AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS

Size: px
Start display at page:

Download "AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS"

Transcription

1 AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS * Mahd Nangr Department of Electrcal Engneerng, Khaje Nasr Unversty of Technology, Tehran, Iran *Author for Correspondence ABSTRACT In ths paper we present a new unversal algorthm to encode the sources totally and wthout loss, the alphabet of output symbols s supposed the source of nteger. Ths algorthm provdes the securty of system and performs the affars of codng wthout usng of sources statstcs. Here we show that the average length of the dedcated code words s shorter than when the sequence output numbers are encoded one by one or block by block and also our presented method gves a knd of securty to the system because we use some of encodng characterstc as the encrypton key. Keywords: Unversal Source Codng (Data Compresson), Block Source Codng, Elas Codng Schemes, Omega Codng, Secure Source Codng, Redundancy INTRODUCTION In recent decades, researchers of nformaton theory, codng and cryptography felds have conducted a huge flurry of attempts toward combnng algorthms to receve jont approaches. Hence, desgn and mplementaton of effcent algorthms are under man consderaton when they acheve many of the followng goals together: compresson, error correcton and securty. One of the major nterestng methods s devsng algorthms whch effectvely provde both the data compresson and securty whch has been called Jont Encrypton-Source Codng (JESC) scheme. A verty of algorthms and schemes are proposed n each categores, lke the methods n (Merhav, 2006), (Kang and Lu, 2012) and (Snae and Vakl, 2010), usng some technques lke permutaton, channel codng or source codng based algorthms to acheve the compresson, error correcton or securty together. Elas proposed Gamma; Delta and Omega algorthms to represent postve ntegers whch used memoryless encodng structures, all of hs algorthms are unversal. Each codeword n these algorthms have some attachment portons to the bnary representaton of ntegers that gve capablty of beng unquely decodable or nstantaneous to the code. Omega encodng algorthm s the shortest one between Elas algorthms n the sense of expected codeword length over the most of probablty dstrbutons and has recursve structure whch means codeword portons are obtaned from each other recursvely (Elas, 1975). Foster ntroduces a block source codng scheme for unversally encodng of postve ntegers (Foster et al., 2002) whch encodes the source sequences block-by-block usng Omega scheme (Elas, 1975). On the other hand, a recursve algorthm to encode ntegers wth the expected code length shorter than Omega over some specal probablty dstrbutons have been ntroduced n (Nangr et al., 2015) whch uses Fbonacc representaton (Apostolco and Fraenkel, 1987) n some portons of the assgned code words to the ntegers. In ths work, we ntroduce a novel algorthm on the category of JESC. The proposed method s comprsed of a unversal lossless block compresson functon and an nherent mechansm for hdden encrypton of the source sequences. We am to securely encode output sequences of a dscrete nformaton source so that the code words not only are unquely decodable, but also are an nstantaneous set of bnary sequences (Cover and Thomas, 2006), we propose a new lossless block source algorthm for unversal codng of postve ntegers whch s supposed to be the source s output alphabet wthout usng any knowledge of the source statstcs (Salomon, 2007), (Davsson, 1973). It s note to worth that the proposed scheme has a memory structure because each codeword s allocated based on all the symbols of the block. There are Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1430

