Prediction Capabilities of Vulnerability Discovery Models

Size: px
Start display at page:

Download "Prediction Capabilities of Vulnerability Discovery Models"

Transcription

1 Predictio Capabilities of Vulerability Discovery Models Omar H. Alhazmi, Colorado State Uiversity Yashwat K. Malaiya, Ph. D., Colorado State Uiversity Key Words: Security holes, Operatig Systems, Vulerability, Itrusios, Quatitative models. SUMMARY & CONCLUSIONS Quatitative approaches for software security are eeded for effective testig, maiteace ad risk assessmet of software systems. Vulerabilities that are preset i a operatig system after its release represet a great risk. Vulerability Discovery Models (VDMs) have bee proposed to model vulerability discovery ad have has bee fitted to vulerability data agaist caledar time. The models have bee show to fit very well. I this paper, we ivestigate the predictio capabilities that these models offer by evaluatig accuracy of predictios made with partial data. We examie both the recetly proposed logistic model ad a ew liear model. I additio to VDMs, we cosider static approaches to estimatig some of the major attributes of the vulerability discovery process, presetig a static approach to estimatig the iitial values of oe of the VDM s parameters. We also suggest the use of costraits for parameter estimatio durig curve-fittig. Here we develop computatioal approaches for early applicatios of the models ad examie the predictive capability of the models. We use data from Widows 98, Widows 000 ad Red Hat Liux 7.1. We examie the impact of usig a specific costrait whe the parameters of the logistic model are estimated Plots for the predictio error are give. The results demostrate that the predictio error is sigificatly less whe a costrait based o past observatios is added. It is observed that the liear model may yield acceptable projectios for systems for which vulerability discovery has ot yet reached saturatio. The results also suggest that it may be possible to improve the predictio capability by combiig static ad dyamic approaches, or by combig differet models. 1. INTRODUCTION Security vulerabilities i operatig systems, servers ad other software have emerged as a major threat to systems with iteret coectivity. A Software Vulerability is defied as a defect which eables a attacker to bypass security measures (Ref. 1) or as a weakess i the security system that might be exploited to cause loss or harm (Ref ). A umber of vulerabilities are discovered after a operatig system or server is released. The umber of udiscovered vulerabilities ad their discovery rates are amog the major factors that cotribute to the risk. Vulerabilities are a subset of software defects. For geeral software defects, several quatitative methods that use static metrics or software reliability growth models (SRGMS) are available. Because vulerabilities are defects, we ca expect to be able to develop some aalogous methods for vulerabilities. Recetly there have bee attempts to develop models for describig the discovery of vulerabilities termed vulerability discovery models (VDMs) (Refs. 3-6). Such models ca be applied to assess the security risks associated with a system. Software developers ca itegrate such models i the developmet process to allocate testig ad patch developmet resources i a cost effective maer. Oe way to evaluate the applicability of a model would be to see how well it fits the available data (Ref. 7). However a maager may ofte be iterested i makig projectios whe oly part of the data is available. I the software reliability egieerig field, several researchers have ivestigated the predictive capability of a umber of reliability growth models (Refs. 8, 9). Geerally, the two of the measures of iterest ofte are average magitude of error, ad the average bias which measures the tedecy of the model to overestimate or uderestimate the umber of vulerabilities (Ref. 9). We will examie the predictio capability of vulerability discovery models usig a similar two-compoet predictability measure. The capabilities of the VDMs will be examied by usig actual data from major software systems ad plottig the error i estimated values. This will allow us to compare differet schemes, idetify procedures that are likely to keep the error small, ad assess the accuracy of projectios. The available data for several major operatig systems suggest that vulerability discovery teds to maifest differet tred durig differet phases. We cosider the questio of how we ca obtai prelimiary estimates of the parameters of the models i the early phases i presece of such shifts. This requires iterpretatio of the model parameters. The models proposed by Alhazmi ad Malaiya demostrate very good fit with actual data (Ref. 4). The authors used chi-square (χ ) goodess of fit tests o several data sets ad showed the fit to be sigificat. They also showed that some of the major attributes such as the umber of vulerabilities ad vulerability desity fall withi a rage for differet systems whe ormalized (Ref. 7). However, a good fit does ot ecessarily imply good predictive capability. Because treds chage, a model that fits well i the early stage may o loger fit whe additioal data is obtaied. Here we evaluate two models usig partial data to examie the predictable capabilities of the models. We will the examie

