Fused Number Representation Systems and their Barcode Applications

Size: px
Start display at page:

Download "Fused Number Representation Systems and their Barcode Applications"

Transcription

1 Best Studet Paper Award Fused Nuber Represetatio Systes ad their Barcode Applicatios Sarkis Agaia* Departet of Electrical Egieerig, Staford Uiversity, 450 Serra Mall, Staford, Califoria ABSTRACT I this paper we focus o: a) ehacig the perforace of existig barcode systes ad b) buildig a barcode syste for obile applicatios. First we itroduce a ew cocept of geeratig a paraetric uber represetatio syste by fusig a uber of represetatio systes that use ultiplicatio, additio, ad other operatios. Secod we show how oe ca geerate a secure, reliable, ad high capacity color barcode by usig the fused syste. The represetatio, sybols, ad colors ay be used as ecryptio keys that ca be ecoded ito barcodes, thus eliiatig the direct depedece o cryptographic techiques. To supply a extra layer of security, the fused syste also allows oe to ecrypt give data usig differet types of ecryptio ethods. I additio, this fused syste ca be used to iprove iage processig applicatios ad cryptography. Keywords: Barcode, Multiple Base Represetatio, Fiboacci/Lucas p-codes, Double Base Represetatio, Cell/ obile phoes 1. INTRODUCTION Sice the 1960 s, barcodes have provided optical achie-readable represetatios of data. Iitially used to label railroad cars, barcodes are ow laid o alost every ediu, fro paper ad cardboard to plastics ad etals ad fro ski to DNA 1. Though other techologies are beig developed for cosuers to sca obects, icludig radio waves, coputer chips or satellite locatio systes, barcodes aitai their popularity due to their low cost, low rate of error, high iforatio capacity, ad portability 2. The potetial ad dead for barcode techology cotiues to icrease with costatly iprovig digital techologies. The recet itegratio of these techologies, aely through the pairig of obile caera phoes ad high desity barcodes, ca fulfill the dead for electroic data exchage. For istace, i Japa ad Korea, people ca save ad exchage Facebook iforatio, receive the utritioal iforatio about their McDoald s eal, board airplaes usig their phoes ad wireless payets 3. Despite its huge potetial, however, the use of caera phoes to sca barcodes is ot widespread. Resolutio liits, distortio, blurrig, ad oise iduced by the phoe caera hider the direct use of ost existig bar codes for obile phoes 4. These probles are exacerbated whe dealig with caera phoes that geerate low to ediu quality iages (less tha 640 x480 pixels) 5. Questios that have bee raised iclude: Are the existig barcodes suitable for scaig by obile phoes? Is it ecessary to desig a ew barcode tailored for obile phoes 4? As private wireless trasactios ay be proe to hackig ad piracy, a additioal questio is how ca ake barcodes ore secure? Copaies have developed their ow uique, proprietary barcode forats that are better geared toward obile applicatios 2. These developets have resulted i desigs that vary draatically fro those of traditioal barcodes, which represet data i the widths ad spacigs of black parallel lies. These barcodes, also kow as liear or 1D (1 diesioal) barcodes or sybologies carry a liited aout of iforatio with few security features. Other *sagaia@staford.edu Multiedia o Mobile Devices 2010, edited by Reier Creutzburg, David Akopia, Proc. of SPIE-IS&T Electroic Iagig, SPIE Vol. 7542, SPIE-IS&T CCC code: X/10/$18 doi: / SPIE-IS&T/ Vol

2 sybologies, such as 2-D ad color barcodes, have thus bee looked at i a effort to ake barcode systes ore efficiet, accessible, ad secure. May of these sybologies are siilar to their liear couterparts i that they are based o biary represetatios. They differ, however, i the aout of iforatio they ca hold. I exchage for the icreased iforatio cotet, 2D ad color barcodes have also icreased the coplexity of recogitio algoriths, as they require greater iage segetatio 6. Thus, due to the varyig resolutios of obile caera phoes, the iagig quality of a give caera phoe ay ot be satisfactory for decodig a high desity 2D or color barcode 4. I additio, iage capture by the phoe caera i a variety of lightig coditios ay ot retai eough discriiate iforatio of color ad grayscale. I the followig, we itroduce a ew represetatio syste to geerate secure, reliable, ad high capacity barcodes that are easier for cell phoes to decode. We call this represetatio syste the Multiple Base Nuber Syste (MNBS). MBNS fuses several uber represetatio systes icludig the double base uber syste, which has recetly bee itroduced to offer ore sparse ad efficiet eas of represetig data. MBNS ca be applied to barcode sybols with a variety of widths, colors, ad vertical arrays to represet ore iforatio. The rest of this paper is orgaized as follows: Sectio II itroduces soe ecessary backgroud iforatio. A cocept of geeratig fused uber represetatio syste is provided i Sectio III. I Sectio IV, the fused uber represetatio syste is used to costruct ore efficiet ad error-resistat barcode systes. Sectio V offers cocludig rearks ad suggestios for future work. 2. BACKGROUND: NUMBER REPRESENTATIONS Below we review soe uber represetatios, ost otably Fiboacci ad Lucas ubers ad their geeralizatios. We also itroduce ew Fiboacci ad Lucas p-uber based paraetric represetatio uber systes, which are later ipleeted i developig color barcodes. Fiboacci ad Lucas Sequeces: Fiboacci ad Lucas (F-L) sequeces iclude weighted F-L ubers, F-L p- ubers, -diesioal (Meta) F-L ubers, ad rado F-L ubers. I this article, we focus o sequeces that are geerated usig the first two classes of ubers. Fiboacci ad Lucas (F-L) Nubers 7 : Fiboacci (f ) ad Lucas (l ) ubers ca be preseted recursively as f f + f, l = l l, 2 (1) k = k 1 k 2 k k 1 + k where f 0 =0, f 1 =1, l 0 =2, l 1 =1, l 2 =3, k 2.Subsequet ters of F-L ubers are thus defied as the su of their two predecessors. Note that a Lucas uber l k ca be also expressed i ters of the Fiboacci ubers as: l = 2 f + f ; l = f + f ; f = ( l + l )/5, k k k 1 k k 1 k+ 1 k k 1 k+ 1 (2) Weighted Fiboacci ad Lucas (F-L) P-Nubers 7 : Nubers that are give weight based o their coefficiets ad are defied by the followig recurrece: 0 if 0, (p) F = 1 if 0< p + 1, (3) (p) (p) af -1 + bf-p-1 if >p+1 p+ 1 if = 0, (p) L = 1 if 0 < p, (4) (p) (p) al -1 + bl-p-1 if >p where a ad b are soe costats ad p is a o-egative iteger. I the followig, we cosider the case i which a = b = 1. Note that F-Lucas p-uber represetatios iclude a ifiite uber of various represetatios. For SPIE-IS&T/ Vol

