Further Research on Registration System with Vandermonde Matrix

Size: px
Start display at page:

Download "Further Research on Registration System with Vandermonde Matrix"

Transcription

1 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 614 Further Research o Registratio System with Vadermode Matrix Nig Huag 1, Xia-tog Huag 2, Jig-i Re 3, Xia-we He 2, Yag Liu 2 1 Ceter of Moder Educatioa Techoogy, Gaa Nma Uiversity Gazhou, , Chia hgzjx@qqcom 2 Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity Gazhou, , Chia 3 Coege of Commuicatio ad Media, Gaa Nma Uiversity Gazhou, , Chia Abstract We propose a improved software registratio system from our previous research Our improvemets are maiy as foows (1) Chagig basic fied to make the scheme suitabe f a characters (2) Chagig ecryptio ad decryptio fmuae to make the scheme me compex (3) Usig the techique of etter decompositio ad compositio to make the scheme me deceptive to a possibe adversary (4) Usig mobie phoe i the system to ehace the security Experimeta resuts ad aaysis show that the improvemets are successfu ad the scheme is viabe ad secure Keywds: software, registratio, Vadermode matrix 1 Itroductio Copy protectio f computer software started a og cat-ad-mouse strugge betwee pubishers ad crackers These were (ad are) programmers who woud defeat copy protectio o software as a hobby, add their aias to the tite scree, ad the distribute the cracked product to the etwk BBSes Iteret sites that speciaized i distributig uauthized copies of software [1] Research o the topic ever eds I [2], we proposed a scheme of registratio with Vadermode matrix i a Gaois fied GF (p), which is a appicatio of Hi cipher [8] I this paper, we further discuss the improvemets of the method Our improvemets are maiy as foows (1) Usig the Gaois fied GF (2 m ) istead of GF (p) to make the scheme suitabe f a characters (2) Usig matrix equatio V 1 X+C istead of V 1 X to make the scheme me compex (3) Usig the techique of etter decompositio ad compositio to make the scheme me deceptive to a possibe adversary (4) Usig mobie phoe i the system to ehace the security The rest of the paper is gaized as foows I Sectio 2, we briefy itroduce our igia research i GF (p) I Sectio 3, we propose some ove ideas to improve our igia scheme I Sectio 4, we desig the registratio system I Sectio 5, we give experimeta resuts ad aaysis We cocude the paper i Sectio 6 2 Origia Scheme Agree o permissio cotro character strig such as P ROF ESSIONALV ERSION o both sides of the ved ad user The we take differet characters µ 1, µ 2,,, µ, from hard id [7] to create a Vadermode matrix i a Gaois fied GF (p), where p is a prime That is V = V (µ 1, µ 2,, µ ) µ = 1 µ 2 µ mod p (1) µ 1 1 µ 1 2 µ 1 The we obtai a determiat fmua det(v ) = (p + µ i µ j ) mod p (2) 1 i<j Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

