International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

Size: px
Start display at page:

Download "International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia."

Transcription

1 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2, Sam Harar 3 SYSTEL, SUPCOM, Tunsa hamd@unv-tln.fr 2 SYSCOM, ENIT, Tunsa abdelhed manel@yahoo.fr, ammar.bouallegue@ent.rnu.tn 3 SIS, USTV, France harar@unv-tln.fr ABSTRACT We propose a method to recover the structure of a randomly permuted chaned code and how to cryptanalyse cryptographc schemes based on these knds of error codng. As applcaton of these methods s a cryptographc schema usng regular Low Densty Party Check (LDPC) Codes. Ths result prohbts the use of chaned code and partcularly regular LDPC codes on cryptography. KEYWORDS: Cryptography, Chaned Codes, LDPC Codes, Attack, Complexty.. INTRODUCTION RSA and McElece are the oldest publc key cryptosystems. They are based respectvely on ntractablty of factorzaton and syndrome decodng problems []. However, McElece [2] was not qute as successful as RSA, partallydue to ts large publc key and to the belef that could not be used n sgnature. In 2, Courtos, Fnasz and Sendrer [3] show a new method to buld practcal sgnature schemes wth the McElece publc key cryptosystem. Ths scheme has the drawback of a hgh sgnature cost. One dea to counter ths drawback conssts n replacng Goppa code by other codes whch have faster decodng algorthms lke chaned codes. In ths paper, we show an nvarant n the structure of chaned codes whch makes a weakness n cryptographc schemes based on chaned codes. Our approach s based on the fact that any gven chaned equvalent code can be transformed n a systematc code whch has a specal generator matrx representaton. Regular LDPC code s generally a chaned repetton code. We show that these codes are useless n cryptography. 57

2 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 2. CHAINED CODE A chaned code C s defned as a drect sum of elementary codes N = n and of dmenson = = k = K. C = C = = {( u u ); u C,..., u C },..., C. Ths code s of length To encode an nformaton m = ( m,..., m ), where m s generator matrx to obtan the codeword u = m. G = ( u,..., u ) wth u s the obtaned from m usng the elementary code dagonal s formed by elementary generator matrces k bts, we smply multply t by the n bts codeword C. So, G s a dagonal matrx n blocs and whose G of the code C. We assume that we have an effcent decodng algorthm for each elementary code u ( u,..., u ) decoded word s m ( m,..., ) =, we apply for each codeword m = dec u. C. To decode dec. The u ts correspondent decodng algorthm C ( ) = wth ( ) m We defne the support of a non zero word x ( x,..., x n ) zero postons. sup( ) { {,.., n}, x } = C =, denoted sup(x ), as the set of ts non x and the support of a set S { y,..., } U = as the unon of the supports of ts words sup( S) = sup( y ). So the support of a code C ( N, K) s the unon of ts k 2 codeword supports. y S Two words x and y are sad to be connected f ther supports are not dsjonts.e sup( x ) sup( y) = Θ and two sets I and J are sad to be dsjonts f there s no connecton subset between them. A non zero codeword x of C s sad to be mnmal support f there s no codeword sup( y) sup( x). y y C such that Two codes C ( N, K ) and '( N, K),.., N such as: C' = σ ( C) = { cσ ( ),.., cσ ( N ) }. In other words, C and C' are equvalents f there s a C are sad to be equvalents f there s a permutaton σ of { } permutaton matrx such as for any generator matrx G ofc, the matrx matrx of C '. G '= G. P s a generator 58

