Related-Cipher Attacks
|
|
- Stanley Ross
- 5 years ago
- Views:
Transcription
1 Relaed-Cipher Aacs Hongjun Wu Laboraories for Informaion Technology Heng Mui Keng Terrace Singapore 96 LSRKNYR$PMXEWXEVIHYWK Absrac. We formally inroduce he concep of relaed-cipher aac. In his paper, we consider he relaed ciphers as bloc ciphers wih he same round funcion bu wih differen round numbers. If heir ey schedules do no depend on he oal round number, hen relaed-cipher aac could be applied if he same ey is used. We applied his aac o bloc cipher SQUARE and show ha SQUARE is vulnerable o his aac. We also show ha a new AES ey schedule proposed a ACISP is weaer han he original one under his aac. We hen classify he differenial aacs ino hree caegories: relaed-message aac (he original differenial crypanalysis), relaed-ey aac and relaedcipher aac. These aacs should be aen ino consideraion in cipher design. Inroducion There have been a number of aacs on bloc ciphers. The mos imporan wo inds of aacs are differenial crypanalysis [] and linear crypanalyis []. There are some varians or eensions of hese wo aacs such as he higher order differenial crypanalysis [7], runcaed differenial crypanalysis [5], muliple linear approimaions [9], non-linear approimaions [6], pariioning crypanalysis [4] and differenial-linear crypanalysis [8], ec. A common feaure of hese aacs is ha boh he cipher and he ey are fied. By analyzing some nown (or chosen) plaines, informaion abou he ey could be revealed. The linear crypanalysis can also be applied in he ciphere only aac when here is sufficien redundancy in he plaines. All hese aacs are very imporan in he design of ciphers. In [], he relaed-ey aac is inroduced. For his aac, he cipher is fied while he eys are relaed. This aac can be applied when some relaed eys and one common cipher are used o encryp messages. Relaed ey aac has imporan implicaion on he ey schedule design of bloc ciphers. In his paper, we inroduce a new aac relaed-cipher aac. For relaed-cipher aac, he ey is fied while he ciphers are relaed. I could be applied when someone uses he same ey in relaed ciphers. In his paper, we consider he relaed ciphers as bloc ciphers wih he same round funcion bu differen round number and heir ey schedules do no depend on he oal round number. This aac can find he ey easily when he difference beween he round numbers is small. Relaed-cipher aac has imporan implicaion on he design of he ey schedule of bloc ciphers wih fleible round number. R. Deng e al. (Eds.): ICICS, LNCS 5, pp ,. Springer-Verlag Berlin Heidelberg
2 448 Hongjun Wu This paper is organized as follows. The relaed-cipher aac is inroduced in Secion. Secion applies he relaed-cipher aac o some bloc ciphers wih fleible round number. Secion 4 suggess a way o resis relaed cipher aac by relaing he ey schedule o he oal round number of he bloc cipher. Secion 5 concludes his paper. Relaed-Cipher Aac Usually a secre ey is associaed wih one paricular cipher. However, he same ey may be used in differen ciphers in some cases. If hose ciphers are relaed, he relaed-cipher aac may be applied. In his paper, we deal wih he bloc ciphers wih fleible round number. Fleible round number is a feaure in some bloc ciphers. I allows a user o choose greaer securiy level. However, he ey schedule of some of hese bloc ciphers does no depend on he oal round number. We denoe hese bloc ciphers as relaed ciphers. For his ind of cipher, if he same ey is used in he ciphers wih differen round number, hen he ey can be found when he difference beween he round numbers is small. The aac is oulined below. Relaed-Cipher Aac on Bloc Ciphers. Consider wo relaed bloc ciphers. Boh of hem have he same round funcion, bu wih differen round numbers, r and (r + r) respecively. If a ey is used in hese wo ciphers o encryp he same message, he aac can be carried ou on he r- round cipher. For his r-round cipher, he plaine is he ciphere of he r-round cipher and he ciphere is ha of he (r + r)-round cipher. The ey can be deermined easily for small r. In he ne secion, we will apply relaed-cipher aac on some bloc ciphers wih fleible round number. Relaed-Cipher Aac on Some Bloc Ciphers In his secion relaed cipher aac is applied o wo bloc ciphers wih fleible round number. Bloc SQUARE [] is vulnerable o his ind of aac. AES [] can resis his ind of aac. Bu a new AES ey schedule [] is no ha secure. Oher bloc ciphers wih fleible round number such as SAFER [] are also vulnerable o he relaed cipher aac bu we omi he aacs here. These resuls show ha some of he bloc ciphers wih fleible round number are really vulnerable o relaed cipher aac if heir ey schedules are no carefully designed. Care should be aen when we design bloc ciphers wih fleible round number. In Subsecion., we apply he aac o SQUARE. In Subsecion., AES is shown o be able o resis he relaedcipher aac. In Subsecion., we show ha a new AES ey schedule presened a ACISP is no secure agains he relaed-cipher aac.. Bloc Cipher SQUARE SQUARE is a new bloc cipher designed by J. Daemen, L. Knudsen and V. Rijmen. The round number of SQUARE is se o eigh while he designers also allow he con-
