Prediction Capabilities of Vulnerability Discovery Models
|
|
- Millicent Robertson
- 6 years ago
- Views:
Transcription
1 Predictio Capabilities of Vulerability Discovery Models Omar H. Alhazmi, Colorado State Uiversity Yashwat K. Malaiya, Ph. D., Colorado State Uiversity Key Words: Security holes, Operatig Systems, Vulerability, Itrusios, Quatitative models. SUMMARY & CONCLUSIONS Quatitative approaches for software security are eeded for effective testig, maiteace ad risk assessmet of software systems. Vulerabilities that are preset i a operatig system after its release represet a great risk. Vulerability Discovery Models (VDMs) have bee proposed to model vulerability discovery ad have has bee fitted to vulerability data agaist caledar time. The models have bee show to fit very well. I this paper, we ivestigate the predictio capabilities that these models offer by evaluatig accuracy of predictios made with partial data. We examie both the recetly proposed logistic model ad a ew liear model. I additio to VDMs, we cosider static approaches to estimatig some of the major attributes of the vulerability discovery process, presetig a static approach to estimatig the iitial values of oe of the VDM s parameters. We also suggest the use of costraits for parameter estimatio durig curve-fittig. Here we develop computatioal approaches for early applicatios of the models ad examie the predictive capability of the models. We use data from Widows 98, Widows 000 ad Red Hat Liux 7.1. We examie the impact of usig a specific costrait whe the parameters of the logistic model are estimated Plots for the predictio error are give. The results demostrate that the predictio error is sigificatly less whe a costrait based o past observatios is added. It is observed that the liear model may yield acceptable projectios for systems for which vulerability discovery has ot yet reached saturatio. The results also suggest that it may be possible to improve the predictio capability by combiig static ad dyamic approaches, or by combig differet models. 1. INTRODUCTION Security vulerabilities i operatig systems, servers ad other software have emerged as a major threat to systems with iteret coectivity. A Software Vulerability is defied as a defect which eables a attacker to bypass security measures (Ref. 1) or as a weakess i the security system that might be exploited to cause loss or harm (Ref ). A umber of vulerabilities are discovered after a operatig system or server is released. The umber of udiscovered vulerabilities ad their discovery rates are amog the major factors that cotribute to the risk. Vulerabilities are a subset of software defects. For geeral software defects, several quatitative methods that use static metrics or software reliability growth models (SRGMS) are available. Because vulerabilities are defects, we ca expect to be able to develop some aalogous methods for vulerabilities. Recetly there have bee attempts to develop models for describig the discovery of vulerabilities termed vulerability discovery models (VDMs) (Refs. 3-6). Such models ca be applied to assess the security risks associated with a system. Software developers ca itegrate such models i the developmet process to allocate testig ad patch developmet resources i a cost effective maer. Oe way to evaluate the applicability of a model would be to see how well it fits the available data (Ref. 7). However a maager may ofte be iterested i makig projectios whe oly part of the data is available. I the software reliability egieerig field, several researchers have ivestigated the predictive capability of a umber of reliability growth models (Refs. 8, 9). Geerally, the two of the measures of iterest ofte are average magitude of error, ad the average bias which measures the tedecy of the model to overestimate or uderestimate the umber of vulerabilities (Ref. 9). We will examie the predictio capability of vulerability discovery models usig a similar two-compoet predictability measure. The capabilities of the VDMs will be examied by usig actual data from major software systems ad plottig the error i estimated values. This will allow us to compare differet schemes, idetify procedures that are likely to keep the error small, ad assess the accuracy of projectios. The available data for several major operatig systems suggest that vulerability discovery teds to maifest differet tred durig differet phases. We cosider the questio of how we ca obtai prelimiary estimates of the parameters of the models i the early phases i presece of such shifts. This requires iterpretatio of the model parameters. The models proposed by Alhazmi ad Malaiya demostrate very good fit with actual data (Ref. 4). The authors used chi-square (χ ) goodess of fit tests o several data sets ad showed the fit to be sigificat. They also showed that some of the major attributes such as the umber of vulerabilities ad vulerability desity fall withi a rage for differet systems whe ormalized (Ref. 7). However, a good fit does ot ecessarily imply good predictive capability. Because treds chage, a model that fits well i the early stage may o loger fit whe additioal data is obtaied. Here we evaluate two models usig partial data to examie the predictable capabilities of the models. We will the examie