3 values p=0 ad p=1, for istace, the F-L p-represetatios respectively reduce to the well-kow biary ad F-L systes previously discussed. As p, the F-L p-represetatios becoe the uitary code i which X = Other uber systes ca be geerated by varyig the value of p. The iitial sequeces for the X. first five p-values are give i the table below. Table of Fiboacci ad Lucas P-Nubers P Fiboacci p-ubers Lucas p-ubers 0 0,1,2,4,8,16,32,64,128,512,1024 1,1,2,4,8,16,32, 64,128,256,512,1024, ,1,1,2,3,5,8,13,21,34,55,89,143 2,1,3,4,7,11,18,29,47,76, 123, 199, ,1,1,1,2,3,4,6,9,13,19,28,41,60 3,1,1,4,5,6,10,15,21,31,46, 67, ,1,1,1,1,2,3,4,5,7,10,14,19,26,36,50,69,95.. 4,1,1,1,5,6,7,8,13,19,26, 34, ,1,1,1,1,1,2,3,4,5,6,8,11,15,20,26,34,45,60,80 5,1,1,1,1,6,7,8,9,10,16,23, 31 Paraetric Represetatios: Cosider the followig expasio of a iteger X X= arku (, ) + a Rk ( 1, u) + a Rk ( 2, u) ar(2, u) + ar(1, u) + a, a Z (5) k k 1 k where Rku (, ) is a paraetric base sequece of the uber syste. The table below gives soe saple represetatio systes we ca geerate fro (5). Table of Paraetric Represetatios Case R(k,u) Represetatio Siged Biary a 2 + a 2 + a a 2 + a 2 + a, a { 1,0,1} (6) 2 k 8 k k 1 k k k 1 k Siged Terary 3 k 9 k k 1 k bk 3 + bk 13 + bk b23 + b13 + b0, b { 1,0,1} or {0,1, 2} (7) Siged Geeral r k 10 k k 1 k ckr + ck 1r + ck 2r c2r + c1r + c0, c {0, ± 1, ± 2,..., ± ( r 1)} (8) P-Fiboacci Double Base F (p) 7 (p) (p) (p) (p) (p) k bk k k-1 k-1 b2f 2 b1f 1 b F + b F , {0,1}, F is a Fiboacci p-uber X (9) p k q u 11 k u k 1 u 1 k 2 u 2 d k, up q + d k 1, u 1p q + d k 2, u 2 p q d 0,0, d, {0,1}, (10) ( geeralized ) k < u, 0 d < k; ( specifically) k = 2, u = 3, Prie P k 12 ep k k + ek-1p k ep ep1, e {0,1}, P is a prie uber X (11) May such systes are sparse but redudat. We are iterested the coditios that lead to these systes uique represetatios ad iial expasios. For istace, it has bee show that the represetatio R(k,u) = q k, where q is a iteger 2 is uique ad iial if two cosecutive digits cc 1 = 0 for all k 8, or the coefficiets c, 0,1,2,..., k = satisfy the followig two coditios 13 : c + c + 1 < r, for all c < c + 1, if c c + 1 < 0 Case 1 ca also be exteded to fidig a uique Fiboacci represetatio (Zeckedorf s Theore). Such a represetatio for a iteger X exists if: X=F k -1, k=1,2,3,4 Both Fiboacci ad q k represetatios have bee applied i the optial desig of arithetical hardware 8, codig theory 6, ad cryptography 11,14. k k, SPIE-IS&T/ Vol

4 3. FUSED NUMBER REPRESENTATION SYSTEMS I this sectio we itroduce the Multiple Base Nuber Syste (MBNS), a collectio or fusio of differet uber systes. MBNS allows us to represet a iteger X with various systes{ S (p) (q) (l), Τ,...,Z k} i the for X = s S Τ *...* Z, p, q, l = 0,1,2,... (12) i,,.., k (p) (q) (l) i, k where * is a arbitrarily chose fusio operatio (i.e., additio, ultiplicatio, liear cobiatio, etc.) ad si, is either real or iagiary. Soe oteworthy s i values iclude s i, {0,1}, s i, {-1,0,1}, s i, {0,1,} where = 1. (p) (q) (1) Also to be oted is that S, Τ,..., Z k ca be both real ad coplex uber systes. Chagig the paraeter values i these systes provides greater represetatio possibilities. The ap below sus up the basic idea behid this ew uber syste. I the followig, we focus o a subset of MBNS, aely the two base represetatio syste which allows us to fuse two uber systes together. The ideas below, however, ca be exteded i fusig ultiple other uber systes. (p) (q) Two Base Represetatio Syste: A subset of MBNS i which two uber systes, S,Τ, are fused ito a sigle paraetric represetatio of the for: X = e S Τ, p, q = 0,1, 2... (13) i, (p) (q) i, e {0,1}, or e { 1,0,1}, e D = {0,..., q }, q = 1,2,... e {0,1,, + 1} = 1 etc. i, i, i, i, where, {0,1,2,3 } ad p ad q are paraeters. Exaples of (13), i which we let * be the ultiplicatio operatio, are provided below to illustrate the for s versatility. S = 2, T = 1, e {0,1}, gives the radix-2 represetatio (see 6); p q i, S = 3, T = 1, e {0,1,2}, gives the radix-3 represetatio (see 7); p q i, S 2 T, ei, {0,1} p q T ei, = =, gives the radix -4 represetatio; S = 2 or 3, = 1, { 1,0,1}, gives the siged digit uber syste (see 6,7); S p 2, q 3 T, ei, {0,1} S p p or p, q F L T 1, ei, {0,1}, = =, gives the double-base represetatio (see 10); = = gives the F-L p-represetatio(see 9); S = F or L, T = q, e { 1,0,1}, gives a so called siged-digit F-L p- represetatio. p p p q i, SPIE-IS&T/ Vol

