Related-Cipher Attacks

Size: px
Start display at page:

Download "Related-Cipher Attacks"

Transcription

1 Relaed-Cipher Aacs Hongjun Wu Laboraories for Informaion Technology Heng Mui Keng Terrace Singapore 96 LSRKNYR$PMXEWXEVIHYWK Absrac. We formally inroduce he concep of relaed-cipher aac. In his paper, we consider he relaed ciphers as bloc ciphers wih he same round funcion bu wih differen round numbers. If heir ey schedules do no depend on he oal round number, hen relaed-cipher aac could be applied if he same ey is used. We applied his aac o bloc cipher SQUARE and show ha SQUARE is vulnerable o his aac. We also show ha a new AES ey schedule proposed a ACISP is weaer han he original one under his aac. We hen classify he differenial aacs ino hree caegories: relaed-message aac (he original differenial crypanalysis), relaed-ey aac and relaedcipher aac. These aacs should be aen ino consideraion in cipher design. Inroducion There have been a number of aacs on bloc ciphers. The mos imporan wo inds of aacs are differenial crypanalysis [] and linear crypanalyis []. There are some varians or eensions of hese wo aacs such as he higher order differenial crypanalysis [7], runcaed differenial crypanalysis [5], muliple linear approimaions [9], non-linear approimaions [6], pariioning crypanalysis [4] and differenial-linear crypanalysis [8], ec. A common feaure of hese aacs is ha boh he cipher and he ey are fied. By analyzing some nown (or chosen) plaines, informaion abou he ey could be revealed. The linear crypanalysis can also be applied in he ciphere only aac when here is sufficien redundancy in he plaines. All hese aacs are very imporan in he design of ciphers. In [], he relaed-ey aac is inroduced. For his aac, he cipher is fied while he eys are relaed. This aac can be applied when some relaed eys and one common cipher are used o encryp messages. Relaed ey aac has imporan implicaion on he ey schedule design of bloc ciphers. In his paper, we inroduce a new aac relaed-cipher aac. For relaed-cipher aac, he ey is fied while he ciphers are relaed. I could be applied when someone uses he same ey in relaed ciphers. In his paper, we consider he relaed ciphers as bloc ciphers wih he same round funcion bu differen round number and heir ey schedules do no depend on he oal round number. This aac can find he ey easily when he difference beween he round numbers is small. Relaed-cipher aac has imporan implicaion on he design of he ey schedule of bloc ciphers wih fleible round number. R. Deng e al. (Eds.): ICICS, LNCS 5, pp ,. Springer-Verlag Berlin Heidelberg

2 448 Hongjun Wu This paper is organized as follows. The relaed-cipher aac is inroduced in Secion. Secion applies he relaed-cipher aac o some bloc ciphers wih fleible round number. Secion 4 suggess a way o resis relaed cipher aac by relaing he ey schedule o he oal round number of he bloc cipher. Secion 5 concludes his paper. Relaed-Cipher Aac Usually a secre ey is associaed wih one paricular cipher. However, he same ey may be used in differen ciphers in some cases. If hose ciphers are relaed, he relaed-cipher aac may be applied. In his paper, we deal wih he bloc ciphers wih fleible round number. Fleible round number is a feaure in some bloc ciphers. I allows a user o choose greaer securiy level. However, he ey schedule of some of hese bloc ciphers does no depend on he oal round number. We denoe hese bloc ciphers as relaed ciphers. For his ind of cipher, if he same ey is used in he ciphers wih differen round number, hen he ey can be found when he difference beween he round numbers is small. The aac is oulined below. Relaed-Cipher Aac on Bloc Ciphers. Consider wo relaed bloc ciphers. Boh of hem have he same round funcion, bu wih differen round numbers, r and (r + r) respecively. If a ey is used in hese wo ciphers o encryp he same message, he aac can be carried ou on he r- round cipher. For his r-round cipher, he plaine is he ciphere of he r-round cipher and he ciphere is ha of he (r + r)-round cipher. The ey can be deermined easily for small r. In he ne secion, we will apply relaed-cipher aac on some bloc ciphers wih fleible round number. Relaed-Cipher Aac on Some Bloc Ciphers In his secion relaed cipher aac is applied o wo bloc ciphers wih fleible round number. Bloc SQUARE [] is vulnerable o his ind of aac. AES [] can resis his ind of aac. Bu a new AES ey schedule [] is no ha secure. Oher bloc ciphers wih fleible round number such as SAFER [] are also vulnerable o he relaed cipher aac bu we omi he aacs here. These resuls show ha some of he bloc ciphers wih fleible round number are really vulnerable o relaed cipher aac if heir ey schedules are no carefully designed. Care should be aen when we design bloc ciphers wih fleible round number. In Subsecion., we apply he aac o SQUARE. In Subsecion., AES is shown o be able o resis he relaedcipher aac. In Subsecion., we show ha a new AES ey schedule presened a ACISP is no secure agains he relaed-cipher aac.. Bloc Cipher SQUARE SQUARE is a new bloc cipher designed by J. Daemen, L. Knudsen and V. Rijmen. The round number of SQUARE is se o eigh while he designers also allow he con-

3 Relaed-Cipher Aacs 449 servaive users o increase he number of rounds in a sraigh way. The ey schedule of SQUARE does no depend on he oal round number of he cipher and hus vulnerable o he relaed cipher aac... Srucure of SQUARE The srucure of SQUARE is oulined below. Ineresed readers may refer o [] for he deail. SQUARE is an ieraed bloc cipher wih a bloc lengh and ey lengh of 8 bis each. The basic building blocs of he cipher are five differen inverible ransformaions ha operae on a 4 4 array of byes. The elemen of a sae a in row i and column j is specified as a i,j. Boh indees sar from. These five ransformaions are oulined below. A Linear Transformaion θ. θ b = θ ( a) b = c a c a c a c a : i, j j i, j i, j i, j i, where he muliplicaion in GF( 8 ) and he indices of c is aen modulo 4. If he rows of a sae is denoed by polynomials Using his noaion, and defining a i ( ) = ai, j j= c( ) = c j= Then θ can be described as a modular polynomial muliplicaion: In SQUARE, c() b = θ ( a) b ( ) = c( ) a ( ) mod( ) for i < 4 is chosen o be i i + c( ) = A Nonlinear Transformaion γ. γ is a nonlinear bye subsiuion and is defined as γ : b = γ ( a) bi j = Sγ ( ai, j j j 4, j wih S γ an inverible 8-bi subsiuion able. In SQUARE, he S-bo is consruced by aing he mapping an affine ransformaion o he oupu bis. A Bye Permuaion π. π : = π ( a) b i = a b, j j, i Biwise Round Key Addiion σ. σ [ ] consiss of he biwise addiion of a round ey. σ[ ] : b = σ[ ]( a) b = a ) and applying