2 the accuracy of the projectio by matchig the estimatio usig later data. The model parameters are related to the critical poits ad other observable attributes of the discovery process. We will discuss the sigificace of these attributes. No-liear regressio ofte requires iitial estimates of model parameter to esure that the fit is globally optimal. With limited iitial data, the parameter values may be ustable. A uderstadig of the model parameters will assist i iterpretig the values computed. Some comparable work has bee doe with Software Reliability Growth Models (SRGMs) i (Ref. 10), i which the authors have iterpreted some of the parameters of the SRGMs. I the ext sectio we discuss the two models examied. We ext itroduce the measures used for evaluatio ad the approaches used. Fially, we preset ad discuss the results obtaied.. VULNERABILITY DISCOVERY MODELS We cosider two models: Alhazmi-Malaiya Logistic model (AML) ad Liear Vulerability Discovery model (LVD). The secod model may be cosidered to be a simple approximatio. Alhazmi-Malaiya Logistic model (AML): This model was proposed by Alhazmi ad Malaiya i (Ref. 4); AML has show good fit o a rage of operatig systems vulerability data reported i (Refs. 11,1). Below, Figure 1 below shows a example of the fitted model, together with actual data for cumulative umber of vulerabilities Ω for Widows 95. As this figure shows, the vulerability discovery rate dω/dt icreases at the begiig, reaches a steady rate ad the starts to declie. The cumulative umber of vulerabilities thus shows a icreasig rate at the begiig as the system starts attractig a icreasig share of the istalled base. After some time, a steady rate of vulerability fidig yields a liear curve. Evetually, as the vulerability discovery rate starts droppig, there is saturatio due both to reduced attetio ad a smaller pool of remaiig vulerabilities. The model presumes that the rate of chage of the cumulative umber of vulerabilities dω/dt is govered by two factors, as give i Equatio 1 below. The first factor (AΩ) icreases with the time eeded to take ito accout the risig share of the istalled base. The secod factor (B-Ω) declies as the umber of remaiig udetected vulerabilities declies. While it is possible to obtai a more complex model, this model provides a good fit to the data (Ref. 4). Let us assume that the vulerability discovery rate is give by the differetial equatio:- dω AΩ( B Ω) dt (1) where Ω is the cumulative umber of vulerabilities, t is the caledar time, ad iitially t0. A ad B are empirical costats determied from the recorded data. Cumulative Vulerabilities Ju-96 Dec-96 Widows 95 Actual data The Model Ju-97 Dec-97 Ju-98 Dec-98 Ju-99 Dec-99 Ju-00 Dec-00 Ju-01 Dec-01 Ju-0 Dec-0 Ju-03 Dec-03 Figure 1 Alhazmi-Malaiya Logistic (AML) model fitted to Widows 95 vulerability data set. By solvig the differetial equatio we obtai B Ω ( t ) () ABt BCe + 1 where C is the itegratio costat itroduced while solvig Equatio 1. It is thus a three-parameter model give by the logistic fuctio. I Equatio, as t approaches ifiity, Ω approaches B. Thus, the parameter B represets the total umber of accumulated vulerabilities that will evetually be foud. It should be oted that the saturatio phase may ot be see i a OS which has ot bee preset for a sufficietly log time. Also, if the iitial adaptatio is quick due to better prior publicity, i some cases the early learig phase (whe the slope rises gradually) may ot be sigificat. This may cause the available data to appear largely liear, ad the secod model cosidered later may apply. A o-liear regressio may require a iitial estimate of the parameter values. A iitial estimate of B may be obtaied by otig the size of the software ad usig the typical vulerability desity values of similar software. The curve beds at two trasitio poits. To idetify the trasitio poits we take the derivatives of Equatio with respect to time t. 3 ABt d Ω AB Ce (3) ABt dt ( BCe + 1) From Equatio 3, the highest vulerability discovery rate occurs at the midpoit of Figure at time
3 T m The secod derivative is: 1 l BC AB 5 ( ABt) d Ω A C B e ABt dt ( BCe + 1) 3 4 ABt A B Ce ABt ( BCe + 1) The secod derivative exhibits a maximum ad a miimum. Thus two trasitio poits i Figure are obtaied by equatig the third derivative to zero. The trasitio poits occur at times t equal to Cumulative Vulerabilities 3 l BC T 1 AB Trasitio poit 1 ad Alhazmi-Malaiya Logistic Model T Caledar Time + 3 l BC. AB Mid poit Trasitio poit Figure AML model with the trasitio poits ad mid poit show We ca demostrate that the maximum slope is give by AB /4, which occurs at Ω B/. It ca be show that the two trasitio poits are.63/ab time period apart. Therefore, the duratio of the liear phase decreases as AB grows ad icreases as AB drops. If we regard B, the total umber of vulerabilities to be costat, we coclude that the parameter A cotrols the duratio of the liear phase. A estimate of the duratio betwee the two trasitio poits ca be obtaied from the data from prior software systems. We will use this mathematical result later to costrai the rage of the regressio parameters values. Parameter C impacts the locatio of the first trasitio poit. As we ca observe from Equatio, the ifluece of parameter C weakes as t icreases. Liear Vulerability Discovery model (LVD): Here we propose a ew liear model for compariso. Available data for some systems (Refs. 4, 7) demostrates the early learig (4) phase is sometimes egligible. This may be due to the similarity betwee the ew release ad its prior versio which results i a shorter learig phase for the testers to become familiar with the ew release. Furthermore, it has bee observed that at the saturatio phase, the vulerabilities discovered i the ext versio iclude vulerabilities shared with the modeled versio. This ca prolog the liear tred eve though a icreasig market share is take by the ewer versio. The liear model (LVD) is a approximatio of the AML model ad is expected to perform well o software systems that are relatively ew. We wat to determie whether a liear model ca be a reasoable approximatio i some cases. The liear model is give by a liear equatio, Ω ( t ) p + qt (5) where q is the slope ad p is a costat factor. The liear model may fit the cases i which much of the data is liear (for example i Figure 3) ad largely falls withi the two trasitio