5 S = F or L, T = F or L, e {0,1}, gives a ew, so called double F-L base p- represetatio. p p p q q q i, These exaples ephasize the ultiplicatio represetatio systes of Fiboacci ad Lucas ubers ad their variatios (i.e., o-weighted/ weighted F-L p-ubers), though they ca be expaded to iclude Golde Ratio ubers ad other systes. We ote that it is also possible to fuse these represetatios usig additio: X = e {as + bτ + d}, p, q= 0,1,..., k 1, (14) i, (p) (q) i, where a,b ad d are costats. This liear cobiatio of systes ay lead to iterestig represetatios such as X = ek{a kfk + bkl k} where a kad b kare costats: i.e., a k=, b k= or (15) k Defiitio: A uber represetatio of a iteger X is called a caoical or oral for if it is a stadard way of presetig X. For exaple, the double base represetatio is a caoical for whe d = e is i.15 Below we preset a approach for deteriig the ear caoical for of a certai two base represetatio. Two Base Represetatios ad the Greedy Algorith: Oe way to fid a certai two base represetatio of a iteger is to use the Greedy approach 11, which deteries the best approxiatio of, coputes the differece, ad reapplies the process. The geeral forula that describes this two base represetatio is 1 l = siaa i B i = 1 b, (16) where s i is a set of predefied coefficiets. Note this forula allows for the itroductio of otrivial coefficiets i b ai ai b b ai ultiple base expasios. To illustrate the forula, let = Settig A = 3 or F, B = 2 or F, we ca express as a su of double base ters or Fiboacci products usig the Greedy Algorith. Double Base Expasio: = = = Fiboacci Expasio: = = = = Note that we call ay syste of expressig a iteger with ixed Fiboacci ubers i the for Double Fiboacci Base Nuber Represetatio Syste (referred to as FBNS or Fiboacci for short)., d F F, The Greedy Algorith does ot always produce a caoic represetatio. For exaple, cosider the iteger X=49 expressed i DFNS. The represetatio produced by the Greedy Algorith is X=21*2+6*1+1*1. However, the caoic represetatio (oly oe such for exists for the iteger 49) is X=13*3+5*2. Deteriig the caoical for of such a two base represetatio is ofte difficult, especially for very large itegers. The Greedy Algorith is thus used as a straightforward eas of producig a ear-to-caoic for. Itegers represeted usig the Greedy Algorith ca have varyig represetatio efficiecies based o the chose two base represetatio syste. That is, the iial uber of ozero digits eeded to represet each iteger chages with respect to the chose represetatio syste of the for (16). I the followig, we copare two represetatio systes geerated fro (16), aely the double base ad the Fiboacci expasios, to see which syste is ore efficiet i represetig itegers. We begi our copariso betwee the double base ad Fiboacci expasios by aalyzig the possible direct products or ters geerated by each syste. the SPIE-IS&T/ Vol

6 These tables provide all double base ad Fiboacci products less tha 10,000. Note that ters <100, >100 ad <1000, >1000 ad <10,000 are represeted with gree, yellow, ad orage cells, respectively. Fro the data tables, we ca see that the Fiboacci ad double base expasios are both very sparse. Still, the Fiboacci syste sees to represet ay ubers with fewer ters. We ca attribute this to the fact that the Fiboacci syste icreases at a slower pace (though still quite quickly) tha the double base syste. As a result, ore itegers are represeted as direct products of Fiboacci ubers tha of biary ad terary ubers. For exaple, we ca see that there are 101 differet Fiboacci products less tha 10,000 (26 below 100, 32 below 1000 ad above 100, ad 43 below 10,000 ad above 1000). I copariso, there are oly 67 double base products less tha 10,000 (20 below 100, 20 below 1000 ad above 100, ad 27 below 10,000 ad above 1000). A iterestig observatio here is that as we allow the uber liit to icrease (say fro below 1000 to below 10000), the uber of Fiboacci products icreases ore tha the uber of double base products (double base: 20 27, Fiboacci: 32 43). Copariso of Double Base ad Fiboacci Products Less tha 10,000 Ters Below Double Base Fiboacci Ters I Coo , I other words, the differece i the uber of Fiboacci ad double base products icreases as we allow our uber rage to icrease (fro 12=32-20 to 16=43-27). Geerally, give its larger represetatio of ubers, which becoes ore proiet as we allow our uber rage to icrease, the Fiboacci product sequece is ore efficiet i represetig ubers while aitaiig a high degree of sparseess. We test this idea o various itegers. The first table below provides ear caoical Fiboacci ad double base expasios of itegers 100 calculated usig the Greedy Algorith. I early half of the itegers cosidered oe ethod of expasio fares better tha the other. That is, oe syste uses fewer ters to represet the respective iteger. I 30 cases (represeted by gree cells), the Fiboacci syste is ore efficiet i represetig the give iteger. I cotrast, the double base syste is ore efficiet i oly 19 cases (represeted by red cells). For the reaiig cases (represeted by o-shaded cells), both represetatio systes use the sae uber of ters to express the give iteger. We ca cotiue testig this idea. SPIE-IS&T/ Vol

7 Fro the table secod table below, we see that the Fiboacci syste is ore efficiet 37 ties (represeted by gree cells) while the double base is ore efficiet oly 21 ties (represeted by red cells). This data further affirs the idea that Fiboacci systes are ore ofte tha ot ore efficiet i represetig give itegers. That is, the Fiboacci systes represet ay ore ubers with fewer ters tha double base systes. As the uber of Fiboacci products icreases ore tha the uber of double base products, we expect the Fiboacci syste to geerally becoe eve ore efficiet as our give iteger value icreases (of course, there are exceptios to this expectatio: cosider, for istace, the above exaple X= discussed above).. SPIE-IS&T/ Vol