3 Relaed-Cipher Aacs 449 servaive users o increase he number of rounds in a sraigh way. The ey schedule of SQUARE does no depend on he oal round number of he cipher and hus vulnerable o he relaed cipher aac... Srucure of SQUARE The srucure of SQUARE is oulined below. Ineresed readers may refer o [] for he deail. SQUARE is an ieraed bloc cipher wih a bloc lengh and ey lengh of 8 bis each. The basic building blocs of he cipher are five differen inverible ransformaions ha operae on a 4 4 array of byes. The elemen of a sae a in row i and column j is specified as a i,j. Boh indees sar from. These five ransformaions are oulined below. A Linear Transformaion θ. θ b = θ ( a) b = c a c a c a c a : i, j j i, j i, j i, j i, where he muliplicaion in GF( 8 ) and he indices of c is aen modulo 4. If he rows of a sae is denoed by polynomials Using his noaion, and defining a i ( ) = ai, j j= c( ) = c j= Then θ can be described as a modular polynomial muliplicaion: In SQUARE, c() b = θ ( a) b ( ) = c( ) a ( ) mod( ) for i < 4 is chosen o be i i + c( ) = A Nonlinear Transformaion γ. γ is a nonlinear bye subsiuion and is defined as γ : b = γ ( a) bi j = Sγ ( ai, j j j 4, j wih S γ an inverible 8-bi subsiuion able. In SQUARE, he S-bo is consruced by aing he mapping an affine ransformaion o he oupu bis. A Bye Permuaion π. π : = π ( a) b i = a b, j j, i Biwise Round Key Addiion σ. σ [ ] consiss of he biwise addiion of a round ey. σ[ ] : b = σ[ ]( a) b = a ) and applying
4 45 Hongjun Wu The Round Key Evoluion ψ. The round eys are derived ieraively from he cipher ey K in he following way. = K = ψ ( ) + where ψ is an inverible affine ransformaion and = ψ ( ) is defined by + = rol( ) = = = C () where rol(a i ) is a lef bye-roaion operaion on a row as rol [ ai, ai,ai,ai, ] = [ ai,ai, ai,ai, ] and he round consans C are also defined ieraively as C C = = C We noice ha he ey schedule of SQUARE does no depend on he oal round number. The Cipher SQUARE The h round funcion is denoed by ρ [ ] : ρ[ ] = σ[ SQUARE is defined as eigh rounds preceeded by a ey addiion [ σ ] and by θ : SQUARE[] = ] o π o γ ρ[ ] o ρ[ ] o ρ[ ] o ρ[ ] o 4 ρ[ ] o ρ[ ] o ρ[ ] o ρ[ ] oσ[ o θ ] oθ As a safey margin, he designers fied he number of rounds o eigh. However, he designers also allow conservaive users o increase he number of rounds in a sraigh way... Relaed Cipher Aac on SQUARE From he descripion of SQUARE, i is noed ha he ey schedule of SQUARE does no depend on he oal round number. So SQAUARE ciphers wih differen round numbers are relaed. If he same ey is used in SQUARE wih differen round number, hen he relaed cipher aac can be applied. Denoe c r as he ciphere of r round SQUARE and c r as ha of r round SQUARE. If a c r and a c r are relaed o he same plaine, hey are denoed as one righ pair. We apply he relaed cipher aac o he siuaions where r = and r =.
5 Relaed-Cipher Aacs 45 When r =, he cipher ey can be deermined from only one righ pair. In his case, SQUARE is reduced o only one round and he following relaion holds From equaion (), he round ey is derived as r r r c + + = ρ [ ]( c ) () = ( π o γ oθ ( c r )) c The cipher ey K can be derived from his round ey direcly since he ey evoluion ψ is inverible. This cipher ey K can be used o decryp all he messages encryped wih i. When r =, he cipher ey can be deermined from wo righ pairs easily. In his case, SQUARE is reduced o wo rounds and he following relaion holds Le hen equaion () is simplified o c c r = ρ[ ] o ρ[ ]( c ) () c r = π o γ o θ ( c r ) r r ( π o γ oθ ( c )) (4) + = r We noe he fac ha one row of ( c ) is relaed o one column of + r ( c ). So equaion (4) is decomposed ino four bloc ciphers each wih - bi bloc lengh. These four bloc ciphers have he common form as c = γ o θ ( c )) (5) ( The value of (or ) can be deermined easily from pairs of ( c, c ). So he round ey (or ) is nown and he cipher ey can be deermined.. Bloc Cipher AES AES is also wih fleible round number: for AES-8, for AES-9, and 4 for AES-56 (where AES- indicaes AES wih -bi secre ey). However, AES is no vulnerable o he relaed-cipher aac... Srucure of AES We inroduce only he ey schedule of AES here. Is pseudo code is given in Fig.. In Fig., he ey[ ] represens he cipher ey, N is he lengh of he cipher ey in - bi words, Nb is he bloc size in words, w[ ] is he round eys, Nr is he round number. Subword, RoWord and Rcon are some funcions we will omi heir illusraions here.
6 45 Hongjun Wu /I])\TERWMSRF]XIOI]?OA[SVH[?FVAO) FIKMR [SVHXIQT M! [LMPIM O [?MA![SVHOI]?MAOI]?MA OI]?MAOI]?MA M!M IRH[LMPI M!O [LMPIM FVA XIQT![?MA MJMQSHO! XIQT!7YF;SVH6SX;SVHXIQT\SV6GSR?MOA IPWIMJO"ERHMQSHO! XIQT!7YF;SVHXIQT IRHMJ [?MA![?MOA\SVXIQT M!M IRH[LMPI IRH Fig.. Pseudo code for AES ey schedule.. AES Is Able o Resis he Relaed-Cipher Aac From he descripion of he AES ey schedule, we see ha he ey schedule of AES depends on he ey lengh N. I is hus impossible for he same ey being used in he AES wih differen round numbers. Even if a 56-bi ey is he repea of a 8-bi ey and boh of hem are used o encryp he same message, he relaed-cipher aac could no be applied since he ey schedule of AES-56 is slighly differen from ha of AES-8. We see ha AES is able o resis he relaed cipher aac because he relaionship beween he ey lengh and he round number is fied. I is hus avoided ha he same ey being used in he relaed ciphers.. A New AES Key Schedule A ACISP, a new AES ey schedule [] was proposed. However, we will show ha his new ey schedule is weaer han he original one under he relaed-cipher aac.
