Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme

Size: px
Start display at page:

Download "Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme"

Transcription

1 Header for SPIE use Further Attacks o Yeug-Mitzer Fragile Watermarkig Scheme Jiri Fridrich, Miroslav Golja, ad Nasir Memo a Departmet of Systems Sciece ad Idustrial Egieerig, SUNY Bighamto, Bighamto, NY b Departmet of Electrical Egieerig, SUNY Bighamto, Bighamto, NY c Departmet of Computer Sciece, Polytechic Uiversity, Brookly, NY ABSTRACT I this paper, we describe ew ad improved attacks o the autheticatio scheme previously proposed by Yeug ad Mitzer [1. Previous attacks assumed that the biary watermark logo iserted i a image for the purposes of autheticatio was kow. Here we remove that assumptio ad show how the scheme is still vulerable, eve if the biary logo is ot kow but the attacker has access to multiple images that have bee watermarked with the same secret key ad cotai the same (but ukow logo. We preset two attacks. The first attack ifers the secret watermark isertio fuctio ad the biary logo, give multiple images autheticated with the same key ad cotaiig the same logo. We show that a very good approximatio to the logo ad watermark isertio fuctio ca be costructed usig as few as two images. With color images, oe eeds may more images., evertheless the attack is still feasible. The secod attack we preset, which we call the `collage- attack is a variatio of the Hollima-Memo couterfeitig attack. The proposed variatio does ot require kowledge of the watermark logo ad produces couterfeits of superior quality by meas of a suitable ditherig process that we develop. 1. INTRODUCTION Yeug ad Mitzer [1 proposed the followig method for autheticatio of digital images. The process of image autheticatio starts with a secret key that is used to geerate a key depedet biary valued fuctio f, f: {, 1,, 255} {,1}, that maps itegers from to 255 to either 1 or. For color images, three such fuctios (or biary lookup tables), f R, f G, f B, oe for each color chael, are geerated. These biary fuctios are used to ecode a biary logo L. I order to embed a watermark, gray scale images are perturbed to satisfy the followig expressio For a RGB image, the three color chaels are perturbed to obtai L(i,j) = f g (g(i,j)) for each pixel (i,j). (1) L(i,j) = f R (R(i,j)) f G (G(i,j)) f B (B(i,j)) for each pixel (i,j). (2) I additio to this process, sice origial pixel values are modified durig watermark isertio, Yeug ad Mitzer use error diffusio to maitai proper average color over the image i ay local regio. Although the error diffusio step is crucial i suppressig ay aoyig artifacts that might be itroduced durig watermark isertio, it is ot of iterest i our discussio. This is because, for all practical purposes, the image that is obtaied after watermark isertio is treated as ``the'' origial image whose itegrity is to be verified by subsequet extractio of the embedded watermark logo ad checkig it for ay modificatios. Hece ay chages made while arrivig at this origial image are ot of iterest to a potetial attacker. Furthermore, i later versios of the techique, Yeug ad Mitzer also scramble the biary logo prior to embeddig. Agai this scramblig process is ot relevat to the type of attacks described here ad hece for the sake of brevity we chose to igore it. Oce a watermark is iserted, image autheticity is the easily verified by checkig the relatioship L(i,j) = f g (g(i,j)) for each pixel (i,j). Note that the autheticatio process requires kowledge of the biary lookup tables or the secret key used to geerate them.