2 the accuracy of the projectio by matchig the estimatio usig later data. The model parameters are related to the critical poits ad other observable attributes of the discovery process. We will discuss the sigificace of these attributes. No-liear regressio ofte requires iitial estimates of model parameter to esure that the fit is globally optimal. With limited iitial data, the parameter values may be ustable. A uderstadig of the model parameters will assist i iterpretig the values computed. Some comparable work has bee doe with Software Reliability Growth Models (SRGMs) i (Ref. 10), i which the authors have iterpreted some of the parameters of the SRGMs. I the ext sectio we discuss the two models examied. We ext itroduce the measures used for evaluatio ad the approaches used. Fially, we preset ad discuss the results obtaied.. VULNERABILITY DISCOVERY MODELS We cosider two models: Alhazmi-Malaiya Logistic model (AML) ad Liear Vulerability Discovery model (LVD). The secod model may be cosidered to be a simple approximatio. Alhazmi-Malaiya Logistic model (AML): This model was proposed by Alhazmi ad Malaiya i (Ref. 4); AML has show good fit o a rage of operatig systems vulerability data reported i (Refs. 11,1). Below, Figure 1 below shows a example of the fitted model, together with actual data for cumulative umber of vulerabilities Ω for Widows 95. As this figure shows, the vulerability discovery rate dω/dt icreases at the begiig, reaches a steady rate ad the starts to declie. The cumulative umber of vulerabilities thus shows a icreasig rate at the begiig as the system starts attractig a icreasig share of the istalled base. After some time, a steady rate of vulerability fidig yields a liear curve. Evetually, as the vulerability discovery rate starts droppig, there is saturatio due both to reduced attetio ad a smaller pool of remaiig vulerabilities. The model presumes that the rate of chage of the cumulative umber of vulerabilities dω/dt is govered by two factors, as give i Equatio 1 below. The first factor (AΩ) icreases with the time eeded to take ito accout the risig share of the istalled base. The secod factor (B-Ω) declies as the umber of remaiig udetected vulerabilities declies. While it is possible to obtai a more complex model, this model provides a good fit to the data (Ref. 4). Let us assume that the vulerability discovery rate is give by the differetial equatio:- dω AΩ( B Ω) dt (1) where Ω is the cumulative umber of vulerabilities, t is the caledar time, ad iitially t0. A ad B are empirical costats determied from the recorded data. Cumulative Vulerabilities Ju-96 Dec-96 Widows 95 Actual data The Model Ju-97 Dec-97 Ju-98 Dec-98 Ju-99 Dec-99 Ju-00 Dec-00 Ju-01 Dec-01 Ju-0 Dec-0 Ju-03 Dec-03 Figure 1 Alhazmi-Malaiya Logistic (AML) model fitted to Widows 95 vulerability data set. By solvig the differetial equatio we obtai B Ω ( t ) () ABt BCe + 1 where C is the itegratio costat itroduced while solvig Equatio 1. It is thus a three-parameter model give by the logistic fuctio. I Equatio, as t approaches ifiity, Ω approaches B. Thus, the parameter B represets the total umber of accumulated vulerabilities that will evetually be foud. It should be oted that the saturatio phase may ot be see i a OS which has ot bee preset for a sufficietly log time. Also, if the iitial adaptatio is quick due to better prior publicity, i some cases the early learig phase (whe the slope rises gradually) may ot be sigificat. This may cause the available data to appear largely liear, ad the secod model cosidered later may apply. A o-liear regressio may require a iitial estimate of the parameter values. A iitial estimate of B may be obtaied by otig the size of the software ad usig the typical vulerability desity values of similar software. The curve beds at two trasitio poits. To idetify the trasitio poits we take the derivatives of Equatio with respect to time t. 3 ABt d Ω AB Ce (3) ABt dt ( BCe + 1) From Equatio 3, the highest vulerability discovery rate occurs at the midpoit of Figure at time

3 T m The secod derivative is: 1 l BC AB 5 ( ABt) d Ω A C B e ABt dt ( BCe + 1) 3 4 ABt A B Ce ABt ( BCe + 1) The secod derivative exhibits a maximum ad a miimum. Thus two trasitio poits i Figure are obtaied by equatig the third derivative to zero. The trasitio poits occur at times t equal to Cumulative Vulerabilities 3 l BC T 1 AB Trasitio poit 1 ad Alhazmi-Malaiya Logistic Model T Caledar Time + 3 l BC. AB Mid poit Trasitio poit Figure AML model with the trasitio poits ad mid poit show We ca demostrate that the maximum slope is give by AB /4, which occurs at Ω B/. It ca be show that the two trasitio poits are.63/ab time period apart. Therefore, the duratio of the liear phase decreases as AB grows ad icreases as AB drops. If we regard B, the total umber of vulerabilities to be costat, we coclude that the parameter A cotrols the duratio of the liear phase. A estimate of the duratio betwee the two trasitio poits ca be obtaied from the data from prior software systems. We will use this mathematical result later to costrai the rage of the regressio parameters values. Parameter C impacts the locatio of the first trasitio poit. As we ca observe from Equatio, the ifluece of parameter C weakes as t icreases. Liear Vulerability Discovery model (LVD): Here we propose a ew liear model for compariso. Available data for some systems (Refs. 4, 7) demostrates the early learig (4) phase is sometimes egligible. This may be due to the similarity betwee the ew release ad its prior versio which results i a shorter learig phase for the testers to become familiar with the ew release. Furthermore, it has bee observed that at the saturatio phase, the vulerabilities discovered i the ext versio iclude vulerabilities shared with the modeled versio. This ca prolog the liear tred eve though a icreasig market share is take by the ewer versio. The liear model (LVD) is a approximatio of the AML model ad is expected to perform well o software systems that are relatively ew. We wat to determie whether a liear model ca be a reasoable approximatio i some cases. The liear model is give by a liear equatio, Ω ( t ) p + qt (5) where q is the slope ad p is a costat factor. The liear model may fit the cases i which much of the data is liear (for example i Figure 3) ad largely falls withi the two trasitio poits show i Figure. It ca thus be see as a approximatio of the AML model. There are other proposed VDMs that eed to be examied similarly i future (Ref. 6). Cumulative Number of Vulerabilities Widows NT Time (Moths) Vulerabulities LVD AML Figure 3 (AML) ad (LVD) models fitted to Widows NT 4.0 vulerability data set. 3. PREDICTABILITY MEASURES We evaluate predictability by examiig the accuracy of predictio usig early partial data. We apply the model uder cosideratio for umber of times (t 1, t, t 3,, t ) with equal caledar time iterval periods betwee estimatios. For each t i, the partial data at t i is fitted to the model at the best fit usig regressio aalysis to determie the best values for the parameters. The parameters are used to plot the complete predictio curve to obtai the estimated umber of vulerabilities (Ω i ). These estimated umbers of vulerabilities (Ω 1, Ω, Ω 3,, Ω ) are compared with the actual umber of vulerabilities (Ω) to determie the ormalized estimatio error (Ω i -Ω)/Ω. We the take the