7 Relaed-Cipher Aacs 45.. Descripion of he New AES Key Schedule We inroduce only he new ey schedules for AES-9 and AES-56 here. IXT!V!JSV%)7 T!V!JSV%)7 JSVV!XSV JSVN!XS E N!O N 7?V NA 7?/ NT A E N!O NT 7?V NA 7?/ N A JSVM!XS &]XI7YFE 7LMJX6S[E M\'SPYQRE %HH6SYRH/I]EF /6 V!E Fig.. Pseudo code for he new AES ey schedule In Fig., each M j represens one bye of he cipher ey. ByeSub, ShifRow, Mi- Column and AddRoundKey are he componens of he AES round funcion. S[ ] is he S-bo used in AES. Each KR r represens a 8-bi round ey... Weaness in he New AES Key Schedule We consider he following scenario. Consider ha a 64-bi ey being used in AES- 9 and AES-56. And very liely he 64-bi ey is concaenaed o form he 9 and 56-bi ey, respecively. Then he firs round eys for AES-9 and AES-56 would be idenical. Now an aac could be applied o he las wo rounds of AES Mehod o Resis he Relaed Cipher Aac In Secion, we applied he relaed-aac on SQUARE, AES and a new AES ey schedule. AES is able o resis he aac. In his secion, we inroduce a general mehod o resis he relaed-cipher aac on bloc ciphers wih fleible round number: relaing he ey schedule o he oal round number. So when he same ey is used o encryp he same plaine, he inermediae value afer he ih round in he r round cipher should be quie differen from ha in he r round cipher (r r ). The acual implemenaion ha relaes he ey schedule o he oal round number may vary from cipher o cipher. In he following eample, we show how o relae he ey schedule of SQUARE o he oal round number. The original ey schedule of SQUARE is mainained and addiional modificaion is carried ou on he subeys.
8 454 Hongjun Wu Afer he original ey schedule of SQUARE, we denoe all he subeys as,..., n (each one is one bye). The addiional modificaion is carried ou in his way: for i = o n do = S i [ S [ r]]; γ i + where S γ is he S-bo used in SQUARE and r is he oal round number. We epec ha SQUARE wih his modified ey schedule could resis he relaed-cipher aac. Since 8 round SQUARE is in use now, we sugges o eep he 8-round SQUARE he same as in [], bu hose SQUARE wih increased round number may adop his srenghened ey schedule. γ 5 Conclusion In his paper, we inroduced he relaed-cipher aac and applied his aac o some bloc ciphers wih fleible round number. A Bloc cipher wih fleible round number bu wih ey schedule unrelaed o he oal round number is vulnerable o his aac. Care should be aen in designing ciphers wih fleible feaures. A mehod o resis relaed cipher aac by relaing he ey schedule o he oal round number is also suggesed. Afer inroducing he relaed-cipher aac, we can classify he differenial aac as relaed-message aac (he original differenial crypanalysis), relaed-ey aac and relaed-cipher aac. Any combinaion of hese aacs also gives a new aac. We believe ha he cipher design should ae all hese aacs ino consideraion. References. E. Biham and A. Shamir. Differenial Crypanalysis of he Daa Encrypion Sandard, Springer-Verlag, 99.. E. Biham. New Types of Crypanalyic Aacs Using Relaed Keys. In T. Helleseh, edior, Advances in Crypology: Proc. of Eurocryp 9, LNCS 765, pages 98-49, Springer-Verlag, J. Daemen, L. Knudsen and V. Rijmen. The Bloc Cipher SQUARE. In E. Biham, edior, Fas Sofware Encrypion Proc. Forh Inernaional Worshop, Haifa, Israel, January 997, LNCS 67, pages -7, Springer Verlag, C. Harpes and J.L. Massey. Pariioning Crypanalysis. In E. Biham, edior, Fas Sofware Encrypion: Forh Inernaional Worshop, Haifa, Israel, January 997, LNCS 67, pages -7, Springer Verlag, L.R. Knudsen. Truncaed and higher order differenials. In B. Preneel, edior, Fas Sofware Encrypion: Second Inernaional Worshop, Leuven, Belgium, 994, LNCS 8, pages 96-, Springer Verlag, L.R. Knudsen and M.J.B. Robshaw. Non-Linear Approimaions in Linear Crypanalysis. In U. Maurer, edior, Advancess in Crypology Eurocryp 96, LNCS 7, pages 4-5. Springer Verlag, X. Lai. Higher order derivaives and differenial crypanalysis. In Proc. Symposium on Communicaion, Coding and Crypography, in honor of James L. Massey on he occasion of his 6 h birhday, Feb. -, 994, Mone-Veria, Ascona, Swizerland, 994.
9 Relaed-Cipher Aacs S.K. Langford and M.E. Hellman. Differenial-linear crypanalysis. In Y. G. Desmed, edior, Advances in Crypology Proc. Crypo 94, LNCS 89, pages 7-6. Springer Verlag, B.S. Kalisi Jr. and M.J.B. Robshaw. Linear Crypanalysis Using Muliple Approimaions. In Y. G. Desmed, edior, Advances in Crypology Proc. Crypo 94, LNCS 89, pages 7-9. Springer Verlag, J. Massey. SAFER K-64: A Bye-Oriened Bloc-Ciphering Algorihm. In R. Anderson, edior, Fas Sofware Encrypion Proc. Cambridge Securiy Worshop, Cambridge, U.K., Dec. 9-, 99, LNCS 89, Springer-Verlag, pp.-7. [See also: SAFER K-64: One Year Laer. In B. Preneel, edior, Fas Sofware Encrypion-- Proceedings of he Second Inernaional Worshop on Fas Sofware Encrypion, Springer-Verlag, 995, pp.- 4; and Srenghened Key Schedule for he Cipher SAFER, posed o he USENET newsgroup sci.cryp, Sepember 9, 995]. M. Masui, Linear Crypanalysis Mehod for DES Cipher. In T. Helleseh, edior, Advances in Crypology Proc. of Eurocryp '9, LNCS 765, pages 86-97, Springer- Verlag, L. May, M. Henricsen, W. Millan, G. Carer, and E. Dawson, Srenghening he Key Schedule of he AES. In Informaion Securiy and Privacy Proc. of ACISP, LNCS 84, pages Naional Insiue of Sandards and Technology, Advanced Encrypion Sandard. Available a hp:// csrc.nis.gov/encrypion/aes/
