Robust Digital Image Cryptosystem Based on Nonlinear Dynamics of Compound Sine and Cosine Chaotic Maps for Private Data Protection

Size: px
Start display at page:

Download "Robust Digital Image Cryptosystem Based on Nonlinear Dynamics of Compound Sine and Cosine Chaotic Maps for Private Data Protection"

Transcription

1 Robust Digital Image Cryptosystem Based o oliear Dyamics of Compoud Sie ad Cosie Chaotic Maps for Private Data Protectio S. Maksuapa, T. Veerawadtaapog, W. Sa-Um Itelliget Electroics Systems Research Laboratory Faculty of Egieerig, Thai-ichi Istitute of Techology Patthaakar Rd., Sualaug, Bagkok, THAILAD, 0250, Fax: , Tel: saru.maksuapa@gmail.com, taachad.pog@gmail.com, ad wimol@ti.ac.th Abstract this paper presets a digital image cryptosystem based o oliear dyamics of a compoud sie ad cosie chaotic map. The compoud sie ad cosie chaotic map is proposed for high-degree of chaos over most regios of parameter spaces i order to icrease high-etropy radom-bit sources. Image diffusio is performed through pixel shufflig ad bit-plae separatios prior to XOR operatios i order to achieve a fast ecryptio process. Security key coversios from ASCII code to floatig umber for use as iitial coditios ad cotrol parameters are also preseted i order to ehace key-space ad key-sesitivity performaces. Experimets have bee performed i MATLAB usig stadard colour images. oliear dyamics of the chaotic maps were iitially ivestigated i terms of Cobweb map, chaotic attractor, Lyapuov expoet spectrum, bifurcatio diagram, ad 2-dimesioal parameter spaces. Ecryptio qualitative performaces are evaluated through pixel desity histograms, 2-dimesioal power spectral desity, key space aalysis, key sesitivity, vertical, horizotal, ad diagoal correlatio plots. Ecryptio quatitative performaces are evaluated through correlatio coefficiets, PCR ad UACI. Demostratios of wrog-key decrypted image are also icluded. Keywords Digital Image Processig, Cryptosystem, Chaotic Map, Ecryptio, Decryptio, oliear Dyamics I. ITRODUCTIO Recet advaces i commuicatios have led to great demad for secured image trasmissios for a variety of applicatios such as medical, idustrial ad military imagig systems. The secured image trasmissios greatly require reliable, fast ad robust security systems, ad ca be achieved through cryptography, which is a techique of iformatio privacy protectio uder hostile coditios []. Image cryptography may be classified ito two categories, i.e. () pixel value substitutio which focuses o the chage i pixel values so that origial pixel iformatio caot be read, ad (2) pixel locatio scramblig which focuses o the chage i pixel positio. Covetioal cryptography such as Data Ecryptio Stadard (DES), Iteratioal Data Ecryptio Algorithm (IDEA), Advaced Ecryptio Stadard (AES), ad RSA algorithm may ot be applicable i real-time image ecryptio due to large computatioal time ad high computig power, especially for the images with large data capacity ad high correlatio amog pixels [2]. Recetly, the utilizatio of chaotic systems has extesively bee suggested as oe of a potetial alterative cryptography i secured image trasmissios. As compared to those of covetioal ecryptio algorithms, chaos-based ecryptios are sesitive to iitial coditios ad parameters whilst covetioal algorithms are sesitive to desigated keys. Furthermore, chaos-based ecryptios spread the iitial regio over the etire phase space, but cryptographic algorithms shuffle ad diffuse data by rouds of ecryptio [3]. Therefore, the security of chaos-based ecryptios is defied o real umbers through mathematical models of oliear dyamics while covetioal ecryptio operatios are defied o fiite sets. Such chaos-based ecryptio aspects cosequetly offer high flexibility i ecryptio desig processes ad acceptable privacy due to vast umbers of chaotic system variats ad umerous possible ecryptio keys. Chaos-based ecryptio algorithms are performed i two stages, i.e. the cofusio stage that permutes the image pixels ad the diffusio stage that spreads out pixels over the etire space. Most existig chaos-based ecryptios based o such two-stage operatios employ both iitial coditios ad cotrol parameters of -D, 2-D, ad 3-D chaotic maps such as Baker map [4,5], Arold cat map [6,7], ad Stadard map [8, 9] for secret key geeratios. Furthermore, the combiatios of two or three differet maps have bee suggested [0, ] i order to achieve higher security levels. Despite the fact that such maps offer satisfactory security levels, iteratios of maps require specific coditios of chaotic behaviors through a arrow regio of parameters ad iitial coditios. Cosequetly, the use of iteratio maps has become typical for most of proposed ciphers ad complicated techiques i pixel cofusio ad diffusio are ultimately required. This paper therefore presets a alterative chaos-based digital image cryptosystem with three mai aspects. First, the compoud sie ad cosie chaotic maps, which potetially offers high-degree of chaos over most regios of parameter spaces, is proposed through oliear dyamics aalyses ad is cosequetly exploited as high-etropy radom-bit sources for ecryptio. Secod, image cofusio ad diffusio processes