2 some unversal encodng schemes n the lterature usng the memory n the encodng procedure (Jalal et al., 2010), (Beram and Fekr, 2012). Addtonally, the proposed algorthm uses the count and locaton of small numbers of the blocks to acheve the secrecy. Algorthms encode ntegers one-by-one or block-byblock; we show that ths scheme has shorter expected codeword length than both of these manners. Our proposed algorthm has two mportant dfferences wth works whch are sad n above, one of them s that our algorthm s provdng secrecy by usng some parameters of block codng functon whch s appled to output data stream of source. Another one s achevng effcent compresson over all probablty dstrbutons due to have no small postve numbers n blocks, encodng 1s of blocks whch have the most probablty mass dstrbuton accordng to the assumpton s the challengng part of algorthms as we see n works lke (Foster et al., 2002) and (Nangr et al., 2015). Note that these two advantages n our algorthm are ntertwned wth each other to gve more compresson and secrecy. Ths paper s organzed as follows. In Secton 2 we present prelmnares and problem defntons. Proposed codng scheme wll be seen n secton 3, block source codng and constructon of super code words s ntroduced n ths secton, and we brng up the man dea of block source codng n ths secton, key extracton and securng process s presented n ths secton, n Secton 4 we wll see ts detal. In Secton 5 the performance of our proposed codng scheme wll be analyzed and compared wth the shortest code of Elas algorthms, Omega scheme. Fnally conclusons are drawn n Secton 6. Prelmnares and Problem Defnton Our general problem here s codng of ntegers unversally, meanng that the encoder and decode don t have any knowledge of source statstc and probablty dstrbuton on ntegers that are supposed source alphabet so they don t get any usage of t, (Davsson, 1973) and (Andreasen, 2001). It s supposed that the nformaton source s dscrete, statonary and wthout memory. Addtonally the source probablty dstrbuton s some symbols of ntegers seres, ths s a logc and applcable n nformaton sources because n the sources such as mage the numbers of source alphabet that s pxel ntenstes s large, so much that wth good approxmaton they could be llmtable and would be n one by one correspondence wth ntegers serous. Suppose that n s the length of each block from ntegers. The only assumpton n unversal codng algorthms has about probablty dstrbuton of symbols s the unascendng feature of dstrbuton, lke the assumptons that are n (Elas, 1975)-(Knuth, 1973): P( k) P( k 1) k (1), In whch Pk ( ) s probablty dstrbuton on ntegers {1,2,3,...}. Addtonally t s supposed that the source symbols are produced ndependently and dentcally dstrbuton (d). If t s supposed that the source alphabet s nteger s seres s only because of smplcty, because the source output symbols alphabet s supposed llmtable and there s one by one correspondence among each dscrete llmtable collecton wth nteger s collecton. For smplcty, the presented algorthm s appled on blocks wth fxed length separately lke (Foster et al., 2002). Also t s possble to analyze source output sequence to the blocks wth varable length and to acheve to hgh compresson and securty advantages. In non-block structures because of the assumpton of decreasng feature of probablty dstrbuton, the codeword length s decreasng functon, also ths feature n codeword length n block structure s true but n block structures we don t have separate codeword, we would have a super codeword that s dedcated to blocks. The comparson of compresson algorthms s performed on the bass of ther complexty and average codeword length, the normalzed redundancy s the llustrator of each algorthm average code length that s defned lke below for p probablty dstrbuton (Han and Kobayash, 2002): R n ( P) EL ( P) H ( P) n n H ( P) n In whch EL ( P ) and H ( P) n n are showng the average length of dedcated codes to each source block and entropy that s decomposed to the blocks wth length of n. Indexes shows that all calculatons are (2), Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1431