4 average of the ormalized error magitude values to obtai the measure average error (AE). Average bias (AB) is similarly obtaied whe the sig of the error is also cosidered (Ref. 9). The average error (AE) ad average bias (AB) are defied as: 1 Ωi Ω AE (6) i 1 Ω 1 Ωi Ω AB (7) i 1 Ω where Ω is the actual umber of vulerabilities while Ω i is the umber of vulerabilities predicted at time t i. A alterative approach is to evaluate the ext step predictio is that the data up to t i is used to estimate the value at t i+1 (Refs. 13, 14). However, i cases where models are eeded to make loger term projectios, predictive capabilities for a variable period are also eeded, ad AE ad AB are more appropriate measures. Next, the estimatio approaches will be previewed ad the predictive capabilities of these approaches will be evaluated. 4. PREDICTING THE NUMBER OF VULNERABILITIES We examie three approaches for estimatig the umber of vulerabilities. These approaches are the static approach which uses the program size as the static metric. The dyamic approach uses the vulerability discovery models (VDMs). The third approach combies the dyamic capabilities with the static estimatio to filter out the extreme estimatios. The Static Approach: This approach requires the kowledge of the vulerability desity of comparable software systems. Vulerability desity (Ref. 7) is defied as the umber of vulerabilities per thousad lies of code. The kowledge of vulerability desity of at least oe previous software system is a requiremet of the static approach. Such previous software systems should preferably have bee developed i a comparable maer-i.e., developed by a similar team i the same orgaizatio. The assumig that the vulerability desity is close to the older system, we will have a error rage that ca be predetermied for addressig factors such as better developmet practices, more thorough testig before release, fractio of code that is access-related, etc. The Dyamic Approaches: We have used two differet implemetatios of the AML model i additio to the LVD model. 1) Ucostraied AML: This approach does ot place ay prior costraits o the parameters; rather the AML model give by Equatio is directly applied. The three parameters are estimated usig iterative computatio utilizig a least squares fit. ) AML costraied (AML-C): We chose to apply the costrait that the duratio betwee the two trasitio poits is obliged to be withi a certai limit. The duratio has bee show to be.63/ab for the AML model. Hece, we ca limit.63/ab betwee some miimum ad maximum values. The choice of the miimum ad maximum values determied by the values form the previous software systems. This costrait assumes that the trasitio poits are withi the time-frame of the expected lifetime of the software, thus eforcig the S- shape ad aticipatig the two trasitio poits. 3) Liear (LVD): The liear LVD model give by Equatio 5. The parameters values are determied simply by liear regressio aalysis. The Combied Dyamic/Static Approach: The Dyamic vulerability discovery estimatio approaches (AML), (AML- C) ad (LVD) are applied to estimate the total umber of vulerabilities. However, we ca also use the static approach to estimate ceilig ad floor values whe the dyamic model is applied ad some extreme estimatio occurs due to some bumps that appears early i the vulerabilities datasets. That would require the use of vulerability desity data from prior similar systems. I AML ad AML-C the static estimatio was used to obtai the bouds of the parameter B. 5. TESTING THE ACCURACY OF ESTIMATION We have applied the approaches metioed above to estimate the umber of vulerabilities i three systems: Widows 98, Widows 000 ad Liux 7.1. Because the use of static methods ad costraits requires the use of prior data, operatig systems such as Widows 95 ad Widows NT 4.0 caot be used due to lack of data from applicable previous versios. Table 1 illustrates the use of prior data for the three systems. The vulerabilities data is curret up to April 005 (Refs. 7, 1, 13). The static approach will oly be able to give estimate oly for the fial poit as a whole figure but ot estimates for differet poits of time. From Table 1 we ote that the vulerability desities for Widows 98 ad Liux 7.1 do lie withi ±5% of the value of their respective predecessors. However the vulerability desity for Widows 000 is outside of the ±5% of the value of its predecessor Widows NT. This may be due to the fact that Widows 000 cotais a larger fractio of o-access related code compared with NT. The Figures 3-5 show the ormalized error i estimatios at differet times for the three systems. The time scale is

