On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

Size: px
Start display at page:

Download "On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties"

Transcription

1 On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different pseudo noise (PN) nd orthogonl sequences for encrypting speech signls in terms of perceptul intelligence. Speech signl cn e viewed s sequence of correlted smples nd ech smple s sequence of its. The residul intelligiility of the speech signl cn e reduced y removing the correltion mong the speech smples. PN sequences hve rndom like properties tht help in reducing the correltion mong speech smples. The men squre periodic uto-correltion (MSAAC) nd the men squre periodic cross-correltion (MSACC) mesures re used to test the rndomness of the PN sequences. Results of the investigtion show the effectivity of lrge Ksmi sequences for this purpose mong mny PN sequences. Keywords Speech encryption, pseudo-noise codes, mximl length, Gold, Brker, Ksmi, Wlsh-Hdmrd, utocorreltion, crosscorreltion, figure of merit. I. INTRODUCTION WHILE trnsmitting informtion (speech, imge or other dt) through insecure chnnels, there might e unwnted disclosure s well s unuthorized modifiction of dt if tht is not properly secured. Therefore, certin mechnisms re needed to protect the informtion within insecure chnnel. One wy to provide such protection is to convert the intelligile dt into unintelligile form prior to trnsmission nd such process of conversion with key is clled encryption []- [3]. At the receiver side, the encrypted messge is converted ck to the originl intelligile form y the reverse process of the encryption clled decryption. Cryptogrphic techniques re minly clssified s privte key cryptogrphy nd pulic key cryptogrphy [2],[3]. In privte key cryptogrphy, lso clled symmetric key cryptogrphy, sme key is used for oth encryption nd decryption. In pulic key cryptogrphy, on the other hnd, different keys re used for encryption nd decryption nd it is thus clled n symmetric key cryptogrphy. The min disdvntge of privte key encryption technique is the distriution of key to uthorized users ut it is fster when compred with pulic key cryptogrphy. Security is needed ginst two types of ttckers, nmely csul listeners nd professionl ttckers termed s cryptnlysts. The strength of cryptogrphic system [4],[5] is mesured in terms of time nd the resources required to rek the system for getting ck the messge in intelligile form. Removing the intelligiility of messge tht is to e Mnuscript received My 3, 27; revised Septemer 7, 27. The uthors re with the Deprtment of Electronics nd Communiction Engineering, Indin Institute of Technology (IIT) Guwhti, Indi. E-Mil: (v.nil,.mitr, prsnn)@iitg.ernet.in. trnsmitted is sufficient to provide security ginst csul listener, ut cryptnlysts would need strong cryptogrms. In this pper, symmetric key encryption technique for speech smples sed on the simple XOR opertion with different PN sequences is used to test the performnce of the sequences for speech encryption, nd the residul intelligiility present in the encrypted speech using different sequences is oserved y informl listening tests nd y signl inspection methods. This encryption scheme is esy to implement, less complex nd it provides etter security ginst csul listeners. Usully, speech encryption techniques using PN sequences mke the speech signl unintelligile y removing the correltion etween the smples of the speech signl. The sequences used for the encryption, in ny cse, should not portry the sttisticl properties of the trnsmitted signl so tht the ttcker cnnot use sttisticl nlysis to ttck the system. PN sequences [6]-[8] hve noise like properties; these sequences re sttisticlly independent nd uniformly distriuted. XOR opertion of these sequences with the speech smples mkes the speech signl noise-like signl, nd the encrypted speech signl sounds like rndom noise signl. The PN sequences which hve good uto-correltion nd cross-correltion properties remove the correltion mong the speech smples nd results in n encrypted signl of less residul intelligence. The rndomness of inry sequences is mesured y men squre periodic uto-correltion (MSAAC) nd men squre periodic cross-correltion (MSACC) mesures [9],[]. The sequences which hve etter rndom noise properties will hve less MSAAC nd MSACC vlues. This pper is orgnized s follows: in Sections 2 nd 3, we riefly del with different types of PN nd orthogonl sequences. Section 4 descries the techniques to mesure the correltion or rndomness of the PN sequences. Section 5 nrrtes the speech encryption using PN sequences nd the min otined results long with the comprison of the different PN sequences re given in Section 6. The pper is concluded y summrizing the present work in Section 7. II. DIFFERENT PN SEQUENCES FOR SPEECH ENCRYPTION PN sequences re strems of s nd s. Here, the wveform is tken s rndom-like, mening tht it cn e generted y mthemticlly precise rules, ut sttisticlly it stisfies the requirements of truly rndom sequence in the limiting sense. These pseudo-rndom or pseudo-noise (PN) properties include, mong other properties, () lnce, () run nd (c) 45

