A Novel Risk Assessment Model for Software Projects

Size: px
Start display at page:

Download "A Novel Risk Assessment Model for Software Projects"

Transcription

1 A Novel Risk Assessment Model for Software Projects Masood Uzzafer Department of Computer Science University of Nottingham, UK Abstract This paper presents a novel risk assessment model for software jects. Traditional software risk assessment models lack the capability of classifying risk events based on their (in)dependence and statistical (in)dependence. The posed risk assessment model relies on a scheme to classify the risk events of the software ject based on their (in)dependence to occur and statistical (in)dependence of their impacts. Further, the posed risk assessment model is integrated with a generic software cost estimation model to generate the cost estimates with integrated impact of the risk events of the software ject. Keywords Software Risk Impact, Software Risk Classification, Software Risk Assessment, Estimated Software Project Cost. S I. INTRODUCTION oftware risk assessment is an integral part of risk management of software jects. Two main components of a software risk assessment cess are qualitative risk assessment and quantitative risk assessment. Qualitative risk assessment focuses on the identification of risk events, while quantitative risk assessment studies the impacts and the bability of impacts of the identified risk events. Central notion of risk is that it is an event which may or may not take place hence its occurrence is uncertain and it brings out adverse monetary sequences to a software ject. Monetary loss due to a risk event is defined in terms of risk impact and the bability of risk impact. Risk impact is a random quantity therefore it is modeled with random variables having an underlying bability distribution. The actual risk impact cannot be realized unless the risk event takes place; the inability to fully understand risk events and their impacts before they occur is the uncertainty around the risk events. There are various software risk assessment models for the risk assessment of software jects. Based on different techniques, software risk assessment models apply qualitative and quantitative risk assessment to risk events of the software ject. While traditional risk assessment models vide a foundation for risk assessment of software elopment and tractual jects, these software risk assessment models lack the capability to qualitatively and quantitatively classify and treat the impacts of the risk events based on their (in)dependence and statistical (in)dependence. Qualitatively, the identified risk events can be classified as dependent and independent, whereas quantitatively the impacts of the identified risk events can be classified as statistically dependent and statistically independent. In simple terms, the dependent risk events are caused by other risk events, whereas the independent risk events are independent of the occurrences of the other risk events. The impacts of the statistically dependent risk events are said to be correlated, whereas, the impacts of statistically independent risk events are said to be uncorrelated. This paper presents a novel software risk assessment model which qualitatively classifies risk events as dependent and independent and further treats the impacts of the risk events based on their statistical (in)dependence. The paper is structured as follows; some software risk assessment models off interest are discussed in section II for illustration purposes [1, 2, 3], a novel risk assessment model is presented in section III and finally section IV draws some clusions. II. SOFTWARE RISK ASSESSMENT MODELS The foundation work for qualitative and quantitative risk assessment of software jects was carried out by Barry Boehm [1]. He outlined a cedure for the qualitative risk assessment, and used decision tree model for the quantitative risk assessment of software jects. The model assigns a value called risk exposure (RE) to each identified risk event expressed as follows: RE = P*L (1) Where RE is the risk exposure P is the bability of the risk event, and L is the monetary loss due to the risk event. Risk exposures of different risk events are loaded into the decision tree, and different software risk management options are analyzed to select the most optimum software risk management option, which shows the most optimum risk exposure. Another software risk assessment model, posed by Richard discussed a detailed cedure for risk

2 assessment of software jects [2]. The model integrates the software risk assessment model with the Constructive Cost Model (COCOMO) for software cost estimation [8]. This integrated model vides rich insight into the loss and tingency resources required for the software ject to combat the risk events. In an illustrated example, the risk events of a software ject are identified that are; cplx: the effects of algorithmic complexity, time: the timing straints, stor: the system memory straints, size: the uncertainty in the estimated code size. The identified risk events are classified as related with each other such that the complex algorithm, cplx, cause the software code size to increase, size, that increases the system execution time, time, and the system memory, stor. The risk impact of the risk events cplx, stor and time are mapped on a scale of { i : i [0,1]} 1.The impacts of the size and cplx are modelled with the bability distributions while the impacts of stor and time are selected from the COCOMO table which is based on the size of the software ject. The Monte Carlo simulation randomly selects the values of size and cplx from the respective distributions while the impact values of stor and time are selected from the COCOMO table that is based on the software size. These values are plugged into an integrated model of COCOMO and risk assessment represented by equation (2), b E a size cplx stor time (2) Where, E is the effort in man-months, size is the software size in kilo-lines of code, a and b are empirically driven COCOMO stants that are based on the type of the software. Running the Monte Carlo simulation few hundred times generate a histogram of the effort, E, required for the software ject. Say-Wei et al. presented a risk assessment model for software jects by using a questionnaire to identify the risk events and their impacts. The questionnaire sists of nine different categories of risk where each risk category tains a list of questions. The bability for each risk event, r i, is assessed through a set of questions in the questionnaire. The questionnaire vides three choices for a specific question, where each choice is mapped on a scale of 1-3, with 1 being the least and 3 being the highest risk impact. The numerical values from all the questions related to a risk event are accumulated and normalized by dividing it with the number of the questions. The value of impact, r i, of each risk event is scaled by a weight factor, w i, where each weight factor corresponds to different types of software jects. The overall software ject risk level, R, is obtained n through, R 1 r * w, which is normalized as follows, Where R n i i i R R R R max min min R min and R max (3), are the minimum and maximum risk when answers to all the questions are 1 and 3, respectively. Rn is the normalized overall risk level of the software ject on a scale of [0-1] referred as the software ject risk. Finally, the impact of risk on the quality, schedule and cost of the software ject are assessed. The risk assessment models [1, 2, 3] discussed established a foundation for the further elopment of the risk assessment models for the software jects. The main drawback of these traditional risk assessment models is that the risk events are not classified based on their (in)dependence on each other, in-addition the impacts of the risk events are not treated based on their statistical (in)dependence, which cause double counting the impacts of the statistically dependent risk events. Uzzafer [11] presented a scheme to classify the risk events of software jects based on their (in)dependence and statistical (in)dependence. The Barry s model uses the decision tree to model the impact of the different risk events of the software jects which helps to classify the risk events based on their dependence but fails to treat the impacts of the risk events based on their statistical (in)dependence. The Richards s model recognizes the statistical dependence of the risk events by stating that size, cplx, stor and time risk events are related, but do not treat the risk events based on their relation or in other words, based on their statistical dependence. This model defines the risk events of size and cplx as correlated while Monte Carlo simulation randomly selects the impact values of the size and cplx, which cause uncorrelated samples of the size and cplx to be selected and cause double counting of their impacts. Further, the impact of the risk events stor and time are taken from the COCOMO table and described as correlated. The COCOMO makes no assumptions about the statistical (in)dependence of the stor and time risk events and estimates the values of the stor and time without any sideration of their correlation with each other. While Richard s model describes the stor and time risk events as related i.e., statistically dependent, but uses the un-correlated impact values of the stor and time risk events from the COCOMO table. The Sya-Wei et al. s risk assessment model treats the risk events without sidering their statistical (in)dependence. A risk assessment model for the software jects is needed that can classify the risk events based on their (in)dependence and statistical (in)dependence for the per classification and treatment of the risk events of the software ject. Further, the software cost is the single most important factor in managing the software jects. The software ject risk events render an adverse impact on the estimated cost of the software ject. All the risk assessment models sider the impacts of risk events on the estimated cost of the software ject, directly [2] or indirectly [1, 3]. Directly, when the risk assessment model is integrated with a specific software cost estimation