3 performed on the blocks wth the length of n. Accordng to frst theorem of Shannon R n ( P) 0 (Cover and Thomas, 2006) and t would be an effcent compresson algorthm n whch the normalzed redundancy tends to zero. There are methods that acheve to the average length of Shannon's entropy (Jalal and Wessman, 2008a) and (Jalal and Wessman, 2008b) but have the dsadvantages such as to be lossy or not to be unversal. On the other hand our algorthm s lossless and unversal that encodes the ntegers wth average codeword length near entropy on the all probablty dstrbutons. It s exploted from unary codng scheme n some part of our proposed algorthm, whch s a smple unversal codng algorthm, the unary code of m conssts of m 1zero bts termnated wth 1 (Fete and Seung, 2007). For example unary code of 6 s: One of the unversal codng algorthms for ntegers that are robust aganst the channel errors s Fbonacc algorthm that uses Fbonacc sequence numbers to dedcate the codeword to ntegers. In ths algorthm the ntegers s wrtten lke seres of Fbonacc numbers that there shouldn t be any repettve number n seres, and ths demonstrates that ths knd of depcton s unque and there would not be any two consecutve numbers from Fbonacc sequence n seres (Apostolco and Fraenkel, 1987) and (Fraenkel and Klen, 1996). In table number 1 we see some prmary numbers from Fbonacc sequence; ths sequence s produced by below recursve equaton: F 1, F 2, F F F n 3 (3), 1 2 n n1 n2 Table 1: Fbonacc numbers F1 F2 F3 F4 F5 F6 F7 F8 F9 F To assgn a codeword to the nteger N, frst the largest Fbonacc number that s equal to or less than N s determned, let t s F, the 'th Fbonacc number. A 1 s placed as the 'th bt n the codeword. Wth subtractng F from N and repeatng the prevous steps to the number N F ths procedure contnues. Ths procedure s repeated untl we reach to 0. Fnally, a 1 bt s added to the rght sde of the codeword, whch means the codeword s ended. The nterestng property of Fbonacc code words s contanng no adjacent 1 s n the codeword except at the end of codeword (Knuth, 1973), ths property s used n decodng algorthm of Fbonacc scheme. Here Fnor ( ) F denotes Fbonacc codeword of the nteger n. n For example, the Fbonacc codeword of 2015 s F , Snce 2015 F F F F F, n whch F shows the 'th element n Fbonacc sequence Proposed Codng Scheme In ths part the presented algorthm s descrbed n detal. Before descrbng about the steps of algorthm we need to talk about an dea that s relevant wth dedcaton of super codeword to blocks. Decomposng Source Output to Blocks The source codng algorthms follow dfferent strateges wth the purpose of the data compresson by average codeword length near to Shannon s entropy, one of the most common ways of source output sequence codng s symbol by symbol or separately, that s called compresson wthout memory. Another way and strategy s symbols codng by the structures that have memory, an example of ths structure s a method n whch source output sequence s decomposed to some blocks and a super codeword s dedcated for each block, the dedcated super codeword s dependent on all symbols of that block obvously. We can desgn a varety of algorthms wth memory where ther performance s better than memoryless algorthms from the average code length pont of vew. Moreover, t s clear that memoryless algorthms have less complexty than wth memory algorthms. It s supposed that the block sequence resulted from the analyss of source output sequence s B 1, B 2, B 3,... and the super code words dedcated to them are SC( B ), SC( B ), SC( B ),..., the workng way of our algorthm Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1432

4 s lke that after analyzng the source output sequence to blocks by usng of some parameters and characterstcs of each block, the super code word relevant to that block would be acheved, we wll descrbe the contnuaton of the process n detal. Locaton and Count of Small Numbers Now we descrbe the process of code dedcaton n detal. Suppose that nformaton source n every perod of tme T produces an nteger and X1, X2,... s the source llmtable output sequence that s X. Ths sequence s decomposed to the blocks wth fxed length lke below: B1 ( X1, X2,..., Xn), B2 ( X n1, X n2,..., X 2n),..., Our algorthm dedcates the super code words to blocks n a multstep process. The frst step: n ths step the encoder saves the unary code of block symbols n a table vertcally, for example f the current block s (2,5,4,1,3,1), the unary code words that are wrtten vertcally would be lke table 2. Table 2: Unary codes of current block (look-up table) It s obvous that the k th raw of ths table depcts the numbers of k n each block, so the sum of frst raw of ths table s equal wth the number of 1 s n each block that accordng to assumpton s the most probable symbol, and should has the shortest codeword length, the mportant pont that we wll use t. Suppose that Y s the sum of 1sn frst raw of table that s also representng the number of 1 of the block that we are gong to code t, the number of all possble cases for the placng of these 1s n a block wth length n s equal wth n. In the next step, we code the nteger s algorthm of the block wth a specal Y code. In total n ths step every unversal algorthm for symbol by symbol codng of the ntegers s applcable. Table 3: Code words of some ntegers based on second step Integer number The proposed code word The second step: n ths step an effcent recursve algorthm s used that t has three sub-steps, ths algorthm s appled for the nteger numbers k 1 n current block: 1. Wrte the standard bnary representaton of the postve nteger number and remove ts most sgnfcant bt, e.g., we wrte 0001 nstead of Count the number of bts that s obtaned n the frst step, for an nteger k we has log 2 k bts exactly. 3. Attach the Fbonacc code of log 2 k to the left sde of the bnary strng we obtaned n the frst step. Example 1: The nteger number 17 has 4 bts n the frst step and hence the Fbonacc codeword for the nteger 4 s F We attach 1011 to the left sde of 0001 and fnally obtan the codeword Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1433