2 uto-correltion properties [8]. These three properties mke PN sequences efficient for speech encryption. However, due to the third property, djcent its correltion ecomes considerly less, therey mking the PN sequences more effective for speech encryption when compred with dt encryption due to high djcent correltion present in the speech signls. Therefore, PN sequences tht re useful for speech encryption must hve very good uto-correltion nd cross-correltion properties s well s mintining some rndomness properties. Below, we riefly descrie different PN sequences useful for speech encryption. Note tht in some cses we shll represent inry sequences using zeros nd ones nd in other cses + s nd s. The pproprite mpping is tht the zeros re mpped to + s nd ones re mpped to s. A. Mximl Length Sequences The Mximl length sequence (m-sequence) genertor is usully constructed with liner feedck shift registers (LFSR) [],[2]. The m-sequences re, y definition, the lrgest codes tht cn e generted y given shift register of given length with feedck. The feedck function, lso clled s chrcteristic polynomil, determines the length nd type of the sequence generted. B. Gold Sequences Gold sequences re generted y the modulo-2 opertion of two different m-sequences of sme length. Any two m- sequences re le to generte fmily of mny non-mximl product codes, ut preferred mximl sequences cn only produce Gold codes [7], [8]. C. Gold-Like Sequences There exists clss of sequences which hs prmeters similr to those of Gold sequences except tht it is otined from decimted sequence. Let u e n m-sequence of length N = 2 n generted y primitive polynomil of degree n nd let q e n integer such tht gcd(q, N) = 3. Also, let v (k), k =,, 2, denote the sequences otined y decimting T k u y q. In tht cse, the new sequences formed y different comintions of u nd v re clled Gold-like sequences [3]. D. Brker Sequences Brker sequences re short length codes tht offer good correltion properties. A Brker code is sequence of some finite length N such tht the solute vlue of discrete utocorreltion function r(τ) for τ [4], [5]. Brker sequences hve mny dvntges over other PN sequences. These sequences hve uniformly low uto-correltion sideloes ( ), ut the size of these fmilies is smll. E. Brker-Like Sequences Brker sequences hve good correltion properties with the pek correltion vlue eing ounded y. The numer of existing Brker sequences, however, re very less. We cn generte more numer of sequences y mking certin relxtion on the pek vlue of the correltion function long with mximum llowed shift etween the sequences. This newly generted sequences re clled Brker-like sequences [6]. F. Ksmi Sequences Ksmi sequences re lso PN sequences of length N = 2 n, which re defined for even vlues of n [3],[7]. There re two clsses of Ksmi sequences: (i) smll set of Ksmi sequences, (ii) lrge set of Ksmi sequences. Smll set of Ksmi sequences re optiml in the sense of mtching Welch s lower ound for correltion functions. A smll set of Ksmi sequences [3] is set of 2 n/2 inry sequences. Fig. shows the lock digrm representtion for the genertion of smll set of Ksmi sequences, ech of length 63 it. Smll set of Ksmi sequences re optiml sequences nd hve etter correltion properties compred to Gold sequences. But the set contins less numer of sequences. For the shift register of length n the numer of possile sequences for the smll Ksmi sequence set is only 2 n/2 sequences, wheres Gold code set contins 2 n + 2 sequences. The numer of sequences cn e incresed y mking some relxtion on the correltion vlues of the sequences. The resulting set of sequences is clled lrge set of Ksmi sequences [3],[7]. III. DIFFERENT ORTHOGONAL CODES FOR SPEECH ENCRYPTION Two sequences re sid to e orthogonl when the inner product etween them is zero, i.e., c i (kτ), c j (kτ) = where c i (kτ) nd c j (kτ) re the i th nd j th orthogonl memers of n orthogonl set, respectively, M is the length of the set nd τ is the symol durtion. There re two kinds of orthogonl codes: fixed- nd vrile-length. Fixed length orthogonl codes include Wlsh Hdmrd (WH) nd modified WH (MWH) codes. Among vrile length codes, orthogonl Gold codes nd orthogonl vrile spreding fctor (OVSF) codes re mentionle. WH codes re orthogonl codes possessing low utocorreltion properties. The WH sequences [8],[9] of length N re defined with clss of orthogonl mtrices H N, clled Hdmrd mtrices, s H N H T N = NI N where H T N is the trnsposed Hdmrd mtrix of order N, nd I N is the N N unity mtrix. MWH codes re generted y multiplying the Hdmrd mtrix H N y digonl mtrix D N of sme order [9],[2] such tht W N = H N D N. WH codes nd MWH codes re fixed length orthogonl codes; the dot product of ny two sequences is zero. Vrile length orthogonl codes c k (i), i =, 2,..., 2 k, re those with different lengths stisfying the orthogonl property [7]. The codes re tken from code tree nd this orthogonl vrile spreding fctor (OVSF) tree genertion lgorithm is similr to the recursive genertion of the Wlsh codes y mens of the Hdmrd mtrices. New levels in the code tree re generted y conctenting root codeword with replic of itself. 46