5 give as a percetage of the total time period cosidered. As expected, projectios made usig AML or LVD closer to the ed time exhibit less error. The shaded regio i these figures shows where ceilig ad floor values would be if Ω was estimated usig the static approach assumig the defect desity to be withi ±5% of the predecessor. Table 1 Estimatig the umber of vulerabilities usig the static approach Software Systems Widows 98 Widows 000 RH Liux 7.1 Comparable V D (Wi95) (Wi NT 4.0) (RHL 6.) Code Size Est. Ω With 5±% 45 to 75 Actual Ω to to The plot for AML error for Red Had Liux 7.1 (Figure 5) demostrates that the fitted model first shows uderestimatio util about 45% of the time, followed by overestimatio. At about 65% of the time, the projectio stabilizes ad is reasoably accurate. Use of costraits durig the parameter value search ca cut out such swigs. For Widows 98 (Figure 3) AML geerally uderestimates while AML-C overestimates. For Widows 000, both AML ad AML-C uderestimate. I all cases the error reduces sigificatly as we approach last part of the life time. Error i Estimatio 60% Widows 98 50% 40% 30% 0% 10% 0% -10% 30% 40% 50% 60% 70% 80% 90% 100% -0% -30% -40% -50% -60% Percetage of Elapsed Caledar Time Static Estimatio AML AML-C LVD versios ted to have shorter lifetime tha Widows. The figures show improvemets i the accuracy of estimatios for the AML model. The improvemet is quite sigificat over the earlier estimatios as the impact of extreme projectios is miimized by applyig the two costraits. Table shows the average error (AE) ad the average bias (AB) give by Equatios 6 ad 7 have bee calculated for the three data sets. We ote the sigificat improvemet i both AE ad AB whe the costrait is used i AML. Error i Estimatio 190% 170% 150% 130% 110% 90% 70% 50% 30% 10% -10% -30% -50% -70% 5% 30% 35% 40% 45% Static Estimatio Widows % 55% 60% 65% 70% 75% 80% Percetage of time elapsed caledar time 85% 90% AML AML-C LVD Figure 4 Estimatio error values for Widows 000 Error i Estimatio 100% 80% 60% 40% 0% -40% -60% -80% -100% Static Estimatio Liux Red Hat 7.1 0% -0% 5% 35% 45% 55% 65% 75% 85% 95% Percetage of Elapsed Caledar Time 95% AML AML-C LVD Figure 5 Estimatio error values for Red Hat Liux 7.1 Table The Average Error (AE) ad Average Bias (AB) for the estimatios usig dyamic models 100% Figure 3 Estimatio error values for Widows 98 The first costrait o B assumed a 5% rage (Table 1). This costrait had to be dropped for Widows 000. The secod costrait o Widows 98 ad Widows 000 was chose to be 4 (.63/AB) 48. However, for Red Hat Liux 7.1 the costrait was 18 (.63/AB) 36 sice Liux Approach Software System AML with AML Liear (LVD) costraits AE AB AE AB AE AB Widows % -43.8% 0.1% -0.1% 9.1% 9.1% Widows % -9.8% 16.8% -15.5% 4.6% 4.6% Red Hat Liux % -5.3% 15.4% 6.3% 19.% -4.0%

6 It is iterestig to ote that LVD actually does a good job for Widows 000 ad RH Liux 7.1. This is because a oticeable saturatio i vulerability discovery has ot yet set i for these two systems. From Figures 3-5 we ca see that a combiatio of static ad dyamic approaches ca improve the predictio capability. The estimator has more flexibility i estimatig the umber of vulerabilities i a system. Moreover, the estimator ca have more cofidece i the estimatio results if more tha oe approach is used. REFRENCES 1. E. E. Schultz Jr., D. S. Brow, ad T. A. Logstaff, Respodig to Computer Security Icidets, Lawrece Livermore Natioal Laboratory, ftp://ftp.cert.df.de/pub/docs/csir/ihg.ps.gz, July C. P. Pfleeger, Security i Computig, Pretice-Hall, R. J. Aderso, Security i Opes versus Closed Systems - The Dace of Boltzma, Coase ad Moore, Ope Source Software: Ecoomics, Law ad Policy, Toulouse, Frace, Jue O. H. Alhazmi ad Y. K. Malaiya, Quatitative vulerability assessmet of systems software, Proceedigs of 51 st Aual Reliability ad Maitaiability Symposium, Alexadria,VA, Jauary 005, pp E. Rescola, Is fidig security holes a good idea? Security ad Privacy, IEEE Security ad Privacy, Vol. 03, No. 1, Jauary-February 005 pp O. H. Alhazmi ad Y. K. Malaiya, Quatitative vulerability assessmet of systems software, to appear i Proc. Iteratioal Symposium o Software Reliability Egieerig, Chicago, IL, November O. H. Alhazmi, Y. K. Malaiya, I. J. Ray, Security Vulerabilities i Software Systems: A Quatitative Perspective, to appear i the Proceedigs of the 19th Aual IFIP WG 11.3 Workig Coferece o Data ad Applicatios Security, Storrs, CT, August J. D. Musa, K. Okumoto, A Logarithmic Poisso Executio Time Model for Software Reliability Measuremets, Proceedigs of 7 th Iteratioal Coferece o Software Egieerig, Silver Sprig, MD, March 1984,pp Y. K. Malaiya, N. Karuaithi, ad P. Verma. Predictability of software reliability models, IEEE Trasactios o Reliability, Vol. 41, No. 4, pp , December Y. K. Malaiya ad J. A. Deto. What do software reliability parameters represet? I Proc. Iteratioal Symposium o Software Reliability Egieerig, pages , Albuquerque, NM, November ICAT Metabase, April The MITRE Corporatio, April A. A. Abdel-Ghaly, P.Y. Cha, ad B. Littlewood, Evaluatio of Competig Software Reliability Predictios, IEEE Trasactios o Reliability, Vol. SE-1, No. 9, September 1986, pp S. Brocklehurst, P.Y. Cha, B. Littlewood ad J. Sell, Recalibratig Software Reliability Models, IEEE Trasactios o Software Egieerig, Vol. 16, No. 9, April pp BIOGRAPHIES Omar H. Alhazmi Computer Sciece Departmet Colorado State Uiversity Fort Collis, CO USA. omar@cs.colostate.edu Omar Alhazmi is curretly a Ph.D. studet at Colorado State Uiversity sice Jauary 00. He received his Master's degree i computer sciece from Villaova Uiversity i 001. Yashwat K. Malaiya,Ph.D Computer Sciece Departmet Colorado State Uiversity Fort Collis, CO USA. malaiya@cs.colostate.edu Yashwat K. Malaiya is a Professor i Computer Sciece Departmet at Colorado State Uiversity. He received MS i Physics from Sagar Uiversity, MScTech i Electroics from BITS Pilai ad PhD i Electrical Egieerig from Utah State Uiversity. He has published widely i the areas of fault modelig, software ad hardware reliability, testig ad testable desig sice He has also bee a cosultat to idustry. He was the Geeral Chair of 003 IEEE Iteratioal Symposium o Software Reliability Egieerig. He is a seior member of IEEE.