poits show i Figure. It ca thus be see as a approximatio of the AML model. There are other proposed VDMs that eed to be examied similarly i future (Ref. 6). Cumulative Number of Vulerabilities Widows NT Time (Moths) Vulerabulities LVD AML Figure 3 (AML) ad (LVD) models fitted to Widows NT 4.0 vulerability data set. 3. PREDICTABILITY MEASURES We evaluate predictability by examiig the accuracy of predictio usig early partial data. We apply the model uder cosideratio for umber of times (t 1, t, t 3,, t ) with equal caledar time iterval periods betwee estimatios. For each t i, the partial data at t i is fitted to the model at the best fit usig regressio aalysis to determie the best values for the parameters. The parameters are used to plot the complete predictio curve to obtai the estimated umber of vulerabilities (Ω i ). These estimated umbers of vulerabilities (Ω 1, Ω, Ω 3,, Ω ) are compared with the actual umber of vulerabilities (Ω) to determie the ormalized estimatio error (Ω i -Ω)/Ω. We the take the
4 average of the ormalized error magitude values to obtai the measure average error (AE). Average bias (AB) is similarly obtaied whe the sig of the error is also cosidered (Ref. 9). The average error (AE) ad average bias (AB) are defied as: 1 Ωi Ω AE (6) i 1 Ω 1 Ωi Ω AB (7) i 1 Ω where Ω is the actual umber of vulerabilities while Ω i is the umber of vulerabilities predicted at time t i. A alterative approach is to evaluate the ext step predictio is that the data up to t i is used to estimate the value at t i+1 (Refs. 13, 14). However, i cases where models are eeded to make loger term projectios, predictive capabilities for a variable period are also eeded, ad AE ad AB are more appropriate measures. Next, the estimatio approaches will be previewed ad the predictive capabilities of these approaches will be evaluated. 4. PREDICTING THE NUMBER OF VULNERABILITIES We examie three approaches for estimatig the umber of vulerabilities. These approaches are the static approach which uses the program size as the static metric. The dyamic approach uses the vulerability discovery models (VDMs). The third approach combies the dyamic capabilities with the static estimatio to filter out the extreme estimatios. The Static Approach: This approach requires the kowledge of the vulerability desity of comparable software systems. Vulerability desity (Ref. 7) is defied as the umber of vulerabilities per thousad lies of code. The kowledge of vulerability desity of at least oe previous software system is a requiremet of the static approach. Such previous software systems should preferably have bee developed i a comparable maer-i.e., developed by a similar team i the same orgaizatio. The assumig that the vulerability desity is close to the older system, we will have a error rage that ca be predetermied for addressig factors such as better developmet practices, more thorough testig before release, fractio of code that is access-related, etc. The Dyamic Approaches: We have used two differet implemetatios of the AML model i additio to the LVD model. 1) Ucostraied AML: This approach does ot place ay prior costraits o the parameters; rather the AML model give by Equatio is directly applied. The three parameters are estimated usig iterative computatio utilizig a least squares fit. ) AML costraied (AML-C): We chose to apply the costrait that the duratio betwee the two trasitio poits is obliged to be withi a certai limit. The duratio has bee show to be.63/ab for the AML model. Hece, we ca limit.63/ab betwee some miimum ad maximum values. The choice of the miimum ad maximum values determied by the values form the previous software systems. This costrait assumes that the trasitio poits are withi the time-frame of the expected lifetime of the software, thus eforcig the S- shape ad aticipatig the two trasitio poits. 3) Liear (LVD): The liear LVD model give by Equatio 5. The parameters values are determied simply by liear regressio aalysis. The Combied Dyamic/Static Approach: The Dyamic vulerability discovery estimatio approaches (AML), (AML- C) ad (LVD) are applied to estimate the total umber of vulerabilities. However, we ca also use the static approach to estimate ceilig ad floor values whe the dyamic model is applied ad some extreme estimatio occurs due to some bumps that appears early i the vulerabilities datasets. That would require the use of vulerability desity data from prior similar systems. I AML ad AML-C the static estimatio was used to obtai the bouds of the parameter B. 5. TESTING THE ACCURACY OF ESTIMATION We have applied the approaches metioed above to estimate the umber of vulerabilities i three systems: Widows 98, Widows 000 ad Liux 7.1. Because the use of static methods ad costraits requires the use of prior data, operatig systems such as Widows 95 ad Widows NT 4.0 caot be used due to lack of data from applicable previous versios. Table 1 illustrates the use of prior data for the three systems. The vulerabilities data is curret up to April 005 (Refs. 7, 1, 13). The static approach will oly be able to give estimate oly for the fial poit as a whole figure but ot estimates for differet poits of time. From Table 1 we ote that the vulerability desities for Widows 98 ad Liux 7.1 do lie withi ±5% of the value of their respective predecessors. However the vulerability desity for Widows 000 is outside of the ±5% of the value of its predecessor Widows NT. This may be due to the fact that Widows 000 cotais a larger fractio of o-access related code compared with NT. The Figures 3-5 show the ormalized error i estimatios at differet times for the three systems. The time scale is