2 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 615 It foows from µ i s are differet from each other that V is ivertibe The fast computatio of the iverse of V is A = V 1 (µ 1, µ 2,, µ ) = HL mod p (3) where H is a upper triaguar matrix ad L a ower triaguar oe The eemets of each ca be obtaied from recursive fmuae Let X = (x 1, x 2,, x ) T be the pai text, defie a iear mappig: X (y 1, y 2, y ) T = V X mod p (4) as a ecryptio agithm, which is equivaet to the foowig iear fuctios: y 1 = x 1 + x x y 2 = µ 1 x 1 + µ 2 x µ x mod p (5) y = µ 1 1 x 1 + µ 1 2 x µ 1 x The decryptio agithm is X = V 1 AY mod p (6) which is equivaet to the foowig iear fuctios: x 1 = a 11 y 1 + a 12 y a 1 y x 2 = a 21 y 1 + a 22 y a 2 y mod p (7) x = a 1 y 1 + a 2 y a y I der to miimize the set of ecessary fmuae o the user s side, we use A = V 1 o the ved s side as the ecryptio key whie V o the user s side as the decryptio key O the ved s side, we take the permissio cotro strig as the pai text X We compute V 1 X mod p as the cipher text O the user s side, we use X = V Y mod p to verify the registratio Our igia scheme takes p = 37 as the moduus, choose 10 umbers ad 26 capita etters ad the symbo $ Lower case etters are coverted to upper oes Other symbos are iged The key space is (37 + 1) f a give 3 Improved Scheme 31 Basic fied of the scheme To make the scheme uiversa, we defie our computatio i the fied GF (2 m ) I fact, GF (2 m ) is cogruet to Z 2 [x]/f(x), where Z 2 [x] is the poyomia rig over Z 2, f(x) is a primitive poyomia of Z 2 [x] I Z 2 [x]/f(x), the additio of poyomias α(x) ad β(x) is defied by σ(x) = α(x) + β(x)with the character of Z 2 beig 2, f arbitrary α(x) Z 2 [x], we have α(x) + α(x) = 0The mutipicatio of poyomias ad is defied by π(x) = α(x) + β(x) mod f(x)see me detais i [4, 5, 6] If we take m = 8,GF (2 8 ) is just the etter set of exteded ASCII This meas we ca use every symbo i a pai text However, that wi cause the probem of upritabe etters i the registratio strig We use the decompositio of etters to sove this probem by spittig a etter ito two, each is i the rage of {0, 1, 2,, 9, A, B, C, D, E, F } Furtherme, we pus each vaue with A i the geeratio of a registratio strig F exampe, if a etter with the vaue 0 is used f a registratio strig, we reay see it as A Simiary, we see B f vaue 1, C f vaue 2 through P f vaue F This ca easiy be reaized i C aguage Suppose c is i the cipher text, the decompositio ad coversio is expressed by c 1 = c/0x10 + A c 2 = c%0x10 + A This method aso icreases the compexity of the ecryptio Bravo! It actuay butters both sides of our bread 32 Fast computatio of V 1 = HL We deveop the method i [3] to use it i GF (2 m ) Let L be the matrix whose rows are associated with the coefficiets of the poyomias ψ 1 (s) = 1 (8) ψ i = (s + µ j )ψ i 1 (s) L ca be deoted by L(1, s,, s 1 ) T = (ψ 1 (s), ψ 2 (s),, ψ (s)) T L = (9) 1 2 Let ii = 1, ij = 0(i j) (10) i+1,1 = (µ i ) i,j 1 i+1,j = i,j 1 j = 2, 3,, i, i = 1, 2,, (11) Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

3 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 616 Let the iitia vect h = (c 1, c 2,, c ) T be determied from the partia fractio expasio 1 (s + µ 1 ) (s + µ ) = c c s + µ 1 s + µ Deote H by h ij = Deote d(s) by Let H = (h 1, h 2,, h ) T (12) { 1 ψ j+1 (µi) if i j 0, if i > j (13) d(s) = (µ 1 + s, µ 2 + s,, µ + s) T (14) h i 1 = h i d(µ i ), i =, 1,, 2 (15) edig at h 1 = (1, 0,, 0) T The right side of (14) is the ier product of h i ad d(µ i ), ie, if u = (u 1, u 2,, u ) T,v = (v 1, v 2,, v ) T the h i d(µ i ) = (u 1 v 1, u 2 v 2,, u v ) T (16) It foows that the fmuae to compute the eemets i the upper triaguar matrix H are give by { 1 ψ h ij = j+1 (µi), if i j (17) 0, if i > j where is the matrix cotaiig cipher text This is equivaet to m groups of iear mappigs as foows y 11 = a 11 x a 1 x 1 + c 11 y 21 = a 21 x a 2 x 1 + c 21 (21) y 1 = a 1 x a 2 x 1 + c 1 y 12 = a 11 x a 1 x 2 + c 12 y 22 = a 21 x a 2 x 2 + c 22 (22) y 2 = a 1 x a 2 x 2 + c 2 y 1m = a 11 x 1m + + a 1 x m + c 1m y 2m = a 21 x 1m + + a 2 x m + c 2m (23) y m = a 1 x 1m + + a 2 x m + c m I the fied of character 2, the decryptio is expressed as foows X = V (Y C) = V (Y + C) This is equivaet to m groups of iear mappigs as foows ψ j+1(µ i ) = j 1 k=1,k i (µ i + µ k ) (18) 33 Improvemets of the iear mappigs x 11 = y y1 x 21 = µ 1 y µ y1 x 1 = µ 1 1 y µ 1 y 1 (24) I the fied GF (2 8 ), Let x 11 x 12 x 1m x X = 21 x 22 x 2m (19) x 1 x 2 x m be the pai text, ad c 11 c 12 c 1m c C = 21 c 22 c 2m (20) c 1 c 2 c m be the same size as XThe V 1 X + C x 12 = y y2 x 22 = µ 1 y µ y2 x 2 = µ 1 1 y µ 1 y 2 x 1m = y1m + + ym x 2m = µ 1 y1m + + µ ym x m = µ 1 1 y1m + + µ 1 where y ij = y ij c ij = y ij + c ij y m (25) (26) This cipher is obviousy me compex compared with the igia oe The security is ehaced Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