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

The Institute of Chartered Accountants of Sri Lanka

The Institute of Chartered Accountants of Sri Lanka The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Survey of Low Power Techniques for ROMs

Survey of Low Power Techniques for ROMs Survey of Low Power Techiques for ROMs Edwi de Agel Crystal Semicoductor Corporatio P.O Box 17847 Austi, TX 78744 Earl E. Swartzlader, Jr. Departmet of Electrical ad Computer Egieerig Uiversity of Texas

More information

Identifying poor performers while the process is running

Identifying poor performers while the process is running Idetifyig poor performers while the process is ruig KEYWORDS Michel Ruel P.E. Presidet, TOP Cotrol Ic 4734 Soseeahray Drive 49, Bel-Air St, #103 Hubertus, WI 53033 Levis Qc G6W 6K9 USA Caada mruel@topcotrol.com

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Delta- Sigma Modulator with Signal Dependant Feedback Gain

Delta- Sigma Modulator with Signal Dependant Feedback Gain Delta- Sigma Modulator with Sigal Depedat Feedback Gai K.Diwakar #1 ad V.Vioth Kumar *2 # Departmet of Electroics ad Commuicatio Egieerig * Departmet of Electroics ad Istrumetatio Egieerig Vel Tech Uiversity,Cheai,

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

Methods to Reduce Arc-Flash Hazards

Methods to Reduce Arc-Flash Hazards Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece

More information

The Firing Dispersion of Bullet Test Sample Analysis

The Firing Dispersion of Bullet Test Sample Analysis Iteratioal Joural of Materials, Mechaics ad Maufacturig, Vol., No., Ma 5 The Firig Dispersio of Bullet Test Sample Aalsis Youliag Xu, Jubi Zhag, Li Ma, ad Yoghai Sha Udisputed, this approach does reduce

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

A Novel Small Signal Power Line Quality Measurement System

A Novel Small Signal Power Line Quality Measurement System IMTC 3 - Istrumetatio ad Measuremet Techology Coferece Vail, CO, USA, - May 3 A ovel Small Sigal Power Lie Quality Measuremet System Paul B. Crilly, Erik Leadro Boaldi, Levy Ely de Lacarda de Oliveira,

More information

Measurement of Equivalent Input Distortion AN 20

Measurement of Equivalent Input Distortion AN 20 Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also

More information

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK Giovai Huiske ad Eric va Berkum Dept. of Civil Egieerig - Uiversity of Twete - 7500 AE Eschede - The Netherlads E-mail: g.huiske@ctw.utwete.l ad

More information

A New Method for Traffic Prediction in Emerging Mobile Networks

A New Method for Traffic Prediction in Emerging Mobile Networks Joural of Commuicatios Vol., No. 2, December 2 A New Method for Traffic Predictio i Emergig Mobile Networks Yuia Jia, Beili Wa, Liag Liag, Qia Zhao, Yu Zhag, ad Liag Tag2 College of Commuicatio Egieerig,

More information

Analysis and Optimization Design of Snubber Cricuit for Isolated DC-DC Converters in DC Power Grid

Analysis and Optimization Design of Snubber Cricuit for Isolated DC-DC Converters in DC Power Grid Aalysis ad Optimizatio Desig of Subber Cricuit for Isolated DC-DC Coverters i DC Power Grid Koji Orikawa Nagaoka Uiversity of Techology Nagaoka, Japa orikawa@st.agaokaut.ac.jp Ju-ichi Itoh Nagaoka Uiversity

More information

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria COMPARATIVE ANALYSIS OF ARTIFICIAL NEURAL NETWORK'S BACK PROPAGATION ALGORITHM TO STATISTICAL LEAST SQURE METHOD IN SECURITY PREDICTION USING NIGERIAN STOCK EXCHANGE MARKET AkiwaJe, A.T., IbharaJu, F.T.