5 give as a percetage of the total time period cosidered. As expected, projectios made usig AML or LVD closer to the ed time exhibit less error. The shaded regio i these figures shows where ceilig ad floor values would be if Ω was estimated usig the static approach assumig the defect desity to be withi ±5% of the predecessor. Table 1 Estimatig the umber of vulerabilities usig the static approach Software Systems Widows 98 Widows 000 RH Liux 7.1 Comparable V D (Wi95) (Wi NT 4.0) (RHL 6.) Code Size Est. Ω With 5±% 45 to 75 Actual Ω to to The plot for AML error for Red Had Liux 7.1 (Figure 5) demostrates that the fitted model first shows uderestimatio util about 45% of the time, followed by overestimatio. At about 65% of the time, the projectio stabilizes ad is reasoably accurate. Use of costraits durig the parameter value search ca cut out such swigs. For Widows 98 (Figure 3) AML geerally uderestimates while AML-C overestimates. For Widows 000, both AML ad AML-C uderestimate. I all cases the error reduces sigificatly as we approach last part of the life time. Error i Estimatio 60% Widows 98 50% 40% 30% 0% 10% 0% -10% 30% 40% 50% 60% 70% 80% 90% 100% -0% -30% -40% -50% -60% Percetage of Elapsed Caledar Time Static Estimatio AML AML-C LVD versios ted to have shorter lifetime tha Widows. The figures show improvemets i the accuracy of estimatios for the AML model. The improvemet is quite sigificat over the earlier estimatios as the impact of extreme projectios is miimized by applyig the two costraits. Table shows the average error (AE) ad the average bias (AB) give by Equatios 6 ad 7 have bee calculated for the three data sets. We ote the sigificat improvemet i both AE ad AB whe the costrait is used i AML. Error i Estimatio 190% 170% 150% 130% 110% 90% 70% 50% 30% 10% -10% -30% -50% -70% 5% 30% 35% 40% 45% Static Estimatio Widows % 55% 60% 65% 70% 75% 80% Percetage of time elapsed caledar time 85% 90% AML AML-C LVD Figure 4 Estimatio error values for Widows 000 Error i Estimatio 100% 80% 60% 40% 0% -40% -60% -80% -100% Static Estimatio Liux Red Hat 7.1 0% -0% 5% 35% 45% 55% 65% 75% 85% 95% Percetage of Elapsed Caledar Time 95% AML AML-C LVD Figure 5 Estimatio error values for Red Hat Liux 7.1 Table The Average Error (AE) ad Average Bias (AB) for the estimatios usig dyamic models 100% Figure 3 Estimatio error values for Widows 98 The first costrait o B assumed a 5% rage (Table 1). This costrait had to be dropped for Widows 000. The secod costrait o Widows 98 ad Widows 000 was chose to be 4 (.63/AB) 48. However, for Red Hat Liux 7.1 the costrait was 18 (.63/AB) 36 sice Liux Approach Software System AML with AML Liear (LVD) costraits AE AB AE AB AE AB Widows % -43.8% 0.1% -0.1% 9.1% 9.1% Widows % -9.8% 16.8% -15.5% 4.6% 4.6% Red Hat Liux % -5.3% 15.4% 6.3% 19.% -4.0%
6 It is iterestig to ote that LVD actually does a good job for Widows 000 ad RH Liux 7.1. This is because a oticeable saturatio i vulerability discovery has ot yet set i for these two systems. From Figures 3-5 we ca see that a combiatio of static ad dyamic approaches ca improve the predictio capability. The estimator has more flexibility i estimatig the umber of vulerabilities i a system. Moreover, the estimator ca have more cofidece i the estimatio results if more tha oe approach is used. REFRENCES 1. E. E. Schultz Jr., D. S. Brow, ad T. A. Logstaff, Respodig to Computer Security Icidets, Lawrece Livermore Natioal Laboratory, ftp://ftp.cert.df.de/pub/docs/csir/ihg.ps.gz, July C. P. Pfleeger, Security i Computig, Pretice-Hall, R. J. Aderso, Security i Opes versus Closed Systems - The Dace of Boltzma, Coase ad Moore, Ope Source Software: Ecoomics, Law ad Policy, Toulouse, Frace, Jue O. H. Alhazmi ad Y. K. Malaiya, Quatitative vulerability assessmet of systems software, Proceedigs of 51 st Aual Reliability ad Maitaiability Symposium, Alexadria,VA, Jauary 005, pp E. Rescola, Is fidig security holes a good idea? Security ad Privacy, IEEE Security ad Privacy, Vol. 03, No. 1, Jauary-February 005 pp O. H. Alhazmi ad Y. K. Malaiya, Quatitative vulerability assessmet of systems software, to appear i Proc. Iteratioal Symposium o Software Reliability Egieerig, Chicago, IL, November O. H. Alhazmi, Y. K. Malaiya, I. J. Ray, Security Vulerabilities i Software Systems: A Quatitative Perspective, to appear i the Proceedigs of the 19th Aual IFIP WG 11.3 Workig Coferece o Data ad Applicatios Security, Storrs, CT, August J. D. Musa, K. Okumoto, A Logarithmic Poisso Executio Time Model for Software Reliability Measuremets, Proceedigs of 7 th Iteratioal Coferece o Software Egieerig, Silver Sprig, MD, March 1984,pp Y. K. Malaiya, N. Karuaithi, ad P. Verma. Predictability of software reliability models, IEEE Trasactios o Reliability, Vol. 41, No. 4, pp , December Y. K. Malaiya ad J. A. Deto. What do software reliability parameters represet? I Proc. Iteratioal Symposium o Software Reliability Egieerig, pages , Albuquerque, NM, November ICAT Metabase, April The MITRE Corporatio, April A. A. Abdel-Ghaly, P.Y. Cha, ad B. Littlewood, Evaluatio of Competig Software Reliability Predictios, IEEE Trasactios o Reliability, Vol. SE-1, No. 9, September 1986, pp S. Brocklehurst, P.Y. Cha, B. Littlewood ad J. Sell, Recalibratig Software Reliability Models, IEEE Trasactios o Software Egieerig, Vol. 16, No. 9, April pp BIOGRAPHIES Omar H. Alhazmi Computer Sciece Departmet Colorado State Uiversity Fort Collis, CO USA. omar@cs.colostate.edu Omar Alhazmi is curretly a Ph.D. studet at Colorado State Uiversity sice Jauary 00. He received his Master's degree i computer sciece from Villaova Uiversity i 001. Yashwat K. Malaiya,Ph.D Computer Sciece Departmet Colorado State Uiversity Fort Collis, CO USA. malaiya@cs.colostate.edu Yashwat K. Malaiya is a Professor i Computer Sciece Departmet at Colorado State Uiversity. He received MS i Physics from Sagar Uiversity, MScTech i Electroics from BITS Pilai ad PhD i Electrical Egieerig from Utah State Uiversity. He has published widely i the areas of fault modelig, software ad hardware reliability, testig ad testable desig sice He has also bee a cosultat to idustry. He was the Geeral Chair of 003 IEEE Iteratioal Symposium o Software Reliability Egieerig. He is a seior member of IEEE.
APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS
APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio
More informationA SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS
A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr
More informationA New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code
Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti
More informationUnit 5: Estimating with Confidence
Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio
More informationRadar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1
Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,
More informationThe Institute of Chartered Accountants of Sri Lanka
The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display
More informationApplication of Improved Genetic Algorithm to Two-side Assembly Line Balancing
206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,
More informationAC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM
AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor
More informationWAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI
WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse
More informationData Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *
Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech
More informationA New Design of Log-Periodic Dipole Array (LPDA) Antenna
Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,
More informationRoberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series
Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series
More informationH2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.
H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios
More informationFingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains
7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig
More informationSurvey of Low Power Techniques for ROMs
Survey of Low Power Techiques for ROMs Edwi de Agel Crystal Semicoductor Corporatio P.O Box 17847 Austi, TX 78744 Earl E. Swartzlader, Jr. Departmet of Electrical ad Computer Egieerig Uiversity of Texas
More informationIdentifying poor performers while the process is running
Idetifyig poor performers while the process is ruig KEYWORDS Michel Ruel P.E. Presidet, TOP Cotrol Ic 4734 Soseeahray Drive 49, Bel-Air St, #103 Hubertus, WI 53033 Levis Qc G6W 6K9 USA Caada mruel@topcotrol.com
More informationCHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER
95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth
More informationPermutation Enumeration
RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for
More informationx y z HD(x, y) + HD(y, z) HD(x, z)
Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios
More informationDelta- Sigma Modulator with Signal Dependant Feedback Gain
Delta- Sigma Modulator with Sigal Depedat Feedback Gai K.Diwakar #1 ad V.Vioth Kumar *2 # Departmet of Electroics ad Commuicatio Egieerig * Departmet of Electroics ad Istrumetatio Egieerig Vel Tech Uiversity,Cheai,
More informationProblem of calculating time delay between pulse arrivals
America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay
More informationDensity Slicing Reference Manual
Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com
More informationMethods to Reduce Arc-Flash Hazards
Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece
More informationThe Firing Dispersion of Bullet Test Sample Analysis
Iteratioal Joural of Materials, Mechaics ad Maufacturig, Vol., No., Ma 5 The Firig Dispersio of Bullet Test Sample Aalsis Youliag Xu, Jubi Zhag, Li Ma, ad Yoghai Sha Udisputed, this approach does reduce
More informationOn Parity based Divide and Conquer Recursive Functions
O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These
More informationLogarithms APPENDIX IV. 265 Appendix
APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult
More informationThe Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method
Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,
More informationA Novel Small Signal Power Line Quality Measurement System
IMTC 3 - Istrumetatio ad Measuremet Techology Coferece Vail, CO, USA, - May 3 A ovel Small Sigal Power Lie Quality Measuremet System Paul B. Crilly, Erik Leadro Boaldi, Levy Ely de Lacarda de Oliveira,
More informationMeasurement of Equivalent Input Distortion AN 20
Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also
More informationSHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK
SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK Giovai Huiske ad Eric va Berkum Dept. of Civil Egieerig - Uiversity of Twete - 7500 AE Eschede - The Netherlads E-mail: g.huiske@ctw.utwete.l ad
More informationA New Method for Traffic Prediction in Emerging Mobile Networks
Joural of Commuicatios Vol., No. 2, December 2 A New Method for Traffic Predictio i Emergig Mobile Networks Yuia Jia, Beili Wa, Liag Liag, Qia Zhao, Yu Zhag, ad Liag Tag2 College of Commuicatio Egieerig,
More informationAnalysis and Optimization Design of Snubber Cricuit for Isolated DC-DC Converters in DC Power Grid
Aalysis ad Optimizatio Desig of Subber Cricuit for Isolated DC-DC Coverters i DC Power Grid Koji Orikawa Nagaoka Uiversity of Techology Nagaoka, Japa orikawa@st.agaokaut.ac.jp Ju-ichi Itoh Nagaoka Uiversity
More informationAkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria
COMPARATIVE ANALYSIS OF ARTIFICIAL NEURAL NETWORK'S BACK PROPAGATION ALGORITHM TO STATISTICAL LEAST SQURE METHOD IN SECURITY PREDICTION USING NIGERIAN STOCK EXCHANGE MARKET AkiwaJe, A.T., IbharaJu, F.T.