4 45 Hongjun Wu The Round Key Evoluion ψ. The round eys are derived ieraively from he cipher ey K in he following way. = K = ψ ( ) + where ψ is an inverible affine ransformaion and = ψ ( ) is defined by + = rol( ) = = = C () where rol(a i ) is a lef bye-roaion operaion on a row as rol [ ai, ai,ai,ai, ] = [ ai,ai, ai,ai, ] and he round consans C are also defined ieraively as C C = = C We noice ha he ey schedule of SQUARE does no depend on he oal round number. The Cipher SQUARE The h round funcion is denoed by ρ [ ] : ρ[ ] = σ[ SQUARE is defined as eigh rounds preceeded by a ey addiion [ σ ] and by θ : SQUARE[] = ] o π o γ ρ[ ] o ρ[ ] o ρ[ ] o ρ[ ] o 4 ρ[ ] o ρ[ ] o ρ[ ] o ρ[ ] oσ[ o θ ] oθ As a safey margin, he designers fied he number of rounds o eigh. However, he designers also allow conservaive users o increase he number of rounds in a sraigh way... Relaed Cipher Aac on SQUARE From he descripion of SQUARE, i is noed ha he ey schedule of SQUARE does no depend on he oal round number. So SQAUARE ciphers wih differen round numbers are relaed. If he same ey is used in SQUARE wih differen round number, hen he relaed cipher aac can be applied. Denoe c r as he ciphere of r round SQUARE and c r as ha of r round SQUARE. If a c r and a c r are relaed o he same plaine, hey are denoed as one righ pair. We apply he relaed cipher aac o he siuaions where r = and r =.

5 Relaed-Cipher Aacs 45 When r =, he cipher ey can be deermined from only one righ pair. In his case, SQUARE is reduced o only one round and he following relaion holds From equaion (), he round ey is derived as r r r c + + = ρ [ ]( c ) () = ( π o γ oθ ( c r )) c The cipher ey K can be derived from his round ey direcly since he ey evoluion ψ is inverible. This cipher ey K can be used o decryp all he messages encryped wih i. When r =, he cipher ey can be deermined from wo righ pairs easily. In his case, SQUARE is reduced o wo rounds and he following relaion holds Le hen equaion () is simplified o c c r = ρ[ ] o ρ[ ]( c ) () c r = π o γ o θ ( c r ) r r ( π o γ oθ ( c )) (4) + = r We noe he fac ha one row of ( c ) is relaed o one column of + r ( c ). So equaion (4) is decomposed ino four bloc ciphers each wih - bi bloc lengh. These four bloc ciphers have he common form as c = γ o θ ( c )) (5) ( The value of (or ) can be deermined easily from pairs of ( c, c ). So he round ey (or ) is nown and he cipher ey can be deermined.. Bloc Cipher AES AES is also wih fleible round number: for AES-8, for AES-9, and 4 for AES-56 (where AES- indicaes AES wih -bi secre ey). However, AES is no vulnerable o he relaed-cipher aac... Srucure of AES We inroduce only he ey schedule of AES here. Is pseudo code is given in Fig.. In Fig., he ey[ ] represens he cipher ey, N is he lengh of he cipher ey in - bi words, Nb is he bloc size in words, w[ ] is he round eys, Nr is he round number. Subword, RoWord and Rcon are some funcions we will omi heir illusraions here.

6 45 Hongjun Wu /I])\TERWMSRF]XIOI]?OA[SVH[?FVAO) FIKMR [SVHXIQT M! [LMPIM O [?MA![SVHOI]?MAOI]?MA OI]?MAOI]?MA M!M IRH[LMPI M!O [LMPIM FVA XIQT![?MA MJMQSHO! XIQT!7YF;SVH6SX;SVHXIQT\SV6GSR?MOA IPWIMJO"ERHMQSHO! XIQT!7YF;SVHXIQT IRHMJ [?MA![?MOA\SVXIQT M!M IRH[LMPI IRH Fig.. Pseudo code for AES ey schedule.. AES Is Able o Resis he Relaed-Cipher Aac From he descripion of he AES ey schedule, we see ha he ey schedule of AES depends on he ey lengh N. I is hus impossible for he same ey being used in he AES wih differen round numbers. Even if a 56-bi ey is he repea of a 8-bi ey and boh of hem are used o encryp he same message, he relaed-cipher aac could no be applied since he ey schedule of AES-56 is slighly differen from ha of AES-8. We see ha AES is able o resis he relaed cipher aac because he relaionship beween he ey lengh and he round number is fied. I is hus avoided ha he same ey being used in he relaed ciphers.. A New AES Key Schedule A ACISP, a new AES ey schedule [] was proposed. However, we will show ha his new ey schedule is weaer han he original one under he relaed-cipher aac.

7 Relaed-Cipher Aacs 45.. Descripion of he New AES Key Schedule We inroduce only he new ey schedules for AES-9 and AES-56 here. IXT!V!JSV%)7 T!V!JSV%)7 JSVV!XSV JSVN!XS E N!O N 7?V NA 7?/ NT A E N!O NT 7?V NA 7?/ N A JSVM!XS &]XI7YFE 7LMJX6S[E M\'SPYQRE %HH6SYRH/I]EF /6 V!E Fig.. Pseudo code for he new AES ey schedule In Fig., each M j represens one bye of he cipher ey. ByeSub, ShifRow, Mi- Column and AddRoundKey are he componens of he AES round funcion. S[ ] is he S-bo used in AES. Each KR r represens a 8-bi round ey... Weaness in he New AES Key Schedule We consider he following scenario. Consider ha a 64-bi ey being used in AES- 9 and AES-56. And very liely he 64-bi ey is concaenaed o form he 9 and 56-bi ey, respecively. Then he firs round eys for AES-9 and AES-56 would be idenical. Now an aac could be applied o he las wo rounds of AES Mehod o Resis he Relaed Cipher Aac In Secion, we applied he relaed-aac on SQUARE, AES and a new AES ey schedule. AES is able o resis he aac. In his secion, we inroduce a general mehod o resis he relaed-cipher aac on bloc ciphers wih fleible round number: relaing he ey schedule o he oal round number. So when he same ey is used o encryp he same plaine, he inermediae value afer he ih round in he r round cipher should be quie differen from ha in he r round cipher (r r ). The acual implemenaion ha relaes he ey schedule o he oal round number may vary from cipher o cipher. In he following eample, we show how o relae he ey schedule of SQUARE o he oal round number. The original ey schedule of SQUARE is mainained and addiional modificaion is carried ou on he subeys.