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

High-Order CCII-Based Mixed-Mode Universal Filter

High-Order CCII-Based Mixed-Mode Universal Filter High-Order CCII-Based Mixed-Mode Uiversal Filter Che-Nog Lee Departmet of Computer ad Commuicatio Egieerig, Taipei Chegshih Uiversity of Sciece ad Techology, Taipei, Taiwa, R. O. C. Abstract This paper

More information

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches Joural of Power Electroics, ol, o, pp 67-677, July 67 JPE --6 http://dxdoiorg/6/jpe67 I(Prit: 98-9 / I(Olie: 9-78 A ew Basic Uit for Cascaded Multi Iverters with the Capability of Reducig the umber of

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION A SIMPL MOD OF GOAL DIRCD LOSSY SYNSIS AND NWORK OPIMIZAION Karel ájek a), ratislav Michal, Jiří Sedláček a) Uiversity of Defece, Kouicova 65,63 00 Bro,Czech Republic, Bro Uiversity of echology, Kolejí

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

ELEC 350 Electronics I Fall 2014

ELEC 350 Electronics I Fall 2014 ELEC 350 Electroics I Fall 04 Fial Exam Geeral Iformatio Rough breakdow of topic coverage: 0-5% JT fudametals ad regios of operatio 0-40% MOSFET fudametals biasig ad small-sigal modelig 0-5% iodes (p-juctio

More information

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture

Outline. Motivation. Analog Functional Testing in Mixed-Signal Systems. Motivation and Background. Built-In Self-Test Architecture Aalog Fuctioal Testig i Mixed-Sigal s Jie Qi Dept. of Electrical & Computer Egieerig Aubur Uiversity Co-Advisors: Charles Stroud ad Foster Dai Outlie Motivatio ad Backgroud Built-I Self-Test Architecture

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Sensors & Transducers 2015 by IFSA Publishing, S. L. Sesors & Trasducers 215 by IFSA Publishig, S. L. http://www.sesorsportal.com Uiversal Sesors ad Trasducers Iterface for Mobile Devices: Metrological Characteristics * Sergey Y. YURISH ad Javier CAÑETE

More information

Estimation of reflection location by the correlation coefficient function

Estimation of reflection location by the correlation coefficient function Acoustics 8 Paris Estimatio of reflectio locatio by the correlatio coefficiet fuctio H. Shibayama a, T. Araya b, Y. Maabe b ad E. Oarura b a Shibaura Istitute of Techology, 3-7-5, Toyosu, Koto-u, 35-8548

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

(2) The MOSFET. Review of. Learning Outcome. (Metal-Oxide-Semiconductor Field Effect Transistor) 2.0) Field Effect Transistor (FET)

(2) The MOSFET. Review of. Learning Outcome. (Metal-Oxide-Semiconductor Field Effect Transistor) 2.0) Field Effect Transistor (FET) EEEB73 Electroics Aalysis & esig II () Review of The MOSFET (Metal-Oxide-Semicoductor Field Effect Trasistor) Referece: Neame, Chapter 3 ad Chapter 4 Learig Outcome Able to describe ad use the followig:

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION

A SIMPLE METHOD OF GOAL DIRECTED LOSSY SYNTHESIS AND NETWORK OPTIMIZATION 49 A SIMPL MOD OF GOAL DIRCD LOSSY SYNSIS AND NWORK OPIMIZAION K. ájek a),. Michal b), J. Sedláek b), M. Steibauer b) a) Uiversity of Defece, Kouicova 65,63 00 ro,czech Republic, b) ro Uiversity of echology,

More information

Delta- Sigma Modulator based Discrete Data Multiplier with Digital Output

Delta- Sigma Modulator based Discrete Data Multiplier with Digital Output K.Diwakar et al. / Iteratioal Joural of Egieerig ad echology (IJE Delta- Sigma Mulator based Discrete Data Multiplier with Digital Output K.Diwakar #,.ioth Kumar *2, B.Aitha #3, K.Kalaiarasa #4 # Departmet

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

THE OCCURRENCE OF TRANSIENT FIELDS AND ESD IN TYPICAL SELECTED AREAS

THE OCCURRENCE OF TRANSIENT FIELDS AND ESD IN TYPICAL SELECTED AREAS THE OCCURRENCE OF TRANSIENT FIELDS AND ESD IN TYPICAL SELECTED AREAS Stepha FREI Techical Uiversity Berli, Istitute of Electrical Power Egieerig Eisteiufer, 587 Berli, Germay e-mail: frei@ihs.ee.tu-berli.de

More information

Laboratory Exercise 3: Dynamic System Response Laboratory Handout AME 250: Fundamentals of Measurements and Data Analysis