More informationAnalysis of SDR GNSS Using MATLAB
Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite
More informationCross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs
Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg
More informationOptimal Arrangement of Buoys Observable by Means of Radar
Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -
More informationHigh-Order CCII-Based Mixed-Mode Universal Filter
High-Order CCII-Based Mixed-Mode Uiversal Filter Che-Nog Lee Departmet of Computer ad Commuicatio Egieerig, Taipei Chegshih Uiversity of Sciece ad Techology, Taipei, Taiwa, R. O. C. Abstract This paper
More informationA New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches
Joural of Power Electroics, ol, o, pp 67-677, July 67 JPE --6 http://dxdoiorg/6/jpe67 I(Prit: 98-9 / I(Olie: 9-78 A ew Basic Uit for Cascaded Multi Iverters with the Capability of Reducig the umber of
More informationCh 9 Sequences, Series, and Probability
Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math
More informationCS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,
CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary
More informationA New Energy Efficient Data Gathering Approach in Wireless Sensor Networks
Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar
More informationCompound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:
More informationA SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION
A SIMPL MOD OF GOAL DIRCD LOSSY SYNSIS AND NWORK OPIMIZAION Karel ájek a), ratislav Michal, Jiří Sedláček a) Uiversity of Defece, Kouicova 65,63 00 Bro,Czech Republic, Bro Uiversity of echology, Kolejí
More informationComparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels
Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965
More informationELEC 350 Electronics I Fall 2014
ELEC 350 Electroics I Fall 04 Fial Exam Geeral Iformatio Rough breakdow of topic coverage: 0-5% JT fudametals ad regios of operatio 0-40% MOSFET fudametals biasig ad small-sigal modelig 0-5% iodes (p-juctio
More informationOutline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture
Aalog Fuctioal Testig i Mixed-Sigal s Jie Qi Dept. of Electrical & Computer Egieerig Aubur Uiversity Co-Advisors: Charles Stroud ad Foster Dai Outlie Motivatio ad Backgroud Built-I Self-Test Architecture
More informationAn Adaptive Image Denoising Method based on Thresholding
A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract
More informationTest Time Minimization for Hybrid BIST with Test Pattern Broadcasting
Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert
More informationlecture notes September 2, Sequential Choice
18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers
More informationSensors & Transducers 2015 by IFSA Publishing, S. L.
Sesors & Trasducers 215 by IFSA Publishig, S. L. http://www.sesorsportal.com Uiversal Sesors ad Trasducers Iterface for Mobile Devices: Metrological Characteristics * Sergey Y. YURISH ad Javier CAÑETE
More informationEstimation of reflection location by the correlation coefficient function
Acoustics 8 Paris Estimatio of reflectio locatio by the correlatio coefficiet fuctio H. Shibayama a, T. Araya b, Y. Maabe b ad E. Oarura b a Shibaura Istitute of Techology, 3-7-5, Toyosu, Koto-u, 35-8548
More informationHigh Speed Area Efficient Modulo 2 1
High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets
More informationCounting on r-fibonacci Numbers
Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd
More information(2) The MOSFET. Review of. Learning Outcome. (Metal-Oxide-Semiconductor Field Effect Transistor) 2.0) Field Effect Transistor (FET)
EEEB73 Electroics Aalysis & esig II () Review of The MOSFET (Metal-Oxide-Semicoductor Field Effect Trasistor) Referece: Neame, Chapter 3 ad Chapter 4 Learig Outcome Able to describe ad use the followig:
More informationarxiv: v2 [math.co] 15 Oct 2018
THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.