8 454 Hongjun Wu Afer he original ey schedule of SQUARE, we denoe all he subeys as,..., n (each one is one bye). The addiional modificaion is carried ou in his way: for i = o n do = S i [ S [ r]]; γ i + where S γ is he S-bo used in SQUARE and r is he oal round number. We epec ha SQUARE wih his modified ey schedule could resis he relaed-cipher aac. Since 8 round SQUARE is in use now, we sugges o eep he 8-round SQUARE he same as in [], bu hose SQUARE wih increased round number may adop his srenghened ey schedule. γ 5 Conclusion In his paper, we inroduced he relaed-cipher aac and applied his aac o some bloc ciphers wih fleible round number. A Bloc cipher wih fleible round number bu wih ey schedule unrelaed o he oal round number is vulnerable o his aac. Care should be aen in designing ciphers wih fleible feaures. A mehod o resis relaed cipher aac by relaing he ey schedule o he oal round number is also suggesed. Afer inroducing he relaed-cipher aac, we can classify he differenial aac as relaed-message aac (he original differenial crypanalysis), relaed-ey aac and relaed-cipher aac. Any combinaion of hese aacs also gives a new aac. We believe ha he cipher design should ae all hese aacs ino consideraion. References. E. Biham and A. Shamir. Differenial Crypanalysis of he Daa Encrypion Sandard, Springer-Verlag, 99.. E. Biham. New Types of Crypanalyic Aacs Using Relaed Keys. In T. Helleseh, edior, Advances in Crypology: Proc. of Eurocryp 9, LNCS 765, pages 98-49, Springer-Verlag, J. Daemen, L. Knudsen and V. Rijmen. The Bloc Cipher SQUARE. In E. Biham, edior, Fas Sofware Encrypion Proc. Forh Inernaional Worshop, Haifa, Israel, January 997, LNCS 67, pages -7, Springer Verlag, C. Harpes and J.L. Massey. Pariioning Crypanalysis. In E. Biham, edior, Fas Sofware Encrypion: Forh Inernaional Worshop, Haifa, Israel, January 997, LNCS 67, pages -7, Springer Verlag, L.R. Knudsen. Truncaed and higher order differenials. In B. Preneel, edior, Fas Sofware Encrypion: Second Inernaional Worshop, Leuven, Belgium, 994, LNCS 8, pages 96-, Springer Verlag, L.R. Knudsen and M.J.B. Robshaw. Non-Linear Approimaions in Linear Crypanalysis. In U. Maurer, edior, Advancess in Crypology Eurocryp 96, LNCS 7, pages 4-5. Springer Verlag, X. Lai. Higher order derivaives and differenial crypanalysis. In Proc. Symposium on Communicaion, Coding and Crypography, in honor of James L. Massey on he occasion of his 6 h birhday, Feb. -, 994, Mone-Veria, Ascona, Swizerland, 994.

9 Relaed-Cipher Aacs S.K. Langford and M.E. Hellman. Differenial-linear crypanalysis. In Y. G. Desmed, edior, Advances in Crypology Proc. Crypo 94, LNCS 89, pages 7-6. Springer Verlag, B.S. Kalisi Jr. and M.J.B. Robshaw. Linear Crypanalysis Using Muliple Approimaions. In Y. G. Desmed, edior, Advances in Crypology Proc. Crypo 94, LNCS 89, pages 7-9. Springer Verlag, J. Massey. SAFER K-64: A Bye-Oriened Bloc-Ciphering Algorihm. In R. Anderson, edior, Fas Sofware Encrypion Proc. Cambridge Securiy Worshop, Cambridge, U.K., Dec. 9-, 99, LNCS 89, Springer-Verlag, pp.-7. [See also: SAFER K-64: One Year Laer. In B. Preneel, edior, Fas Sofware Encrypion-- Proceedings of he Second Inernaional Worshop on Fas Sofware Encrypion, Springer-Verlag, 995, pp.- 4; and Srenghened Key Schedule for he Cipher SAFER, posed o he USENET newsgroup sci.cryp, Sepember 9, 995]. M. Masui, Linear Crypanalysis Mehod for DES Cipher. In T. Helleseh, edior, Advances in Crypology Proc. of Eurocryp '9, LNCS 765, pages 86-97, Springer- Verlag, L. May, M. Henricsen, W. Millan, G. Carer, and E. Dawson, Srenghening he Key Schedule of he AES. In Informaion Securiy and Privacy Proc. of ACISP, LNCS 84, pages Naional Insiue of Sandards and Technology, Advanced Encrypion Sandard. Available a hp:// csrc.nis.gov/encrypion/aes/

P. Bruschi: Project guidelines PSM Project guidelines.

P. Bruschi: Project guidelines PSM Project guidelines. Projec guidelines. 1. Rules for he execuion of he projecs Projecs are opional. Their aim is o improve he sudens knowledge of he basic full-cusom design flow. The final score of he exam is no affeced by

More information

HIGH THROUGHPUT EVALUATION OF SHA-1 IMPLEMENTATION USING UNFOLDING TRANSFORMATION

HIGH THROUGHPUT EVALUATION OF SHA-1 IMPLEMENTATION USING UNFOLDING TRANSFORMATION VOL., NO. 5, MARCH 26 ISSN 89-668 26-26 Asian Research Publishing Nework (ARPN). All righs reserved. HIGH THROUGHPUT EVALUATION OF SHA- IMPLEMENTATION USING UNFOLDING TRANSFORMATION Shamsiah Bini Suhaili

More information

A new image security system based on cellular automata and chaotic systems

A new image security system based on cellular automata and chaotic systems A new image securiy sysem based on cellular auomaa and chaoic sysems Weinan Wang Jan 2013 Absrac A novel image encrypion scheme based on Cellular Auomaa and chaoic sysem is proposed in his paper. The suggesed

More information

Lecture #7: Discrete-time Signals and Sampling

Lecture #7: Discrete-time Signals and Sampling EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined

More information

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI) ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114

More information

4.5 Biasing in BJT Amplifier Circuits

4.5 Biasing in BJT Amplifier Circuits 4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can

More information

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009 ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...