P. Bruschi: Project guidelines PSM Project guidelines.
Projec guidelines. 1. Rules for he execuion of he projecs Projecs are opional. Their aim is o improve he sudens knowledge of he basic full-cusom design flow. The final score of he exam is no affeced by
More informationHIGH THROUGHPUT EVALUATION OF SHA-1 IMPLEMENTATION USING UNFOLDING TRANSFORMATION
VOL., NO. 5, MARCH 26 ISSN 89-668 26-26 Asian Research Publishing Nework (ARPN). All righs reserved. HIGH THROUGHPUT EVALUATION OF SHA- IMPLEMENTATION USING UNFOLDING TRANSFORMATION Shamsiah Bini Suhaili
More informationA new image security system based on cellular automata and chaotic systems
A new image securiy sysem based on cellular auomaa and chaoic sysems Weinan Wang Jan 2013 Absrac A novel image encrypion scheme based on Cellular Auomaa and chaoic sysem is proposed in his paper. The suggesed
More informationLecture #7: Discrete-time Signals and Sampling
EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined
More informationECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)
ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114
More information4.5 Biasing in BJT Amplifier Circuits
4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can
More informationECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009
ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...
More informationEE201 Circuit Theory I Fall
EE1 Circui Theory I 17 Fall 1. Basic Conceps Chaper 1 of Nilsson - 3 Hrs. Inroducion, Curren and Volage, Power and Energy. Basic Laws Chaper &3 of Nilsson - 6 Hrs. Volage and Curren Sources, Ohm s Law,
More informationLab 3 Acceleration. What You Need To Know: Physics 211 Lab
b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.
More informationDirect Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities
Direc Analysis of Wave Digial Nework of Microsrip Srucure wih Sep Disconinuiies BILJANA P. SOŠIĆ Faculy of Elecronic Engineering Universiy of Niš Aleksandra Medvedeva 4, Niš SERBIA MIODRAG V. GMIROVIĆ
More informationThe student will create simulations of vertical components of circular and harmonic motion on GX.
Learning Objecives Circular and Harmonic Moion (Verical Transformaions: Sine curve) Algebra ; Pre-Calculus Time required: 10 150 min. The sudens will apply combined verical ranslaions and dilaions in he
More informationCommunication Systems. Department of Electronics and Electrical Engineering
COMM 704: Communicaion Lecure : Analog Mulipliers Dr Mohamed Abd El Ghany Dr. Mohamed Abd El Ghany, Mohamed.abdel-ghany@guc.edu.eg nroducion Nonlinear operaions on coninuous-valued analog signals are ofen
More informationThe University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours
The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and
More informationEE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling
EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1
More information(This lesson plan assumes the students are using an air-powered rocket as described in the Materials section.)
The Mah Projecs Journal Page 1 PROJECT MISSION o MArs inroducion Many sae mah sandards and mos curricula involving quadraic equaions require sudens o solve "falling objec" or "projecile" problems, which
More informationLecture September 6, 2011
cs294-p29 Seminar on Algorihmic Game heory Sepember 6, 2011 Lecure Sepember 6, 2011 Lecurer: Chrisos H. Papadimiriou Scribes: Aloni Cohen and James Andrews 1 Game Represenaion 1.1 abular Form and he Problem
More informationExperiment 6: Transmission Line Pulse Response
Eperimen 6: Transmission Line Pulse Response Lossless Disribued Neworks When he ime required for a pulse signal o raverse a circui is on he order of he rise or fall ime of he pulse, i is no longer possible
More informationTable of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost)
Table of Conens 3.0 SMPS Topologies 3.1 Basic Componens 3.2 Buck (Sep Down) 3.3 Boos (Sep Up) 3.4 nverer (Buck/Boos) 3.5 Flyback Converer 3.6 Curren Boosed Boos 3.7 Curren Boosed Buck 3.8 Forward Converer
More information10. The Series Resistor and Inductor Circuit
Elecronicsab.nb 1. he Series esisor and Inducor Circui Inroducion he las laboraory involved a resisor, and capacior, C in series wih a baery swich on or off. I was simpler, as a pracical maer, o replace
More informationAnswer Key for Week 3 Homework = 100 = 140 = 138
Econ 110D Fall 2009 K.D. Hoover Answer Key for Week 3 Homework Problem 4.1 a) Laspeyres price index in 2006 = 100 (1 20) + (0.75 20) Laspeyres price index in 2007 = 100 (0.75 20) + (0.5 20) 20 + 15 = 100
More informationMemorandum on Impulse Winding Tester
Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside
More informationOpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid.