3 model which causes the risk assessment model unusable with other software cost estimation models and indirectly, when the risk assessment is performed without any reference to the estimated software ject cost making it difficult to model the integrated behavior of the risk impact with the estimated cost of the software ject. The risk assessment model should not depend on any specific software cost estimation model and should be flexible so that it could be integrated with any software cost estimation model. Therefore, the goal is to elop a risk assessment model that overcomes the risk classification issue mentioned with the traditional risk assessment models. The qualitative component of the risk assessment model should classify the identified risk events based on their dependence and independence, while the qualitative component should combine the impacts of all the risk events by taking into the sideration their statistical (in)dependence. In-addition the risk assessment model should be independent of specific software cost estimation model so that it could be integrated with any software cost estimation model. III. A NOVEL SOFTWARE RISK ASSESSMENT MODEL Main steps of the posed software risk assessment model are as follows: 1. Identification and classification of the risk events 2. Impact modeling of the risk events 3. Estimating the overall impact of the risk events 1. Risk Impact identification and classification Risk event identification is the foremost step of a risk assessment cess. For risk identification and classification Uzzafer s [11] scheme is used. The scheme relies on the Software Engineering Institutes (SEI) Taxonomy Based Questionnaire (TBQ) [5,6] and presents four classifications of the risk events namely: Independent and Statistically Independent (ISI), Dependent and Statistically Independent (DSI), Independent and Statistically Dependent (ISD) and Dependent and Statistically Dependent (DSD). 2. Risk Impact modeling The random risk impact, X, is defined as the mapping from the space of the risk events to the real line bounded within the closed interval (0,1], having a known bability distribution. The Beta distributions are defined in the interval [0,1] and are used to model the random risk impacts of the risk events [8]. The Beta bability density function, f X ( x;, ), for the random risk impact, X, has the following form [9]: f X ( 1) ( 1) x (1 x) ( x;, ) (0,1) (4) B (, ) d A A A (5) 0 B(, ) (1 ) Where B () is the Beta function, (, ) are the shaping parameters and (0,1) is the indicator function which ensures that only values in the interval (0,1] has associated babilities, we write X : Beta(, ) to represent it. The expectation, EX [ ], and the variance, Var [ X ], of the Beta distributed random risk impact, X, are defined as, EX [ ] Var [ X ] 2 ( ) ( 1) The shape of the Beta distribution could be positively or negatively skewed depending upon the shaping parameters, (, ). The positively skewed Beta distribution represents that most of the risk impact observations are less than 0.5 and the expectation, EX [ ], of the random risk impact, X, is below 0.5. While the negatively skewed Beta distribution represents that most of the random observations of the risk impact are more than 0.5, therefore the expectation, EX [ ], of the random risk impact, X, is over 0.5. To represent the risk impact as the percentage of loss, the risk impact is mapped to a percentage of loss. For example, the risk impact with the expectation EX [ ] 0.1 can be mapped to represent 10% of the losses. Other risk impact observations can be similarly mapped to the percentage of the losses based on the linear and non-linear mapping depending upon the nature of the risk events, e.g. the risk impact EX [ ] 0.2 can be mapped to 40% of the losses. (6) (7) Figure 1: X : Beta(, ) for different values of (, ) Figure 1 shows the Beta distribution which is positively skewed on the left that has EX [ ] , not skewed in the middle having EX [ ] 0.5 and negatively skewed on the right having EX [ ] , each distribution has the different shaping parameters, (, ).