2 [p0,p,p2,,p7] [p] [p0] TABLE. SUMMARY OF 6-CHARACTERS IPUT ASCII CODES FOR SETTIG IITIAL CODITIOS AD COTROL PARAMETERS Image to be ecrypted Dec2Bi Separate ASCII code Xm for Settig iitial coditios ASCII code Ym for settig cotrol parameters Grayscale Image 52x52 Pixels 8-Bit Biary umber per Pixel 3 Sets of RGB Image -Bit Biary umber per Pixel 24 Sets of Biary umber X : A A 4A 7A 0A 3A 6 Y : A A 3A 5A 7A 9A XOR X2 : A 2A 5A 8A A 4A Y2 : A 2A 4A 6A 8A 0A 2 6-Characters ASCII Code Key Geeratio System Iitial coditios Parameters a a2 a8 b b2 b8 Compoud Sie ad Cosie Maps X3 : A 3A 6A 9A 2A 5A 2 Y3 : A 3A 5A 7A 9A A 3 X4 : A 4A 7A 0A 3A 6A 3 Y4 : A 4A 6A 8A 0A 2A 4 X5 : A 5A 8A A 4A A 4 Y5 : A5A 7A 9A A 3A 5 [q0,q,q2,,q7] [q] [q0] [q7] X6 : A 6A 9A 2A 5A 2A 5 Y6 : A 6A 8A 0A 2A 4A 6 X7 : A 7A 0A 3A 6A 3A 6 Y7 : A 7A 9A A 3A 5A Ecrypted Image Bi2Dec 8-Bit Biary umber per Pixel Combie -Bit Biary umber per Pixel 3 Sets of RGB Image 24 Sets of Biary umber Figure. Proposed ecryptio algorithms usig the compoud sie ad cosie chaotic maps. are performed through ucomplicated pixel shufflig ad bitplae separatios prior to XOR operatios i order to achieve a fast ecryptio process. Last, security key coversios from ASCII code to floatig umber for use as iitial coditios ad cotrol parameters are also preseted i order to ehace keyspace ad key-sesitivity performaces. II. PROPOSED ECRYPTIO ALGORITHMS A. Compoud Sie ad Cosie Chaotic Maps A category of trigoometric fuctios, ivolvig sie ad cosie maps, have potetially offered rich dyamic behaviours as described i simple forms as [2] x +=si(ax ) ad x +=cos(bx ) where the costats a ad b ca be cosidered as parameters associated with the frequecies of sie ad cosie fuctios, respectively. Although such sie ad cosie maps offers relatively high complexity i terms of oliear dyamics, the chaotic regios i the bifurcatio diagram is still isufficiet due to periodic characteristics. This paper therefore cosiders the ehacemet of sie ad cosie maps through the combiatio betwee sie ad cosie maps, i.e. x cos( ax ) si( bx ) As will be see later, such a compoud sie ad cosie map i () offers high-degree of chaos over most regios of parameter spaces. As a ature of chaotic maps, the iitial coditios ad cotrol parameters ca be used as iteral security keys that etirely set the ecryptio characteristics. The proposed cryptography techique attempts to achieve simple-buthighly-secured image ecryptio ad decryptio algorithms i a category of chaos-based cryptosystems. Fig. shows the proposed ecryptio ad detectio algorithms usig compoud sie ad cosie maps. Three major processes are summarized as follows; X8 : A 8A A 4A A 4A 7 Y8 : A 8A 0A 2A 4A 6A 2 First, the origial image is prepared for diffusio. The origial color image with M image size is iitially coverted ito three sets of sub-images with RGB compoets cotaiig pixels i grey scale levels. Each sub-image will subsequetly be coverted ito biary matrix i which each pixel is represeted by 8-bit biary umbers. For example, the pixel p(,) cotais the biary umber p 0-p 7. Each pixel will the be separated ito eight plaes correspodig to biary bits p 0 to p 7. As a result, there are 24 sets of bit plae images represeted i matrix forms with a sigle biary umber i each pixel, which is ready for further Excusive-OR (XOR) operatios. Secod, the iput security keys from users which is represeted i ASCII code with arbitrary 6 alphaumeric characters defied as A=A A 2A 3,...,A 6 will form two mai sets of ASCII codes, i.e X m ad Y m for settig the iitial coditios ad the cotrol parameters, respectively, where m =, 2, 3,...,8 as summarized i Table. Such two sets X m ad Y m will be coverted ito 48-bit biary represetatios deoted by B X to B X48 ad B Y to B Y48, respectively. The real umbers R Xm ad R Ym are subsequetly formed through the biary represetatio as follows; R Xm R Ym (B X 2 B 2... B 2 ) / 2 X X48 (B Y 2 B 2... B 2 ) / 2 Y Y48 As a result, the iitial coditios ad the cotrol parameters ca be achieved by a b m m ( RXm RYm) mod ( R ) mod Ym RYm It is see that the values of a m ad b m are i the regio of (0,) ad are ready for use as iteral security keys i the ecryptio algorithms. The desig algorithm realizes eight chaotic maps based o () as follows;