OpenSax-CNX module: m0004 Elemenal Signals Don Johnson This work is produced by OpenSax-CNX and licensed under he Creaive Commons Aribuion License.0 Absrac Complex signals can be buil from elemenal signals,
More informationNotes on the Fourier Transform
Noes on he Fourier Transform The Fourier ransform is a mahemaical mehod for describing a coninuous funcion as a series of sine and cosine funcions. The Fourier Transform is produced by applying a series
More informationRevision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax
2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely
More informationUNIT IV DIGITAL MODULATION SCHEME
UNI IV DIGIAL MODULAION SCHEME Geomeric Represenaion of Signals Ojecive: o represen any se of M energy signals {s i (} as linear cominaions of N orhogonal asis funcions, where N M Real value energy signals
More informationECE-517 Reinforcement Learning in Artificial Intelligence
ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering
More informationA WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS
A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS Kalle Rui, Mauri Honanen, Michael Hall, Timo Korhonen, Veio Porra Insiue of Radio Communicaions, Helsini Universiy of Technology
More informationTeacher Supplement to Operation Comics, Issue #5
eacher Supplemen o Operaion Comics, Issue #5 he purpose of his supplemen is o provide conen suppor for he mahemaics embedded ino he fifh issue of Operaion Comics, and o show how he mahemaics addresses
More informationNegative frequency communication
Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac
More informationAnalysis of Low Density Codes and Improved Designs Using Irregular Graphs
Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher M. Amin Shokrollahi Daniel A. Spielman Absrac In [6], Gallager inroduces a family of codes based
More informationRole of Kalman Filters in Probabilistic Algorithm
Volume 118 No. 11 2018, 5-10 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu doi: 10.12732/ijpam.v118i11.2 ijpam.eu Role of Kalman Filers in Probabilisic Algorihm
More informationChapter 2 Summary: Continuous-Wave Modulation. Belkacem Derras
ECEN 44 Communicaion Theory Chaper Summary: Coninuous-Wave Modulaion.1 Modulaion Modulaion is a process in which a parameer of a carrier waveform is varied in accordance wih a given message (baseband)
More informationAN303 APPLICATION NOTE
AN303 APPLICATION NOTE LATCHING CURRENT INTRODUCTION An imporan problem concerning he uilizaion of componens such as hyrisors or riacs is he holding of he componen in he conducing sae afer he rigger curren
More informationSocial-aware Dynamic Router Node Placement in Wireless Mesh Networks
Social-aware Dynamic Rouer Node Placemen in Wireless Mesh Neworks Chun-Cheng Lin Pei-Tsung Tseng Ting-Yu Wu Der-Jiunn Deng ** Absrac The problem of dynamic rouer node placemen (dynrnp) in wireless mesh
More informationSquare Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival
Square Waves, Sinusoids and Gaussian Whie Noise: A Maching Pursui Conundrum? Don Percival Applied Physics Laboraory Deparmen of Saisics Universiy of Washingon Seale, Washingon, USA hp://faculy.washingon.edu/dbp
More informationEE 40 Final Project Basic Circuit
EE 0 Spring 2006 Final Projec EE 0 Final Projec Basic Circui Par I: General insrucion 1. The final projec will coun 0% of he lab grading, since i s going o ake lab sessions. All oher individual labs will
More informationFigure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are.
Geomery Review of PIL KEY Name: Parallel and Inersecing Lines Dae: Per.: PIL01: Use complemenary supplemenary and congruen o compare wo angles. 1) Complee he following definiion: Two angles are Complemenary
More informationCommunications II Lecture 7: Performance of digital modulation
Communicaions II Lecure 7: Performance of digial modulaion Professor Kin K. Leung EEE and Compuing Deparmens Imperial College London Copyrigh reserved Ouline Digial modulaion and demodulaion Error probabiliy
More informationChapter 2 Introduction: From Phase-Locked Loop to Costas Loop
Chaper 2 Inroducion: From Phase-Locked Loop o Cosas Loop The Cosas loop can be considered an exended version of he phase-locked loop (PLL). The PLL has been invened in 932 by French engineer Henri de Belleszice
More informationComparing image compression predictors using fractal dimension
Comparing image compression predicors using fracal dimension RADU DOBRESCU, MAEI DOBRESCU, SEFA MOCAU, SEBASIA ARALUGA Faculy of Conrol & Compuers POLIEHICA Universiy of Buchares Splaiul Independenei 313
More informationA New Voltage Sag and Swell Compensator Switched by Hysteresis Voltage Control Method
Proceedings of he 8h WSEAS Inernaional Conference on ELECTRIC POWER SYSTEMS, HIGH VOLTAGES, ELECTRIC MACHINES (POWER '8) A New Volage Sag and Swell Compensaor Swiched by Hyseresis Volage Conrol Mehod AMIR
More informationLecture 5: DC-DC Conversion
1 / 31 Lecure 5: DC-DC Conversion ELEC-E845 Elecric Drives (5 ECTS) Mikko Rouimo (lecurer), Marko Hinkkanen (slides) Auumn 217 2 / 31 Learning Oucomes Afer his lecure and exercises you will be able o:
More informationGaussian Blurring-Deblurring for Improved Image Compression
aussian Blurring-Deblurring for mproved mage Compression Moi Hoon Yap 1 Michel Biser Hong Ta Ewe 1 1 Mulimedia Universi (MMU) Jalan Mulimedia 100 Cberjaa Selangor Darul Ehsan Malasia {mhap hewe}@mmu.edu.m
More informationUPDATE FOR DESIGN OF STRUCTURAL STEEL HOLLOW SECTION CONNECTIONS VOLUME 1 DESIGN MODELS, First edition 1996 A.A. SYAM AND B.G.