4 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 34 Use of mobie phoe as a receiver I our igia scheme, we assumed that the user got the registratio strig vie web service emai Now we propose the registratio strig ca aso be received as a message via a mobie phoe Step1 The user pays f the software ad submits persoa ifmatio, eg hard id, ame, mobie phoe umber to the server via web Step2 The server checks the submissio Step3 The sever creates a registratio strig Step4 The server seds the registratio strig to the user s mobie phoe via wireess tue Step5 The user reads the message ad register the software The fow of the process is show by Fig Registratio steps 617 Agithm: Step1 Seects differet eemets from id, fms a ew id1 Step2 Creates matrices of ower triaguar L ad upper triaguar H from id1 as show i subsectio 32 Step3 Computes the iverse of Vadermode matrix V 1 = HL Step4 Appeds ecessary dots to the permissio cotro strig p1 to fit the dimesio, puts the resut i p2 Step5 Puts p2 ito matrix X ad creates a matrix C from ame which matches dimesios i step4, usig the eemets of ame circuary x11 x12 x1m x21 x22 x2m X= x1 x2 xm c11 c21 C= c12 c22 c1m c2m c1 c2 cm Step6 Computes V 1 X + C Fig Registratio steps Step7 Decomposes Y ad adds 0 A0 to each eemet respectivey to update Y Step8 Takes eemets from Y to create a registratio strig ike r = xxxxxx xxxxxx xxxxxx 4 Registratio scheme Set preimiary coditios o both sides of the ved ad user: A character strig as a permissio cotro strig p1 dimesio 41 The Creatio of registratio strig The user submits the message as foows Hard id(id f sht), ame, mobie phoe umber(mph f sht) O the ved s side, the server computes as foows: Iput: id, ame, mph Output:Registratio strig ike r = xxxxxx xxxxxx xxxxxx The the server seds the registratio strig above to the user s mobie phoe via wireess tue 42 The use of registratio strig Readig the registratio strig from mobie phoe, the user keys i to register the software Iput: Registratio strig ike r = xxxxxx xxxxxx xxxxxx Output: T RU E/F ALSE Agithm: Step1 Takes eemets from r to create a matrix Y Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

5 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 618 Step2 Miuses A from each eemet of Y to update Y Step3 I the same way as step6 i ast subsectio, creates matrix C Step4 I the fied of character 2, computes Y C = Y + C Step5 Computes Vadermode matrix V from oca hardware id, id 1 Step6 Computes X = V (Y C) = V (Y + C) to get a possibe pai text Step7 Obtais p 2 from X Step8 Removes redudat dots if there are ay at the ed to get p 1 Step9 Compares p 1 with the preimiary oe Step10 The resut is T RUE F ALSE If the verificatio is successfu, the registratio wi be approved, otherwise it wi be defied A registered software picks up the registratio strig automaticay ad verifies it accdig to the above routie to decide which fuctios the software ca use 5 Experimeta resuts ad aaysis Embeds i the software o both sides of the ved ad user: p 1 = V IP versio as a permissio cotro strig Agree o dimesio = 6 51 The Creatio of registratio strig The user submits the messages as foowsid = 5V P 0567Q, ame = Aice, mph = O the ved s side, the server computes as foows Iput: id = 5V P 0567Q, ame = Aice Output: r = GEP CBJ LBDNF G P IMAMA AIHJN E Agithm: Step1 Seects differet eemets from id, fms a ew id 1 : id 1 = 5V P 067Q Step2 Creates ower triaguar ad upper triaguar matrices: L = ad H = BE A 2B B0 CC DF BE A2 8B B A Step3 ComputesV 1 = HL 07 A3 C0 A A5 10 BA F 5 D3 06 = B1 AA F 0 D7 F E 73 CD F D A F D BF 5C 7B 7B AD Step4 Appeds 2 dots to the permissio cotro strig to fit the dimesio, p 2 = V IP versio Step5 Puts p 2, ame ito matrices: V s I i X = P o v 50 6F 76 6E e 65 2E r 72 2E the A C = i c e A i c e A 6C which matche dimesio i step4 Step6 Computes 64 F 8 F 2 C0 19 C0 B1 08 3D D4 Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