3 Parameter b = (0,0) Parameter a = (0,0) (a) Parameter b = (0,) Parameter a = (0,) (b) Figure 2. Plots of 2-D Lyapuov Expoet bifurcatio structure betwee parameters a ad b over the parameter space; (a) (0,0) ad (b) the zoomed i regio (0,). Lyapuov Expoet (LE) Chaotic Behaviors : LE>0 o-chaotic Behaviors : LE<0 umber of the iitial coditio a Values of the iitial coditio a Figure 4. Histrogram of umbers of iitial coditios a. =000 iteratios are adjusted to the biary umber through the zero thresholds for the subsequet XOR operatios. Last, the XOR operatios diffuse the geerated chaotic bit ad the 24 biary images i parallel process. The XOR operatio yields bit if the two iput bits are differet, but yields bits 0 if the two iputs are similar. The results obtaied from such XOR operatios are 24 matrices with sigle biary umber i each pixel. All the 24 matrices are combied ito three RGB matrices of a sigle 8-bit matrix i which each pixel is represeted by [b 0-b 7]. As a result, the ecrypted image ca be achieved. The decryptio process also follows the ecryptio process i a backward algorithms as log as the security keys are kow. Iterated Values X III. EXPERIMETAL RESULTS Experimetal results have bee performed i a computer aid desig tool MATLAB. oliear dyamics of a compoud sie ad cosie map was iitially simulated ad ecryptio ad decryptio security performaces were subsequetly evaluated. B. oliear Dyamics of Compoud Sie ad Cosie Map Sice chaotic behaviors of the compoud sie ad cosie maps determie overall performace of the cryptosystem, Lyapuov expoet (LE) has bee realized as a quatitative measure of chaoticity. The LE is defied as a quatity that characterizes the rate of separatio of ifiitesimally close trajectories ad is give by [3] Parameter a Figure 3. Plots of the Lyapuov expoet spectrum ad the bifurcatio diagram of parameters a over the parameter space (0,0) whe the parameter b is fixed at 0.5. xm, cos( bm0πx ) si( bm 0πx ) It is see i (6) that the costat 0π has bee icluded i order to sustai the parameters a ad b described i () i the regio of (0, 0) which is sufficiet to acquire chaos. The values of m are circularly shifted with to 8, i.e. if the operatio roud reaches m+=8 the the ext value is. As a result, a total umber of 6 keys are employed as security keys i the ecryptio process. Such keys are used to geerate chaotic sigals from the compoud sie ad cosie chaotic maps. The output sigals LE lim log 2 dx dx where is the umber of iteratios. Typically, the positive LE idicates chaotic behaviors. The larger value of LE results i higher degree of chaos. Fig.2 shows the plots of 2-imesioal Lyapuov Expoet bifurcatio structure betwee parameters a ad b over the parameter space (0, 0) ad the zoomed i regio (0, ) where the chaotic regio is represeted by the dark blue color while the o-chaotic regio is represeted i the white regio. It is show i Fig.2 that the chaotic behaviors of the compoud sie ad cosie map occupy most of parameter spaces, leadig to a very robust chaos for secret key geeratios. oetheless, the zoomed i regio at small values of parameters a ad b cotai some o-chaotic regios, which represet quasi-chaotic or periodic behaviors. The proposed