8 4. APPLICATIONS We will ow apply MBNS represetatios such as FBNS to costruct ore efficiet ad error resistat barcode systes. We cosider 2D barcodes as they expad traditioal 1D barcode iforatio capacities by addig the vertical array of bars ad spaces. By exaiatio of obile phoe caeras ad the oral use cases, the iiu requireets of the 2D codes for caera phoes are idetified 4. They are a) Matrix codes are preferred to Stacked codes. b) Code size should grow proportioally to the data ad have o sudde ups. c) Code should be easily detected ad read regardless of its size ad data aout. d) Code should have read flexibility so that it ca be read uder ay agle. 2D code should also be efficiet ad widely supported. For istace, although 2D barcodes ca be of ay shape, ost are ade up of squares ad rectagles due to pixel efficiecy. Moreover, 2D barcodes are ofte ot foud i color ad grayscale as black ad white barcodes are ore widely supported ad allow for faxig ad photocopyig without losig readability. Takig these criteria ito accout, we propose represetig the iput data with MBNS represetatios such as DBNS ad FBNS. The procedures for doig so are outlied i the flow chart below: Note that for ehaced security, both algoriths ay also use ecryptio techiques. As MBNS represetatios are sparse, they are efficiet i represetig give data ad ca lead to high perforace barcodes. I geeral, these systes are also well equipped for error correctio. I the followig, we test our algoriths agaist the traditioal base 2 represetatio used i QR code 3. Though our algoriths are explaied through a ueric exaple, they ca be exteded to differet types (ueric, alphabetic, alpha-ueric, etc.) ad laguages of iforatio. Algorith 1 (Illustrative Exaple): Usig the Double Base Nuber Syste to Represet Iput Data Separate the data ito oe bit groups. 2. Choose a represetatio syste: DBNS or FBNS. 3. Deterie each groups DBNS represetatio, for istace by usig the Greedy Algorith. 4. Fill i MNBS tables for each group represetatio ad alig the adacetly to oe aother. Though we ca select fro various represetatio sybols ad colors, we here costruct our barcode fro black ad white squares for pixel efficiecy. We also add a boarder to our barcode by a outliig row ad colu. This way we ca easily preserve the table forat that we used i our geeratio. DBNS Table ad Barcode SPIE-IS&T/ Vol

9 FBNS Table ad Barcode* *Note that because of repetitio, we ca costruct odified FBNS tables without losig represetatio possibilities. I this case, we ca igore the last two rows (or colus). We ca also represet the uber 9 as 8*1+ 1*1 istead of as 3*3, ad get rid of oe additioal colu (or row). The FBNS barcode above is geerated usig this idea. Algorith 2: We ow provide several versios of Algorith 2 ad apply the to codig the data Note that due to redudacy i systes such as FBNS, we are ofte ot liited to shadig i a particular cell ad have the possibility of choosig a cell we fid ore coducive to easy readig (i.e., a cell that is ot adacet to ay other filled cells). Coordiate Code Coordiate Code Nuber of Code Coordiate Code Nuber of Code Coordiates Coordiates Coordiate Code Versio A Versio B Versio C Versio D As the charts above illustrate, we ca vary ay of eleets of our algoriths icludig the uber of eleets i a group, the represetatio syste, the code for represetig coordiates, the atrix holdig the code represetatio, ad the barcode shape, color, ad boarder. We ca also vary the uber of represetatio systes to costruct higher diesioal barcodes. For istace, we ca us three base represetatios (istead of the two base used here) to costruct 3-D barcodes. Error Correctio ad Code Versios: The code versios are geerated usig Hadaard atrices 16, which ca be used to defie soe error correctio codes. Note that code versios ay also be geerated to use other error SPIE-IS&T/ Vol

10 correctio codes such as Reed-Soloo code. Though Versio A ay be the ost copact, it ay ot be used for all MBNS systes ad does ot provide the error correctio capabilities of the others. Hadaard code ca be used to correct 4 1 errors ad detect 4 errors i a -bit ecoded block. The table below illustrates soe of the various levels of error correctio usig versios of Algorith 2. Though code that ca reach a data correctio level of 15% is regarded as satisfactory 17, we ca reach a level of up to 25% Levels of Error Correctio Usig Algorith 2 # Bits/ Coordiate Error Detectio Capability Error Correctio Capability Versio Bits % Bits % A B,C,D E F Copariso to QR Code: We ow test our ethod agaist that used i QR Code. I order to ake this copariso, a brief overview of how QR code is geerated is provided below. Iput data i QR Code ca be represeted i several odes, as illustrated i the table below. Each ode has a correspodig four-bit-log biary represetatio as well as a separate bit cout for a group of iput characters. For istace, the biary represetatio ad reserved bit cout for ode ueric is 0001 ad 10, respectively; for alphaueric ode, 0010 ad 9, respectively. The biary represetatio correspodig to the iput data is placed at the begiig of the ecoded QR code. For istace, if we were to ecode the zip code 78249, we would begi the code with the bits 0001 ad reserve 10 bits for every group of ueric characters i the iput data. Below we fiish ecodig the zip code i order to specifically illustrate how QR ecodig works i ueric ode. I order to represet i ueric ode, we group the iput data with characters or bits of 3 or less. The data is separated ito oe 3 bit ad oe 2 bit group: 782 ad 49. Each full 3 bit group is reserved a 10 bit biary represetatio. However, if the group cotais fewer characters, say 2 or 1 bits, the a 7 or 4 bit biary represetatio is used respectively. Ecodig 782 ad 49 i 10 bit ad 7 bit biary represetatios, respectively, we get: Addig o the biary represetatio correspodig to the QR ueric ode gives: To fiish ecodig the exaples, we take the represetatio arrage it ito 8 bit groups. 0 s are added to groups at the ed of these represetatios that have less tha 8 characters: This is doe to fit the size of the QR code, which varies accordig to which versio is used. QR code has versios fro 1 to 40, where versio 1 (used here) is a 21x21 atrix ad each followig versio icreases i legth ad width by 4 cells so that versio 40 is a 177x177 atrix. It should be oted that QR code is utilized up to versio 10 for caera phoes as a greater desity exceeds the capabilities of a caera as a iager ad thus caot be successfully decoded (Kato, Ta). This fial code ca be apped to a barcode to for: QRcode has four levels of error correctio: L, M, Q, ad H. About 7%, 15%, 25%, ad 30% or less of errors ca be corrected with each respective level. It is ipleeted usig Reed- Soloo Code, which requires twice the aout of codewords to be corrected. I the preseted exaple, the total codewords that eed to be corrected are 24, requirig 48 additioal error correctig codewords. I copariso, Algorith 1 ad 2 use 50 ad 20 codewords, respectively, to ecode the sae data without error correctio. At this stage, both algoriths offer exceptioally easy reads ad security features. Error correctio features ca be added. For istace, we ca achieve a siilar error correctio level usig Versio E i Algorith 2 with oly 70 codewords. Note that the custo desig capability of both algoriths, icludig variatios i shape, size, color, ad codig represetatio, allows the sybol to provide additioal security. A ore SPIE-IS&T/ Vol