5 c(17) In Table 3, we provde the code words of some postve ntegers based on the proposed scheme. In ths algorthm there s no dedcated codeword to the number 1, on the other hand the codeword of number 1 would be vod, t should be notced that accordng to the structure of block codng that we descrbed before, ths lack of dedcaton of codeword of the number 1 doesn t cause ant problem at all because we want to encode the k 2 ntegers n every block. Now we contnue the descrpton of the algorthm. In every block there s a seres of 1s and k 2 ntegers. The way of creatng super code words s lke that we dsregard (delete) the 1s n the blocksand get the new blocks B and apply the numbers of the new blocks of the mentoned symbol by symbol codng algorthm. Look at ths example: Example 2: Let assume B (2, 5, 4,1, 3,1), then we have B (2,5, 4,3). To assgn a super codeword to the block B, the codes obtaned from the stage 2 of the proposed algorthm are serally concatenated. Thus, the correspondng super codeword s SC( B ) ( c(2), c(5), c(4), c(3)). Therefore, the assocated super codeword of the encoder s SC( B ) (011, 00011,1011, 0011). In fgure1the constructon of super codeword from source output sequence s shown n detal, notce that two keys of 1 and 2 are used to dedcate the super code words to blocks. The process of ganng the key from source sequence s descrbed n next sub-secton. Fgure 1: Constructon of super code words Key Extracton for Secure Codng Procedure As t was mentoned Y and n are two mportant parameters n our codng algorthm. The bnary Y depcton of these numbers s used as encrypton key n presented algorthm. Due to the key exchange our encrypton algorthm belongs to the symmetrc-key encrypton category (Dennng, 1982), (Ahmad et al., n 2015). As we see n fgure 2, two keys that are bnary depcton of Y and whch are used for jont Y decodng and decpherng n presented algorthm smultaneously. key 1=bnary presetaton of Y n (4), key 2=bnary presetaton of Y In fgure 2, we show the block dagram of the proposed algorthm. Two keys whch are bnary presentatons of Y and n, respectvely, are employed for jont decodng and decpherng. Y Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1434

6 Fgure 2: Algorthm block dagram As we see n fgure 2 the dscrete sequence X, X, X,... s the source output that s entered to block encoder and the super code words are produced lke t was told. The encrypton keys are extracted form X, X, X,... sequence and are sent to the recever by a secure channel tll could be used n smultaneous process of decodng and decpherng. Decodng and Decpherng Procedure The decodng scheme of a unversal codng scheme should be unversal too because the decoder doesn t have any nformaton about source symbol statstcs and probablty dstrbuton (Ordentlch et al., 2008). Here the number and the place of 1s are also unknown for the decoder at frst and are receved as key whch s used not only decodng but also n decpherng for the super code words. In ths secton the jont decodng and decpherng are descrbed. As you see n the fgure the recever block has three entrance termnals that are from up to down lke ths: 1- SC( B ), SC( B ), SC( B ), key 1 3- key 2 Because these three entrances enter to the recever block from dfferent termnals, ths block would dfferentate between them naturally, all these entrances are bnary sequences. From these three entrances we want to dscover the X, X, X,... sequence; we explan the algorthm n detal below Frst of all the termnal 2 that they bnary depcton s avalable n t, get the amount of ths parameter. After that the amount of n parameter s calculable from termnal 3 because f we suppose the bnary n sequence equvalent n termnal 3 as m we would have m Y, n fact n s the smallest number that could get ths nequalty. The smplest way to get n s the tral and error method. n After these steps we are prepared tll to decode the super words sequence. Snce n and Y parameters are avalable, the number and place of 1s are known n sequence for the decoder. At frst the 1s are put n relevant place n each block and then the super code words n termnal 1 of k 2 ntegers are decoded and wll place n empty places (the places n whch there s no number 1) of each block tll the all sent sequence are decoded. Notce that n decodng of super code words n termnal 1of the recever we should use the decodng of the codng scheme that was explaned n step 2, that we wll explan t n detal n contnue, ths decodng algorthm s very smlar to that decodng algorthm whch s used n (Nangr et al., 2015). Imagne the bnary sequence of receved super code words n termnal 1, the bt sequence are read from frst tll we arrve to the frst sub-stream 11 (two consecutve bt 1), then by usng of decodng algorthm of Fbonacc method (Apostolco and Fraenkel, 1987) we decode tll to decode that part of sequence and get the K nteger (the resulted number from Fbonacc decodng), then we read K btsafter Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1435