REF: ASI TN006 Version ASI Head Office Level 13, 99 Moun Sree Norh Sydney NSW 060 Tel: 0 9931 6666 Email: enquiries@seel.org.au (ABN)/ACN (94) 000973 839 www.seel.org.au ASI TECHNICAL NOTE TN006 V Auhors:
More informationA Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method
A Bidirecional Three-Phase Push-Pull Converer Wih Dual Asymmeral PWM Mehod Minho Kwon, Junsung Par, Sewan Choi, IEEE Senior Member Deparmen of Elecral and Informaion Engineering Seoul Naional Universiy
More informationDevelopment of Temporary Ground Wire Detection Device
Inernaional Journal of Smar Grid and Clean Energy Developmen of Temporary Ground Wire Deecion Device Jing Jiang* and Tao Yu a Elecric Power College, Souh China Universiy of Technology, Guangzhou 5164,
More informationA-LEVEL Electronics. ELEC4 Programmable Control Systems Mark scheme June Version: 1.0 Final
A-LEVEL Elecronics ELEC4 Programmable Conrol Sysems scheme 243 June 26 Version:. Final schemes are prepared by he Lead Assessmen Wrier and considered, ogeher wih he relevan quesions, by a panel of subjec
More informationPhase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c
Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c
More informationPointwise Image Operations
Poinwise Image Operaions Binary Image Analysis Jana Kosecka hp://cs.gmu.edu/~kosecka/cs482.hml - Lookup able mach image inensiy o he displayed brighness values Manipulaion of he lookup able differen Visual
More informationForeign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm
Journal of Compuer and Communicaions, 215, 3, 1-7 Published Online November 215 in SciRes. hp://www.scirp.org/journal/jcc hp://dx.doi.org/1.4236/jcc.215.3111 Foreign Fiber Image Segmenaion Based on Maximum
More information5 Spatial Relations on Lines
5 Spaial Relaions on Lines There are number of useful problems ha can be solved wih he basic consrucion echniques developed hus far. We now look a cerain problems, which involve spaial relaionships beween
More informationComparitive Analysis of Image Segmentation Techniques
ISSN: 78 33 Volume, Issue 9, Sepember 3 Compariive Analysis of Image Segmenaion echniques Rohi Sardana Pursuing Maser of echnology (Compuer Science and Engineering) GJU S& Hissar, Haryana Absrac Image
More informationCHAPTER CONTENTS. Notes. 9.0 Line Coding. 9.1 Binary Line Codes
Noes CHAPTER CONTENTS 9. Line Coding 9. inary Line Codes 9. ipolar and iphase Line Codes 9.. AMI 9... inary N Zero Subsiuion 9..3 lock Line Codes 9.3 M-ary Correlaion Codes 9.3. Q 9.3. Correlaion Coding
More informationTransmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems
Transmi Beamforming wih educed Feedback Informaion in OFDM Based Wireless Sysems Seung-Hyeon Yang, Jae-Yun Ko, and Yong-Hwan Lee School of Elecrical Engineering and INMC, Seoul Naional Universiy Kwanak
More informationEstimating a Time-Varying Phillips Curve for South Africa
Esimaing a Time-Varying Phillips Curve for Souh Africa Alain Kabundi* 1 Eric Schaling** Modese Some*** *Souh African Reserve Bank ** Wis Business School and VU Universiy Amserdam *** World Bank 27 Ocober
More informationMarch 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION
March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION 1. Parial Derivaives and Differeniable funcions In all his chaper, D will denoe an open subse of R n. Definiion 1.1. Consider a funcion
More informationEXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER
EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER INTRODUCTION: Being able o ransmi a radio frequency carrier across space is of no use unless we can place informaion or inelligence upon i. This las ransmier
More informationAnalysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived
Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher y M. Amin Shokrollahi z Daniel A. Spielman x Absrac In [6], Gallager inroduces a family of codes
More informationLaplacian Mixture Modeling for Overcomplete Mixing Matrix in Wavelet Packet Domain by Adaptive EM-type Algorithm and Comparisons
Proceedings of he 5h WSEAS Inernaional Conference on Signal Processing, Isanbul, urey, May 7-9, 6 (pp45-5) Laplacian Mixure Modeling for Overcomplee Mixing Marix in Wavele Pace Domain by Adapive EM-ype
More informationDeblurring Images via Partial Differential Equations
Deblurring Images via Parial Dierenial Equaions Sirisha L. Kala Mississippi Sae Universiy slk3@mssae.edu Advisor: Seh F. Oppenheimer Absrac: Image deblurring is one o he undamenal problems in he ield o
More informationPREVENTIVE MAINTENANCE WITH IMPERFECT REPAIRS OF VEHICLES
Journal of KONES Powerrain and Transpor, Vol.14, No. 3 2007 PEVENTIVE MAINTENANCE WITH IMPEFECT EPAIS OF VEHICLES Józef Okulewicz, Tadeusz Salamonowicz Warsaw Universiy of Technology Faculy of Transpor
More information16.5 ADDITIONAL EXAMPLES
16.5 ADDITIONAL EXAMPLES For reiew purposes, more examples of boh piecewise linear and incremenal analysis are gien in he following subsecions. No new maerial is presened, so readers who do no need addiional
More informationMotion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc
5h Inernaional Conference on Advanced Maerials and Compuer Science (ICAMCS 206) Moion-blurred sar image acquisiion and resoraion mehod based on he separable kernel Honglin Yuana, Fan Lib and Tao Yuc Beihang
More informationFuzzy Inference Model for Learning from Experiences and Its Application to Robot Navigation