11 geeral copariso of how well QR code, Algorith 1, ad Algorith 2 satisfy the criteria that optiize 2D barcodes for obile phoes 17 is provided below. Copariso of QR Code, Algorith 1, ad Algorith 2 Data Capacity Error Correctio Scaability Desig Security Additioal Features Oi- Directioal Low (VGA) Resolutio High Speed Divisible Scalable Custo QR Code Sall pritout size Al Easy to read, especially at a distace. Legible uder varyig lightig coditios. Al Sall pritout size. Provides additioal error correctio ad ecryptio capabilities 5. CONCLUSION I this paper, we itroduced a cocept of fusig paraetric uber represetatio systes. We deteried that these systes provide sparse, efficiet, ad potetially secure eas of represetig data. Usig the features of these fused systes, we created two algoriths that geerate high data capacity barcodes. These barcodes are easy to read, scalable i size, potetially divisible, ad oi-directioal. Because the aout ad type of iforatio withi the sybol is user selectable, the user ca deterie the desity of the barcode ad thus solve resolutio proble of caera phoes. Moreover, by havig the optio of selectig various represetatio systes, the user is offered a secure eas of represetig data. Oe ca use the algoriths custo desig capabilities, i which sybol characteristics such as shape, size, ad color ca be varied, to provide additioal security ad carry ore iforatio. The geerated barcodes also provide high percetage error correctio ad detectio capabilities usig the Hadaard or other error correctio codes. By copariso, we foud that ay popular 2D barcodes, aely QR code, do ot exhibit all these features. Fially, the proposed algoriths provide a viable alterative to curret 2D barcodes ad show a ew directio i developig secure, reliable, ad high capacity color ad gray level barcodes. REFERENCES [1] Youssef, S.M. ad Sale, R.M., Autoated barcode recogitio for sart idetificatio ad ispectio autoatio, Expert systes with applicatios: A iteratioal oural 33(4), (2007). [2] Meg, J. ad Yag, Y., Applicatio of Mobile 2D Barcode i Chia, 4 th Iteratioal Coferece o Wireless Couicatios, Networkig ad Mobile Coputig, 1-4 (2008) [3] Ohbuchi, E. ad Haaizui, H. ad Hock, L., Barcode Readers usig the Caera Device i Mobile Phoes, Proceedigs of the 2004 Itl. Cof. o Cyberworlds, (2004) [4] Wag, H. ad Zou, Y., Caera Readable 2D Bar Codes Desig ad Decodig for Mobile Phoes, ICIP, (2006) [5] Rohs, M., Real-World Iteractio with Caera- Phoes, 2 d Iteratioal Syposiu o Ubiquitous Coputig Systes, (2004) SPIE-IS&T/ Vol

12 [6] Nigzhog, L. ad Ha, S., Desig ad Aalysis of the Three-Diesioal Bar Code, Iteratioal Coferece o Coputer Sciece ad Software Egieerig 3, (2008) [7] Stakhov, A. P., [Matheatics of Haroy: Fro Euclid to Coteporary Matheatics ad Coputer Sciece], World Scietific, (2008) [8] Reitwieser, G., Biary arithetic, Advaces i coputers 1, (1960) [9] Joye, M. ad Ye, S.M., Optial left-to-right biary siged digit recodig, IEEE Tras. o Coputers 49(7), (2000) [10] Parhai, B., Geeralized Siged-Digit Nuber Systes: A Uifyig Fraework for Redudat Nuber Represetatios, IEEE Trasactios o Coputers 39(1), (1990) [11] Diitrov, V.S. ad Jullie, G. A., A New Nuber Represetatio with Applicatios, IEEE Circuits ad Systes Magazie 3(2), 6-23 (2003) [12] Zazkis, R. ad Capbell, S., Prie decopositio: Uderstadig uiqueess, Joural of Math Behavior 15(2), (1996) [13] Clark, W. E. ad Liag, J., O arithetic weight for a geeral radix represetatio of itegers, IEEE Tras. Ifor. Theory 19, (1973) [14] Morai, F. ad Olivos, J., Speedig up the coputatios o a elliptic curve usig additio-subtractio chais, Theoretical Iforatics ad Applicatios 24, (1990) [15] Heuberger, C., Miial Expasios i Redudat Nuber Systes: Fiboacci Bases ad Greedy Algoriths, Periodica Matheatica Hugarica 49(2), (2004) [16] Horada, K.J., [Hadaard atrices ad their applicatios], Priceto Uiversity Press, (2007) [17] Kato, H. ad Ta, K.T., 2D barcodes for Mobile Phoes, Proceedigs of 2 d Iteratioal Coferece o Mobile Techology, Applicatios ad. Systes, 1-8(2005) SPIE-IS&T/ Vol

Solution 2 Discussion:

Solution 2 Discussion: Mobile Couicatios Solutio 2 Discussio: 4..2007 Solutio 2.: Multiplexig For ultiplexig, SDMA, TDMA, FDMA, ad CDMA were preseted i the lecture. a.) What liits the uber of siultaeous users i a TDM/FDM syste

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

NOISE IN A SPECTRUM ANALYZER. Carlo F.M. Carobbi and Fabio Ferrini Department of Information Engineering University of Florence, Italy

NOISE IN A SPECTRUM ANALYZER. Carlo F.M. Carobbi and Fabio Ferrini Department of Information Engineering University of Florence, Italy NOISE IN A SPECTRUM ANALYZER by Carlo.M. Carobbi ad abio errii Departet of Iforatio Egieerig Uiversity of lorece, Italy 1. OBJECTIVE The objective is to easure the oise figure of a spectru aalyzer with

More information

Lab 2: Common Source Amplifier.