More informationA SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION
49 A SIMPL MOD OF GOAL DIRCD LOSSY SYNSIS AND NWORK OPIMIZAION K. ájek a),. Michal b), J. Sedláek b), M. Steibauer b) a) Uiversity of Defece, Kouicova 65,63 00 ro,czech Republic, b) ro Uiversity of echology,
More informationDelta- Sigma Modulator based Discrete Data Multiplier with Digital Output
K.Diwakar et al. / Iteratioal Joural of Egieerig ad echology (IJE Delta- Sigma Mulator based Discrete Data Multiplier with Digital Output K.Diwakar #,.ioth Kumar *2, B.Aitha #3, K.Kalaiarasa #4 # Departmet
More informationEfficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay
Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,
More informationTHE OCCURRENCE OF TRANSIENT FIELDS AND ESD IN TYPICAL SELECTED AREAS
THE OCCURRENCE OF TRANSIENT FIELDS AND ESD IN TYPICAL SELECTED AREAS Stepha FREI Techical Uiversity Berli, Istitute of Electrical Power Egieerig Eisteiufer, 587 Berli, Germay e-mail: frei@ihs.ee.tu-berli.de
More informationLaboratory Exercise 3: Dynamic System Response Laboratory Handout AME 250: Fundamentals of Measurements and Data Analysis
Laboratory Exercise 3: Dyamic System Respose Laboratory Hadout AME 50: Fudametals of Measuremets ad Data Aalysis Prepared by: Matthew Beigto Date exercises to be performed: Deliverables: Part I 1) Usig
More informationWi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider
Wi-Fi or Femtocell: User Choice ad Pricig Strategy of Wireless Service Provider Yajiao Che, Qia Zhag Departmet of Computer Sciece ad Egieerig Hog Kog Uiversity of Sciece ad Techology Email: {cheyajiao,
More informationA study on the efficient compression algorithm of the voice/data integrated multiplexer
A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE
More informationEmpirical Estimation of Probability Distribution of Extreme Responses of Turret Moored FPSOs
Empirical Estimatio of Probability Distributio of Extreme Resposes of Turret Moored FPSOs Amir H. Izadparast Research ad Developmet Group, SOFEC. Housto, Texas, USA Aru S. Duggal Research ad Developmet
More informationProcedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013
Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b
More informationDesign of FPGA- Based SPWM Single Phase Full-Bridge Inverter
Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my
More informationDepartment of Electrical and Computer Engineering, Cornell University. ECE 3150: Microelectronics. Spring Due on April 26, 2018 at 7:00 PM
Departmet of Electrical ad omputer Egieerig, orell Uiersity EE 350: Microelectroics Sprig 08 Homework 0 Due o April 6, 08 at 7:00 PM Suggested Readigs: a) Lecture otes Importat Notes: ) MAKE SURE THAT
More informationDIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS
Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty
More informationIndoor Localization by Pattern Matching Method Based On Extended Database
Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract
More informationSummary of pn-junction (Lec )
Lecture #12 OUTLNE iode aalysis ad applicatios cotiued The MOSFET The MOSFET as a cotrolled resistor Pich-off ad curret saturatio Chael-legth modulatio Velocity saturatio i a short-chael MOSFET Readig
More informationUsing Color Histograms to Recognize People in Real Time Visual Surveillance
Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca
More informationRecovering low frequencies for impedance inversion by frequency domain deconvolution
Recoverig low frequecies for impedace iversio by frequecy domai decovolutio Sia. Esmaeili*, CREWES, Uiversity of Calgary, sesmaeil@ucalgary.ca Gary. Frak. Margrave, CREWES, Uiversity of Calgary, margrave@ucalgary.ca
More informationFinancial Time Series Forecasting Using Hybrid Wavelet-Neural Model
50 The Iteratioal Arab Joural of Iformatio Techology, Vol. 5, No., Jauary 208 Fiacial Time Series Forecastig Usig Hybrid Wavelet-Neural Model Jovaa Božić ad Djordje Babić School of Computig, Uiversity
More informationAN ESTIMATION OF MULTILEVEL INVERTER FED INDUCTION MOTOR DRIVE
9 IJRIC. All rights reserved. IJRIC www.ijric.org E-ISSN: 76-3336 AN ESTIMATION OF MULTILEVEL INVERTER FED INDUCTION MOTOR DRIVE K.RAMANI AND DR.A. KRISHNAN SMIEEE Seior Lecturer i the Departmet of EEE
More informationCombined Scheme for Fast PN Code Acquisition
13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:
More informationMaking sure metrics are meaningful
Makig sure metrics are meaigful Some thigs are quatifiable, but ot very useful CPU performace: MHz is ot the same as performace Cameras: Mega-Pixels is ot the same as quality Cosistet ad quatifiable metrics
More information13 Legislative Bargaining
1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative
More informationSymmetric implicit multiderivative numerical integrators for direct solution of fifth-order differential equations
Tammasat Iteratioal Joural of Sciece ad Tecology Vol.9, No., April-Jue 04 Symmetric implicit multiderivative umerical itegrators for direct solutio of fift-order differetial equatios S. J. Kayode* Departmet
More informationSapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION
IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are
More informationLocalized Image Segmentation and Enhancement for Meteorite Images
Localized Image Segmetatio ad Ehacemet for Meteorite Images Yufag Bao, PhD Math ad Computer Sciece Departmet Fayetteville State Uiversity, Fayetteville, NC 28301 ybao@ucfsu.edu ABSTRACT This paper proposed
More informationReference Command Shaping Using Specified-Negative-Amplitude Input Shapers for Vibration Reduction
15 Ishitobi, M., 2000, A Stability Coditio of Zeros of Sampled Multivariable Systems, IEEE Tras. Autom. Cotrol, AC-452, pp. 295 299. 16 Laub, A. J., ad Arold, W. F., 1984, Cotrollability ad Observability
More informationINCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION
XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor
More informationBroadcasting in Multichannel Cognitive Radio Ad Hoc Networks
2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,
More informationImportance Analysis of Urban Rail Transit Network Station Based on Passenger
Joural of Itelliget Learig Systems ad Applicatios, 201, 5, 22-26 Published Olie November 201 (http://www.scirp.org/joural/jilsa) http://dx.doi.org/10.426/jilsa.201.54027 Importace Aalysis of Urba Rail
More informationAn Optimal Test Pattern Selection Method to Improve the Defect Coverage
A Optimal Test Patter Selectio Method to Improve the Defect Coverage Yuxi Tia, Michael R. Grimaila, Weipig Shi ad M. Ray Mercer Departmet of Electrical Egieerig Texas A&M Uiversity, College Statio, Texas
More informationA Novel Three Value Logic for Computing Purposes
Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a
More informationX-Bar and S-Squared Charts
STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates
More informationTowards Acceleration of Deep Convolutional Neural Networks using Stochastic Computing
Towards Acceleratio of Deep Covolutioal Neural Networks usig Stochastic Computig Ji Li, Ao Re, Zhe Li, Caiwe Dig, Bo Yua 3, Qiru Qiu ad Yazhi Wag Departmet of Electrical Egieerig, Uiversity of Souther
More informationAssessment of Soil Parameter Estimation Errors for Fusion of Multichannel Radar Measurements
Assessmet of Soil Parameter Estimatio Errors for Fusio of Multichael Radar Measuremets A. urei, D. Marshall, D. Radford,. Lever Cardiff Uiversity 5 The Parade, Roath, CF4 0YF, Cardiff, U A.urei@cs.cf.ac.u
More informationComputational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method
Computatioal Algorithm for Higher Order Legre olyomial ad Gaussia Quadrature Method Asif M. Mughal, Xiu Ye ad Kamra Iqbal Dept. of Applied Sciece, Dept. of Mathematics ad Statistics, Dept. of Systems Egieerig
More informationDesign of FPGA Based SPWM Single Phase Inverter
Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi
More informationHybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting
Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,
More informationNonlinear System Identification Based on Reduced Complexity Volterra Models Guodong Jin1,a* and Libin Lu1,b
6th Iteratioal Coferece o Electroics, Mechaics, Culture ad Medicie (EMCM 205) Noliear System Idetificatio Based o Reduced Complexity Volterra Models Guodog Ji,a* ad Libi Lu,b Xi a research istitute of
More informationOptimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks
Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,
More informationSuper J-MOS Low Power Loss Superjunction MOSFETs
Low Power Loss Superjuctio MOSFETs Takahiro Tamura Mutsumi Sawada Takayuki Shimato ABSTRACT Fuji Electric has developed superjuctio MOSFETs with a optimized surface desig that delivers lower switchig.
More informationA PLANE WAVE MONTE CARLO SIMULATION METHOD FOR REVERBERATION CHAMBERS
A PLANE WAVE MONTE CARLO SIMULATION METHOD FOR REVERBERATION CHAMBERS L. Musso *,**,***, V. Berat *, F. Caavero **, B. Demouli *** * Directio de la Recherche Techocetre Reault 1, Av. du Golf 7888 Guyacourt,
More informationRevision: June 10, E Main Suite D Pullman, WA (509) Voice and Fax
1.8.0: Ideal Oeratioal Amlifiers Revisio: Jue 10, 2010 215 E Mai Suite D Pullma, WA 99163 (509) 334 6306 Voice ad Fax Overview Oeratioal amlifiers (commoly abbreviated as o-ams) are extremely useful electroic
More informationDesign and Construction of a Three-phase Digital Energy Meter
Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)
More informationSETTLING-TIME-ORIENTED DESIGN PROCEDURE FOR TWO-STAGE AMPLIFIERS WITH CURRENT-BUFFER MILLER COMPENSATION
SETTING-TIME-ORIENTED DESIGN PROCEDURE FOR TWO-STAGE AMPIFIERS WITH CURRENT-BUFFER MIER COMPENSATION ANDREA PUGIESE, 1 FRANCESCO AMOROSO, 1 GREGORIO CAPPUCCINO, 1 GIUSEPPE COCORUO 1 Key words: Operatioal
More informationCOMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS
COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,
More informationEvaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2
Iteratioal Coferece o Iformatio Techology ad Maagemet Iovatio (ICITMI 15) Evaluatio of turbulet parameters based o agle-of-arrival fluctuatio Yag LI 1,Chao GAO, Yi-Mig LI, Gag YANG & Xiao-Feg LI 1 Accoutig
More information