7 11 sub-stream attachng t a 1 bt as most sgnfcant bt (MSB) and ntroduce t as the sent nteger. In contnue we wll depct an example to make clearer the process of jont decodng and decpherng procedure. Example 3: suppose that below bnary streams were receved n three termnals of recever block: Termnal 1: Termnal 2: 10 Termnal 3: 1110 As t was explaned we have Y=2 from termnal 2, after gettng Y we can calculate n lke ths that n s the n n smallest nteger that would true n 14 Y 2 m nequalty, the m=14s got from termnal 3. From ths nequalty n 6 s obtaned. Now from 1110 stream n termnal 3 decoder fnd out that ths s correspond ths poston of 1 s n sx-tuple: (,,,1,,1). Fnally from the bnary sequence n termnal 1and by usng the second step decodng process we can acheve to the sextet blanks. Durng ths process the s decoded to (2, 5, 4, 3), by combnng these numbers wth data about number and the place of numbers 1 that now are avalable we depct the sent sequence lke ths ( X, X, X, X, X, X ) (2,5, 4,1,3,1) and the process of jont decodng and decpherng s completed. The arrangement and the way of mputng the bnary streams of termnal 3 to the place of 1s n blocks of n nteger gve more freedom and vsblty to us n desgnng powerful keys for system. Ths arrangement and mputaton s obvously hdden for the mpermssble and unknown user and couldn t fnd the sent sequence by recevng the super code words sequence. In last example the bnary fled mputaton of termnal 3 to the place of 1s s lke ths strategy: Imagne two bnary stream b 1 and b2from termnal 3, f the correspondng n-tuplefor placng 1s are B1 and B 2, we suppose them the place of 1s n n-tuple. Our mputaton strategy s lke below: b b (5), 1 2 If and only f ndex of "1" n B ndex of "1" n B (6), 1 2 It s obvous that we could have dfferent strateges and formulas that ther results would be varable keys and ths cause that the breakng the cpher of ths system wouldn t be easy. In next secton we wll dscuss the algorthm performance n the sense of the average codeword length. Performance Analyss of Proposed Algorthm Our presented algorthm gets a smaller average codeword length than Omega Elas scheme over all probablty dstrbutons that between three Elas's algorthms has the smallest average codeword length, we wll affrm t. Moreover the securty operaton of presented algorthm s powerful, to break the code of ths algorthm when the attacker s aware of the n, block length, for number and placng of the 1s of the blocks there are 2 n ways, so the code breakng of ths algorthm contans obvous complexes that are more than polynomal complexes n the case of calculaton, whch s n NP complex categores. Some code words of small ntegers are presented n table 4, n the sense of compresson the average codeword length s the standard comparson between the codes. Lemma 1: For n 4 the Fbonacc codng scheme has shorter (t means ) codeword length than Omega Elas codng scheme whch have shortest expected codeword length between three algorthms of Elas (Sayood, 2003). Lemma 2: For n 2 the Second Stage codng scheme has shorter (t means ) codeword length than Omega Elas codng scheme. Proof: Because we use Fbonacc code words n the left porton of codeword n Second stage scheme and recursve structure of Omega Elas scheme, for n 2 ths lemma s strongly true usng lemma 1 (For Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1436

8 length of Fbonacc code words no closed form expresson s presented up to now, due to ths we note that smulaton results confrm lemma). Theorem 1: Our proposed algorthm acheves shorter expected codeword length than Elas Omega scheme over all probablty dstrbutons. Proof: suppose that the length of Omega codng scheme for postve nteger n s ( n). Then the expected codeword length of Omega codng s as follows E{ } p ( ) (7), 1 Also suppose that the length of our codng scheme for postve nteger n s cn. ( ) Then the expected codeword length of our codng s as follows (notce that cn ( ) s codeword length whch obtaned from stage 2, so n 2) E{ c} p c( ) (8), 2 Omega scheme s a recursve algorthm, t means that f we elmnate the last porton of code words n Omega codeword wthout the last 0 bt of t, we acheve to a sequence of bts that s an Omega codeword for another postve nteger too. From lemma 2 we conclude that for n 2 the codeword length whch obtaned from second stage has shorter length than Omega codng scheme length, because the left sde porton of codeword arses from Fbonacc codeword.e., n 2 : c( n) ( n) (9), An expectaton over probablty dstrbuton { p } whch s unknown to us results, E{ c} p c( ) p ( ) E{ } p ( ) (10), Note that n our algorthm no codeword s assgned to the 1s n blocks. Ths nequalty completes the proof. Table 4: Code words of 1 to 14 based on Fbonacc, second stage and Omega Elas schemes Integer Number Fbonacc Scheme Second Stage Scheme Omega Elas Scheme n Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1437