4 3. Estimating the overall risk impact The next step in the risk assessment of the software ject is to estimate the overall risk impact of the software ject due to all the identified risk events of the software ject. The risk events are identified using the SEI risk taxonomy TBQ, where each risk class attribute is a potential risk event [11]. Each identified risk event is assigned a risk impact on a scale of (0,1] based on the export opinion. The identified risk events of a SEI class are classified as independent and statistically dependent (ISI). To estimate the risk impact of a SEI risk class due to all the attributes of the SEI class, the histogram of the risk impacts of all the attributes of the SEI class is structed, which reveals the range and the spread of the risk impacts due to all the risk events of the SEI class. The Beta distribution parameters, (, ), are estimated from the histogram of the SEI class and based on the estimated parameters, (, ), the histogram of the SEI class is fitted with the Beta distribution. The Beta distribution fit, X class ~ Beta( calss, class ), captures the random risk impact, X class, due to the risk events of the SEI class having the bability distribution, f X ( x ;, ) class class class class Beta( class, class ), of overall random risk impact, X. This cess is repeated for all the SEI risk classes. The risk events of the three SEI risk classes, Program Engineering, Development Environment and Program Constraints generates three Beta distributions Beta(, ), Beta(, ) and Beta(, ), where each models the random risk impact X r : Beta(, ), X : Beta(, ) p o and X : Beta(, ) due to the risk events of the Program Engineering, Development Environment and Program Constraints SEI classes, respectively. Figure 2 shows the histograms of the SEI classes fitted with the Beta distributions. The single realization of the overall risk impact, x, is the duct of the risk impact of all the because all the SEI risk classes are said to be statistically independent [11]. First we get the random risk impacts on a scale of { xclass : xclass (0,1]} 1 for all the SEI classes, then the overall risk impact, x, is calculated using equation (8), x ( x 1)*( x 1)*( x 1) (8) where x, x and x are the single realizations of the random risk impacts X, X and X at some instance. The distribution of the random overall risk impact, X, of the software ject is the joint distribution of the distributions of random overall risk impacts of all the SEI classes. The SEI classes are classified as independent and statistically independent, ISI. Therefore, the joint distribution, f X ( x, x, x ), of all the SEI classes is the duct of the marginal distributions of all the SEI classes as represented by equation (9) and shown in Figure 3, f X ( x, x, x ) f ( x ;, ) X f ( x ;, ) f ( x ;, ) (9) X X The bability that the overall risk, x, of the software ject is within the region bounded with x, x and x, is represented as, FX ( x, x x ) P{ X x, X x, X x }, that is defined as follows, FX ( x, x x ) x x x ( ) X F x F ( x ) X FX ( x ) dx dx dx (10) The posed risk assessment model does not depend on any specific software cost estimation model it generates the random overall risk impact, X, of the software ject that can be integrated with any estimated cost of the software ject. If fy ( y ) is the distribution of the estimated cost of the software ject estimated by using any software cost estimation model [7,10] and Y represents the random cost required for the software ject. Then the following expression integrates the risk assessment and the cost estimation models of the software ject, XY X * Y (11) Figure 2: Histograms with Beta Distribution fit Where X is the random overall risk impact of the software ject having the bability density, f X ( x, x, x ), Y is the random estimated cost of the software ject having the bability distribution fy ( y ) and XY is the random estimated software ject cost that bears the impacts of risk events of the software ject.

5 integrated it with the estimated cost of the software ject. Figure 3: Joint Probability Distribution f X ( x, x, x ) The Monte Carlo simulation selects the random risk impact samples of the X, X and X from their respective distributions i.e., Beta(, ), Beta(, ) and Beta(, ) to estimate the x from equation (8) and selects the random cost samples, Y, from the estimated cost distribution, fy ( y ), of the software ject then uses the equation (11) to estimate the cost of the software ject, XY, with the integrated impact of the risk events, XY. Running the Monte Carlo simulation few hundred times struct the histogram of the cost samples, XY, that bears the impacts due to all the identified risk events of the software ject, as shown in Figure 4. Software cost estimation models that duce single value cost estimates, Y, can also be integrated with the risk assessment model represented by the equation (11), using the cedure described above. I. CONCLUSIONS A novel risk assessment model for software jects is presented. The posed risk assessment model classifies the risk events of software jects based on their (in)dependence and statistical (in)dependence on other risk events of the software ject and helps to avoid double counting the impact of statistically dependent risk events. The model relies on the SEI s TBQ for the risk identification and classifies the SEI classes and attributes based on their (in)dependence and statistical (in)dependence. The classes of SEI s TBQ are classified as independent and statistically independent, while the attributes of a class are classified as independent and statistically dependent on the attributes of the same SEI class. Further a cess of risk impact assessment is shown to get the overall software ject risk impact due to all the identified software ject risk events, and Figure 4: Overall Estimated Cost with Risk Impact REFERENCES [1] Software Risk Management: Principles and Practices, Barry W. Boehm, IEEE Software, January 1991, Pages [2] Richard Fairley, Risk Management for Software Projects, IEEE Software, vol. 11, issue 3 Pages 57 67, May [3] Say-Wei Foo, Arumugam Muruganantham, Software Risk Assessment Model, Proceedings of International Conference on Management of Innovation and Technology, vol. 2, pages, , November [4] Athanasios, Papoulis, Probability Random Variables and Stochastic Process, 3 rd Edition, McGraw Hill Companies, [5] Software Engineering Institute, Software Risk Evaluation Method Description, version 2.0, CMU/SEI-99-TR-029, Dec [6] Marvin Carr, Suresh Konda, Ira Monarch, Clay F. Walker, F. Carol Ulrich, Software Engineering Institute, Taxonomy Based Risk Identification, Technical Report SEI-93-TR-006, June [7] Boehm, B.W., Software Engineering Eomics, Pages: , Prentice-Hall Inc., Englewood Cliffs, N.J., [8] Dale F. Cooper, Stephen Grey, Geoffrey Raymond, Phil Walker, Project Risk Management Guidelines, John Wiley & Sons Ltd, [9] Douglas C. Montgomery, George C. Runger, Applied Statistics and Probability for Engineers, Third Edition. John Wiley & Sons Inc. [10] Lum Karen, Michael Bramble, Jairus Hihn, John Hackney, Mori Khorrami, Erik Monson, Handbook for Software Cost Estimation, Jet Propulsion Labarotry, California, May 2003 [11] Uzzafer, Masood, Impact of Dependent and Independent Risk of Software Proejcts, IEEE International Conference on Management Science and Information Engineering (ICMSIE 2010), December 2010, Zhengzhou, China.

MITIGATING INTERFERENCE TO GPS OPERATION USING VARIABLE FORGETTING FACTOR BASED RECURSIVE LEAST SQUARES ESTIMATION

MITIGATING INTERFERENCE TO GPS OPERATION USING VARIABLE FORGETTING FACTOR BASED RECURSIVE LEAST SQUARES ESTIMATION MITIGATING INTERFERENCE TO GPS OPERATION USING VARIABLE FORGETTING FACTOR BASED RECURSIVE LEAST SQUARES ESTIMATION Aseel AlRikabi and Taher AlSharabati Al-Ahliyya Amman University/Electronics and Communications

More information

OFDM Transmission Corrupted by Impulsive Noise

OFDM Transmission Corrupted by Impulsive Noise OFDM Transmission Corrupted by Impulsive Noise Jiirgen Haring, Han Vinck University of Essen Institute for Experimental Mathematics Ellernstr. 29 45326 Essen, Germany,. e-mail: haering@exp-math.uni-essen.de

More information

How to Capture Discrete Cost Risks in Your Project Cost Model

How to Capture Discrete Cost Risks in Your Project Cost Model How to Capture Discrete Cost Risks in Your Project Cost Model presentation for 2008 Joint SCEA/ISPA Annual Conference and Training Workshop Pacific Palms Conference Resort Industry Hills, CA June 2008