Fuzzy Inference Model for Learning from Experiences and Is Applicaion o Robo Navigaion Manabu Gouko, Yoshihiro Sugaya and Hiroomo Aso Deparmen of Elecrical and Communicaion Engineering, Graduae School
More informationControl and Protection Strategies for Matrix Converters. Control and Protection Strategies for Matrix Converters
Conrol and Proecion Sraegies for Marix Converers Dr. Olaf Simon, Siemens AG, A&D SD E 6, Erlangen Manfred Bruckmann, Siemens AG, A&D SD E 6, Erlangen Conrol and Proecion Sraegies for Marix Converers To
More informationVolume Author/Editor: Simon Kuznets, assisted by Elizabeth Jenks. Volume URL:
This PDF is a selecion from an ou-of-prin volume from he Naional Bureau of Economic Research Volume Tile: Shares of Upper Income Groups in Income and Savings Volume Auhor/Edior: Simon Kuznes, assised by
More informationTHE OSCILLOSCOPE AND NOISE. Objectives:
-26- Preparaory Quesions. Go o he Web page hp://www.ek.com/measuremen/app_noes/xyzs/ and read a leas he firs four subsecions of he secion on Trigger Conrols (which iself is a subsecion of he secion The
More informationArchitectures for Resource Reservation Modules for Optical Burst Switching Core Nodes *
4. ITG-Fachagung Phoonic Neworks, May 5. - 6., 2003, Leipzig, Germany Archiecures for Resource Reservaion Modules for Opical Burs Swiching Core Nodes * Sascha Junghans, Chrisoph M. Gauger Universiy of
More informationAdaptive Approach Based on Curve Fitting and Interpolation for Boundary Effects Reduction
Adapive Approach Based on Curve Fiing and Inerpolaion for Boundary Effecs Reducion HANG SU, JINGSONG LI School of Informaion Engineering Wuhan Universiy of Technology 122 Loushi Road, Wuhan CHINA hangsu@whu.edu.cn,
More informationPower losses in pulsed voltage source inverters/rectifiers with sinusoidal currents
ree-wheeling diode Turn-off power dissipaion: off/d = f s * E off/d (v d, i LL, T j/d ) orward power dissipaion: fw/t = 1 T T 1 v () i () d Neglecing he load curren ripple will resul in: fw/d = i Lavg
More informationUsing Box-Jenkins Models to Forecast Mobile Cellular Subscription
Open Journal of Saisics, 26, 6, 33-39 Published Online April 26 in SciRes. hp://www.scirp.org/journal/ojs hp://dx.doi.org/.4236/ojs.26.6226 Using Box-Jenkins Models o Forecas Mobile Cellular Subscripion
More informationTRIPLE-FREQUENCY IONOSPHERE-FREE PHASE COMBINATIONS FOR AMBIGUITY RESOLUTION
TRIPL-FRQCY IOOSPHR-FR PHAS COMBIATIOS FOR AMBIGITY RSOLTIO D. Odijk, P.J.G. Teunissen and C.C.J.M. Tiberius Absrac Linear combinaions of he carrier phase daa which are independen of he ionospheric delays
More informationEECE 301 Signals & Systems Prof. Mark Fowler
EECE 3 Signals & Sysems Prof. Mark Fowler Noe Se #8 C-T Sysems: Frequency-Domain Analysis of Sysems Reading Assignmen: Secion 5.2 of Kamen and Heck /2 Course Flow Diagram The arrows here show concepual
More informationMobile Communications Chapter 3 : Media Access
Moivaion Can we apply media access mehods from fixed neworks? Mobile Communicaions Chaper 3 : Media Access Moivaion SDMA, FDMA, TDMA Aloha Reservaion schemes Collision avoidance, MACA Polling CDMA SAMA
More informationOptical Short Pulse Generation and Measurement Based on Fiber Polarization Effects
Opical Shor Pulse Generaion and Measuremen Based on Fiber Polarizaion Effecs Changyuan Yu Deparmen of Elecrical & Compuer Engineering, Naional Universiy of Singapore, Singapore, 117576 A*STAR Insiue for
More informationEXTREME SLAP BASS - A DICTIONARY OF GROOVES BY JOHN M. SHAUGHNESSY II 2001 JOHN M. SHAUGHNESSY II
EXTREME SLA BASS - A DITIONARY OF GROOVES BY JON M. SAUGNESSY II 2001 JON M. SAUGNESSY II FORWARD Welcome o he firs ediion of Exreme Slap Bass! This book is he resul of wo years of work. When I originally
More informationClassification of Multitemporal Remote Sensing Data of Different Resolution using Conditional Random Fields
Classificaion of Muliemporal Remoe Sensing Daa of Differen Resoluion using Condiional Random Fields Thorsen Hoberg, Franz Roenseiner and Chrisian Heipke Insiue of Phoogrammery and GeoInformaion Leibniz
More informationDay-of-the-week effects in selected East Asian stock markets
MPRA Munich Personal RePEc Archive Day-of-he-week effecs in seleced Eas Asian sock markes Ricky Chee-Jiun Chia and Venus Khim-Sen Liew and Syed Azizi Wafa Syed Khalid Wafa Labuan School of Inernaional
More informationMach Zehnder Interferometer for Wavelength Division Multiplexing
Mach Zehnder nerferomeer for Wavelengh Division Muliplexing Ary Syahriar Pusa Pengkajian dan Penerapan Teknologi nformasi dan Elekronika Badan Pengkajian dan Penerapan Teknologi e-mail : ary@inn.bpp.go.id
More informationPulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib
5h Inernaional Conference on Environmen, Maerials, Chemisry and Power Elecronics (EMCPE 016 Pulse Train Conrolled PCCM Buck-Boos Converer Ming Qina, Fangfang ib School of Elecrical Engineering, Zhengzhou
More informationA NEW DUAL-POLARIZED HORN ANTENNA EXCITED BY A GAP-FED SQUARE PATCH
Progress In Elecromagneics Research Leers, Vol. 21, 129 137, 2011 A NEW DUAL-POLARIZED HORN ANTENNA EXCITED BY A GAP-FED SQUARE PATCH S. Ononchimeg, G. Ogonbaaar, J.-H. Bang, and B.-C. Ahn Applied Elecromagneics
More informationAnnouncement. Allowed
9//05 nnouncemen Firs es: Sep. 8, Chap. -4 llowed wriing insrumen poce calculaor ruler One 8.5" " paper conaining consans, formulas, and any oher informaion ha you migh find useful (NOT any inds of soluions).