2 There are some obvious advatages of this approach. First, the logo itself ca carry some useful visual iformatio about the image or its creator. It ca also represet a particular autheticatio device or software. Secod, by comparig the origial logo with the recovered oe, oe ca visually ispect the itegrity of the image ad readily idetify croppig. Third, the autheticatio watermark is embedded ot oly i the LSB s of the image but somewhat deeper (± 5 gray scales). This makes it somewhat more secure ad harder to remove. Fourth, the method is fast, simple, ad ameable to fast ad cheap hardware implemetatio. This makes it very appealig for still image autheticatio i digital cameras or for autheticatio of digital video. However, i order to use this autheticatio scheme i digital cameras, oe eeds to clarify the importat issue of key (ad logo) maagemet. To the best kowledge of the authors, this issue has ot bee properly addressed i the literature before. I Sectio 2, we demostrate that if the same logo ad key are reused for several images, oe could easily recostruct the logo as well as the biary lookup tables from a relatively small umber of images. Oe possibility how to make this attack more difficult to mout is to let the biary fuctios deped ot oly o the colors but also o the pixel positios i, j as suggested i [5. That this measure is ot eough is demostrated i Sectio i which we preset aother couterfeitig attack (the collage attack) ad optimize its performace. The collage attack was itroduced first by Hollima ad Memo i [2 as a special case of a substitutio or couterfeitig attack, which applied to a large class of block-based watermarkig techiques. However, Hollima ad Memo assumed the attacker kows the biary logo. Here we demostrate that the attack ca still be carried out eve if the logo is ot kow. Furthermore, we develop special ditherig techiques to improve the quality of the couterfeit that is costructed. We demostrate how the quality of couterfeit images (a aspect igored by Hollima ad Memo ca be sigificatly improved with the proposed ditherig process. Fially, i Sectio 4 we coclude the paper ad discuss simple modificatios that ca be made to the Yeug-Mitzer scheme to prevet the kid of attacks described here. 2. INFERRING THE SECRET BINARY FUNCTION AND THE WATERMARK LOGO Recetly, Memo, Shede ad Wog [5 showed that the ucertaity i the secret biary fuctios or lookup tables f R (), f G () ad f B () ca be sigificatly reduced give a sequece of watermarked images cotaiig the same logo, which was assumed to be kow. I this sectio we show that kowledge of the logo is ot ecessary. First we show that for gray scale images the look-up tables ca be mostly recostructed usig as few as two images. For the color case we eed may more images or the watermark image eeds to have sufficietly structure. Case 1: Gray scale images - If the same logo lookup tables are used for multiple images, both the logo ad the biary fuctios ca be almost completely recovered from as few as two grayscale images. Give two watermarked grayscale M N images U ad V with gray scales u ad v, watermarked with the same secret key K ad a biary logo B, oe ca write L(i,j) = f g (u(i,j)) = f g (v(i,j)) for every pixel (i,j). () This costitutes M N equatios for 256 ukows f g (), f g (1),, f g (255). Most of the equatios are redudat ad, depedig o the image, there may ot be a uique solutio f g. We ca start with the set {, 1,.., 255} divided ito 256 subsets, each subset havig exactly oe gray scale level. The, the first equatio, f g (u(1,1)) = f g (v(1,1)), tells us that the values of f g are the same for both u(1,1) ad v(1,1). Thus, we ca group together these two gray levels because the value of the biary fuctio f g is the same for both. Gradually, the 256 subsets will start to coalesce ito a smaller umber of larger subsets. At the ed, there will be two large subsets, oe correspodig to f g =, the other to f g = 1, ad several other sets for which the value of f g is udetermied. To test the plausibility of this idea, we have performed experimets with several grayscale images. Two test images have bee watermarked with the same biary logo ad the same biary fuctio f g. The system of equatios () was the solved to recover the biary fuctio f g. Three test images, 'Lea', 'Airfield', ad 'Bridge', are show i Figures 1. Usig the images 'Lea' ad 'Airfield', we were able to determie 24 values for f g. Combiig the watermarked images 'Airfield' ad 'Bridge' gave us 22 values for f g. This is a uacceptable leak of iformatio, which clearly idicates that the biary lookup table ad the logo should ot be reused for more tha oe image. With icreasig umber of available images, the umber of correctly recovered values of the biary fuctio f g quickly saturates at 256.