6 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 619 Step7 Decomposes Y ad adds A to each eemet respectivey to get G L P A E B I I P D M H C N A J B F M N J G A E Step8 Takes eemets from Y to create a registratio strig: r = GEP CBJ LBDNF G P IMAMA AIHJNE The the server seds the registratio strig to the user s mobie phoe via wireess tue 52 The use of registratio strig Readig the registratio strig from mobie phoe, the user keys i to register the software Iput: r = GEP CBJ LBDNF G P IMAMA AIHJN E Output: T RUE/F ALSE Agithm: Step1 Takes eemets from r = GEP CBJ LBDNF G P IMAMA AIHJN E to get a matrix G L P A E B I I P D M H C N A J B F M N J G A E Step2 Miuses A from each eemet of Y to get a ew matrix 64 F 8 F 2 C0 19 C0 B1 08 3D D4 Step3 I the same way as step5 i ast subsectio, creates A i 6C 69 C = i c c e e A A Step4 I the fied of character 2, computes E A9 Y C = Y + C = 70 A3 D2 6D B8 Step5 Computes Vadermode matrix V = 96 D9 CD D0 5F AF 0B DA F 0 CB CA 33 B4 6D CD 5D A1 from oca hardware id = 5V P 0567Q, id1 = 5V P 067Q Step6 Computes a possibe pai text X = V (Y C) = V (Y + C) V s I i = 50 6F 76 6E P o v 65 2E e 72 2E r Step7 Obtais p 2 = V IP versio from X Step8 Removes 2 redudat dots at the ed to get p 1 = V IP versio Step9 Compares p 1 with the preimiary oe Step10 The resut is T RUE 53 Aaysis of the resuts I our ove scheme, the computatios are perfmed i GF (2 8 ) to make the scheme suitabe f the whoe exteded ASCII tabe Meawhie, the key space expads from (37 + 1) f a give ( ) The uses of mobie phoe, user s ame, the decompositio ad compositio of etters aso ehace the cipher Experimeta resuts show the success of the scheme 6 Cocusios It foows from Experimeta resuts ad aaysis that the ove scheme is ehaced We get better resuts i our further research Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