More information

EE201 Circuit Theory I Fall

EE201 Circuit Theory I Fall EE1 Circui Theory I 17 Fall 1. Basic Conceps Chaper 1 of Nilsson - 3 Hrs. Inroducion, Curren and Volage, Power and Energy. Basic Laws Chaper &3 of Nilsson - 6 Hrs. Volage and Curren Sources, Ohm s Law,

More information

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.

More information

Direct Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities

Direct Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities Direc Analysis of Wave Digial Nework of Microsrip Srucure wih Sep Disconinuiies BILJANA P. SOŠIĆ Faculy of Elecronic Engineering Universiy of Niš Aleksandra Medvedeva 4, Niš SERBIA MIODRAG V. GMIROVIĆ

More information

The student will create simulations of vertical components of circular and harmonic motion on GX.

The student will create simulations of vertical components of circular and harmonic motion on GX. Learning Objecives Circular and Harmonic Moion (Verical Transformaions: Sine curve) Algebra ; Pre-Calculus Time required: 10 150 min. The sudens will apply combined verical ranslaions and dilaions in he

More information

Communication Systems. Department of Electronics and Electrical Engineering

Communication Systems. Department of Electronics and Electrical Engineering COMM 704: Communicaion Lecure : Analog Mulipliers Dr Mohamed Abd El Ghany Dr. Mohamed Abd El Ghany, Mohamed.abdel-ghany@guc.edu.eg nroducion Nonlinear operaions on coninuous-valued analog signals are ofen

More information

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and

More information

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1

More information

(This lesson plan assumes the students are using an air-powered rocket as described in the Materials section.)

(This lesson plan assumes the students are using an air-powered rocket as described in the Materials section.) The Mah Projecs Journal Page 1 PROJECT MISSION o MArs inroducion Many sae mah sandards and mos curricula involving quadraic equaions require sudens o solve "falling objec" or "projecile" problems, which

More information

Lecture September 6, 2011

Lecture September 6, 2011 cs294-p29 Seminar on Algorihmic Game heory Sepember 6, 2011 Lecure Sepember 6, 2011 Lecurer: Chrisos H. Papadimiriou Scribes: Aloni Cohen and James Andrews 1 Game Represenaion 1.1 abular Form and he Problem

More information

Experiment 6: Transmission Line Pulse Response

Experiment 6: Transmission Line Pulse Response Eperimen 6: Transmission Line Pulse Response Lossless Disribued Neworks When he ime required for a pulse signal o raverse a circui is on he order of he rise or fall ime of he pulse, i is no longer possible

More information

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost)

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost) Table of Conens 3.0 SMPS Topologies 3.1 Basic Componens 3.2 Buck (Sep Down) 3.3 Boos (Sep Up) 3.4 nverer (Buck/Boos) 3.5 Flyback Converer 3.6 Curren Boosed Boos 3.7 Curren Boosed Buck 3.8 Forward Converer

More information

10. The Series Resistor and Inductor Circuit

10. The Series Resistor and Inductor Circuit Elecronicsab.nb 1. he Series esisor and Inducor Circui Inroducion he las laboraory involved a resisor, and capacior, C in series wih a baery swich on or off. I was simpler, as a pracical maer, o replace

More information

Answer Key for Week 3 Homework = 100 = 140 = 138

Answer Key for Week 3 Homework = 100 = 140 = 138 Econ 110D Fall 2009 K.D. Hoover Answer Key for Week 3 Homework Problem 4.1 a) Laspeyres price index in 2006 = 100 (1 20) + (0.75 20) Laspeyres price index in 2007 = 100 (0.75 20) + (0.5 20) 20 + 15 = 100

More information

Memorandum on Impulse Winding Tester

Memorandum on Impulse Winding Tester Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside

More information

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid.

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid. OpenSax-CNX module: m0004 Elemenal Signals Don Johnson This work is produced by OpenSax-CNX and licensed under he Creaive Commons Aribuion License.0 Absrac Complex signals can be buil from elemenal signals,

More information

Notes on the Fourier Transform

Notes on the Fourier Transform Noes on he Fourier Transform The Fourier ransform is a mahemaical mehod for describing a coninuous funcion as a series of sine and cosine funcions. The Fourier Transform is produced by applying a series

More information

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax 2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely

More information

UNIT IV DIGITAL MODULATION SCHEME

UNIT IV DIGITAL MODULATION SCHEME UNI IV DIGIAL MODULAION SCHEME Geomeric Represenaion of Signals Ojecive: o represen any se of M energy signals {s i (} as linear cominaions of N orhogonal asis funcions, where N M Real value energy signals

More information

ECE-517 Reinforcement Learning in Artificial Intelligence

ECE-517 Reinforcement Learning in Artificial Intelligence ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering

More information

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS Kalle Rui, Mauri Honanen, Michael Hall, Timo Korhonen, Veio Porra Insiue of Radio Communicaions, Helsini Universiy of Technology

More information

Teacher Supplement to Operation Comics, Issue #5

Teacher Supplement to Operation Comics, Issue #5 eacher Supplemen o Operaion Comics, Issue #5 he purpose of his supplemen is o provide conen suppor for he mahemaics embedded ino he fifh issue of Operaion Comics, and o show how he mahemaics addresses

More information

Negative frequency communication

Negative frequency communication Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac

More information

Analysis of Low Density Codes and Improved Designs Using Irregular Graphs

Analysis of Low Density Codes and Improved Designs Using Irregular Graphs Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher M. Amin Shokrollahi Daniel A. Spielman Absrac In [6], Gallager inroduces a family of codes based

More information

Role of Kalman Filters in Probabilistic Algorithm

Role of Kalman Filters in Probabilistic Algorithm Volume 118 No. 11 2018, 5-10 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu doi: 10.12732/ijpam.v118i11.2 ijpam.eu Role of Kalman Filers in Probabilisic Algorihm