3 Figure 1 Test image 'Lea' Figure 2 Test image 'Airfield' Figure Test image 'Bridge' Case 2: Color images: I [5, Memo, Shede ad Wog showed that if the biary logo L is kow tha the ucertaity i the biary fuctios f R, f G, ad f B ca be sigificatly reduced. They cocluded that, i some cases, the biary look-up tables ca be reduced to as few as four possibilities, give a sigle image. However, as we show here, kowledge of the biary logo L is really ot ecessary. The biary fuctios f R, f G, ad f B ca still be mostly recostructed provided we have a sufficiet umber of images cotaiig the same logo ad watermarked usig the same key. That is, a similar attack as the gray scale case described above ca also be mouted for color images, although the umber of images eeded for recostructig the biary fuctios f R, f G, ad f B is much higher. This is because whereas i the grayscale image case we had 256 sets to begi with, i the color case we have as may as 2 24 for 24 bit images. Assumig a 24 bit color image for the sake of discussio, we start with the colors (,, ) partitioed ito 2 24 sets, with each color beig i a separate set. The, give a sequece of images X 1,, X k let X i,j deote the set of pixels i the sequece at locatio (i,j). If the same logo is embedded i each image i the sequece X 1,, X k the all the pixels i the set X i,j map to the same value L(i,j), which ca be either or 1. Now if two such sets say X i,j ad X k,l have a o-empty itersectio, the clearly all pixels i these two sets agai map to the same value ad hece ca be grouped together. We cotiue i this maer groupig together sets that have a o-empty itersectio ad stop whe we have all pixels partitioed ito exactly two sets. I practice we do ot expect to get exactly two sets but if f most of the pixels fall ito two sets the we have sigificat iformatio about the biary lookup tables. That is, we kow the value of f R ( ) f G ( ) f B ( ) for a large majority of RGB triples. Note that this would be sufficiet to make modificatios to a image ad still have it autheticate. However we still do ot kow the idividual fuctios f R, f G, ad f B. These ca be deduced by usig the techiques give i [5 or by directly solvig a system of M N liear equatios i mod 2 arithmetic. No formal aalysis of this issue has bee performed as yet. The authors believe that the fact that the watermarkig techique has certai serious security weakesses for gray-scale images is a sufficiet argumet for modificatio Note that replacig the liear expressio (2) with a more complicated expressio ivolvig quadratic or other o-liearity s with the hope to make the umerical solutio of the system of equatios impractical, is ot likely to brig a sigificat improvemet. This is because the umber of equatios exceeds the umber of ukows by a large margi ad the values of the oliear terms ca simply be added as aother set of ukows. I Sectio 4, we propose better coutermeasures agaist this attack.. THE COLLAGE ATTACK The secod problem described i this paper is actually commo to all watermarkig schemes i which the watermark is embedded locally ad does ot deped o the image idex. This attack will apply to eve more geeral schemes i which the biary fuctio depeds ot oly o the gray level (color) but also o the pixel positio i, j i the image. We call the attack the collage attack. The collage-attack is a variatio of the Hollima-Memo couterfeitig attack o blockwise idepedet watermarkig techiques [2. However, i their attack of the Yeug-Mitzer techique, Hollima ad Memo had assumed the watermark logo is available to the attacker. However, we show here that the attack is possible eve whe the biary logo is ot kow. I this case the attacker just eeds a larger umber of images watermarked with the same key ad logo. Furthermore, Hollima ad Memo did ot cosider the quality of the recostructed image i their attack. Here we show that