Laboratory Exercise 3: Dynamic System Response Laboratory Handout AME 250: Fundamentals of Measurements and Data Analysis Laboratory Exercise 3: Dyamic System Respose Laboratory Hadout AME 50: Fudametals of Measuremets ad Data Aalysis Prepared by: Matthew Beigto Date exercises to be performed: Deliverables: Part I 1) Usig

More information

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider

Wi-Fi or Femtocell: User Choice and Pricing Strategy of Wireless Service Provider Wi-Fi or Femtocell: User Choice ad Pricig Strategy of Wireless Service Provider Yajiao Che, Qia Zhag Departmet of Computer Sciece ad Egieerig Hog Kog Uiversity of Sciece ad Techology Email: {cheyajiao,

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Empirical Estimation of Probability Distribution of Extreme Responses of Turret Moored FPSOs

Empirical Estimation of Probability Distribution of Extreme Responses of Turret Moored FPSOs Empirical Estimatio of Probability Distributio of Extreme Resposes of Turret Moored FPSOs Amir H. Izadparast Research ad Developmet Group, SOFEC. Housto, Texas, USA Aru S. Duggal Research ad Developmet

More information

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013 Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Department of Electrical and Computer Engineering, Cornell University. ECE 3150: Microelectronics. Spring Due on April 26, 2018 at 7:00 PM

Department of Electrical and Computer Engineering, Cornell University. ECE 3150: Microelectronics. Spring Due on April 26, 2018 at 7:00 PM Departmet of Electrical ad omputer Egieerig, orell Uiersity EE 350: Microelectroics Sprig 08 Homework 0 Due o April 6, 08 at 7:00 PM Suggested Readigs: a) Lecture otes Importat Notes: ) MAKE SURE THAT

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

Indoor Localization by Pattern Matching Method Based On Extended Database

Indoor Localization by Pattern Matching Method Based On Extended Database Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract

More information

Summary of pn-junction (Lec )

Summary of pn-junction (Lec ) Lecture #12 OUTLNE iode aalysis ad applicatios cotiued The MOSFET The MOSFET as a cotrolled resistor Pich-off ad curret saturatio Chael-legth modulatio Velocity saturatio i a short-chael MOSFET Readig

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

Recovering low frequencies for impedance inversion by frequency domain deconvolution

Recovering low frequencies for impedance inversion by frequency domain deconvolution Recoverig low frequecies for impedace iversio by frequecy domai decovolutio Sia. Esmaeili*, CREWES, Uiversity of Calgary, sesmaeil@ucalgary.ca Gary. Frak. Margrave, CREWES, Uiversity of Calgary, margrave@ucalgary.ca

More information

Financial Time Series Forecasting Using Hybrid Wavelet-Neural Model

Financial Time Series Forecasting Using Hybrid Wavelet-Neural Model 50 The Iteratioal Arab Joural of Iformatio Techology, Vol. 5, No., Jauary 208 Fiacial Time Series Forecastig Usig Hybrid Wavelet-Neural Model Jovaa Božić ad Djordje Babić School of Computig, Uiversity

More information

AN ESTIMATION OF MULTILEVEL INVERTER FED INDUCTION MOTOR DRIVE

AN ESTIMATION OF MULTILEVEL INVERTER FED INDUCTION MOTOR DRIVE 9 IJRIC. All rights reserved. IJRIC www.ijric.org E-ISSN: 76-3336 AN ESTIMATION OF MULTILEVEL INVERTER FED INDUCTION MOTOR DRIVE K.RAMANI AND DR.A. KRISHNAN SMIEEE Seior Lecturer i the Departmet of EEE

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Making sure metrics are meaningful

Making sure metrics are meaningful Makig sure metrics are meaigful Some thigs are quatifiable, but ot very useful CPU performace: MHz is ot the same as performace Cameras: Mega-Pixels is ot the same as quality Cosistet ad quatifiable metrics

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

Symmetric implicit multiderivative numerical integrators for direct solution of fifth-order differential equations

Symmetric implicit multiderivative numerical integrators for direct solution of fifth-order differential equations Tammasat Iteratioal Joural of Sciece ad Tecology Vol.9, No., April-Jue 04 Symmetric implicit multiderivative umerical itegrators for direct solutio of fift-order differetial equatios S. J. Kayode* Departmet

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Localized Image Segmentation and Enhancement for Meteorite Images

Localized Image Segmentation and Enhancement for Meteorite Images Localized Image Segmetatio ad Ehacemet for Meteorite Images Yufag Bao, PhD Math ad Computer Sciece Departmet Fayetteville State Uiversity, Fayetteville, NC 28301 ybao@ucfsu.edu ABSTRACT This paper proposed

More information

Reference Command Shaping Using Specified-Negative-Amplitude Input Shapers for Vibration Reduction

Reference Command Shaping Using Specified-Negative-Amplitude Input Shapers for Vibration Reduction 15 Ishitobi, M., 2000, A Stability Coditio of Zeros of Sampled Multivariable Systems, IEEE Tras. Autom. Cotrol, AC-452, pp. 295 299. 16 Laub, A. J., ad Arold, W. F., 1984, Cotrollability ad Observability

