotic Maps for Private Data Protection
Robust Digital Image Cryptosystem Based o oliear Dyamics of Compoud Sie ad Cosie Chaotic Maps for Private Data Protectio S. Maksuapa, T. Veerawadtaapog, W. Sa-Um Itelliget Electroics Systems Research Laboratory
More informationIdentification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.
Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's
More informationA MINIMUM SPANNING TREE BASED METHOD FOR UAV IMAGE SEGMENTATION
IPR Aas of the Photogrammetry, Remote esig ad patia Iformatio cieces, Voume III-7, 06 XXIII IPR Cogress, 9 Juy 06, Prague, Czech Repubic A MINIMUM PANNING TREE BAED METHOD FOR UAV IMAGE EGMENTATION Pig
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationOn the Exact Solution of the No-Wait Flow Shop Problem with Due Date Constraints
O the Exact Soutio of the No-Wait Fow Shop Probem with Due Date Costraits Hamed Samarghadi Departmet of Fiace ad Maagemet Sciece, Edwards Schoo of Busiess, Uiversity of Saskatchewa, Saskatoo, Saskatchewa,
More informationText Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree
Available olie at www.ijpe-olie.com vol. 13, o. 7, November 017, pp. 1159-1164 DOI: 10.3940/ijpe.17.07.p19.11591164 Text Feature Selectio based o Feature Dispersio Degree ad Feature Cocetratio Degree Zhifeg
More information1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationOptimal Mapped Mesh on the Circle
Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad
More informationEigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1
Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces
More informationFuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter
Fuzzy Membership Fuctio Optimizatio for System Idetificatio Usig a Eteded Kalma Filter Srikira Kosaam ad Da Simo Clevelad State Uiversity NAFIPS Coferece Jue 4, 2006 Embedded Cotrol Systems Research Lab
More informationCS 111: Program Design I Lecture 5: US Law when others have encryption keys; if, for
CS 111: Program Desig I Lecture 5: US Law whe others have ecryptio keys; if, for Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago September 8, 2016 Lavabit ad Sowde Lavabit was a ecrypted
More informationNumerical Methods Lecture 6 - Curve Fitting Techniques
Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationAn Exponential Time 2-Approximation Algorithm for Bandwidth
A Expoetia Time -Approximatio Agorithm for Badwidth Marti Fürer Serge Gaspers Shiva Prasad Kasiviswaatha Abstract The badwidth of a graph G o vertices is the miimum b such that the vertices of G ca be
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationConvolutional Neural Network Architectures for Signals Supported on Graphs
IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 Covoutioa Neura Network Architectures for Sigas Supported o Graphs Ferado Gama, Atoio G. Marques, Geert Leus, ad Aejadro Ribeiro arxiv:1805.00165v2 eess.sp
More informationPackage popkorn. R topics documented: February 20, Type Package
Type Pacage Pacage popkor February 20, 2015 Title For iterval estimatio of mea of selected populatios Versio 0.3-0 Date 2014-07-04 Author Vi Gopal, Claudio Fuetes Maitaier Vi Gopal Depeds
More information