9 Concluson A new JESC algorthm was presented that encodes the ntegers securely and unversally. In the algorthm process the analyss dea of source output sequence to blocks s used whch s supposed as a sequence of ntegers. Instead of dedcatng codeword to each nteger we dedcate a super codeword to each block. It was showed that by decomposng the source output sequence to the seres of blocks we can use the produced parameters, we used the parameters n extractng encrypton keys and securng the codng algorthm. Fnally the process of presented algorthm s analyzed and compared about ts effcency n unversal compresson. The amount of securty of the presented algorthm s also analyzed n the sense of the calculaton the complexty of code breakng by the enemy. REFERENCES Ahmad S, Alam KMR, Rahman H and Tamura S (2015). A comparson between symmetrc and asymmetrc key encrypton algorthm based decrypton mx nets. Internatonal Conference on Networkng Systems and Securty (NSysS) 1(5) 5-7. Amemya T and Yamamoto H (1993). A new class of the unversal representaton for the postve ntegers. IEICE Transactons on Fundamentals E76-A(3) Andreasen P (2001). Unversal Source Codng. M.Sc. thess, Math. Dept., Unv. of Copenhagen. Apostolco A and Fraenkel AS (1987).Robust transmsson of unbounded strngs usng Fbonacc representatons. IEEE Transactons on Informaton Theory 33(2) Beram A and Fekr F (2012). Memory-Asssted Unversal Source Codng. Data Compresson Conference (DCC). Cover TM and Thomas JA (2006). Elements of Informaton Theory, 2 nd edton (New York: John Wley & Sons). Davsson LD (1973). Unversal noseless codng. IEEE Transactons on Informaton Theory 19(6) Dennng DE (1982). Cryptography and Data Securty (Addson-Wesley Publshng Company). Elas P (1975). Unversal codeword sets and representatons of the ntegers. IEEE Transactons on Informaton Theory Fete IR and Seung HS (2007). Neural Network Models of Brdsong Producton, Learnng, and Codng (New Encyclopeda of Neuroscence, Elsever). Foster DP, Stne RA and Wyner AJ (2002). Unversal codes for fnte sequences of ntegers drawn from a monotone dstrbuton. IEEE Transactons on Informaton Theory 48(6) Fraenkel S and Klen ST (1996). Robust unversal complete codes for transmsson and compresson. Dscrete Appled Mathematcs 64. Han TS and Kobayash K (2002). Mathematcs of Informaton and Codng. Amercan Mathematcal Socety. Jalal S, Verdu S and Wessman T (2010). A Unversal Scheme for Wyner Zv Codng of Dscrete Sources. IEEE Transactons on Informaton Theory 56(4) Jalal S and Wessman T (2008a). Near optmal lossy source codng and compresson-based denosng va Markov chan Monte Carlo. 42nd Annual Conference on Informaton Scences and Systems (CISS 2008) Jalal S and Wessman T (2008b). Lossy Source Codng va Markov Chan Monte Carlo. IEEE Internatonal Zurch Semnar on Communcatons Kang W and Lu N (2012). Compressng encrypted data: A permutaton approach. 50th Annual Allerton Conference on Communcaton, Control, and Computng (Allerton) Knuth DE (1973). The Art of Computer Programmng, 2 nd edton (Readng, MA, Addson-Wesley) 1. Levenshten VI (1968). On the redundancy and delay of decodable codng of natural numbers. Cybern 20. Merhav N (2006). On jont codng for watermarkng and encrypton. IEEE Transactons on Informaton Theory 52(1) Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1438