More information

Chapter 2 Summary: Continuous-Wave Modulation. Belkacem Derras

Chapter 2 Summary: Continuous-Wave Modulation. Belkacem Derras ECEN 44 Communicaion Theory Chaper Summary: Coninuous-Wave Modulaion.1 Modulaion Modulaion is a process in which a parameer of a carrier waveform is varied in accordance wih a given message (baseband)

More information

AN303 APPLICATION NOTE

AN303 APPLICATION NOTE AN303 APPLICATION NOTE LATCHING CURRENT INTRODUCTION An imporan problem concerning he uilizaion of componens such as hyrisors or riacs is he holding of he componen in he conducing sae afer he rigger curren

More information

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks Social-aware Dynamic Rouer Node Placemen in Wireless Mesh Neworks Chun-Cheng Lin Pei-Tsung Tseng Ting-Yu Wu Der-Jiunn Deng ** Absrac The problem of dynamic rouer node placemen (dynrnp) in wireless mesh

More information

Square Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival

Square Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival Square Waves, Sinusoids and Gaussian Whie Noise: A Maching Pursui Conundrum? Don Percival Applied Physics Laboraory Deparmen of Saisics Universiy of Washingon Seale, Washingon, USA hp://faculy.washingon.edu/dbp

More information

EE 40 Final Project Basic Circuit

EE 40 Final Project Basic Circuit EE 0 Spring 2006 Final Projec EE 0 Final Projec Basic Circui Par I: General insrucion 1. The final projec will coun 0% of he lab grading, since i s going o ake lab sessions. All oher individual labs will

More information

Figure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are.

Figure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are. Geomery Review of PIL KEY Name: Parallel and Inersecing Lines Dae: Per.: PIL01: Use complemenary supplemenary and congruen o compare wo angles. 1) Complee he following definiion: Two angles are Complemenary

More information

Communications II Lecture 7: Performance of digital modulation

Communications II Lecture 7: Performance of digital modulation Communicaions II Lecure 7: Performance of digial modulaion Professor Kin K. Leung EEE and Compuing Deparmens Imperial College London Copyrigh reserved Ouline Digial modulaion and demodulaion Error probabiliy

More information

Chapter 2 Introduction: From Phase-Locked Loop to Costas Loop

Chapter 2 Introduction: From Phase-Locked Loop to Costas Loop Chaper 2 Inroducion: From Phase-Locked Loop o Cosas Loop The Cosas loop can be considered an exended version of he phase-locked loop (PLL). The PLL has been invened in 932 by French engineer Henri de Belleszice

More information

Comparing image compression predictors using fractal dimension

Comparing image compression predictors using fractal dimension Comparing image compression predicors using fracal dimension RADU DOBRESCU, MAEI DOBRESCU, SEFA MOCAU, SEBASIA ARALUGA Faculy of Conrol & Compuers POLIEHICA Universiy of Buchares Splaiul Independenei 313

More information

A New Voltage Sag and Swell Compensator Switched by Hysteresis Voltage Control Method

A New Voltage Sag and Swell Compensator Switched by Hysteresis Voltage Control Method Proceedings of he 8h WSEAS Inernaional Conference on ELECTRIC POWER SYSTEMS, HIGH VOLTAGES, ELECTRIC MACHINES (POWER '8) A New Volage Sag and Swell Compensaor Swiched by Hyseresis Volage Conrol Mehod AMIR

More information

Lecture 5: DC-DC Conversion

Lecture 5: DC-DC Conversion 1 / 31 Lecure 5: DC-DC Conversion ELEC-E845 Elecric Drives (5 ECTS) Mikko Rouimo (lecurer), Marko Hinkkanen (slides) Auumn 217 2 / 31 Learning Oucomes Afer his lecure and exercises you will be able o:

More information

Gaussian Blurring-Deblurring for Improved Image Compression

Gaussian Blurring-Deblurring for Improved Image Compression aussian Blurring-Deblurring for mproved mage Compression Moi Hoon Yap 1 Michel Biser Hong Ta Ewe 1 1 Mulimedia Universi (MMU) Jalan Mulimedia 100 Cberjaa Selangor Darul Ehsan Malasia {mhap hewe}@mmu.edu.m

More information

UPDATE FOR DESIGN OF STRUCTURAL STEEL HOLLOW SECTION CONNECTIONS VOLUME 1 DESIGN MODELS, First edition 1996 A.A. SYAM AND B.G.

UPDATE FOR DESIGN OF STRUCTURAL STEEL HOLLOW SECTION CONNECTIONS VOLUME 1 DESIGN MODELS, First edition 1996 A.A. SYAM AND B.G. REF: ASI TN006 Version ASI Head Office Level 13, 99 Moun Sree Norh Sydney NSW 060 Tel: 0 9931 6666 Email: enquiries@seel.org.au (ABN)/ACN (94) 000973 839 www.seel.org.au ASI TECHNICAL NOTE TN006 V Auhors:

More information

A Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method

A Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method A Bidirecional Three-Phase Push-Pull Converer Wih Dual Asymmeral PWM Mehod Minho Kwon, Junsung Par, Sewan Choi, IEEE Senior Member Deparmen of Elecral and Informaion Engineering Seoul Naional Universiy

More information

Development of Temporary Ground Wire Detection Device

Development of Temporary Ground Wire Detection Device Inernaional Journal of Smar Grid and Clean Energy Developmen of Temporary Ground Wire Deecion Device Jing Jiang* and Tao Yu a Elecric Power College, Souh China Universiy of Technology, Guangzhou 5164,

More information

A-LEVEL Electronics. ELEC4 Programmable Control Systems Mark scheme June Version: 1.0 Final

A-LEVEL Electronics. ELEC4 Programmable Control Systems Mark scheme June Version: 1.0 Final A-LEVEL Elecronics ELEC4 Programmable Conrol Sysems scheme 243 June 26 Version:. Final schemes are prepared by he Lead Assessmen Wrier and considered, ogeher wih he relevan quesions, by a panel of subjec

More information

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c

More information

Pointwise Image Operations

Pointwise Image Operations Poinwise Image Operaions Binary Image Analysis Jana Kosecka hp://cs.gmu.edu/~kosecka/cs482.hml - Lookup able mach image inensiy o he displayed brighness values Manipulaion of he lookup able differen Visual

More information

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm Journal of Compuer and Communicaions, 215, 3, 1-7 Published Online November 215 in SciRes. hp://www.scirp.org/journal/jcc hp://dx.doi.org/1.4236/jcc.215.3111 Foreign Fiber Image Segmenaion Based on Maximum