3 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 3. CHAINED CODES AND CRYPTOGRAPHY As we mentoned n the ntroducton, the drawback of the unque dgtal sgnature scheme based on error codng s the hgh sgnature complexty whch s due to Goppa decodng algorthm. One dea to counter ths drawback conssts n replacng Goppa code by chaned code whch have faster decodng algorthm. Generally, the secret key of a cryptographc scheme based on error codng s the code tself, for whch an effcent decodng algorthm s known, and the publc key s a transformaton of the generator or party check matrces. We consder a dgtal sgnature scheme based on chaned code, and then we develop an algorthm to dscover the prvate key from publc key. Ths attack s applcable for each cryptographc scheme snce t s a structural attack. Secret key: Publc key: Sgnature: Verfcaton: o S s a random ( K K ) non sngular matrx called the scramblng matrx. o G s a ( K N) generator matrx of a chaned code o P s a random ( N N ) permutaton matrx o G '= S. G. P s a randomly scrambled et permuted generator matrx. It s a generator matrx of an equvalent non structured code to the chaned code c s the completed correcton capactes calculated as [3]. o h( ) s a hash functon. o The sgner, frst, calculates y = h( M ). P, where h(m ) s the N bt message, P s the nverse of P. Then he uses the completed decodng algorthm [3] for the orgnal chaned code C to obtan x = S. σ. Fnally, the recever obtans the sgnature by computng S σ =. x where S s the nverse of S. o The verfer calculates ρ ' = σ. G' and ρ = h(m ) o The sgnature s vald f d ( ρ, ρ' ) < c We have ntroduced a dgtal sgnature scheme and then we present the weakness of ths scheme. Ths weakness s due to the fact that chaned codes have an nvarant. Code equvalence means that one generator matrx s a permutaton of the other, because matrx S does not change the code but only performs a modfcaton on the bass of the lnear subspace. Canteaut showed that the 59

4 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 matrx S may be mportant to hde the systematc structure of the Goppa codes, therefore havng an mportant securty role [4]. However, Heman was the frst to study ths pont and states that the random matrx S used n the orgnal McElece scheme serves no securty purpose concernng the protecton [5]. We confrm ths argument and we show that the random matrx S has no securty role for cryptographc schemes based on lnear codes. We state also that dsjont elementary code supports s an nvarant by permutaton. To avod exhaustve attack, we used at least fve dfferent elementary codes and to avod attack by nformaton set, we used a chaned code wth length at least equal to 9 bts. The attack explores the characterstcs of the code transformaton n order to dentfy ts buldng blocks. Its nput s a generatng matrx G' of a randomly permuted chaned code of length N and dmenson K. Its output s a structured chaned code. The algorthm s steps are: o Apply a Gauss elmnaton to the rows of the matrx form G = ( I, d Z ). G' to obtan the systematc Sendrer shows that rows of any systematc generator matrx of a code C are mnmal support codewords of C and that any mnmal support codeword of C s a row of a systematc generator matrx of C [4]. The systematc chaned code support s formed by dsjont sets. Each set represents the support of an elementary code. The transformaton of any randomly permuted chaned code generator matrx nto a systematc matrx by lnear algebrac algorthms wll allow us to fnd these supports and thus elementary codes. o Search the dsjont sets of rows of the systematc matrx G. Each set forms the elementary code support. o Use elementary decodng algorthms to decode every message. As applcaton of these codes, regular LDPC codes whch represent chaned repetton codes. Next sectons represent the propretes of these codes. 4. LOW DENSITY PARITY CHECK CODES Low-densty party-check (LDPC) codes were frst dscovered by Gallager [6] n 962 and have recently been redscovered by Mackay and Neal [7], [8]. In fact, when LDPC codes have been nvented, ther decodng was too complcated for the technology, and so they have been forgotten. These codes delver very good performance when decoded wth the belef-propagaton (BP) algorthm [7]. Bnary LDPC codes, are lnear block codes defned by a sparse party check matrx H ( M N ), where N denotes the codeword length and M the number of party-check equatons. When the numbers of s n each column and row are constant the code s called a regular LDPC code. Otherwse, t s sad to be rregular. 4.. Regular LDPC codes In ths secton, we show that the party check matrx of an LDPC code has a partcular structure. The unqueness of the canoncal matrx provdes us to recover used codes of any equvalent code. 6