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

Importance Analysis of Urban Rail Transit Network Station Based on Passenger

Importance Analysis of Urban Rail Transit Network Station Based on Passenger Joural of Itelliget Learig Systems ad Applicatios, 201, 5, 22-26 Published Olie November 201 (http://www.scirp.org/joural/jilsa) http://dx.doi.org/10.426/jilsa.201.54027 Importace Aalysis of Urba Rail

More information

An Optimal Test Pattern Selection Method to Improve the Defect Coverage

An Optimal Test Pattern Selection Method to Improve the Defect Coverage A Optimal Test Patter Selectio Method to Improve the Defect Coverage Yuxi Tia, Michael R. Grimaila, Weipig Shi ad M. Ray Mercer Departmet of Electrical Egieerig Texas A&M Uiversity, College Statio, Texas

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Towards Acceleration of Deep Convolutional Neural Networks using Stochastic Computing

Towards Acceleration of Deep Convolutional Neural Networks using Stochastic Computing Towards Acceleratio of Deep Covolutioal Neural Networks usig Stochastic Computig Ji Li, Ao Re, Zhe Li, Caiwe Dig, Bo Yua 3, Qiru Qiu ad Yazhi Wag Departmet of Electrical Egieerig, Uiversity of Souther

More information

Assessment of Soil Parameter Estimation Errors for Fusion of Multichannel Radar Measurements

Assessment of Soil Parameter Estimation Errors for Fusion of Multichannel Radar Measurements Assessmet of Soil Parameter Estimatio Errors for Fusio of Multichael Radar Measuremets A. urei, D. Marshall, D. Radford,. Lever Cardiff Uiversity 5 The Parade, Roath, CF4 0YF, Cardiff, U A.urei@cs.cf.ac.u

More information

Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method

Computational Algorithm for Higher Order Legendre Polynomial and Gaussian Quadrature Method Computatioal Algorithm for Higher Order Legre olyomial ad Gaussia Quadrature Method Asif M. Mughal, Xiu Ye ad Kamra Iqbal Dept. of Applied Sciece, Dept. of Mathematics ad Statistics, Dept. of Systems Egieerig

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,

More information

Nonlinear System Identification Based on Reduced Complexity Volterra Models Guodong Jin1,a* and Libin Lu1,b

Nonlinear System Identification Based on Reduced Complexity Volterra Models Guodong Jin1,a* and Libin Lu1,b 6th Iteratioal Coferece o Electroics, Mechaics, Culture ad Medicie (EMCM 205) Noliear System Idetificatio Based o Reduced Complexity Volterra Models Guodog Ji,a* ad Libi Lu,b Xi a research istitute of

More information

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,

More information

Super J-MOS Low Power Loss Superjunction MOSFETs

Super J-MOS Low Power Loss Superjunction MOSFETs Low Power Loss Superjuctio MOSFETs Takahiro Tamura Mutsumi Sawada Takayuki Shimato ABSTRACT Fuji Electric has developed superjuctio MOSFETs with a optimized surface desig that delivers lower switchig.

More information

A PLANE WAVE MONTE CARLO SIMULATION METHOD FOR REVERBERATION CHAMBERS

A PLANE WAVE MONTE CARLO SIMULATION METHOD FOR REVERBERATION CHAMBERS A PLANE WAVE MONTE CARLO SIMULATION METHOD FOR REVERBERATION CHAMBERS L. Musso *,**,***, V. Berat *, F. Caavero **, B. Demouli *** * Directio de la Recherche Techocetre Reault 1, Av. du Golf 7888 Guyacourt,

More information

Revision: June 10, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 10, E Main Suite D Pullman, WA (509) Voice and Fax 1.8.0: Ideal Oeratioal Amlifiers Revisio: Jue 10, 2010 215 E Mai Suite D Pullma, WA 99163 (509) 334 6306 Voice ad Fax Overview Oeratioal amlifiers (commoly abbreviated as o-ams) are extremely useful electroic

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

SETTLING-TIME-ORIENTED DESIGN PROCEDURE FOR TWO-STAGE AMPLIFIERS WITH CURRENT-BUFFER MILLER COMPENSATION

SETTLING-TIME-ORIENTED DESIGN PROCEDURE FOR TWO-STAGE AMPLIFIERS WITH CURRENT-BUFFER MILLER COMPENSATION SETTING-TIME-ORIENTED DESIGN PROCEDURE FOR TWO-STAGE AMPIFIERS WITH CURRENT-BUFFER MIER COMPENSATION ANDREA PUGIESE, 1 FRANCESCO AMOROSO, 1 GREGORIO CAPPUCCINO, 1 GIUSEPPE COCORUO 1 Key words: Operatioal

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2

Evaluation of turbulent parameters based on angle-of-arrival fluctuation Yang LI 1,Chao GAO 2, Yi-Ming LI 2, Gang YANG 2 & Xiao-Feng LI 2 Iteratioal Coferece o Iformatio Techology ad Maagemet Iovatio (ICITMI 15) Evaluatio of turbulet parameters based o agle-of-arrival fluctuatio Yag LI 1,Chao GAO, Yi-Mig LI, Gag YANG & Xiao-Feg LI 1 Accoutig

More information