Lab 2: Common Source Amplifier. epartet of Electrical ad Coputer Egieerig Fall 1 Lab : Coo Source plifier. 1. OBJECTIVES Study ad characterize Coo Source aplifier: Bias CS ap usig MOSFET curret irror; Measure gai of CS ap with resistive

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in Orthogonal Frequency Division Multiplexing (OFDM)

Minimum Normalized Transmit Rate Based Fair Scheduling Algorithm in Orthogonal Frequency Division Multiplexing (OFDM) Iteratioal Joural of Electroic Egieerig Research ISSN 097-640 Volue 1 Nuber 4 (009) pp. 337 344 Research Idia Publicatios http://www.ripublicatio.co/ijeer.ht Miiu Noralized Trasit Rate Based Fair Schedulig

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

DECISION MAKING ON LOAD CONNECCTION FROM DIFFERENT SUBSTATIONS OF SPECIFIC CAPACITY ON THE BASIS OF MINIMUM TRANSMISSION LOSS

DECISION MAKING ON LOAD CONNECCTION FROM DIFFERENT SUBSTATIONS OF SPECIFIC CAPACITY ON THE BASIS OF MINIMUM TRANSMISSION LOSS Proceedigs of the Iteratioal Coferece o Mechaical Egieerig 27 (ICME27) 29- Deceber 27, Dhaka, Bagladesh ICME7-AM- DECISION MAKING ON LOAD CONNECCTION FROM DIFFENT SUBSTATIONS OF SPECIFIC ON THE BASIS OF

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Dynamic Data-bit Memory Built-In Self- Repair

Dynamic Data-bit Memory Built-In Self- Repair Dyaic Data-bit Meory Built-I Self- Repair M. Nicolaidis, N. Achouri, S. Boutobza iroc Techologies 38025 Greoble, Frace Abstract: I oder SoCs, ebedded eories occupy the largest part of the chip area ad

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Quasi Cyclic Low Density Parity Check Code for High SNR Data Transfer

Quasi Cyclic Low Density Parity Check Code for High SNR Data Transfer 56 M.R. SAM, J.S.KM, QC-DC CODE FOR G SNR DAA RANSFER Quasi Cyclic ow Desity arity Check Code for igh SNR Data rasfer Mohaad Rakibul SAM, Jisag KM Dept. of Electrical ad Electroic Egieerig, slaic Uiv.

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2 Lossless image compressio Usig Hashig (usig collisio resolutio) Amritpal Sigh 1 ad Racha rajpoot 2 1 M.Tech.* CSE Departmet, 2 Departmet of iformatio techology Guru Kashi UiversityTalwadi Sabo, Bathida

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Coded Modulation for Gaussian Channels: Dispersion- and Entropy-Limited Regimes

Coded Modulation for Gaussian Channels: Dispersion- and Entropy-Limited Regimes Coded Modulatio for Gaussia Chaels: Dispersio- ad Etropy-Liited Regies Ebrahi MolaviaJazi Departet of Electrical Egieerig Pesylvaia State Uiversity Uiversity Park, PA 6 Eail: eu@psu.edu J. Nicholas Laea

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN Iteratioal Joural of Scietific & Egieerig Research, Volue 4, Issue 7, July-2013 1971 A of Cell to Switch Assiget i Mobile Couicatio Networks Usig Algorith Ail Goyal, Shiv Krisha Joshi,Surbhi Gupta Abstract--This

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

H(X,Y) = H(X) + H(Y X)

H(X,Y) = H(X) + H(Y X) Today s Topics Iformatio Theory Mohamed Hamada oftware gieerig ab The Uiversity of Aizu mail: hamada@u-aizu.ac.jp UR: http://www.u-aizu.ac.jp/~hamada tropy review tropy ad Data Compressio Uiquely decodable

More information

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING H. Chadsey U.S. Naval Observatory Washigto, D.C. 2392 Abstract May sources of error are possible whe GPS is used for time comparisos. Some of these mo

More information

Diversity Performance of Precoded OFDM with MMSE Equalization

Diversity Performance of Precoded OFDM with MMSE Equalization Uiversity of Wollogog Research Olie Faculty of Iforatics - Papers (Archive) Faculty of Egieerig ad Iforatio Scieces 7 Diversity Perforace of Precoded OFDM with MMSE Equalizatio Xiaojig Huag Uiversity of

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013 Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

Novel Steganography System using Lucas Sequence

Novel Steganography System using Lucas Sequence Novel Stegaography System usig ucas Sequece Fahd Alharbi Faculty of Egieerig Kig Abdulaziz Uiversity Rabigh, KSA Abstract Stegaography is the process of embeddig data ito a media form such as image, voice,

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS G.C. Cardarilli, M. Re, A. Salsao Uiversity of Rome Tor Vergata Departmet of Electroic Egieerig Via del Politecico 1 / 00133 / Rome / ITAL {marco.re,

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Topology Error Identification for the NEPTUNE Power System using an Artificial Neural Network

Topology Error Identification for the NEPTUNE Power System using an Artificial Neural Network Topology Error Idetificatio for the NEPTUNE Power Syste usig a Artificial Neural Network Kevi Scheider, Studet Meber, IEEE, Che-Chig Liu, Fellow, IEEE Abstract The goal of the North Easter Pacific Tie-Series