More informationAuto-Tuning of PID Controllers via Extremum Seeking
25 American Conrol Conference June 8-, 25. Porland, OR, USA ThA7.2 Auo-Tuning of PID Conrollers via Exremum Seeking Nick illingsworh* and Miroslav rsić Deparmen of Mechanical and Aerospace Engineering
More informationDemodulation Based Testing of Off Chip Driver Performance
Demodulaion Based Tesing of Off Driver Performance Wilfried Daehn Hochschule Magdeburg-Sendahl Fachbereich Elekroechnik Posfach 368 39 Magdeburg Phone: ++49 39 886 4673 Fa: ++49 39 886 426 Email: wilfried.daehn@compuer.org
More informationSCiCoreDrive62 +DC T5 U V W -DC. SCiCore 62. IGBT/MOSFET drivers
PRELIMINARY TECHNICAL INFORMATION SCiCoreDrive62 IGBT/MOSFET drivers HIGHLIGHTS - 6 channel IGBT driver - suiable for 200V IGBT (900 V max on DCLink) - Up o 8 A peak oupu curren - Collecor sensing & faul
More informationGenerating Polar Modulation with R&S SMU200A
Rohde & Schwarz producs: SMU00 Generaing Polar Modulaion wih R&S SMU00 Polar modulaion is a mehod where digial modulaion is realized as a combinaion of phase and ampliude modulaion, raher han using an
More informationKnowledge Transfer in Semi-automatic Image Interpretation
Knowledge Transfer in Semi-auomaic Image Inerpreaion Jun Zhou 1, Li Cheng 2, Terry Caelli 23, and Waler F. Bischof 1 1 Deparmen of Compuing Science, Universiy of Albera, Edmonon, Albera, Canada T6G 2E8
More informationWrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity
Wrap Up Fourier ransorm Sampling, Modulaion, Filering Noise and he Digial Absracion Binary signaling model and Shannon Capaciy Copyrigh 27 by M.H. Perro All righs reserved. M.H. Perro 27 Wrap Up, Slide
More informationA Segmentation Method for Uneven Illumination Particle Images
Research Journal of Applied Sciences, Engineering and Technology 5(4): 1284-1289, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scienific Organizaion, 2013 Submied: July 17, 2012 Acceped: Augus 15, 2012
More informationHow to Shorten First Order Unit Testing Time. Piotr Mróz 1
How o Shoren Firs Order Uni Tesing Time Pior Mróz 1 1 Universiy of Zielona Góra, Faculy of Elecrical Engineering, Compuer Science and Telecommunicaions, ul. Podgórna 5, 65-246, Zielona Góra, Poland, phone
More informationExamination Mobile & Wireless Networking ( ) April 12,
Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary
More informationLecture 11. Digital Transmission Fundamentals
CS4/MSc Compuer Neworking Lecure 11 Digial Transmission Fundamenals Compuer Neworking, Copyrigh Universiy of Edinburgh 2005 Digial Transmission Fundamenals Neworks consruced ou of Links or ransmission
More informationMobile Robot Localization Using Fusion of Object Recognition and Range Information
007 IEEE Inernaional Conference on Roboics and Auomaion Roma, Ialy, 10-14 April 007 FrB1.3 Mobile Robo Localizaion Using Fusion of Objec Recogniion and Range Informaion Byung-Doo Yim, Yong-Ju Lee, Jae-Bok
More information2600 Capitol Avenue Suite 200 Sacramento, CA phone fax
26 Capiol Avenue Suie 2 Sacrameno, CA 9816 916.64.4 phone 916.64.41 fax www.esassoc.com memorandum dae Sepember 2, 216 o from subjec Richard Rich, Ciy of Sacrameno; Jeffrey Dorso, Pioneer Law Group Brian
More informationIndustrial, High Repetition Rate Picosecond Laser
RAPID Indusrial, High Repeiion Rae Picosecond Laser High Power: RAPID is a very cos efficien, compac, diode pumped Nd:YVO4 picosecond laser wih 2 W average power a 1064 nm. Is 10 ps-pulses have high pulse
More informationEvaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System
General Leers in Mahemaic, Vol. 3, No.3, Dec 27, pp. 77-85 e-issn 259-9277, p-issn 259-9269 Available online a hp:\\ www.refaad.com Evaluaion of Insananeous Reliabiliy Measures for a Gradual Deerioraing
More informationEstimation of Automotive Target Trajectories by Kalman Filtering
Buleinul Şiinţific al Universiăţii "Poliehnica" din imişoara Seria ELECRONICĂ şi ELECOMUNICAŢII RANSACIONS on ELECRONICS and COMMUNICAIONS om 58(72), Fascicola 1, 2013 Esimaion of Auomoive arge rajecories
More informationA New Design of Private Information Retrieval for Storage Constrained Databases
A ew Design of Privae Informaion Rerieval for Sorage Consrained Daabases icholas Woolsey, Rong-Rong Chen, and Mingyue Ji Deparmen of Elecrical and Compuer Engineering, Universiy of Uah Sal Lake Ciy, UT,
More informationIntegrated Forward Half-Bridge Resonant Inverter as a High-Power-Factor Electronic Ballast
Inegraed Forward Half-Bridge Resonan Inverer as a High-Power-Facor Elecronic Ballas Absrac.- A novel single-sage high-power-facor elecronic ballas obained from he inegraion of a forward dc-o-dc converer
More informationCalculation on the Inter-Lobe Clearance Distribution of Twin-Screw Compressor by Optimization Method
Purdue Universi Purdue e-pubs Inernaional Compressor Engineering Conference School of echanical Engineering 6 Calculaion on he Iner-Lobe Clearance Disribuion of Twin-Screw Compressor b Opimiaion ehod Wei
More information