5 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 The support of systematc LDPC code s formed by dsjont sets. Each set represents the support of an elementary repetton code. The transformaton of any randomly permuted LDPC code party check matrx nto a systematc matrx by lnear algebrac algorthms wll allow us to fnd these supports and thus elementary codes. The regular LDPC party check matrx s constructed as follows: t s a concatenaton of permuted repetton code. H = 4.2. Party check matrx propertes We are nterested, n ths secton, on party check matrx propertes whch wll be used to analyse the regular LDPC code structure. The party check matrx H of a lnear code s not unque, any S.H s also a party check matrx. o If the systematc party check matrx exsts then t s unque [4]. o Rows of any systematc party check matrx of a code C are mnmal support codewords of C [4]. o Any mnmal support codeword of C s a row of a systematc party check matrx of C [4]. Consequently, the systematc LDPC code party check matrx rows are dvded n dsjont sets. Each set defnes the support of a repetton code C. Ths property s nvarant by permutaton. Based on ths property, we show that, a randomly permuted LDPC party check matrx H ' = SHP has a partcular structure. Ths structure permts to dscover easly the hdden matrx H '. 5. RESULTS 5.. Attack complexty on chaned lnear codes The securty of cryptographc schemes based on error codng s hghly dependent on the class of used codes. Some class of codes reveal ther characterstcs even when they go through the permutaton used to construct the publc code. It s the case of chaned codes. The startng pont was the observaton that any systematc matrx s formed by small weght codeword and that chaned code contans so many mnmal support codewords. These two propertes lead to a structural attack of dgtal sgnature scheme based on chaned code. Fgure shows the complexty of the attack of some cryptosystems usng chaned codes. The complexty s always 45 less 2 even wth so long codes ( N = 3). Ths complexty prohbts usng chaned code n cryptography. 6

6 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 Fgure : Attack complexty on chaned lnear codes 5.2. Attack complexty on LDPC Codes The complexty s the number of bnary operatons to dscover a randomly permuted regular LDPC code structure. 2 o N. M / 2 bnary operatons for Gaussan elmnaton. o M. N bnary operatons to compute all lne weghts. Thus, the number of bnary operatons necessary for ths algorthm s equal to 2 N. M / 2 + N. M. Fgure 2: Complexty of the attack on cryptosystem usng regular LDPC 62

7 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 Fgure 2 shows the complexty of the attack of some cryptosystems usng regular LDPC. The 45 complexty s always less 2 even wth so long codes ( N = 3). Ths complexty prohbts usng LDPC n cryptography. 6. CONCLUSION In ths paper, we dscussed the structure of a randomly permuted chaned code. We explored potental threats from systematc generator matrx that has partcular structure. Chaned code generator matrces have the propertes of dsconnected elementary code supports. Ths property s nvarant by permutaton, whch make ths knd of code useless n cryptography. Regular LDPC codes have ths property. REFERENCES [] E.R. Berlekamp, R.J. McElece, and H.C.A. van Tlborg, On the nherent ntractablty of certan codng problems IEEE Transactons on Informaton Theory, Vol.24, No.3,978, pp [2] R.J. McElece, A publc-key cryptosystem based on algebrac codng theory DSN Prog. Rep., Jet Propulson Laboratory, Calforna Inst. Technol., Pasadena, CA, pp. 4-6,January 978. [3] N. Courtos, M. Fnasz, and N. Sendrer, How to acheve a McElece-based dgtal sgnature scheme In C. Boyd, edtor, Asacrypt 2, volume 2248 of LNCS, pages Sprnger-Verlag, 2. [4] N.Sendrer, On the structure of a lnear code AAECC, Vol.9, n3, 998, pp [5] A. Canteaut, Attaques de cryptosystmes mots de pods fable et constructon de fonctons t-rslentes. PhD thess, Unverst Pars 6, October 996. [6] R. G. Gallager, Low-Densty Party-Check codes PhD thess, MIT, July 963. [7] D. J. C. MacKay, Good error-correctng codes based on very sparse matrces IEEE Transactons on Informaton Theory, vol. 45, pp , March 999. [8] D. J. C. Mackay, Near shannon lmt performance of low densty party check codes Electron. Lett., vol. 33, pp , Mars [9] J. Chen and M. P. C. Fossorer, Near optmum unversal belef propagaton based decodng of Low- Densty Party Check codes IEEE Transactons on Communcatons, vol. 5, pp , March

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

c 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

c 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, c 2009 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS

AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS * Mahd Nangr Department of Electrcal Engneerng, Khaje Nasr Unversty of Technology, Tehran, Iran *Author for Correspondence ABSTRACT

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

A General Framework for Codes Involving Redundancy Minimization

A General Framework for Codes Involving Redundancy Minimization IEEE TRANSACTIONS ON INFORMATION THEORY A General Framework for Codes Involvng Redundancy Mnmzaton Mchael Baer, Member, IEEE Abstract A framework wth two scalar parameters s ntroduced for varous problems

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA

More information

SIMULATED PERFORMANCE A MATLAB IMPLEMENTATION OF LOW-DENSITY PARITY- CHECK CODES. By: Dan Dechene Kevin Peets. Supervised by: Dr.