More information

Development and Performance Analysis of a Class of Intelligent Target Recognition Algorithms

Development and Performance Analysis of a Class of Intelligent Target Recognition Algorithms Development and Performance Analysis of a Class of Intelligent Recognition Algorithms Mark Tillman Defense Intelligence Agency Missile and Space Intelligence Center Redstone Arsenal, AL 35898-55 rmt@msic.dia.mil

More information

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Expectation

More information

C th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011) April 26 28, 2011, National Telecommunication Institute, Egypt

C th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2011) April 26 28, 2011, National Telecommunication Institute, Egypt New Trends Towards Speedy IR-UWB Techniques Marwa M.El-Gamal #1, Shawki Shaaban *2, Moustafa H. Aly #3, # College of Engineering and Technology, Arab Academy for Science & Technology & Maritime Transport

More information

Jitter in Digital Communication Systems, Part 1

Jitter in Digital Communication Systems, Part 1 Application Note: HFAN-4.0.3 Rev.; 04/08 Jitter in Digital Communication Systems, Part [Some parts of this application note first appeared in Electronic Engineering Times on August 27, 200, Issue 8.] AVAILABLE

More information

On the GNSS integer ambiguity success rate

On the GNSS integer ambiguity success rate On the GNSS integer ambiguity success rate P.J.G. Teunissen Mathematical Geodesy and Positioning Faculty of Civil Engineering and Geosciences Introduction Global Navigation Satellite System (GNSS) ambiguity

More information

Jitter in Digital Communication Systems, Part 2

Jitter in Digital Communication Systems, Part 2 Application Note: HFAN-4.0.4 Rev.; 04/08 Jitter in Digital Communication Systems, Part AVAILABLE Jitter in Digital Communication Systems, Part Introduction A previous application note on jitter, HFAN-4.0.3

More information

Lecture5: Lossless Compression Techniques

Lecture5: Lossless Compression Techniques Fixed to fixed mapping: we encoded source symbols of fixed length into fixed length code sequences Fixed to variable mapping: we encoded source symbols of fixed length into variable length code sequences

More information

Ricean Parameter Estimation Using Phase Information in Low SNR Environments

Ricean Parameter Estimation Using Phase Information in Low SNR Environments Ricean Parameter Estimation Using Phase Information in Low SNR Environments Andrew N. Morabito, Student Member, IEEE, Donald B. Percival, John D. Sahr, Senior Member, IEEE, Zac M.P. Berkowitz, and Laura

More information

THE EFFECT of multipath fading in wireless systems can

THE EFFECT of multipath fading in wireless systems can IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 119 The Diversity Gain of Transmit Diversity in Wireless Systems with Rayleigh Fading Jack H. Winters, Fellow, IEEE Abstract In

More information

Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels

Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels 1692 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 48, NO. 10, OCTOBER 2000 Frequency-Hopped Multiple-Access Communications with Multicarrier On Off Keying in Rayleigh Fading Channels Seung Ho Kim and Sang

More information

Seven Basic Quality Control Tools HISTOGRAM TOOL

Seven Basic Quality Control Tools HISTOGRAM TOOL Frequency Frequency Seven Basic Quality Control Tools HISTOGRAM TOOL QUALITY TOOLS Histogram Description of Histogram: The frequency histogram (or distribution) is a statistical tool for presenting numerous

More information

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233

MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS. Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 MATRIX SAMPLING DESIGNS FOR THE YEAR2000 CENSUS Alfredo Navarro and Richard A. Griffin l Alfredo Navarro, Bureau of the Census, Washington DC 20233 I. Introduction and Background Over the past fifty years,

More information

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise

Efficient Target Detection from Hyperspectral Images Based On Removal of Signal Independent and Signal Dependent Noise IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. III (Nov - Dec. 2014), PP 45-49 Efficient Target Detection from Hyperspectral

More information

Implementing the concept of paint before assembly to the typical assembly line

Implementing the concept of paint before assembly to the typical assembly line Implementing the concept of paint before assembly to the typical assembly line Rayappa Mahale * M.Tech., Student IP&E Dept BVBCET, Hubli Dr. V.N.Gaitonde Professor IP&E Dept BVBCET, Hubli Abstract This

More information

PROCESS-VOLTAGE-TEMPERATURE (PVT) VARIATIONS AND STATIC TIMING ANALYSIS

PROCESS-VOLTAGE-TEMPERATURE (PVT) VARIATIONS AND STATIC TIMING ANALYSIS PROCESS-VOLTAGE-TEMPERATURE (PVT) VARIATIONS AND STATIC TIMING ANALYSIS The major design challenges of ASIC design consist of microscopic issues and macroscopic issues [1]. The microscopic issues are ultra-high

More information

Hamming net based Low Complexity Successive Cancellation Polar Decoder

Hamming net based Low Complexity Successive Cancellation Polar Decoder Hamming net based Low Complexity Successive Cancellation Polar Decoder [1] Makarand Jadhav, [2] Dr. Ashok Sapkal, [3] Prof. Ram Patterkine [1] Ph.D. Student, [2] Professor, Government COE, Pune, [3] Ex-Head

More information

Detection and Estimation of Signals in Noise. Dr. Robert Schober Department of Electrical and Computer Engineering University of British Columbia

Detection and Estimation of Signals in Noise. Dr. Robert Schober Department of Electrical and Computer Engineering University of British Columbia Detection and Estimation of Signals in Noise Dr. Robert Schober Department of Electrical and Computer Engineering University of British Columbia Vancouver, August 24, 2010 2 Contents 1 Basic Elements

More information

TOWARDS CUSTOMIZED SMART GOVERNMENT QUALITY MODEL

TOWARDS CUSTOMIZED SMART GOVERNMENT QUALITY MODEL TOWARDS CUSTOMIZED SMART GOVERNMENT QUALITY MODEL Fahad Salmeen Al-Obthani 1 and Ali Abdulbaqi Ameen 2 1, 2 Lincoln University College, Wisma Lincoln, No. 12-18, Jalan SS 6/12, Petaling Jaya, Darul Ehsan,

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

4D-Particle filter localization for a simulated UAV

4D-Particle filter localization for a simulated UAV 4D-Particle filter localization for a simulated UAV Anna Chiara Bellini annachiara.bellini@gmail.com Abstract. Particle filters are a mathematical method that can be used to build a belief about the location