4 uless care is take the couterfeit image could be of poor quality. We the give techiques for producig high quality couterfeit images. The basic idea behid the collage attack is to create a ew image from multiple autheticated images by combiig portios of differet images while preservig their relative spatial locatio withi the image. More geerally, give multiple M N images I 1, I 2,, I autheticated with the same logo ad biary fuctios, we ca costruct a ew image (a collage) J by selectig pixels from all images, while preservig the relative locatio of the pixels i the images: J(i,j) = I k (i,j) for some k {1,, } ad all (i,j). The ew image J will be authetic if its autheticity is checked with the same logo ad biary fuctios used for autheticatig images I 1,, I. Give a large umber of images I 1, I 2,, I with RGB colors (R k (i,j), G k (i,j), B k (i,j)), k = 1,,, a pirate ca take a arbitrary image I with RGB colors (R(i,j), G(i,j), B(i,j)), ad create a approximatio to I by selectig the closest colors from all images for every pixel (R, G, B) = (R k, G k, B k ) with k = mi arg k { (R R k ) 2 + (G G k ) 2 + (B B k ) 2 }, (4) where the last expressio eeds to be evaluated for every pixel (i,j). I the ext sub-sectio we calculate the expected value of the differece I J (i square orm) depeds o the umber of images i the database,, based o some simple assumptios about the images. We the itroduce a modified ditherig algorithm to further improve the visual quality of the forgery J. The sectio is closed with several examples of forgeries geerated from a database cotaiig = 2, 8, ad images. Calculatio of Expected Distortio i Couterfeit: We model the statistical distributio of colors i the images simply as a uiform distributio of colors i the color cube. I what follows, we also assume that the space of all possible RGB colors is scaled to a uit cube C ad that the color values are triples of real umbers. Let D be the distace betwee two radomly chose colors i the color cube C. The fuctio F(x) = P(D < x) is a o-decreasig probability distributio fuctio with F() =, F(a) = 1 (a = for Euclidea metric i the color cube ad a = 1 for the maximal metric). We further deote F (x) = P(D x). The expected value E(D) of the distace betwee two radomly chose colors i C is a a E( D) = x. F' ( x) dx = F ( x) dx. We approximate the average error due to quatizatio i Eq. (4) as the expected value of the distace betwee a radomly chose color ad the earest color out of other radomly chose colors a E( D, = F ( x) dx. The probability F (x) = P(D x) = V ( B( z, x) C) dz = 1 4/ π x + O(x 4 ), where V( ) deotes the volume ad B(z, x) is a z C ball with ceter i z ad radius x. To fid out about asymptotic behavior of this itegral for large, it will become clear that it is sufficiet to calculate the cubic term oly. Now we eed to fid the asymptotic expressio for E(D, for large : a a 4 4 E( D, = F ( x) dx (1 π x + O( x )) dx. The asymptotic behavior of this itegral for large ca be obtaied usig the well-kow Laplace techique [4, pp E ( D, Γ( )( ) = Γ( ) =.554 4π 6 π Fially, the average mea square error betwee the origial image I ad its forgery J obtaied froma database of images is.

5 1 I J = 2 1 [ I( i, j) J ( i, j).7. MN i, j 2 Improvig Couterfeit Quality by Error Diffusio: It is possible to improve the visual appearace of the forgery by diffusig the quatizatio error usig a mechaism similar to error diffusio. However, the stadard error diffusio does ot work well i this case because the palette is differet for every pixel ad the palette color distributio does ot fill out the color cube uiformly. The resultig effect is that error diffusio mechaism causes a "spillage" of colors whe the diffusio comes to a boudary betwee two colors. This leads to poor forgeries that actually look worse tha the simple approximatio based o Eq. (4). To fix this problem, we employ a decay factor that suppresses the error ad avoids the above-metioed spillage of colors. The ew color c i ' at pixel i ca be expressed usig the origial color c i as c' i = c i decay error i error i = closest_color i 1 c' i 1. We ote that decay=1 i the classical error diffusio techique. The purpose of the decay factor is to prevet the error from growig due to a lack of colors at a give pixel. The error grows especially fast i regios cotaiig a uiform color c while the available colors from the image database are all far from that color c. This happes whe the color c is located close to a face, a edge or the vertex of the color cube. Let us look at the case of the vertex first. Let D v be the distace of a radomly chose color from a vertex. We have P(D v x) = (1 4/π x /8), for x 1. The expressio for the probability becomes more complicated for x > 1 but, fortuately, it is eough to otice that max(p(d v x)) = m < 1 for 1< x to obtai Therefore 1 4 E ( Dv, = [1 ( x π ) dx + O( m ) / 2 4 E( D, ) [1 ( x ) 2 [1 v π dx = t dt = 2E( D, 2 π. The expected values for a edge ad face colors ca be calculated similarly: / 4 4 E( D, ) [1 4 [1 e π x dx = πt dt = 4 E( D,, / 2 4 E( D, ) [1 2 [1 f π x dx = πt dt = 2 E( D,. 2 The accumulated error after processig K pixels i a row becomes Because E(error i+k ) E(D v,, we have error i+k decay ( error i+k 1 + decay ( error i+k decay error i )) < < decay error i+k 1 + decay 2 error i+k 2 + E(error i+k ) decay/(1 decay) E(D v, for all K.