More information

5 Spatial Relations on Lines

5 Spatial Relations on Lines 5 Spaial Relaions on Lines There are number of useful problems ha can be solved wih he basic consrucion echniques developed hus far. We now look a cerain problems, which involve spaial relaionships beween

More information

Comparitive Analysis of Image Segmentation Techniques

Comparitive Analysis of Image Segmentation Techniques ISSN: 78 33 Volume, Issue 9, Sepember 3 Compariive Analysis of Image Segmenaion echniques Rohi Sardana Pursuing Maser of echnology (Compuer Science and Engineering) GJU S& Hissar, Haryana Absrac Image

More information

CHAPTER CONTENTS. Notes. 9.0 Line Coding. 9.1 Binary Line Codes

CHAPTER CONTENTS. Notes. 9.0 Line Coding. 9.1 Binary Line Codes Noes CHAPTER CONTENTS 9. Line Coding 9. inary Line Codes 9. ipolar and iphase Line Codes 9.. AMI 9... inary N Zero Subsiuion 9..3 lock Line Codes 9.3 M-ary Correlaion Codes 9.3. Q 9.3. Correlaion Coding

More information

Transmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems

Transmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems Transmi Beamforming wih educed Feedback Informaion in OFDM Based Wireless Sysems Seung-Hyeon Yang, Jae-Yun Ko, and Yong-Hwan Lee School of Elecrical Engineering and INMC, Seoul Naional Universiy Kwanak

More information

Estimating a Time-Varying Phillips Curve for South Africa

Estimating a Time-Varying Phillips Curve for South Africa Esimaing a Time-Varying Phillips Curve for Souh Africa Alain Kabundi* 1 Eric Schaling** Modese Some*** *Souh African Reserve Bank ** Wis Business School and VU Universiy Amserdam *** World Bank 27 Ocober

More information

March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION

March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION 1. Parial Derivaives and Differeniable funcions In all his chaper, D will denoe an open subse of R n. Definiion 1.1. Consider a funcion

More information

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER INTRODUCTION: Being able o ransmi a radio frequency carrier across space is of no use unless we can place informaion or inelligence upon i. This las ransmier

More information

Analysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived

Analysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher y M. Amin Shokrollahi z Daniel A. Spielman x Absrac In [6], Gallager inroduces a family of codes

More information

Laplacian Mixture Modeling for Overcomplete Mixing Matrix in Wavelet Packet Domain by Adaptive EM-type Algorithm and Comparisons

Laplacian Mixture Modeling for Overcomplete Mixing Matrix in Wavelet Packet Domain by Adaptive EM-type Algorithm and Comparisons Proceedings of he 5h WSEAS Inernaional Conference on Signal Processing, Isanbul, urey, May 7-9, 6 (pp45-5) Laplacian Mixure Modeling for Overcomplee Mixing Marix in Wavele Pace Domain by Adapive EM-ype

More information

Deblurring Images via Partial Differential Equations

Deblurring Images via Partial Differential Equations Deblurring Images via Parial Dierenial Equaions Sirisha L. Kala Mississippi Sae Universiy slk3@mssae.edu Advisor: Seh F. Oppenheimer Absrac: Image deblurring is one o he undamenal problems in he ield o

More information

PREVENTIVE MAINTENANCE WITH IMPERFECT REPAIRS OF VEHICLES

PREVENTIVE MAINTENANCE WITH IMPERFECT REPAIRS OF VEHICLES Journal of KONES Powerrain and Transpor, Vol.14, No. 3 2007 PEVENTIVE MAINTENANCE WITH IMPEFECT EPAIS OF VEHICLES Józef Okulewicz, Tadeusz Salamonowicz Warsaw Universiy of Technology Faculy of Transpor

More information

16.5 ADDITIONAL EXAMPLES

16.5 ADDITIONAL EXAMPLES 16.5 ADDITIONAL EXAMPLES For reiew purposes, more examples of boh piecewise linear and incremenal analysis are gien in he following subsecions. No new maerial is presened, so readers who do no need addiional

More information

Motion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc

Motion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc 5h Inernaional Conference on Advanced Maerials and Compuer Science (ICAMCS 206) Moion-blurred sar image acquisiion and resoraion mehod based on he separable kernel Honglin Yuana, Fan Lib and Tao Yuc Beihang

More information

Fuzzy Inference Model for Learning from Experiences and Its Application to Robot Navigation

Fuzzy Inference Model for Learning from Experiences and Its Application to Robot Navigation Fuzzy Inference Model for Learning from Experiences and Is Applicaion o Robo Navigaion Manabu Gouko, Yoshihiro Sugaya and Hiroomo Aso Deparmen of Elecrical and Communicaion Engineering, Graduae School

More information

Control and Protection Strategies for Matrix Converters. Control and Protection Strategies for Matrix Converters

Control and Protection Strategies for Matrix Converters. Control and Protection Strategies for Matrix Converters Conrol and Proecion Sraegies for Marix Converers Dr. Olaf Simon, Siemens AG, A&D SD E 6, Erlangen Manfred Bruckmann, Siemens AG, A&D SD E 6, Erlangen Conrol and Proecion Sraegies for Marix Converers To

More information

Volume Author/Editor: Simon Kuznets, assisted by Elizabeth Jenks. Volume URL:

Volume Author/Editor: Simon Kuznets, assisted by Elizabeth Jenks. Volume URL: This PDF is a selecion from an ou-of-prin volume from he Naional Bureau of Economic Research Volume Tile: Shares of Upper Income Groups in Income and Savings Volume Auhor/Edior: Simon Kuznes, assised by

More information

THE OSCILLOSCOPE AND NOISE. Objectives:

THE OSCILLOSCOPE AND NOISE. Objectives: -26- Preparaory Quesions. Go o he Web page hp://www.ek.com/measuremen/app_noes/xyzs/ and read a leas he firs four subsecions of he secion on Trigger Conrols (which iself is a subsecion of he secion The

More information

Architectures for Resource Reservation Modules for Optical Burst Switching Core Nodes *

Architectures for Resource Reservation Modules for Optical Burst Switching Core Nodes * 4. ITG-Fachagung Phoonic Neworks, May 5. - 6., 2003, Leipzig, Germany Archiecures for Resource Reservaion Modules for Opical Burs Swiching Core Nodes * Sascha Junghans, Chrisoph M. Gauger Universiy of