More information

Background Pixel Classification for Motion Detection in Video Image Sequences

Background Pixel Classification for Motion Detection in Video Image Sequences Background Pixel Classification for Motion Detection in Video Image Sequences P. Gil-Jiménez, S. Maldonado-Bascón, R. Gil-Pita, and H. Gómez-Moreno Dpto. de Teoría de la señal y Comunicaciones. Universidad

More information

Chaloemphon Meechai 1 1

Chaloemphon Meechai 1 1 A Study of Factors Affecting to Public mind of The Eastern University of Management and Technology in Faculty Business Administration students Chaloemphon Meechai 1 1 Office of Business Administration,

More information

Contrast adaptive binarization of low quality document images

Contrast adaptive binarization of low quality document images Contrast adaptive binarization of low quality document images Meng-Ling Feng a) and Yap-Peng Tan b) School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Avenue, Singapore

More information

Analysis of Complex Modulated Carriers Using Statistical Methods

Analysis of Complex Modulated Carriers Using Statistical Methods Analysis of Complex Modulated Carriers Using Statistical Methods Richard H. Blackwell, Director of Engineering, Boonton Electronics Abstract... This paper describes a method for obtaining and using probability

More information

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,

More information

Fig. 1. A normal probability distribution is often assumed for components, methods and processes for MC and WCA.

Fig. 1. A normal probability distribution is often assumed for components, methods and processes for MC and WCA. Integrating Statistics and Manufacturing Data into Simulation of Permanent Magnet Motor Drives by Rakesh Dhawan and Amitabh Mallik, Strategic Technology Group, Pune, India ISSUE: July 2010 Simulating motor

More information

Design of DFE Based MIMO Communication System for Mobile Moving with High Velocity

Design of DFE Based MIMO Communication System for Mobile Moving with High Velocity Design of DFE Based MIMO Communication System for Mobile Moving with High Velocity S.Bandopadhaya 1, L.P. Mishra, D.Swain 3, Mihir N.Mohanty 4* 1,3 Dept of Electronics & Telecomunicationt,Silicon Institute

More information

A Bottom-Up Approach to on-chip Signal Integrity

A Bottom-Up Approach to on-chip Signal Integrity A Bottom-Up Approach to on-chip Signal Integrity Andrea Acquaviva, and Alessandro Bogliolo Information Science and Technology Institute (STI) University of Urbino 6029 Urbino, Italy acquaviva@sti.uniurb.it

More information

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects 2011 International Conference on Modeling, Simulation and Control IPCSIT vol.10 (2011) (2011) IACSIT Press, Singapore A Proposed Probabilistic Model for Risk Forecasting in Small Health Informatics Projects

More information

Course Specifications

Course Specifications Development Cluster Computer and Networking Engineering (CNE) Cluster Lead Developer Amir Asif Module Names Module 1: Baseband and Bandpass Communications (40 characters or less Module 2: Channel Coding

More information

Characteristics of Routes in a Road Traffic Assignment

Characteristics of Routes in a Road Traffic Assignment Characteristics of Routes in a Road Traffic Assignment by David Boyce Northwestern University, Evanston, IL Hillel Bar-Gera Ben-Gurion University of the Negev, Israel at the PTV Vision Users Group Meeting

More information

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm

Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Maximum Likelihood Sequence Detection (MLSD) and the utilization of the Viterbi Algorithm Presented to Dr. Tareq Al-Naffouri By Mohamed Samir Mazloum Omar Diaa Shawky Abstract Signaling schemes with memory

More information

INVESTIGATING THE BENEFITS OF MESHING REAL UK LV NETWORKS

INVESTIGATING THE BENEFITS OF MESHING REAL UK LV NETWORKS INVESTIGATING THE BENEFITS OF MESHING REAL UK LV NETWORKS Muhammed S. AYDIN Alejandro NAVARRO Espinosa Luis F. OCHOA The University of Manchester UK The University of Manchester UK The University of Manchester

More information

Efficiency Model Based On Response Surface Methodology for A 3 Phase Induction Motor Using Python

Efficiency Model Based On Response Surface Methodology for A 3 Phase Induction Motor Using Python Efficiency Model Based On Response Surface Methodology for A 3 Phase Induction Motor Using Python Melvin Chelli Dept. of Electrical and Electronics Engineering B.V. Bhoomaraddi College Of Engineering and

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Signal Processing in Mobile Communication Using DSP and Multi media Communication via GSM

Signal Processing in Mobile Communication Using DSP and Multi media Communication via GSM Signal Processing in Mobile Communication Using DSP and Multi media Communication via GSM 1 M.Sivakami, 2 Dr.A.Palanisamy 1 Research Scholar, 2 Assistant Professor, Department of ECE, Sree Vidyanikethan

More information

Adaptive Feature Analysis Based SAR Image Classification

Adaptive Feature Analysis Based SAR Image Classification I J C T A, 10(9), 2017, pp. 973-977 International Science Press ISSN: 0974-5572 Adaptive Feature Analysis Based SAR Image Classification Debabrata Samanta*, Abul Hasnat** and Mousumi Paul*** ABSTRACT SAR

More information

Tutorial on the Statistical Basis of ACE-PT Inc. s Proficiency Testing Schemes

Tutorial on the Statistical Basis of ACE-PT Inc. s Proficiency Testing Schemes Tutorial on the Statistical Basis of ACE-PT Inc. s Proficiency Testing Schemes Note: For the benefit of those who are not familiar with details of ISO 13528:2015 and with the underlying statistical principles

More information

Time And Resource Characteristics Of Radical New Product Development (NPD) Projects And their Dynamic Control. Introduction. Problem Description.