7 IJCSI Iteratioa Joura of Computer Sciece Issues, Vo 10, Issue 1, No 1, Jauary 2013 wwwijcsig 620 Ackowedgemets 1)The auths woud ike to express their thaks to the hard wk of the edits ad reviewers of this paper 2)This wk was suppted by the fud from Natura Sciece of Jiagxi Provice of Chia uder Grat No20114BAB The auths woud ike to express their thaks to the Committee of the fud Refereces [1] Copy protectio f computer software, protectio2012 [2] N Huag, Permissio cotro of software based o registratio system with Vadermode matrix i a Gaois fied,i Istrumetatio & Measuremet, Ses Netwk ad Automatio (IMSNA), 2012 Iteratioa Symposium o, 2012, Vo 2, pp [3] SH Hou, ad E Hou, Triaguar Facts of the Iverse of Vadermode Matrices, I Proceedigs of the Iteratioa MutiCoferece of Egieers ad Computer Scietists 2008 Vo 2, IMECS 2008, pp19-21 [4] Darre Hakerso, Afred Meezes ad Scott VastoeGuide to Eiptic Curve Cryptography, Beri:Spriger,2003 [5] Roberto M Avazi, Heri Cohe, Christophe Doche,Gerhard Frey, Taja Lage, Kim Nguye, ad Frederik Vercautere, Hadbook of eiptic ad hypereiptic curve cryptography, Lodo:Tay & Fracis Group,2006 [6] Wiiam JGibert ad WKeith Nichoso, Moder Aegbra with Appicatios,Secod EditioNew Jersy:Joh Wiey &Sos,Ic,2003 [7] SDS Moteiro ad RF Erbacher, Exempifyig Attack Idetificatio ad Aaysis i a Nove Fesicay Viabe Sysog Mode,I Washigto:IEEE Computer Society,Proceedigs of the Third Iteratioa Wkshop o Systematic Approaches to Digita Fesic Egieerig,2008,pp57-68 [8] L S Hi, Cryptography i a Agebraic Aphabet, The America Mathematica Mothy, Vo 36, No 6 (Ju - Ju, 1929), pp Nig Huag, b i 1958, received Master s degree i appied mathematics ad computer sciece from Jiagxi Uiversity, Chia i 1991, awarded sei egieer of the Idustria ad Commercia Bak of Chia i 2001 He is ow with Ceter of Moder Educatioa Techoogy, Gaa Nma Uiversity, Gazhou, Chia,as a associate profess His research iterests icude ifmatio security ad digita campus Xia-tog Huag, b i 1966, received Doct s degree i computatioa mathematics from Hua Uiversity, Chia i 2006 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou, Chia as a profess His research iterests icude computatioa mathematics ad ifmatio security Jig-i Re, b i 1980, received Master s degree i computer sciece from Wuha Uiversity of Techoogy, Chia i 2006 She is ow with Coege of Commuicatio ad Media, Gaa Nma Uiversity, Gazhou, Chia, as a ecturer Her research iterests icude Iteiget computatio ad simuatio Xia-we He, b i 1974, received Master s degree i computer sciece from Nachag Uiversity, Chia i 2007 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou,Chia, as a associate profess His research iterests icude etwk security ad image recogitio Yag Liu, b i 1972, received Master s degree i computer sciece from Nachag Uiversity, Chia i 2007 He is ow with Coege of Mathematics ad Computer Sciece, Gaa Nma Uiversity, Gazhou,Chia, as a ecturer His research iterests icude agithm optimizatio ad image recogitio Copyright (c) 2013 Iteratioa Joura of Computer Sciece Issues A Rights Reserved

Optimizing Triangular Parabolic Fuzzy EOQ Model with Shortage Using Nearest Interval Approximation

Optimizing Triangular Parabolic Fuzzy EOQ Model with Shortage Using Nearest Interval Approximation Iteratioa Joura o Future Revoutio i Computer Sciece & Commuicatio Egieerig ISSN: 454-448 Voume: 3 Issue: 9 96 Optimizig Triaguar Paraboic Fuzzy EO Mode with Shortage Usig Nearest Iterva Approximatio Faritha

More information

Introduction to FFT Processors. Chih-Wei Liu VLSI Signal Processing Lab Department of Electronics Engineering National Chiao-Tung University

Introduction to FFT Processors. Chih-Wei Liu VLSI Signal Processing Lab Department of Electronics Engineering National Chiao-Tung University Itroductio to FFT Processors Chihei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa ChiaoTug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm

More information

Introduction to FFT Processors

Introduction to FFT Processors Itroductio to FFT Processors Chih-ei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa Chiao-Tug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology It J Pure App Sci Techo 6( (0 pp7-79 Iteratioa Joura of Pure ad Appied Scieces ad Techoogy ISS 9-607 Avaiabe oie at wwwijopaasati Research Paper Reatioship Amog the Compact Subspaces of Rea Lie ad their

More information

MINKOWSKI SET OPERATORS. Daniela VELICHOVÁ

MINKOWSKI SET OPERATORS. Daniela VELICHOVÁ Te Joura of Pois Society for Geometry ad Egieerig Grapics Voume 4 (013), 45-49 45 MINKOWSKI SET OPERATORS Daiea VELICHOVÁ Sova Uiversity of Tecoogy, Istitute of Matematics ad Pysics, Nám. Sobody 17, 81

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Modified Self-Organizing Map for Optical Flow Clustering System

Modified Self-Organizing Map for Optical Flow Clustering System Proceedigs of the 7th WSEAS Iteratioa Coferece o Siga, Speech ad Image Processig, Beijig, Chia, September -7, 7 6 Modified Sef-Orgaizig Map for Optica Fow Custerig System B. DOUNGCHATOM, P. KUMSAWAT, K.