More information

Adaptive Approach Based on Curve Fitting and Interpolation for Boundary Effects Reduction

Adaptive Approach Based on Curve Fitting and Interpolation for Boundary Effects Reduction Adapive Approach Based on Curve Fiing and Inerpolaion for Boundary Effecs Reducion HANG SU, JINGSONG LI School of Informaion Engineering Wuhan Universiy of Technology 122 Loushi Road, Wuhan CHINA hangsu@whu.edu.cn,

More information

Power losses in pulsed voltage source inverters/rectifiers with sinusoidal currents

Power losses in pulsed voltage source inverters/rectifiers with sinusoidal currents ree-wheeling diode Turn-off power dissipaion: off/d = f s * E off/d (v d, i LL, T j/d ) orward power dissipaion: fw/t = 1 T T 1 v () i () d Neglecing he load curren ripple will resul in: fw/d = i Lavg

More information

Using Box-Jenkins Models to Forecast Mobile Cellular Subscription

Using Box-Jenkins Models to Forecast Mobile Cellular Subscription Open Journal of Saisics, 26, 6, 33-39 Published Online April 26 in SciRes. hp://www.scirp.org/journal/ojs hp://dx.doi.org/.4236/ojs.26.6226 Using Box-Jenkins Models o Forecas Mobile Cellular Subscripion

More information

TRIPLE-FREQUENCY IONOSPHERE-FREE PHASE COMBINATIONS FOR AMBIGUITY RESOLUTION

TRIPLE-FREQUENCY IONOSPHERE-FREE PHASE COMBINATIONS FOR AMBIGUITY RESOLUTION TRIPL-FRQCY IOOSPHR-FR PHAS COMBIATIOS FOR AMBIGITY RSOLTIO D. Odijk, P.J.G. Teunissen and C.C.J.M. Tiberius Absrac Linear combinaions of he carrier phase daa which are independen of he ionospheric delays

More information

EECE 301 Signals & Systems Prof. Mark Fowler

EECE 301 Signals & Systems Prof. Mark Fowler EECE 3 Signals & Sysems Prof. Mark Fowler Noe Se #8 C-T Sysems: Frequency-Domain Analysis of Sysems Reading Assignmen: Secion 5.2 of Kamen and Heck /2 Course Flow Diagram The arrows here show concepual

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Moivaion Can we apply media access mehods from fixed neworks? Mobile Communicaions Chaper 3 : Media Access Moivaion SDMA, FDMA, TDMA Aloha Reservaion schemes Collision avoidance, MACA Polling CDMA SAMA

More information

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects Opical Shor Pulse Generaion and Measuremen Based on Fiber Polarizaion Effecs Changyuan Yu Deparmen of Elecrical & Compuer Engineering, Naional Universiy of Singapore, Singapore, 117576 A*STAR Insiue for

More information

EXTREME SLAP BASS - A DICTIONARY OF GROOVES BY JOHN M. SHAUGHNESSY II 2001 JOHN M. SHAUGHNESSY II

EXTREME SLAP BASS - A DICTIONARY OF GROOVES BY JOHN M. SHAUGHNESSY II 2001 JOHN M. SHAUGHNESSY II EXTREME SLA BASS - A DITIONARY OF GROOVES BY JON M. SAUGNESSY II 2001 JON M. SAUGNESSY II FORWARD Welcome o he firs ediion of Exreme Slap Bass! This book is he resul of wo years of work. When I originally

More information

Classification of Multitemporal Remote Sensing Data of Different Resolution using Conditional Random Fields

Classification of Multitemporal Remote Sensing Data of Different Resolution using Conditional Random Fields Classificaion of Muliemporal Remoe Sensing Daa of Differen Resoluion using Condiional Random Fields Thorsen Hoberg, Franz Roenseiner and Chrisian Heipke Insiue of Phoogrammery and GeoInformaion Leibniz

More information

Day-of-the-week effects in selected East Asian stock markets

Day-of-the-week effects in selected East Asian stock markets MPRA Munich Personal RePEc Archive Day-of-he-week effecs in seleced Eas Asian sock markes Ricky Chee-Jiun Chia and Venus Khim-Sen Liew and Syed Azizi Wafa Syed Khalid Wafa Labuan School of Inernaional

More information

Mach Zehnder Interferometer for Wavelength Division Multiplexing

Mach Zehnder Interferometer for Wavelength Division Multiplexing Mach Zehnder nerferomeer for Wavelengh Division Muliplexing Ary Syahriar Pusa Pengkajian dan Penerapan Teknologi nformasi dan Elekronika Badan Pengkajian dan Penerapan Teknologi e-mail : ary@inn.bpp.go.id

More information

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib 5h Inernaional Conference on Environmen, Maerials, Chemisry and Power Elecronics (EMCPE 016 Pulse Train Conrolled PCCM Buck-Boos Converer Ming Qina, Fangfang ib School of Elecrical Engineering, Zhengzhou

More information

A NEW DUAL-POLARIZED HORN ANTENNA EXCITED BY A GAP-FED SQUARE PATCH

A NEW DUAL-POLARIZED HORN ANTENNA EXCITED BY A GAP-FED SQUARE PATCH Progress In Elecromagneics Research Leers, Vol. 21, 129 137, 2011 A NEW DUAL-POLARIZED HORN ANTENNA EXCITED BY A GAP-FED SQUARE PATCH S. Ononchimeg, G. Ogonbaaar, J.-H. Bang, and B.-C. Ahn Applied Elecromagneics

More information

Announcement. Allowed

Announcement. Allowed 9//05 nnouncemen Firs es: Sep. 8, Chap. -4 llowed wriing insrumen poce calculaor ruler One 8.5" " paper conaining consans, formulas, and any oher informaion ha you migh find useful (NOT any inds of soluions).