Time And Resource Characteristics Of Radical New Product Development (NPD) Projects And their Dynamic Control. Introduction. Problem Description. Time And Resource Characteristics Of Radical New Product Development (NPD) Projects And their Dynamic Control Track: Product and Process Design In many industries the innovation rate increased while the

More information

Combining techniques graphical representation of bit error rate performance used in mitigating fading in global system for mobile communication (GSM)

Combining techniques graphical representation of bit error rate performance used in mitigating fading in global system for mobile communication (GSM) JEMT 5 (2017) 1-7 ISSN 2053-3535 Combining techniques graphical representation of bit error rate performance used in mitigating fading in global system for mobile communication (GSM) Awofolaju T. T.* and

More information

Population Adaptation for Genetic Algorithm-based Cognitive Radios

Population Adaptation for Genetic Algorithm-based Cognitive Radios Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications

More information

Solving Assembly Line Balancing Problem using Genetic Algorithm with Heuristics- Treated Initial Population

Solving Assembly Line Balancing Problem using Genetic Algorithm with Heuristics- Treated Initial Population Solving Assembly Line Balancing Problem using Genetic Algorithm with Heuristics- Treated Initial Population 1 Kuan Eng Chong, Mohamed K. Omar, and Nooh Abu Bakar Abstract Although genetic algorithm (GA)

More information

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies

28th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies 8th Seismic Research Review: Ground-Based Nuclear Explosion Monitoring Technologies A LOWER BOUND ON THE STANDARD ERROR OF AN AMPLITUDE-BASED REGIONAL DISCRIMINANT D. N. Anderson 1, W. R. Walter, D. K.

More information

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 11, NOVEMBER 2002 1719 SNR Estimation in Nakagami-m Fading With Diversity Combining Its Application to Turbo Decoding A. Ramesh, A. Chockalingam, Laurence

More information

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN International Journal of Scientific & Engineering Research Volume 9, Issue 3, March-2018 1605 FPGA Design and Implementation of Convolution Encoder and Viterbi Decoder Mr.J.Anuj Sai 1, Mr.P.Kiran Kumar

More information

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection

Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 7, April 4, -3 Variable Step-Size LMS Adaptive Filters for CDMA Multiuser Detection Karen Egiazarian, Pauli Kuosmanen, and Radu Ciprian Bilcu Abstract:

More information

Development of Mathematical Cost Model for Room Temperature End-milling of AISI D2 Tool Steel

Development of Mathematical Cost Model for Room Temperature End-milling of AISI D2 Tool Steel Proceedings of the 2011 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 24, 2011 Development of Mathematical Model for Room Temperature End-milling

More information

Neural Network with Median Filter for Image Noise Reduction

Neural Network with Median Filter for Image Noise Reduction Available online at www.sciencedirect.com IERI Procedia 00 (2012) 000 000 2012 International Conference on Mechatronic Systems and Materials Neural Network with Median Filter for Image Noise Reduction

More information

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY 1 MOHAMMAD RIAZ AHMED, 1 MD.RUMEN AHMED, 1 MD.RUHUL AMIN ROBIN, 1 MD.ASADUZZAMAN, 2 MD.MAHBUB

More information

Naimeh Sadeghi Aminah Robinson Fayek. Dept. of Civil and Environmental Engineering University of Alberta Edmonton, AB, CANADA

Naimeh Sadeghi Aminah Robinson Fayek. Dept. of Civil and Environmental Engineering University of Alberta Edmonton, AB, CANADA Proceedings of the 2008 Winter Simulation Conference S. J. Mason, R. R. Hill, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A FRAMEWORK FOR SIMULATING INDUSTRIAL CONSTRUCTION PROCESSES Naimeh Sadeghi

More information

Distinguishing Photographs and Graphics on the World Wide Web

Distinguishing Photographs and Graphics on the World Wide Web Distinguishing Photographs and Graphics on the World Wide Web Vassilis Athitsos, Michael J. Swain and Charles Frankel Department of Computer Science The University of Chicago Chicago, Illinois 60637 vassilis,

More information

Developing a New Color Model for Image Analysis and Processing

Developing a New Color Model for Image Analysis and Processing UDC 004.421 Developing a New Color Model for Image Analysis and Processing Rashad J. Rasras 1, Ibrahiem M. M. El Emary 2, Dmitriy E. Skopin 1 1 Faculty of Engineering Technology, Amman, Al Balqa Applied

More information

An Approximation Algorithm for Computing the Mean Square Error Between Two High Range Resolution RADAR Profiles

An Approximation Algorithm for Computing the Mean Square Error Between Two High Range Resolution RADAR Profiles IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, VOL., NO., JULY 25 An Approximation Algorithm for Computing the Mean Square Error Between Two High Range Resolution RADAR Profiles John Weatherwax

More information

GREATER CLARK COUNTY SCHOOLS PACING GUIDE. Algebra I MATHEMATICS G R E A T E R C L A R K C O U N T Y S C H O O L S

GREATER CLARK COUNTY SCHOOLS PACING GUIDE. Algebra I MATHEMATICS G R E A T E R C L A R K C O U N T Y S C H O O L S GREATER CLARK COUNTY SCHOOLS PACING GUIDE Algebra I MATHEMATICS 2014-2015 G R E A T E R C L A R K C O U N T Y S C H O O L S ANNUAL PACING GUIDE Quarter/Learning Check Days (Approx) Q1/LC1 11 Concept/Skill

More information

CHAPTER 6 PROBABILITY. Chapter 5 introduced the concepts of z scores and the normal curve. This chapter takes

CHAPTER 6 PROBABILITY. Chapter 5 introduced the concepts of z scores and the normal curve. This chapter takes CHAPTER 6 PROBABILITY Chapter 5 introduced the concepts of z scores and the normal curve. This chapter takes these two concepts a step further and explains their relationship with another statistical concept

More information

Some Parameter Estimators in the Generalized Pareto Model and their Inconsistency with Observed Data

Some Parameter Estimators in the Generalized Pareto Model and their Inconsistency with Observed Data Some Parameter Estimators in the Generalized Pareto Model and their Inconsistency with Observed Data F. Ashkar, 1 and C. N. Tatsambon 2 1 Department of Mathematics and Statistics, Université de Moncton,

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

FPGA Implementation of High Speed Infrared Image Enhancement

FPGA Implementation of High Speed Infrared Image Enhancement International Journal of Electronic Engineering Research ISSN 0975-6450 Volume 1 Number 3 (2009) pp. 279 285 Research India Publications http://www.ripublication.com/ijeer.htm FPGA Implementation of High

More information

Architecture design for Adaptive Noise Cancellation

Architecture design for Adaptive Noise Cancellation Architecture design for Adaptive Noise Cancellation M.RADHIKA, O.UMA MAHESHWARI, Dr.J.RAJA PAUL PERINBAM Department of Electronics and Communication Engineering Anna University College of Engineering,

More information

Spectral analysis of seismic signals using Burg algorithm V. Ravi Teja 1, U. Rakesh 2, S. Koteswara Rao 3, V. Lakshmi Bharathi 4