More information

6.081 March Lecture 6

6.081 March Lecture 6 Review exampe : Aut Zeda s ba accout growig from some iitia baace y [ ] y[.05y[ y[ ].05y[ Natura frequecy is.05 soutio grows as.05 Review exampe : Your robot from ab d d right d eft ] δtθ[ θ[ ] θ[ δtk

More information

CS425 Project Assignment

CS425 Project Assignment CS425 Project Assigmet Tue the TPC-H queries i a database of your choice What is TPC-H? Idustry stadard bechmark for testig database performace for compex SQL Decisio support Aaytics Ad-hoc TPC-H specificatio

More information

ILP Problem Formulation

ILP Problem Formulation ILP Probem Formuatio Ajay Kr. Dhamija (N-1/MBA PT 2006-09) Abstract Iteger iear programmig is a very importat cass of probems, both agorithmicay ad combiatoriay.foowig are some of the probems i computer

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Fuzzy Logic Module of Convolutional Neural Network for Handwritten Digits Recognition

Fuzzy Logic Module of Convolutional Neural Network for Handwritten Digits Recognition Joura of Physics: Coferece Series PAPER OPEN ACCESS Fuzzy Logic Modue of Covoutioa Neura Network for Hadwritte Digits Recogitio To cite this artice: E.A. Popko ad I.A. Weistei 2016 J. Phys.: Cof. Ser.

More information

Comparison of B-Spline and Zernike fitting techniques in complex wavefront surfaces

Comparison of B-Spline and Zernike fitting techniques in complex wavefront surfaces Pease verify that () a pages are preset, () a figures are acceptabe, (3) a fots ad specia characters are correct, ad (4) a text ad figures fit withi the Compariso of B-Spie ad Zerike fittig techiques i

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements

Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements Proceedigs of IEEE Rea-Time Systems Symposium (RTSS), pp. 201-211, Dec. 2002. Embedded System Desig Framework for Miimizig Code Size ad Guarateeig Rea-Time Requiremets Isik Shi, Isup Lee Dept. of Computer

More information

The analysis of image characteristics on the base of energy features of the wavelet transform

The analysis of image characteristics on the base of energy features of the wavelet transform The aaysis of image characteristics o the base of eergy features of the waveet trasform S A Lyasheva 1, M V Medvedev 1, M P Sheymovich 1 ad V V Mokshi 1 1 Kaza Natioa Research Techica Uiversity -KAI, K.

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

An Improvement of the Basic El-Gamal Public Key Cryptosystem

An Improvement of the Basic El-Gamal Public Key Cryptosystem Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

On Multicast Path Finding Algorithms

On Multicast Path Finding Algorithms Pubished i Proceedigs of INFOCOM 91, pp. 1274-1283, Miami, Forida, Apri 7-11, 1991. O Muticast Path Fidig Agorithms Chig-Hua Chow Be Commuicatios Research 445 South Street, MRE 2Q231 Morristow, NJ 07960-1910

More information

Recursion. A problem solving technique where an algorithm is defined in terms of itself. A recursive method is a method that calls itself

Recursion. A problem solving technique where an algorithm is defined in terms of itself. A recursive method is a method that calls itself Recursio 1 A probem sovig techique where a agorithm is defied i terms of itsef A recursive method is a method that cas itsef A recursive agorithm breaks dow the iput or the search space ad appies the same

More information

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum Advaced Materials Research Olie: 04-05-3 ISSN: 66-8985, Vols. 96-930, pp 463-467 doi:0.408/www.scietific.et/amr.96-930.463 04 Tras Tech Publicatios, Switzerlad The Research Based o Fuzzy Slidig Mode Cotrol

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Chapter 10 : Concurrency Control

Chapter 10 : Concurrency Control Chapter 10 : Cocurrecy Cotro modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Ituitio of Lock-based Protocos Trasactios have to

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

CS425 Summer 2016 Jason Arnold Chapter 4: Introduction to SQL

CS425 Summer 2016 Jason Arnold Chapter 4: Introduction to SQL CS425 Summer 2016 Jaso Arod Chapter 4: Itroductio to SQL Modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Chapter 4: Itroductio