4 Wrog Key Decryptio Correct Key Decryptio Ecryptio Origial Image Images Histograms of RED Compoet of Images Histograms of GREE Compoet of Images Histograms of BLUE Compoet of Images 2D Power Spectrum of Images Figure 5. Histograms ad 2D power spectrums of origial image, ecrypted image, decrypted image, ad decrypted image with wrog keys. Pixel values o (x+,y) Pixel values o (x,y+) Pixel values o (x+,y+) Pixel values o (x+,y) Pixel values o (x,y+) Pixel values o (x+,y+) Pixel values o (x,y) Pixel values o (x,y) Pixel values o (x,y) Figure 6. Image correlatio tests i origial ad ecrypted images, icludig horizotally, vertically, ad diagoally adjacet pixels. key geeratio system has bee desiged to potetially geerates secret keys potetially sice the ochaotic sigals will ultimately be achcived. Fig.3 shows LE spectrum ad the bifurcatio diagram of parameters a over the parameter space (0, 0) whe the parameter b is fixed at 0.5. It is apparet i Fig.4 that the LE spectrum is greater tha zero ad growig to ifiity. I additio, the bifurcatio diagram shows dese area of the maximum values of X over the etire rage. As for a particular example, Fig.5 shows the histograms of the umbers of the secret key a for,000 iteratios. It ca be see from Fig.5 that the oliear dyamics of the compoud sie ad cosie maps provide the radom secret keys that distribute over the regio (0, ) radomly. Such characteristics have also foud i other secret keys. The simulatios have bee esured that the proposed compoud the oliear dyamics of the compoud sie ad cosie maps ad the key geeratio