Spectral analysis of seismic signals using Burg algorithm V. Ravi Teja 1, U. Rakesh 2, S. Koteswara Rao 3, V. Lakshmi Bharathi 4 Volume 114 No. 1 217, 163-171 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Spectral analysis of seismic signals using Burg algorithm V. avi Teja

More information

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators

Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators 374 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 2, MARCH 2003 Narrow-Band Interference Rejection in DS/CDMA Systems Using Adaptive (QRD-LSL)-Based Nonlinear ACM Interpolators Jenq-Tay Yuan

More information

Sensor Data Fusion Using a Probability Density Grid

Sensor Data Fusion Using a Probability Density Grid Sensor Data Fusion Using a Probability Density Grid Derek Elsaesser Communication and avigation Electronic Warfare Section DRDC Ottawa Defence R&D Canada Derek.Elsaesser@drdc-rddc.gc.ca Abstract - A novel

More information

An Optimization Approach for Real Time Evacuation Reroute. Planning

An Optimization Approach for Real Time Evacuation Reroute. Planning An Optimization Approach for Real Time Evacuation Reroute Planning Gino J. Lim and M. Reza Baharnemati and Seon Jin Kim November 16, 2015 Abstract This paper addresses evacuation route management in the

More information

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Wavelet Transform From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Fourier theory: a signal can be expressed as the sum of a, possibly infinite, series of sines and cosines. This sum is

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

USE OF BASIC ELECTRONIC MEASURING INSTRUMENTS Part II, & ANALYSIS OF MEASUREMENT ERROR 1

USE OF BASIC ELECTRONIC MEASURING INSTRUMENTS Part II, & ANALYSIS OF MEASUREMENT ERROR 1 EE 241 Experiment #3: USE OF BASIC ELECTRONIC MEASURING INSTRUMENTS Part II, & ANALYSIS OF MEASUREMENT ERROR 1 PURPOSE: To become familiar with additional the instruments in the laboratory. To become aware

More information

Economic Design of Control Chart Using Differential Evolution

Economic Design of Control Chart Using Differential Evolution Economic Design of Control Chart Using Differential Evolution Rukmini V. Kasarapu 1, Vijaya Babu Vommi 2 1 Assistant Professor, Department of Mechanical Engineering, Anil Neerukonda Institute of Technology

More information

Correlation of Model Simulations and Measurements

Correlation of Model Simulations and Measurements Correlation of Model Simulations and Measurements Roy Leventhal Leventhal Design & Communications Presented June 5, 2007 IBIS Summit Meeting, San Diego, California Correlation of Model Simulations and

More information

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine

Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Journal of Clean Energy Technologies, Vol. 4, No. 3, May 2016 Classification of Voltage Sag Using Multi-resolution Analysis and Support Vector Machine Hanim Ismail, Zuhaina Zakaria, and Noraliza Hamzah

More information

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22.

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22. FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 22 Optical Receivers Fiber Optics, Prof. R.K. Shevgaonkar, Dept. of Electrical Engineering,

More information

A Novel Method for Determining the Lower Bound of Antenna Efficiency

A Novel Method for Determining the Lower Bound of Antenna Efficiency A Novel Method for Determining the Lower Bound of Antenna Efficiency Jason B. Coder #1, John M. Ladbury 2, Mark Golkowski #3 # Department of Electrical Engineering, University of Colorado Denver 1201 5th

More information

BEING wideband, chaotic signals are well suited for

BEING wideband, chaotic signals are well suited for 680 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 12, DECEMBER 2004 Performance of Differential Chaos-Shift-Keying Digital Communication Systems Over a Multipath Fading Channel

More information

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS

DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS DESIGN AND IMPLEMENTATION OF AN ALGORITHM FOR MODULATION IDENTIFICATION OF ANALOG AND DIGITAL SIGNALS John Yong Jia Chen (Department of Electrical Engineering, San José State University, San José, California,

More information

AN APPROXIMATION-WEIGHTED DETAIL CONTRAST ENHANCEMENT FILTER FOR LESION DETECTION ON MAMMOGRAMS

AN APPROXIMATION-WEIGHTED DETAIL CONTRAST ENHANCEMENT FILTER FOR LESION DETECTION ON MAMMOGRAMS AN APPROXIMATION-WEIGHTED DETAIL CONTRAST ENHANCEMENT FILTER FOR LESION DETECTION ON MAMMOGRAMS Zhuangzhi Yan, Xuan He, Shupeng Liu, and Donghui Lu Department of Biomedical Engineering, Shanghai University,

More information

On the Approximation of Pressure Loss Components in Air Conditioning Ducts

On the Approximation of Pressure Loss Components in Air Conditioning Ducts International Journal of Science and Engineering Investigations vol. 6, issue 7, December 07 ISSN: 5-8843 On the Approximation of Pressure Loss Components in Air Conditioning s J. I. Sodiki Department

More information

PERFORMANCE ANALYSIS OF NONDIRECTED IR WIRELESS CHANNEL IN INDOOR ENVIRONMENT USING STATISTICAL DISTRIBUTION..

PERFORMANCE ANALYSIS OF NONDIRECTED IR WIRELESS CHANNEL IN INDOOR ENVIRONMENT USING STATISTICAL DISTRIBUTION.. PERFORMANCE ANALYSIS OF NONDIRECTED IR WIRELESS CHANNEL IN INDOOR ENVIRONMENT USING STATISTICAL DISTRIBUTION.. Abstract: PRAKASH PATIL Priyadarshini College of Engineering, Nagpur, RTM S University of

More information

Histogram Equalization: A Strong Technique for Image Enhancement

Histogram Equalization: A Strong Technique for Image Enhancement , pp.345-352 http://dx.doi.org/10.14257/ijsip.2015.8.8.35 Histogram Equalization: A Strong Technique for Image Enhancement Ravindra Pal Singh and Manish Dixit Dept. of Comp. Science/IT MITS Gwalior, 474005

More information

APPENDIX 2.3: RULES OF PROBABILITY

APPENDIX 2.3: RULES OF PROBABILITY The frequentist notion of probability is quite simple and intuitive. Here, we ll describe some rules that govern how probabilities are combined. Not all of these rules will be relevant to the rest of this

More information

NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT:

NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT: IJCE January-June 2012, Volume 4, Number 1 pp. 59 67 NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT: A COMPARATIVE STUDY Prabhdeep Singh1 & A. K. Garg2