6 Origial image Origial image Forgery without diffusio (2 database images) Forgery without diffusio (2 database images) Forgery with diffusio (2 database images) Forgery with diffusio (2 database images) Figure 4 Examples of two images ad forgeries obtaied usig the simple approach based o Eq. 4 (without error diffusio ad with the diffusio ad the optimal decay factor (with diffusio. Oly 2 database images were used i this Figure.

7 This error should ot grow above certai maximal value durig our ditherig process. I particular, we do ot wat to obtai a color outside the color cube. Thus, we require that the error be smaller tha oe half of the diameter of the cluster of available colors [ 2 E(D v, /2. This gives us a upper boud for decay: decay/(1 decay) E(D v, [ 2 E(D v, /2, or decay 1 2/ E(D v,. O the other had, the decay should ot be too small otherwise o error would be diffused to eighborig pixels. Cosequetly, we choose the decay value equal to the upper boud 4β decay = 1 2/ E(D v, = 1, where β = Γ( ) π Our umerical experimets with differet images ad decay factors ideed cofirmed that this value of decay gives us the most pleasig results (see Figure 4, 5, ad 6). We have performed a series of experimets o a database cosistig of color images with 5 25 pixels. As these figures show, the improvemet obtaied by the proposed diffusio process is ideed sigificat, especially whe fewer images are available for costructig a forgery. Forgery without diffusio (8 database images) Forgery without diffusio (8 database images) Forgery with diffusio (8 database images) Forgery without diffusio (8 database images) Figure 5 Examples of two images ad forgeries obtaied usig the simple approach based o Eq. 4 (without error iffusio ad with the diffusio ad the optimal decay factor (with diffusio. Total of 8 database images were used i this Figure.

8 Origial image Forgery with diffusio ( database images) Origial image Forgery with diffusio ( database images) Origial image Forgery with diffusio ( database images) Figure 6 Examples of images ad their forgeries obtaied usig a database of images ad error diffusio with a decay factor.

9 4. CONCLUSION AND COUNTERMEASURES There are several possibilities how to prevet the attacks described i Sectios 2 ad. I [5 Memo, Shede ad Wog suggest makig the watermark extractio fuctio depedet o the positio of the pixel This ca be doe, for example by addig two more look-up tables f I ad f J that take the row idex i ad colum idex j ad also output a zero or a oe value which are the XOR'ed with the values produced by the f R, f G ad f B look-up tables to yield the watermark bit. I other words, we have L{i,j} = f R (R(i,j)) f G {G(i,j)) f B (B(i,j)) f I (i) f J (j). Although the above strategy makes the attacks outlied i sectio 2 ieffective, it is ot eough to prevet the collage attacks preseted i sectio. It appears that the simplest solutio would be to make the watermark deped o a image idex. This would solve the collage attack completely, ad sice the biary fuctios f ad the logo L ca also be made idex-depedet, we could ot apply the first attack either. However, ow we eed the idex i order to autheticate the image. A exhaustive search may ot be a plausible approach because of a potetially large umber of autheticated images (video-frames, for example). A better idea would be to embed the idex i the image usig a key uiquely associated with a particular digital camera or a movie. The idex caot be embedded i the whole image because tamperig with a portio of the image would result i a coclusio that the whole image has bee tampered with. Thus, the idex eeds to be embedded multiple times i small blocks. The idex, however, should be embedded i a robust maer so that the correct idex is extracted eve from slightly modified blocks. However, robust embeddig leads to larger distortio cotributig to the distortio due to the fragile watermark. Obviously, the robust watermark must be embedded as the first watermark. To achieve at least moderate robustess of the idex watermark, we may have to icrease the block size to at least pixels. Assumig the idex ca be captured usig 2 bits, we are takig a potetially large risk that tamperig with a very spatially localized block feature will cause a erroeous idex extractio. Icreasig the block size will egatively ifluece the ability of the autheticatio scheme to localize chages. Hece we propose a differet approach to thwart the attacks described i Sectios 2 ad. We observe that makig the biary fuctio f deped o more tha oe pixel ca thwart the first attack. For example, assumig we are scaig the picture by rows, we ca iclude a fixed radom collectio of eighbors from the portio of the image that has already bee modified. The lookup tables ca be replaced with a mappig derived from a secure block ecryptio algorithm to prevet attacks based o calculatig the lookup tables. The attack described i Sectio 2 will ot be successful for this scheme because of a large umber of possible combiatios of values of the biary fuctio f. It is also ot kow which pixels cotribute to the curret pixel. O top of this, the secure block ecryptio algorithm provides additioal feature of security makig the first attack impractical. To eable detectio of collages, we eed to embed the image idex ito the image. We suggest to embed this idex ito every small, 2 2 block ito radomly chose pixels (the selectio of pixels is the same for every block). The embeddig of the idex ca be itegrated ito the autheticatio scaig process described i the above paragraph simply by makig a additioal request wheever we are at a pixel that will carry iformatio about the idex. We request that ot oly f(p) = Logo(p) but also g(p) = idex bit for some fuctio g. I the autheticatio step, we first apply the detectio fuctio for the fragile watermark ad by lookig at the logo, we ca idetify portios of the image that have bee tampered with. We ca also determie if the image has bee cropped ad idetify boudaries of collaged portios from multiple images. To fid out if the collaged portios came from differet images, the image idices are recovered from each 2 2 block.