SIMULATED PERFORMANCE A MATLAB IMPLEMENTATION OF LOW-DENSITY PARITY- CHECK CODES. By: Dan Dechene Kevin Peets. Supervised by: Dr. SIMULATED PERFORMANCE OF LOW-DENSITY PARITY- CHECK CODES A MATLAB IMPLEMENTATION LAKEHEAD UNIVERSITY FACULTY OF ENGINEERING 2006 By: Dan Dechene Kevn Peets Supervsed by: Dr. Julan Cheng TABLE OF CONTENTS

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

King s Research Portal

King s Research Portal Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,

More information

Equivalent Circuit Model of Electromagnetic Behaviour of Wire Objects by the Matrix Pencil Method

Equivalent Circuit Model of Electromagnetic Behaviour of Wire Objects by the Matrix Pencil Method ERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No., May 008, -0 Equvalent Crcut Model of Electromagnetc Behavour of Wre Objects by the Matrx Pencl Method Vesna Arnautovsk-Toseva, Khall El Khamlch Drss,

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

ALICE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE

ALICE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE #A72 INTEGERS 6 (26) ALIE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE Vladmr Shevelev Department of Mathematcs, Ben-Guron Unversty of the Negev, Beer-Sheva, Israel shevelev@bgu.ac.l Peter J.. Moses Moparmatc

More information

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking

Performance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Optimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples

Optimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples Optmzng Transmsson Lengths for Lmted Feedbac wth on-bnary LDPC Examples Kasra Valna, Sudarsan V. S. Ranganathan, Darush Dvsalar*, and Rchard D. Wesel Department of Electrcal Engneerng, Unversty of Calforna,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem EE 508 Lecture 6 Degrees of Freedom The Approxmaton Problem Revew from Last Tme Desgn Strategy Theorem: A crcut wth transfer functon T(s) can be obtaned from a crcut wth normalzed transfer functon T n

More information

Discussion on How to Express a Regional GPS Solution in the ITRF

Discussion on How to Express a Regional GPS Solution in the ITRF 162 Dscusson on How to Express a Regonal GPS Soluton n the ITRF Z. ALTAMIMI 1 Abstract The usefulness of the densfcaton of the Internatonal Terrestral Reference Frame (ITRF) s to facltate ts access as

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables S. Aucharyamet and S. Srsumrannukul / GMSARN Internatonal Journal 4 (2010) 57-66 Optmal Allocaton of Statc VAr Compensator for Actve Power oss Reducton by Dfferent Decson Varables S. Aucharyamet and S.

More information

LOW-density parity-check (LDPC) codes first discovered

LOW-density parity-check (LDPC) codes first discovered Desgn of LDPC Codes Robust to Nosy Message-Passng Decodng Alla Targhat, Student Member, IEEE, Hamed Farhad, Member, IEEE and Farshad Lahout, Senor Member, IEEE arxv:50.0483v3 [cs.it] Jun 05 Abstract We

More information

08/20/99 1 T1E1.4/99-333R1. Title: Soft Cancellation via Iterative Decoding to Mitigate the effect of Home-LANs on VDSL (333R1)

08/20/99 1 T1E1.4/99-333R1. Title: Soft Cancellation via Iterative Decoding to Mitigate the effect of Home-LANs on VDSL (333R1) 08/0/99 TE.4/99-333R Project: TE.4: VDSL Ttle: Soft Cancellaton va Iteratve Decodng to Mtgate the effect of Home-LANs on VDSL (333R) Contact: Date: Dst'n: K. Cheong, J. Cho, J. Fan, R. Neg, N.Wu and J.

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Performance of Modified Iterative Decoding Algorithm for Multilevel Codes in Adaptive OFDM System

Performance of Modified Iterative Decoding Algorithm for Multilevel Codes in Adaptive OFDM System Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 50-7988 Volume 6 (04) pp. - 0 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance of Modfed Iteratve Decodng

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala.