More information

Call Quality Measurement for Telecommunication Network and Proposition of Tariff Rates

Call Quality Measurement for Telecommunication Network and Proposition of Tariff Rates Call Quality Measurement for Telecommunication Network and Proposition of Tariff Rates Akram Aburas School of Engineering, Design and Technology, University of Bradford Bradford, West Yorkshire, United

More information

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Wavelet Transform From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Fourier theory: a signal can be expressed as the sum of a series of sines and cosines. The big disadvantage of a Fourier

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Fundamentals of Time- and Frequency-Domain Analysis of Signal-Averaged Electrocardiograms R. Martin Arthur, PhD

Fundamentals of Time- and Frequency-Domain Analysis of Signal-Averaged Electrocardiograms R. Martin Arthur, PhD CORONARY ARTERY DISEASE, 2(1):13-17, 1991 1 Fundamentals of Time- and Frequency-Domain Analysis of Signal-Averaged Electrocardiograms R. Martin Arthur, PhD Keywords digital filters, Fourier transform,

More information

Miguel I. Aguirre-Urreta

Miguel I. Aguirre-Urreta RESEARCH NOTE REVISITING BIAS DUE TO CONSTRUCT MISSPECIFICATION: DIFFERENT RESULTS FROM CONSIDERING COEFFICIENTS IN STANDARDIZED FORM Miguel I. Aguirre-Urreta School of Accountancy and MIS, College of

More information

On the Estimation of Interleaved Pulse Train Phases

On the Estimation of Interleaved Pulse Train Phases 3420 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 12, DECEMBER 2000 On the Estimation of Interleaved Pulse Train Phases Tanya L. Conroy and John B. Moore, Fellow, IEEE Abstract Some signals are

More information

Amplitude and Phase Distortions in MIMO and Diversity Systems

Amplitude and Phase Distortions in MIMO and Diversity Systems Amplitude and Phase Distortions in MIMO and Diversity Systems Christiane Kuhnert, Gerd Saala, Christian Waldschmidt, Werner Wiesbeck Institut für Höchstfrequenztechnik und Elektronik (IHE) Universität

More information

A Steady State Decoupled Kalman Filter Technique for Multiuser Detection

A Steady State Decoupled Kalman Filter Technique for Multiuser Detection A Steady State Decoupled Kalman Filter Technique for Multiuser Detection Brian P. Flanagan and James Dunyak The MITRE Corporation 755 Colshire Dr. McLean, VA 2202, USA Telephone: (703)983-6447 Fax: (703)983-6708

More information

ON WAVEFORM SELECTION IN A TIME VARYING SONAR ENVIRONMENT

ON WAVEFORM SELECTION IN A TIME VARYING SONAR ENVIRONMENT ON WAVEFORM SELECTION IN A TIME VARYING SONAR ENVIRONMENT Ashley I. Larsson 1* and Chris Gillard 1 (1) Maritime Operations Division, Defence Science and Technology Organisation, Edinburgh, Australia Abstract

More information

Color Constancy Using Standard Deviation of Color Channels

Color Constancy Using Standard Deviation of Color Channels 2010 International Conference on Pattern Recognition Color Constancy Using Standard Deviation of Color Channels Anustup Choudhury and Gérard Medioni Department of Computer Science University of Southern

More information

A Novel Fuzzy Neural Network Based Distance Relaying Scheme

A Novel Fuzzy Neural Network Based Distance Relaying Scheme 902 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 15, NO. 3, JULY 2000 A Novel Fuzzy Neural Network Based Distance Relaying Scheme P. K. Dash, A. K. Pradhan, and G. Panda Abstract This paper presents a new

More information

Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target

Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target 14th International Conference on Information Fusion Chicago, Illinois, USA, July -8, 11 Comparing the State Estimates of a Kalman Filter to a Perfect IMM Against a Maneuvering Target Mark Silbert and Core

More information

Voltage Sag Index Calculation Using an Electromagnetic Transients Program

Voltage Sag Index Calculation Using an Electromagnetic Transients Program International Conference on Power Systems Transients IPST 3 in New Orleans, USA Voltage Sag Index Calculation Using an Electromagnetic Transients Program Juan A. Martinez-Velasco, Jacinto Martin-Arnedo

More information

Achievable-SIR-Based Predictive Closed-Loop Power Control in a CDMA Mobile System

Achievable-SIR-Based Predictive Closed-Loop Power Control in a CDMA Mobile System 720 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 51, NO. 4, JULY 2002 Achievable-SIR-Based Predictive Closed-Loop Power Control in a CDMA Mobile System F. C. M. Lau, Member, IEEE and W. M. Tam Abstract

More information

Optimizing Multi-Cell Massive MIMO for Spectral Efficiency

Optimizing Multi-Cell Massive MIMO for Spectral Efficiency Optimizing Multi-Cell Massive MIMO for Spectral Efficiency How Many Users Should Be Scheduled? Emil Björnson 1, Erik G. Larsson 1, Mérouane Debbah 2 1 Linköping University, Linköping, Sweden 2 Supélec,

More information

EE 6422 Adaptive Signal Processing

EE 6422 Adaptive Signal Processing EE 6422 Adaptive Signal Processing NANYANG TECHNOLOGICAL UNIVERSITY SINGAPORE School of Electrical & Electronic Engineering JANUARY 2009 Dr Saman S. Abeysekera School of Electrical Engineering Room: S1-B1c-87

More information

CHANNEL MODEL FOR SATELLITE COMMUNICATION LINKS ABOVE 10GHZ BASED ON WEIBULL DISTRIBUTION

CHANNEL MODEL FOR SATELLITE COMMUNICATION LINKS ABOVE 10GHZ BASED ON WEIBULL DISTRIBUTION CHANNEL MODEL FOR SATELLITE COMMUNICATION LINKS ABOVE 10GHZ BASED ON WEIBULL DISTRIBUTION 1 Gowtham.M, 2 Gopi kishore.s.m, 3 Jayapal.M, 4 Thangaraj.M, Dept of ECE, Narasu s Sarathy Institute Of Technology,

More information

94 Engineering Safety: Fundamentals, Techniques, and Applications 2. Roland, H.E. and Moriarty, B., System Safety Engineering and Management, John Wiley and Sons, New York, 1983. 3. Goetsch, D.L., Occupational

More information