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

CS3203 #5. 6/9/04 Janak J Parekh

CS3203 #5. 6/9/04 Janak J Parekh CS3203 #5 6/9/04 Jaak J Parekh Admiistrivia Exam o Moday All slides should be up We ll try ad have solutios for HWs #1 ad #2 out by Friday I kow the HW is due o the same day; ot much I ca do, uless you

More information

Mod. Notations. Primary definition. Specific values. Traditional name. Traditional notation. Mathematica StandardForm notation. Specialized values

Mod. Notations. Primary definition. Specific values. Traditional name. Traditional notation. Mathematica StandardForm notation. Specialized values Mod Notatios Traditioal ae Cogruece fuctio Traditioal otatio od Matheatica StadardFor otatio Mod, Priary defiitio 04.06.0.0001.01 od od is the reaider o divisio of by. The sig of od for real, is always

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND

CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND CFAR DETECTION IN MIMO RADARS USING FUZZY FUSION RULES IN HOMOGENEOUS BACKGROUND Faycal Khaldi 1 ad Faouzi Soltai 2 1,2 Départemet d électroique, Uiversité des Frères Metouri Costatie Costatie 25, Algeria

More information

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n Sectio 6 7A Samplig Distributio of the Sample Meas To Create a Samplig Distributio of the Sample Meas take every possible sample of size from the distributio of x values ad the fid the mea of each sample

More information

Voice Command Recognition System Based on MFCC and VQ Algorithms

Voice Command Recognition System Based on MFCC and VQ Algorithms Voice Commad Recogitio System Based o MFCC ad VQ Algorithms Mahdi Shaeh, ad Azizollah Taheri Abstract The goal of this project is to desig a system to recogitio voice commads. Most of voice recogitio systems

More information

Controller Area Network (CAN) Schedulability Analysis for Messages with Arbitrary Deadlines in FIFO and Work-Conserving Queues

Controller Area Network (CAN) Schedulability Analysis for Messages with Arbitrary Deadlines in FIFO and Work-Conserving Queues Cotroller Area Networ CAN) Schedulability Aalysis for Messages with Arbitrary Deadlies i FIFO ad Wor-Coservig Queues Robert Davis 1 ad Nicolas Navet 2 1 Real-Tie Systes Research Group, Uiversity of Yor,

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

Design of Toll Plaza Based on Genetic Algorithm

Design of Toll Plaza Based on Genetic Algorithm d Iteratioal Coerece o Mechatroics Egieerig ad Ioratio Techology (ICMEIT 017) Desig o Toll Plaza Based o Geetic Algorith Jia Feg a, Wei Xiag b,* College o Electric ad Ioratio Egieerig, Southwest Uiversity

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters?

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters? COMBINATORICS EXERCISES Stepha Wager 1. How may possible ways are there to form five-letter words usig oly the letters A H? How may such words cosist of five distict letters? 2. How may differet umber

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

Hadi Alasti. Department of Electrical Engineering, University of North Carolina at Charlotte

Hadi Alasti. Department of Electrical Engineering, University of North Carolina at Charlotte Hadi Alasti Departet of Electrical Egieerig, Uiversity of North Carolia at Charlotte halasti@ucc.edu ABSTRACT A iterferece tolerat OFDMA schee is proposed for ultiuser wireless couicatios with specific

More information

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes Ru-Time Error Detectio i Polyomial Basis Multiplicatio Usig Liear Codes Siavash Bayat-Saramdi ad M.A. Hasa Departmet of Electrical ad Computer Egieerig, Uiversity of Waterloo Waterloo, Otario, Caada N2L

More information

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ.

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ. ELECTRONICS 00 September, Sozopol, BLGARIA MEASREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQENCY RANGE 0,0-0KHZ. Plame Agelov Agelov Faculty for Computer Sciece, Egieerig ad Natural Studies,

More information

Design of Area and Speed Efficient Modulo 2 n -1 Multiplier for Cryptographic Applications

Design of Area and Speed Efficient Modulo 2 n -1 Multiplier for Cryptographic Applications Iteratioal Joural of Sciece, Egieerig ad Techology Research (IJSETR) Desig of Area ad Speed Efficiet Modulo 2-1 Multiplier for Cryptographic Applicatios Abstract The ecryptio ad decryptio of PKC algorithms

More information

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ Reducig Power Dissipatio i Complex Digital Filters by usig the Quadratic Residue Number System Λ Agelo D Amora, Alberto Naarelli, Marco Re ad Gia Carlo Cardarilli Departmet of Electrical Egieerig Uiversity

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

Illumination Compensation for 2-D Barcode Recognition Basing Morphologic

Illumination Compensation for 2-D Barcode Recognition Basing Morphologic Research Joural of Applied Scieces, Egieerig ad Techology 5(12): 3273-3280, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scietific Orgaizatio, 2013 Submitted: March, 09, 2012 Accepted: August 15, 2012

More information

GENERALIZED FORM OF A 4X4 STRONGLY MAGIC SQUARE

GENERALIZED FORM OF A 4X4 STRONGLY MAGIC SQUARE IJMMS, Vol. 1, No. Geeralized 1, (Jauary-Jue Form 016):87-9 of A 4x4 Strogly Magic Square Serials Publicatios 87 ISSN: 0973-339 GENERALIZED FORM OF A 4X4 STRONGLY MAGIC SQUARE Neeradha. C. K, ad Dr. V.