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala. PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER 1 H. RAGHUNATHA RAO, T. ASHOK KUMAR & 3 N.SURESH BABU 1,&3 Department of Electroncs and Communcaton Engneerng, Chrala Engneerng College,

More information

STATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size

STATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size STATISTICS ImPORTANT TERmS, DEFINITIONS AND RESULTS l The mean x of n values x 1, x 2, x 3,... x n s gven by x1+ x2 + x3 +... + xn x = n l mean of grouped data (wthout class-ntervals) () Drect method :

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Numerical simulations for long range guided waves Nondestructive Testing by a wavelet based two port equivalent.

Numerical simulations for long range guided waves Nondestructive Testing by a wavelet based two port equivalent. Numercal smulatons for long range guded waves Nondestructve Testng by a wavelet based two port equvalent. F. BERTONCINI, A. MUSOLINO, M. RAUGI, F. TURCU Department of Electrc Systems and Automaton Unversty

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

IN wireless networks, it has always been a challenge to satisfy

IN wireless networks, it has always been a challenge to satisfy 1668 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 3, MARCH 14 Desgn of Low-Densty Party-Check Codes for Half-Duplex Three-Phase Two-Way Relay Channels Xnsheng Zhou, Lang-Lang Xe, Senor Member,

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

Implementation Complexity of Bit Permutation Instructions

Implementation Complexity of Bit Permutation Instructions Implementaton Complexty of Bt Permutaton Instructons Zhje Jerry Sh and Ruby B. Lee Department of Electrcal Engneerng, Prnceton Unversty, Prnceton, NJ 085 USA {zsh, rblee}@ee.prnceton.edu Abstract- Several

More information

Chapter 2 Basics of Efficient Secure Function Evaluation

Chapter 2 Basics of Efficient Secure Function Evaluation Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton

More information

arxiv: v1 [cs.it] 30 Sep 2008

arxiv: v1 [cs.it] 30 Sep 2008 A CODED BIT-LOADING LINEAR PRECODED DISCRETE MULTITONE SOLUTION FOR POWER LINE COMMUNICATION Fahad Syed Muhammmad*, Jean-Yves Baudas, Jean-Franços Hélard, and Mattheu Crussère Insttute of Electroncs and

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information

Sensors for Motion and Position Measurement

Sensors for Motion and Position Measurement Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where

More information

Reduced Cluster Search ML Decoding for QO-STBC Systems

Reduced Cluster Search ML Decoding for QO-STBC Systems Reduced Cluster Search ML Decodng for QO-STBC Systems Isaque Suzuk, Taufk Abrão Dept. of Electrcal Engneerng State Unversty of Londrna 8605-990, PR, Brazl taufk@uel.br Bruno A. Angélco, Fernando Craco

More information

Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images

Fuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images Obad Ur-Rehman, Natasa Zvc Fuzzy Authentcaton Algorthm wth Applcatons to Error Localzaton and Correcton of Images OBAID UR-REHMAN and NATASA ZIVIC Char for Data Communcatons Systems Unversty of Segen Hoelderlnstrasse

More information

Chapter 2 Two-Degree-of-Freedom PID Controllers Structures

Chapter 2 Two-Degree-of-Freedom PID Controllers Structures Chapter 2 Two-Degree-of-Freedom PID Controllers Structures As n most of the exstng ndustral process control applcatons, the desred value of the controlled varable, or set-pont, normally remans constant

More information

A Novel Reference Current Generation Algorithm for Harmonic and Reactive Power Compensation in Non Ideal Three-phase Systems

A Novel Reference Current Generation Algorithm for Harmonic and Reactive Power Compensation in Non Ideal Three-phase Systems Internatonal Journal of Electrcal Engneerng. ISSN 0974-2158 Volume 5, Number 2 (2012), pp. 153-166 Internatonal Research Publcaton House http://www.rphouse.com A Novel Reference Current Generaton Algorthm

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis

A Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis A Novel UWB Imagng System Setup for Computer- Aded Breast Cancer Dagnoss Xang He, Ja L, Chenxng Wu Electrcal and Computer Engneerng Oakland Unversty, OU Rochester, I 48309, U.S.A xhe2@oakland.edu, l4@oakland.edu,

More information

Solving switched capacitors circuits by full graph methods

Solving switched capacitors circuits by full graph methods INRNINL JURNL F IRUI, Y ND IGNL PRING olvng swtched capactors crcuts by full graph methods Bohuml Brtnk bstract rcuts wth swtched capactors are descrbed by a capactance matrx and seekng voltage transfers

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER 7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information