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

A Very Simple Approach for 3-D to 2-D Mapping

A Very Simple Approach for 3-D to 2-D Mapping A Very Simple Approach for -D to -D appig Sadipa Dey (1 Ajith Abraham ( Sugata Sayal ( Sadipa Dey (1 Ashi Software Private Limited INFINITY Tower II 10 th Floor Plot No. - 4. Block GP Salt Lake Electroics

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators

Theory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators Theory of Fuzzy Soft Matrix ad its Multi Criteria i Decisio Makig Based o Three Basic t-norm Operators Md. Jalilul Islam Modal 1, Dr. Tapa Kumar Roy 2 Research Scholar, Dept. of Mathematics, BESUS, Howrah-711103,

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

OLYMPIAD 2 MOCK TEST

OLYMPIAD 2 MOCK TEST More Practice - More Score This readies the studets for cofidety tackig differet types of questios ad prepares them adequatey for ay Regioa / Natioa / Iteratioa Oympiad. The saiet features of this series

More information

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)

Wavelet Transform. CSE 490 G Introduction to Data Compression Winter Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual) Wavelet Trasform CSE 49 G Itroductio to Data Compressio Witer 6 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter

More information

A Selected Primer on Computer Vision: Geometric and Photometric Stereo & Structured Light

A Selected Primer on Computer Vision: Geometric and Photometric Stereo & Structured Light A Seected Primer o Computer Visio: Geometric ad Photometric Stereo & Structured Light CS334 Sprig 2012 Daie G. Aiaga Departmet of Computer Sciece Purdue Uiversit Defiitios Camera geometr (=motio) Give

More information

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,

More information

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c Advaced Materials Research Olie: 2013-01-25 IN: 1662-8985, Vol. 659, pp 196-201 doi:10.4028/www.scietific.et/amr.659.196 2013 Tras Tech Publicatios, witzerlad Aalysis of Class Desig Couplig Based o Iformatio

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Name Date Hr. ALGEBRA 1-2 SPRING FINAL MULTIPLE CHOICE REVIEW #2

Name Date Hr. ALGEBRA 1-2 SPRING FINAL MULTIPLE CHOICE REVIEW #2 Name Date Hr. ALGEBRA - SPRING FINAL MULTIPLE CHOICE REVIEW # 5. Which measure of ceter is most appropriate for the followig data set? {7, 7, 75, 77,, 9, 9, 90} Mea Media Stadard Deviatio Rage 5. The umber

More information

5.3 Recursive definitions and structural induction

5.3 Recursive definitions and structural induction /8/05 5.3 Recursive defiitios ad structural iductio CSE03 Discrete Computatioal Structures Lecture 6 A recursively defied picture Recursive defiitios e sequece of powers of is give by a = for =0,,, Ca

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

A Liver Level Set (LLS) Algorithm for Extracting Liver s Volume Containing Disconnected Regions Automatically

A Liver Level Set (LLS) Algorithm for Extracting Liver s Volume Containing Disconnected Regions Automatically 46 IJCSNS Iteratioa Joura of Computer Sciece ad Network Security, VOL.8 No.1, December 008 A Liver Leve Set (LLS) Agorithm for Extractig Liver s Voume Cotaiig Discoected Regios Automaticay Puteri Suhaiza

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

AN EFFECTIVE EXACT ALGORITHM FOR ONE PARTICULAR CASE OF THE TRAVELING-SALESMAN PROBLEM Panishev A.V., Plechystyy D.D.

AN EFFECTIVE EXACT ALGORITHM FOR ONE PARTICULAR CASE OF THE TRAVELING-SALESMAN PROBLEM Panishev A.V., Plechystyy D.D. Iteratioa Joura "Iforatio Theories & Aicatios" Vo 55 AN EFFECTIVE EXACT ALGOITHM FO ONE PATICULA CASE OF THE TAVELING-SALESMAN POBLEM Paishev AV Pechystyy DD Abstract: The artice resets the exact agorith

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com

More information

Novel Encryption Schemes Based on Catalan Numbers

Novel Encryption Schemes Based on Catalan Numbers D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: 48-96 www.iera.com Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha

More information

Area As A Limit & Sigma Notation

Area As A Limit & Sigma Notation Area As A Limit & Sigma Notatio SUGGESTED REFERENCE MATERIAL: As you work through the problems listed below, you should referece Chapter 5.4 of the recommeded textbook (or the equivalet chapter i your

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER

A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER Proceedigs of the Sixth Iteratioal Coferece o Machie Learig ad Cyberetics, Hog Kog, 9- August 7 A METHOD OF GENERATING RULES FOR A KERNEL FUZZY CLASSIFIER AI-MIN YANG,, XIN-GUANG LI, LING-MIN JIANG,YONG-MEI

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

Robust Digital Image Cryptosystem Based on Nonlinear Dynamics of Compound Sine and Cosine Chaotic Maps for Private Data Protection

Robust Digital Image Cryptosystem Based on Nonlinear Dynamics of Compound Sine and Cosine Chaotic Maps for Private Data Protection Robust Digital Image Cryptosystem Based o oliear Dyamics of Compoud Sie ad Cosie Chaotic Maps for Private Data Protectio S. Maksuapa, T. Veerawadtaapog, W. Sa-Um Itelliget Electroics Systems Research Laboratory

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

A MINIMUM SPANNING TREE BASED METHOD FOR UAV IMAGE SEGMENTATION

A MINIMUM SPANNING TREE BASED METHOD FOR UAV IMAGE SEGMENTATION IPR Aas of the Photogrammetry, Remote esig ad patia Iformatio cieces, Voume III-7, 06 XXIII IPR Cogress, 9 Juy 06, Prague, Czech Repubic A MINIMUM PANNING TREE BAED METHOD FOR UAV IMAGE EGMENTATION Pig

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

On the Exact Solution of the No-Wait Flow Shop Problem with Due Date Constraints

On the Exact Solution of the No-Wait Flow Shop Problem with Due Date Constraints O the Exact Soutio of the No-Wait Fow Shop Probem with Due Date Costraits Hamed Samarghadi Departmet of Fiace ad Maagemet Sciece, Edwards Schoo of Busiess, Uiversity of Saskatchewa, Saskatoo, Saskatchewa,

More information

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree

Text Feature Selection based on Feature Dispersion Degree and Feature Concentration Degree Available olie at www.ijpe-olie.com vol. 13, o. 7, November 017, pp. 1159-1164 DOI: 10.3940/ijpe.17.07.p19.11591164 Text Feature Selectio based o Feature Dispersio Degree ad Feature Cocetratio Degree Zhifeg

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter

Fuzzy Membership Function Optimization for System Identification Using an Extended Kalman Filter Fuzzy Membership Fuctio Optimizatio for System Idetificatio Usig a Eteded Kalma Filter Srikira Kosaam ad Da Simo Clevelad State Uiversity NAFIPS Coferece Jue 4, 2006 Embedded Cotrol Systems Research Lab

More information

CS 111: Program Design I Lecture 5: US Law when others have encryption keys; if, for

CS 111: Program Design I Lecture 5: US Law when others have encryption keys; if, for CS 111: Program Desig I Lecture 5: US Law whe others have ecryptio keys; if, for Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago September 8, 2016 Lavabit ad Sowde Lavabit was a ecrypted

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth A Expoetia Time -Approximatio Agorithm for Badwidth Marti Fürer Serge Gaspers Shiva Prasad Kasiviswaatha Abstract The badwidth of a graph G o vertices is the miimum b such that the vertices of G ca be

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Convolutional Neural Network Architectures for Signals Supported on Graphs

Convolutional Neural Network Architectures for Signals Supported on Graphs IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 Covoutioa Neura Network Architectures for Sigas Supported o Graphs Ferado Gama, Atoio G. Marques, Geert Leus, ad Aejadro Ribeiro arxiv:1805.00165v2 eess.sp

More information

Package popkorn. R topics documented: February 20, Type Package

Package popkorn. R topics documented: February 20, Type Package Type Pacage Pacage popkor February 20, 2015 Title For iterval estimatio of mea of selected populatios Versio 0.3-0 Date 2014-07-04 Author Vi Gopal, Claudio Fuetes Maitaier Vi Gopal Depeds

More information