5 systems ca potetially provide truly radom values for diffusio process i the proposed cryptosystem. C. Key Space Aalysis The ecryptio ad decryptio realizes the 6-character ASCII code ABCDEFG as a iput key ad the wrog key chages the last character to 5. The resultig eight iitial coditios ad eight parameters, i.e. a total of 6 keys, are represeted by 8-digit floatig-poit umbers. Cosiderig each key i the form S 2 E where S is a sigificad ad E is a expoet, the keys that represeted by 8 digits of a floatigpoit umber (~ ) results i 28 ucertai digits, which is greater tha the miimum requiremet of the 56-bit data (~ ) ecryptio stadard (DES) algorithm [4]. D. Histograms ad 2D Power Spectral Aalysis The image histogram is a graph that illustrates the umber of pixels i a image at differet itesity values. I particular, the histogram of a color image ca be separated ito three subimages with Red (R), Gree (G), ad Blue (B) compoets. Each sub-image has 256 differet grey itesity levels, graphically displayig 256 umbers with distributio of pixels amogst these grayscale values. I additio, the 2D power spectrum that shows the power of image itesity ca be obtaied through a Discrete Fourier Trasform (DFT) aalysis ad the algorithm is give by [5] F( u, v) M x0 y0 f ( x, y)exp( j(2 / M ) ux)exp( j(2 / ) vy) where x ad y are a coordiates pair of a image, M ad are the size of image, f(x, y) is the image value at the pixel (x, y). Fig.5 shows the histograms of three R, G, B compoets ad 2D power spectrums of origial image, ecrypted image, decrypted image, ad decrypted image with wrog keys. As for a particular demostratio, the origial image is Lea image with image size. It ca be see from Fig.5 that the itesities of all origial images i the histogram are cotributed with differet values i a particular shape ad the power spectrum is ot flat havig a peak of itesity i the middle. The ecrypted image has a flat histogram ad power spectrum, idicatig that the itesity values are equally cotributed over all the itesity rage ad the origial images are completely diffused ad ivisible. The decrypted images with right keys provide similar characteristics of the origial images while the decrypted images with wrog keys are still diffused ad the origial images caot be see. These results qualitatively guaratee that the image is secured. E. Correlatio Coefficiet Aalysis I order to quatify the ecryptio performace ad key sesitivity aalysis, correlatio betwee image pairs, which is a measure of relatioships betwee two pixels itesities of two images, of the three realized images have bee aalyzed. The covariace C v ad the correlatio coefficiet γ xy ca be obtaied as follows [6]; C ( x, y) v i ( xi E( x))( yi E( y)) xy cov( x, y) D( x) D( y) where the fuctios E(x) ad D(x) are expressed as E( x) i x i ad 2 D( x) ( E( )) () x i i x ad the variables x ad y are grey-scale values of pixels i correspodig pixels i differet images or two adjacet pixels i the same image. Typically, the value of γ xy is i the regio [-, ]. I other words, the values of γ xy i the regio (-,0) ad (0,) respectively idicate positive ad egative relatioships, while the larger umber close to or - have stroger relatioships. Usig a radom selectio of 2,048 pairs of pixels, Fig.6 shows image correlatio tests i origial ad ecrypted images, icludig horizotally, vertically, ad diagoally adjacet pixels. It ca qualitatively be cosidered from Figs.6 that the adjacet pixels of all ecrypted images are highly ucorrelated as depicted by scatters plots of correlatios. For the quatitative measures, the correlatios betwee pairs of origial images ad correspodig ecrypted images through the computatio of correlatio coefficiet betwee RGB compoets of the origial images ad correspodig ecrypted images have bee aalyzed. Table 2 summarizes correlatio coefficiets of 2,048 pixels of each image pair. It ca be see i Table 3 that the correlatio coefficiets are very small closig to zero, idicatig that each pair of images are completely idepedet of each other. As for ivestigatios of other images with differet characteristics, comparisos of correlatio coefficiets of four stadard images i MATLAB are also studied. Table 3 summarizes correlatio coefficiets of 2,048 pixels of each pair of images Apparetly, the correlatio coefficiets are also very small. These results quatitatively guaratee that the image is secured. F. Origial Image Sesitivity Aalysis Oe mior chage i the plai image causes sigificat chages i the ecrypted image the such differetial aalysis may become iefficiet, ad therefore much differece betwee ecrypted forms is expected i order to maitai high security level. PCR (et Pixel Chage Rate) ad UACI (Uified Average Chagig Itesity) are two most commo measures. PCR cocetrates o the absolute umber of pixels which chages value i differetial attacks while the UACI focuses o the averaged differece betwee two paired ecrypted images [7]. For the two ecrypted images i which the correspodig origial images have oly oe pixel differece are deoted by C ad C 2. Label the greyscale values of the pixels at pixel (i,j) i C ad C 2 by C (i,j) ad C 2 (i,j), respectively. Defie a bipolar array D, with the same size as images C ad C 2. Cosequetly, D(i,j) is determied by C (i,j) ad C 2 (i,j), if C (i,j) =C 2 (i,j) the D(i,j)=, otherwise, D(i,j)=0. The PCR [2] is defied as