More information

A study on traffic accident measures in municipal roads by using GIS

A study on traffic accident measures in municipal roads by using GIS icccbe 010 Nottigham Uiversity Press Proceedigs of the Iteratioal Coferece o Computig i Civil ad Buildig Egieerig W Tizai (Editor) A study o traffic accidet measures i muicipal roads by usig GIS Satoshi

More information

Measurement of Equivalent Input Distortion AN 20

Measurement of Equivalent Input Distortion AN 20 Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

ELEC 204 Digital Systems Design

ELEC 204 Digital Systems Design Fall 2013, Koç Uiversity ELEC 204 Digital Systems Desig Egi Erzi College of Egieerig Koç Uiversity,Istabul,Turkey eerzi@ku.edu.tr KU College of Egieerig Elec 204: Digital Systems Desig 1 Today: Datapaths

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

Wavelet Transform. CSEP 590 Data Compression Autumn Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)

Wavelet Transform. CSEP 590 Data Compression Autumn Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual) Wavelet Trasform CSEP 59 Data Compressio Autum 7 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter low pass filter

More information

The Institute of Chartered Accountants of Sri Lanka

The Institute of Chartered Accountants of Sri Lanka The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display

More information

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor

More information

Survey of Low Power Techniques for ROMs

Survey of Low Power Techniques for ROMs Survey of Low Power Techiques for ROMs Edwi de Agel Crystal Semicoductor Corporatio P.O Box 17847 Austi, TX 78744 Earl E. Swartzlader, Jr. Departmet of Electrical ad Computer Egieerig Uiversity of Texas

More information

Compression Programs. Compression Outline. Multimedia. Lossless vs. Lossy. Encoding/Decoding. Analysis of Algorithms

Compression Programs. Compression Outline. Multimedia. Lossless vs. Lossy. Encoding/Decoding. Analysis of Algorithms Aalysis of Algorithms Compressio Programs File Compressio: Gzip, Bzip Archivers :Arc, Pkzip, Wirar, File Systems: NTFS Piyush Kumar (Lecture 5: Compressio) Welcome to 453 Source: Guy E. Blelloch, Emad,

More information

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes Performace Limits ad Practical Decodig of Iterleaved Reed-Solomo Polar Cocateated Codes Hessam Mahdavifar, Mostafa El-Khamy, Jugwo Lee, Iyup Kag 1 arxiv:1308.1144v1 [cs.it] 6 Aug 2013 Abstract A scheme

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

Localized Image Segmentation and Enhancement for Meteorite Images

Localized Image Segmentation and Enhancement for Meteorite Images Localized Image Segmetatio ad Ehacemet for Meteorite Images Yufag Bao, PhD Math ad Computer Sciece Departmet Fayetteville State Uiversity, Fayetteville, NC 28301 ybao@ucfsu.edu ABSTRACT This paper proposed

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

COS 126 Atomic Theory of Matter

COS 126 Atomic Theory of Matter COS 126 Atomic Theory of Matter 1 Goal of the Assigmet Video Calculate Avogadro s umber Usig Eistei s equatios Usig fluorescet imagig Iput data Output Frames Blobs/Beads Estimate of Avogadro s umber 7.1833

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS

HOW TO AVOID THE N-1 ATTACK WITHOUT COSTLY IMPLEMENTATIONS Iteratioal Joural of Networ Security & Its Applicatios IJNSA, Vol., No., July HOW TO AVOID THE N- ATTACK WITHOUT COSTY IPEENTATIONS Davi Tioco Varela Coputatioal Sciece Grauate Progra, Faculta e Estuios

More information

An Information Theoretic Analysis for Adaptive-Network- Coded-Cooperation (ANCC) in Wireless Relay Networks

An Information Theoretic Analysis for Adaptive-Network- Coded-Cooperation (ANCC) in Wireless Relay Networks ISIT 6, Seattle, US, July 9-4, 6 Iforatio Theoretic alysis for daptive-network- oded-ooperatio N i Wireless Relay Networks Xigkai ao ad Jig Li Tiffay Departet of lectrical ad oputer gieerig, Lehigh Uiversity,

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

202 Chapter 9 n Go Bot. Hint

202 Chapter 9 n Go Bot. Hint Chapter 9 Go Bot Now it s time to put everythig you have leared so far i this book to good use. I this chapter you will lear how to create your first robotic project, the Go Bot, a four-wheeled robot.

More information

POWERS OF 3RD ORDER MAGIC SQUARES

POWERS OF 3RD ORDER MAGIC SQUARES Fuzzy Sets, Rough Sets ad Multivalued Operatios ad Applicatios, Vol. 4, No. 1, (Jauary-Jue 01): 37 43 Iteratioal Sciece Press POWERS OF 3RD ORDER MAGIC SQUARES Sreerajii K.S. 1 ad V. Madhukar Mallayya

More information

Susceptible Workload driven Selective Fault Tolerance using a Probabilistic Fault Model

Susceptible Workload driven Selective Fault Tolerance using a Probabilistic Fault Model Susceptible Workload drive Selective Fault Tolerace usig a Probabilistic Fault Model Mauricio D. Gutierrez, Vasileios Teetes, To J. Kazierski Electroics ad Coputer Sciece, Uiversity of Southapto, Southapto,

More information

IV054 IV054 IV054 IV054 LITERATURE INTRODUCTION HISTORY OF CRYPTOGRAPHY

IV054 IV054 IV054 IV054 LITERATURE INTRODUCTION HISTORY OF CRYPTOGRAPHY IV5 CODING, CRYPTOGRAPHY ad CRYPTOGRAPHIC PROTOCOLS CONTENTS Prof. Josef Gruska DrSc.. Liear codes 3. Cyclic codes. Classical (secret-key) cryptosystems 5. Public-key cryptography 6. RSA cryptosystem.

More information

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values A Compariso o FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values Mark Hamilto, William Marae, Araud Tisserad To cite this versio: Mark Hamilto, William

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Throughput Capacity of Hybrid Radio-Frequency and Free-Space-Optical (RF/FSO) Multi-Hop Networks

Throughput Capacity of Hybrid Radio-Frequency and Free-Space-Optical (RF/FSO) Multi-Hop Networks Throughput Capacity of Hybrid Radio-Frequecy ad Free-Space-Optical (RF/FSO) Multi-Hop Networks Di Wag ad Alhussei A. Abouzeid Departet of Electrical, Coputer ad Systes Egieerig Resselaer Polytechic Istitute

More information

Pulse-echo Ultrasonic NDE of Adhesive Bonds in Automotive Assembly

Pulse-echo Ultrasonic NDE of Adhesive Bonds in Automotive Assembly ECNDT 6 - Poster 7 Pulse-echo Ultrasoic NDE of Adhesive Bods i Automotive Assembly Roma Gr. MAEV, Sergey TITOV, Uiversity of Widsor, Widsor, Caada Abstract. Recetly, adhesive bodig techology has begu to

More information