10 ACKNOWLEGEMENTS The work o this paper was partially supported by Air Force Research Laboratory, Air Force Material Commad, USAF, uder the grats umber F62-98-C-176 ad F62-98-C-9. The U.S. Govermet is authorized to reproduce ad distribute reprits for Govermetal purposes otwithstadig ay copyright otatio there o. The views ad coclusios cotaied herei are those of the authors ad should ot be iterpreted as ecessarily represetig the official policies, either expressed or implied, of Air Force Research Laboratory, or the U. S. Govermet. REFERENCES [1 M. Yeug, ad F. Mitzer. "A Ivisible Watermarkig Techique for Image Verificatio", Proc. ICIP'97, Sata Barbara, Califoria, [2 M. Hollima ad N. Memo. Couterfeitig attacks for block-wise idepedet watermarkig techiques. To.appear i IEEE Trasactios o Image Processig, March 2. [ M. Hollima, N. Memo, ad M. M. Yeug, "O the Need for Image Depedet Keys for Watermarkig", Proc. Cotet Security ad Data Hidig i Digital Media, Newark, NJ, May 14, [4 A. Erdélyi, Asymptotic Expasios, Dover Publicatios, Ic., New York, 1956, pp. 6. [5 N. Memo, S. Shede ad P. Wog. O the security of the Yeug-Mitzer Autheticatio Watermark. Proceedigs of the IS & T PICS Symposium, Savaah, Georgia, March 1999.

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete

More information

Homework 1 Solutions MA 522 Fall 2017

Homework 1 Solutions MA 522 Fall 2017 Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Algorithms Chapter 3 Growth of Functions

Algorithms Chapter 3 Growth of Functions Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Speeding-up dynamic programming in sequence alignment

Speeding-up dynamic programming in sequence alignment Departmet of Computer Sciece Aarhus Uiversity Demark Speedig-up dyamic programmig i sequece aligmet Master s Thesis Dug My Hoa - 443 December, Supervisor: Christia Nørgaard Storm Pederse Implemetatio code

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

EVALUATION OF TRIGONOMETRIC FUNCTIONS

EVALUATION OF TRIGONOMETRIC FUNCTIONS EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Protecting Biometric Templates with Image Watermarking Techniques

Protecting Biometric Templates with Image Watermarking Techniques Protectig Biometric Templates with Image Watermarkig Techiques Nikos Komios ad Tassos Dimitriou Athes Iformatio Techology, GR-19002 Peaia Attiki, Greece {kotdim}@ait.edu.gr Abstract. Biometric templates

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS I this uit of the course we ivestigate fittig a straight lie to measured (x, y) data pairs. The equatio we wat to fit

More information

are two specific neighboring points, F( x, y)

are two specific neighboring points, F( x, y) $33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Convergence results for conditional expectations

Convergence results for conditional expectations Beroulli 11(4), 2005, 737 745 Covergece results for coditioal expectatios IRENE CRIMALDI 1 ad LUCA PRATELLI 2 1 Departmet of Mathematics, Uiversity of Bologa, Piazza di Porta Sa Doato 5, 40126 Bologa,

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information