6 TABLE 2: COMPARISOS OF CORRELATIO COEFFICIETS OF LEA IMAGE AT DIFFERET SIZES. Image Sizes C RR C RG C RB C GR C GG C GB C BR C BG C BB TABLE 3: COMPARISOS OF CORRELATIO COEFFICIETS OF DIFFERET IMAGE WITH IMAGE SIZE. Images C RR C RG C RB C GR C GG C GB C BR C BG C BB Brai Madril Peppers Jet Plae TABLE 4: SUMMARY OF PCR AD UACI OF DIFFERET IMAGE WITH IMAGE SIZE. Images PCR R PCR G PCR B UACI R UACI G UACI B Lea Brai Madril Peppers Jet Plae D( i, j) i, j PCR 00% (2) T (, ) D i j i, j UACI 00% (3) T where T deotes the total umber pixels i the ecrypted image, F deotes the largest supported pixel value compatible with the cipher image format, ad. deotes the absolute value fuctio. Table 4 summarizes the values of PCR ad UACI for differet image with the sizes of It ca be see that the PCR are relatively close to 00% ad the UACI are also i the acceptable regio of approximately 33%. COCLUSIO A robust digital image cryptosystem based o oliear dyamics of a compoud sie ad cosie chaotic map has bee preseted. The compoud sie ad cosie chaotic map has bee proposed for high-degree of chaos over most regios of parameter spaces i order to icrease high-etropy radombit sources. Image diffusio has bee performed through pixel shufflig ad bit-plae separatios prior to XOR operatios i order to achieve a fast ecryptio process. Security key coversios from ASCII code to floatig umber for use as iitial coditios ad cotrol parameters were also preseted to ehace key-space ad key-sesitivity performaces. oliear dyamics of the chaotic maps have bee ivestigated i terms of chaotic attractor, Lyapuov expoet spectrum, bifurcatio diagram, ad 2-dimesioal parameter spaces. Ecryptio qualitative performaces were evaluated through pixel desity histograms, 2-dimesioal power spectral desity, key space aalysis, key sesitivity, vertical, horizotal, ad diagoal correlatio plots. Ecryptio quatitative performaces were evaluated through correlatio coefficiets, PCR ad UACI. Demostratios of wrog-key decrypted image are also icluded. The proposed cryptosystem offers a potetial alterative to private data protectio systems. REFERECES [] M. Philip, A Ehaced Chaotic Image Ecryptio Iteratioal Joural of Computer Sciece, Vol., o. 5, 20. [2] G.H. Karimia, B. Rashidi, ad A.farmai, A High Speed ad Low Power Image Ecryptio with 28- bit AES Algorithm, Iteratioal Joural of Computer ad Electrical Egieerig, Vol. 4, o. 3, 202. [3] G. Che, Y. Mao, C.K. Chui, A symmetric image ecryptio scheme based o 3D chaotic cat maps, Chaos, Solitos ad Fractals, Vol. 2, pp , [4] X. Tog, M. Cui, Image ecryptio scheme based o 3D baker with dyamical compoud chaotic sequece cipher geerator, Sigal Processig, Vol. 89, pp , [5] J.W. Yoo, H. Kim, A image ecryptio scheme with a pseudoradom permutatio based o chaotic maps, Commu oliear Sci umber Simulatio, Vol. 5, pp , 200. [6] X. Ma, C. Fu, W. Lei, S. Li, A ovel Chaos-based Image Ecryptio Scheme with a Improved Permutatio Process, Iteratioal Joural of Advacemets i Computig Techology, Vol. 3, o. 5, 20. [7] K. Wag, W. Pei, L. Zou, A. Sog, Z. He, O the security of 3D Cat map based symmetric image ecryptio scheme, Physics Letters A, Vol. 343, pp , [8] K. Wog, B. Kwok, ad W. Law, A Fast Image Ecryptio Scheme based o Chaotic Stadard Map, Physics Letters A, Vol. 372, pp , [9] S. Lia, J. Su, Z. Wag, A block cipher based o a suitable use of the chaotic stadard map, Chaos, Solitos ad Fractals, Vol. 26, pp. 7 29, [0] K. Gupta, S. Silakari, ew Approach for Fast Color Image Ecryptio Usig Chaotic Map, Jour. of Iformatio Security, pp , 20 [] F. Huag, Y. Feg, Security aalysis of image ecryptio based o two-dimesioal chaotic maps ad improved algorithm, Frot. Electr. Electro. Eg. Chia, Vol. 4, o., pp. 5-9, [2] G.Lee ad. H. Farhat, Parametrically Coupled Sie Map etworks,electrical Egieerig Departmet, Uiversity of Pesylvaia, Philadelphia, PA, USA,5 December 2000 [3] F.Su, S. Liu, Z. Li, Z. Lu, A ovel image ecryptio scheme based o spatial chaos map,college of Cotrol Sciece ad Egieerig, Shadog Uiversity, Jia, PR Chia, pp , 2008 [4] Q. Gog-bi, J. Qig-feg,Q. Shui-sheg, A ew image ecryptio scheme based o DES algorithm ad Chua's circuit, Imagig Systems ad Techiques, pp , [5] Z. Peg, T.B. Kirk, Two-dimesioal fast Fourier trasform ad power spectrum for wear particle aalysis, Tribology Iteratioal, Vol. 30, Issue. 8, pp , 997. [6] A. Yahya ad A. Abdalla, A Shuffle Image-Ecryptio Algorithm, J. Comput. Sci,pp [7] Y.Wu, Joseph P. ooa, S.Agaia, PCR ad UACI Radomess Tests for Image Ecryptio, Departmet of Electrical ad Computer Egieerig Tufts UiversityMedford, MA,USA

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

AN IMAGE ENCRYPTION SCHEME UTILIZING HARPER S MAP

AN IMAGE ENCRYPTION SCHEME UTILIZING HARPER S MAP Acta Electrotechica et Iformatica, Vol. 18, No. 1, 2018, 47 51, DOI: 10.15546/aeei-2018-0007 47 AN IMAGE ENCRYPTION SCHEME UTILIZING HARPER S MAP Jakub ORAVEC, Já TURÁN, L uboš OVSENÍK Departmet of Electroics