More information

Auto-Tuning of PID Controllers via Extremum Seeking

Auto-Tuning of PID Controllers via Extremum Seeking 25 American Conrol Conference June 8-, 25. Porland, OR, USA ThA7.2 Auo-Tuning of PID Conrollers via Exremum Seeking Nick illingsworh* and Miroslav rsić Deparmen of Mechanical and Aerospace Engineering

More information

Demodulation Based Testing of Off Chip Driver Performance

Demodulation Based Testing of Off Chip Driver Performance Demodulaion Based Tesing of Off Driver Performance Wilfried Daehn Hochschule Magdeburg-Sendahl Fachbereich Elekroechnik Posfach 368 39 Magdeburg Phone: ++49 39 886 4673 Fa: ++49 39 886 426 Email: wilfried.daehn@compuer.org

More information

SCiCoreDrive62 +DC T5 U V W -DC. SCiCore 62. IGBT/MOSFET drivers

SCiCoreDrive62 +DC T5 U V W -DC. SCiCore 62. IGBT/MOSFET drivers PRELIMINARY TECHNICAL INFORMATION SCiCoreDrive62 IGBT/MOSFET drivers HIGHLIGHTS - 6 channel IGBT driver - suiable for 200V IGBT (900 V max on DCLink) - Up o 8 A peak oupu curren - Collecor sensing & faul

More information

Generating Polar Modulation with R&S SMU200A

Generating Polar Modulation with R&S SMU200A Rohde & Schwarz producs: SMU00 Generaing Polar Modulaion wih R&S SMU00 Polar modulaion is a mehod where digial modulaion is realized as a combinaion of phase and ampliude modulaion, raher han using an

More information

Knowledge Transfer in Semi-automatic Image Interpretation

Knowledge Transfer in Semi-automatic Image Interpretation Knowledge Transfer in Semi-auomaic Image Inerpreaion Jun Zhou 1, Li Cheng 2, Terry Caelli 23, and Waler F. Bischof 1 1 Deparmen of Compuing Science, Universiy of Albera, Edmonon, Albera, Canada T6G 2E8

More information

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity Wrap Up Fourier ransorm Sampling, Modulaion, Filering Noise and he Digial Absracion Binary signaling model and Shannon Capaciy Copyrigh 27 by M.H. Perro All righs reserved. M.H. Perro 27 Wrap Up, Slide

More information

A Segmentation Method for Uneven Illumination Particle Images

A Segmentation Method for Uneven Illumination Particle Images Research Journal of Applied Sciences, Engineering and Technology 5(4): 1284-1289, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scienific Organizaion, 2013 Submied: July 17, 2012 Acceped: Augus 15, 2012

More information

How to Shorten First Order Unit Testing Time. Piotr Mróz 1

How to Shorten First Order Unit Testing Time. Piotr Mróz 1 How o Shoren Firs Order Uni Tesing Time Pior Mróz 1 1 Universiy of Zielona Góra, Faculy of Elecrical Engineering, Compuer Science and Telecommunicaions, ul. Podgórna 5, 65-246, Zielona Góra, Poland, phone

More information

Examination Mobile & Wireless Networking ( ) April 12,

Examination Mobile & Wireless Networking ( ) April 12, Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary

More information

Lecture 11. Digital Transmission Fundamentals

Lecture 11. Digital Transmission Fundamentals CS4/MSc Compuer Neworking Lecure 11 Digial Transmission Fundamenals Compuer Neworking, Copyrigh Universiy of Edinburgh 2005 Digial Transmission Fundamenals Neworks consruced ou of Links or ransmission

More information

Mobile Robot Localization Using Fusion of Object Recognition and Range Information

Mobile Robot Localization Using Fusion of Object Recognition and Range Information 007 IEEE Inernaional Conference on Roboics and Auomaion Roma, Ialy, 10-14 April 007 FrB1.3 Mobile Robo Localizaion Using Fusion of Objec Recogniion and Range Informaion Byung-Doo Yim, Yong-Ju Lee, Jae-Bok

More information

2600 Capitol Avenue Suite 200 Sacramento, CA phone fax

2600 Capitol Avenue Suite 200 Sacramento, CA phone fax 26 Capiol Avenue Suie 2 Sacrameno, CA 9816 916.64.4 phone 916.64.41 fax www.esassoc.com memorandum dae Sepember 2, 216 o from subjec Richard Rich, Ciy of Sacrameno; Jeffrey Dorso, Pioneer Law Group Brian

More information

Industrial, High Repetition Rate Picosecond Laser

Industrial, High Repetition Rate Picosecond Laser RAPID Indusrial, High Repeiion Rae Picosecond Laser High Power: RAPID is a very cos efficien, compac, diode pumped Nd:YVO4 picosecond laser wih 2 W average power a 1064 nm. Is 10 ps-pulses have high pulse

More information

Evaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System

Evaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System General Leers in Mahemaic, Vol. 3, No.3, Dec 27, pp. 77-85 e-issn 259-9277, p-issn 259-9269 Available online a hp:\\ www.refaad.com Evaluaion of Insananeous Reliabiliy Measures for a Gradual Deerioraing

More information

Estimation of Automotive Target Trajectories by Kalman Filtering

Estimation of Automotive Target Trajectories by Kalman Filtering Buleinul Şiinţific al Universiăţii "Poliehnica" din imişoara Seria ELECRONICĂ şi ELECOMUNICAŢII RANSACIONS on ELECRONICS and COMMUNICAIONS om 58(72), Fascicola 1, 2013 Esimaion of Auomoive arge rajecories

More information

A New Design of Private Information Retrieval for Storage Constrained Databases

A New Design of Private Information Retrieval for Storage Constrained Databases A ew Design of Privae Informaion Rerieval for Sorage Consrained Daabases icholas Woolsey, Rong-Rong Chen, and Mingyue Ji Deparmen of Elecrical and Compuer Engineering, Universiy of Uah Sal Lake Ciy, UT,

More information

Integrated Forward Half-Bridge Resonant Inverter as a High-Power-Factor Electronic Ballast

Integrated Forward Half-Bridge Resonant Inverter as a High-Power-Factor Electronic Ballast Inegraed Forward Half-Bridge Resonan Inverer as a High-Power-Facor Elecronic Ballas Absrac.- A novel single-sage high-power-facor elecronic ballas obained from he inegraion of a forward dc-o-dc converer

More information

Calculation on the Inter-Lobe Clearance Distribution of Twin-Screw Compressor by Optimization Method

Calculation on the Inter-Lobe Clearance Distribution of Twin-Screw Compressor by Optimization Method Purdue Universi Purdue e-pubs Inernaional Compressor Engineering Conference School of echanical Engineering 6 Calculaion on he Iner-Lobe Clearance Disribuion of Twin-Screw Compressor b Opimiaion ehod Wei

More information