10 Nangr M, Behrooz H and Aref MR (2015). A New Recursve Algorthm for Unversal Codng Of Integers. Journal of Informaton Systems and Telecommuncaton (JIST) 3(1) (9) 1-6. Ordentlch E, Serouss G, Verdu S and Vswanathan K (2008). Unversal Algorthms for Channel Decodng of Uncompressed Sources. IEEE Transactons on Informaton Theory 54(5) Salomon D (2007). Data Compresson- The Complete Reference, fourth edton (Sprnger). Sayood K (2003). Lossless Compresson Handbook (Unversty of Calforna, Santa Barbara: Academc Press Seres n Communcaton, Networkng, and Multmeda). Shamr GI (2013). Unversal Source Codng for Monotonc and Fast Decayng Monotonc Dstrbutons. IEEE Transactons on Informaton Theory 59(11) Snae M and Vakl VT (2010). A low complexty jont compresson-error detecton-cryptography based on arthmetc codng. 10th Internatonal Conference on Informaton Scences Sgnal Processng and ther Applcatons (ISSPA) Copyrght 2014 Centre for Info Bo Technology (CIBTech) 1439

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

A Lower Bound for τ(n) of Any k-perfect Numbers

A Lower Bound for τ(n) of Any k-perfect Numbers Pure Mathematcal Scences, Vol. 4, 205, no. 3, 99-03 HIKARI Ltd, www.m-har.com http://dx.do.org/0.2988/pms.205.4923 A Lower Bound for τn of Any -Perfect Numbers Keneth Adran P. Dagal Department of Mathematcs

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Adaptive System Control with PID Neural Networks

Adaptive System Control with PID Neural Networks Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

On the Usefulness of Fibonacci Compression Codes

On the Usefulness of Fibonacci Compression Codes The Computer Journal Advance Access publshed May 14, 2009 The Author 2009 Publshed by Oxford Unversty Press on behalf of The Brtsh Computer Socety All rghts reserved For Permssons, please emal: journalspermssons@oxfordjournalsorg

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Compressive Direction Finding Based on Amplitude Comparison

Compressive Direction Finding Based on Amplitude Comparison Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications

LSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

Capacity Estimation of Non-Synchronous Covert Channels

Capacity Estimation of Non-Synchronous Covert Channels Capacty Estmaton of on-ynchronous s Zhenghong Wang and uby B. Lee Department of Electrcal Engneerng Prnceton Unversty {zhenghon,rblee}@prnceton.edu Abstract Capacty estmaton s an mportant part of covert

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Harmonic Balance of Nonlinear RF Circuits

Harmonic Balance of Nonlinear RF Circuits MICROWAE AND RF DESIGN Harmonc Balance of Nonlnear RF Crcuts Presented by Mchael Steer Readng: Chapter 19, Secton 19. Index: HB Based on materal n Mcrowave and RF Desgn: A Systems Approach, nd Edton, by

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Network Theory. EC / EE / IN. for

Network Theory.   EC / EE / IN. for Network Theory for / / IN By www.thegateacademy.com Syllabus Syllabus for Networks Network Graphs: Matrces Assocated Wth Graphs: Incdence, Fundamental ut Set and Fundamental rcut Matrces. Soluton Methods:

More information

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG) Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

More information

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM

DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM DC-FREE TURBO CODING SCHEME FOR GPRS SYSTEM Prof. Dr. M. Amr Mokhtar & Eng. A. Refaey-Ahmed Electrcal Engneerng Department, Alexandra Unversty, Egypt. ABSTRACT A useful tool n the desgn of relable dgtal

More information

A new family of linear dispersion code for fast sphere decoding. Creative Commons: Attribution 3.0 Hong Kong License

A new family of linear dispersion code for fast sphere decoding. Creative Commons: Attribution 3.0 Hong Kong License tle A new famly of lnear dsperson code for fast sphere decodng Author(s) Da, XG; Cheung, SW; Yuk, I Ctaton he nd IEEE Canadan Conference on Electrcal and Computer Engneerng (CCECE 009), St. John's, L.,

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

MASTER TIMING AND TOF MODULE-

MASTER TIMING AND TOF MODULE- MASTER TMNG AND TOF MODULE- G. Mazaher Stanford Lnear Accelerator Center, Stanford Unversty, Stanford, CA 9409 USA SLAC-PUB-66 November 99 (/E) Abstract n conjuncton wth the development of a Beam Sze Montor

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

ALICE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE

ALICE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE #A72 INTEGERS 6 (26) ALIE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE Vladmr Shevelev Department of Mathematcs, Ben-Guron Unversty of the Negev, Beer-Sheva, Israel shevelev@bgu.ac.l Peter J.. Moses Moparmatc

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information