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Image Encryption Using Hyper Chaos and Symmetric Cryptography

Image Encryption Using Hyper Chaos and Symmetric Cryptography (IJIRSE) Iteratioal Joural of Iovative Research i Sciece & Egieerig ISSN (Olie) 2347-3207 Image Ecryptio Usig Hyper Chaos ad Symmetric Cryptography Mozhga Mokhtai*, Meghdad Ashtiyai #, Hassa Naraghi**

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible

World Scientific Research Journal (WSRJ) ISSN: Research on Fresnel Lens Optical Receiving Antenna in Indoor Visible World Scietific Research Joural (WSRJ) ISSN: 2472-3703 www.wsr-j.org Research o Fresel Les Optical Receivig Atea i Idoor Visible Light Commuicatio Zhihua Du College of Electroics Egieerig, Chogqig Uiversity

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

are two specific neighboring points, F( x, y)

are two specific neighboring points, F( x, y) $33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'

More information

The Simeck Family of Lightweight Block Ciphers

The Simeck Family of Lightweight Block Ciphers The Simeck Family of Lightweight Block Ciphers Gagqiag Yag, Bo Zhu, Valeti Suder, Mark D. Aagaard, ad Guag Gog Electrical ad Computer Egieerig, Uiversity of Waterloo Sept 5, 205 Yag, Zhu, Suder, Aagaard,

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree 1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:

More information

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS I this uit of the course we ivestigate fittig a straight lie to measured (x, y) data pairs. The equatio we wat to fit

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Procedia Computer Science

Procedia Computer Science Procedia Computer Sciece 3 (20) 378 387 Procedia Computer Sciece 00 (200) 000 000 Procedia Computer Sciece www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia WCIT-200 A Novel algorithm for

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

An Estimation of Distribution Algorithm for solving the Knapsack problem

An Estimation of Distribution Algorithm for solving the Knapsack problem Vol.4,No.5, 214 Published olie: May 25, 214 DOI: 1.7321/jscse.v4.5.1 A Estimatio of Distributio Algorithm for solvig the Kapsack problem 1 Ricardo Pérez, 2 S. Jös, 3 Arturo Herádez, 4 Carlos A. Ochoa *1,

More information

Vision & Perception. Simple model: simple reflectance/illumination model. image: x(n 1,n 2 )=i(n 1,n 2 )r(n 1,n 2 ) 0 < r(n 1,n 2 ) < 1

Vision & Perception. Simple model: simple reflectance/illumination model. image: x(n 1,n 2 )=i(n 1,n 2 )r(n 1,n 2 ) 0 < r(n 1,n 2 ) < 1 Visio & Perceptio Simple model: simple reflectace/illumiatio model Eye illumiatio source i( 1, 2 ) image: x( 1, 2 )=i( 1, 2 )r( 1, 2 ) reflectace term r( 1, 2 ) where 0 < i( 1, 2 ) < 0 < r( 1, 2 ) < 1

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE

RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE RESEARCH ON AUTOMATIC INSPECTION TECHNIQUE OF REAL-TIME RADIOGRAPHY FOR TURBINE-BLADE Z.G. Zhou, S. Zhao, ad Z.G. A School of Mechaical Egieerig ad Automatio, Beijig Uiversity of Aeroautics ad Astroautics,

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

On the Accuracy of Vector Metrics for Quality Assessment in Image Filtering

On the Accuracy of Vector Metrics for Quality Assessment in Image Filtering 0th IMEKO TC4 Iteratioal Symposium ad 8th Iteratioal Workshop o ADC Modellig ad Testig Research o Electric ad Electroic Measuremet for the Ecoomic Uptur Beeveto, Italy, September 5-7, 04 O the Accuracy

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Novel Encryption Schemes Based on Catalan Numbers

Novel Encryption Schemes Based on Catalan Numbers D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: 48-96 www.iera.com Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1%

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1% We are ItechOpe, the first ative scietific publisher of Ope Access books 3,350 108,000 1.7 M Ope access books available Iteratioal authors ad editors Dowloads Our authors are amog the 151 Coutries delivered

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Primitive polynomials selection method for pseudo-random number generator

Primitive polynomials selection method for pseudo-random number generator Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the

More information

Chapter 3. Floating Point Arithmetic

Chapter 3. Floating Point Arithmetic COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add

More information

1. Introduction o Microscopic property responsible for MRI Show and discuss graphics that go from macro to H nucleus with N-S pole

1. Introduction o Microscopic property responsible for MRI Show and discuss graphics that go from macro to H nucleus with N-S pole Page 1 Very Quick Itroductio to MRI The poit of this itroductio is to give the studet a sufficietly accurate metal picture of MRI to help uderstad its impact o image registratio. The two major aspects

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1

Eigenimages. Digital Image Processing: Bernd Girod, 2013 Stanford University -- Eigenimages 1 Eigeimages Uitary trasforms Karhue-Loève trasform ad eigeimages Sirovich ad Kirby method Eigefaces for geder recogitio Fisher liear discrimat aalysis Fisherimages ad varyig illumiatio Fisherfaces vs. eigefaces

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

FINITE DIFFERENCE TIME DOMAIN METHOD (FDTD)

FINITE DIFFERENCE TIME DOMAIN METHOD (FDTD) FINIT DIFFRNC TIM DOMAIN MTOD (FDTD) The FDTD method, proposed b Yee, 1966, is aother umerical method, used widel for the solutio of M problems. It is used to solve ope-regio scatterig, radiatio, diffusio,

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Parabolic Path to a Best Best-Fit Line:

Parabolic Path to a Best Best-Fit Line: Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be

More information

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

T Shaped Fractal Geomerty Based Micro Strip Patch Antenna

T Shaped Fractal Geomerty Based Micro Strip Patch Antenna ISSN 2395-1621 T Shaped Fractal Geomerty Based Micro Strip Patch Atea #1 Dr. Swapil Lahudkar, #2 Satosh Sigh, #3 Akit Yadav, #4 Pooja Kad 2 sk.sigh260@gmail.com #1 Prof. Departmet of Electroics ad Telecommuicatio

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity

More information

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum Advaced Materials Research Olie: 04-05-3 ISSN: 66-8985, Vols. 96-930, pp 463-467 doi:0.408/www.scietific.et/amr.96-930.463 04 Tras Tech Publicatios, Switzerlad The Research Based o Fuzzy Slidig Mode Cotrol

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

The identification of key quality characteristics based on FAHP

The identification of key quality characteristics based on FAHP Iteratioal Joural of Research i Egieerig ad Sciece (IJRES ISSN (Olie: 2320-9364, ISSN (Prit: 2320-9356 Volume 3 Issue 6 ǁ Jue 2015 ǁ PP.01-07 The idetificatio of ey quality characteristics based o FAHP

More information

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps Data-Drive Noliear Hebbia Learig Method for Fuzzy Cogitive Maps Wociech Stach, Lukasz Kurga, ad Witold Pedrycz Abstract Fuzzy Cogitive Maps (FCMs) are a coveiet tool for modelig of dyamic systems by meas

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

The measurement of overhead conductor s sag with DLT method

The measurement of overhead conductor s sag with DLT method Advaces i Egieerig Research (AER), volume 7 2d Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 206) he measuremet of overhead coductor s sag with DL method Fag Ye,

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE

NON-LINEAR MODELLING OF A GEOTHERMAL STEAM PIPE 14thNew Zealad Workshop 1992 NON-LNEAR MODELLNG OF A GEOTHERMAL STEAM PPE Y. Huag ad D. H. Freesto Geothermal stitute, Uiversity of Aucklad SUMMARY Recet work o developig a o-liear model for a geothermal

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Optimized Aperiodic Concentric Ring Arrays

Optimized Aperiodic Concentric Ring Arrays 24th Aual Review of Progress i Applied Computatioal Electromagetics March 30 - April 4, 2008 - iagara Falls, Caada 2008 ACES Optimized Aperiodic Cocetric Rig Arrays Rady L Haupt The Pesylvaia State Uiversity

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Performance Comparisons of PSO based Clustering

Performance Comparisons of PSO based Clustering Performace Comparisos of PSO based Clusterig Suresh Chadra Satapathy, 2 Guaidhi Pradha, 3 Sabyasachi Pattai, 4 JVR Murthy, 5 PVGD Prasad Reddy Ail Neeruoda Istitute of Techology ad Scieces, Sagivalas,Vishaapatam

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information