3 Ksmi sequences Fig.. An exmple of 63 it smll set of Ksmi sequence genertor. One cn find tht mny cross-correltion vlues of Gold codes re. By pdding one zero to the originl Gold codes, it is possile to mke cross-correltion vlues to t no shift mong the two sequences. In fct, 2 n + orthogonl codes cn e otined y this simple zero pdding. These codes re clled orthogonl Gold codes. A detiled discussion on ll these PN nd orthogonl codes cn e found in [2]. IV. MEAN SQUARE CORRELATION MEASURES The performnce of the different PN sequences re evluted y men squre periodic uto-correltion R AC (MSAAC) nd men squre periodic cross-correltion R CC (MSACC) mesures [2]. These correltion mesures hve een introduced y Oppermnn nd Vucetic []. If c i (n) represents non-delyed version of c k (i), c j (n + τ) represents the delyed version of c k (j) y τ units nd N is the length of the sequence c i, then the discrete periodic correltion function is defined s r i,j (τ) = N N τ= N c i (n)c j (n + τ). () The men squre periodic uto-correltion vlue for code set contining M sequences is given y R AC = M M N i= τ= N,τ r i,i (τ) 2 (2) nd similr mesure for the men squre periodic crosscorreltion vlue is given y R CC = M(M ) M M N i= j=,j i τ= N r i,j (τ) 2. (3) Auto-correltion refers to the degree of correspondence etween sequence nd phse shifted replic of itself, wheres cross-correltion is the mesure of greement etween two different codes. These two mesures hve een used s the sis for compring the sequence sets in this pper. The sequences which hve good uto-correltion properties will hve poor cross-correltion properties, nd vice-vers, nd they hve wide nd flt frequency spectrum. The sequences which hve less MSAAC vlues removes the correltion mong the its with in smple, nd the sequences which hve less MSACC vlues removes the smple to smple correltion, nd mke the speech signl less intelligile. A. Figure of Merit As hs een mentioned, the price for eing le to select good cross-correltion properties will e degrdtion in the uto-correltion properties of the set of sequences. A degrdtion of the uto-correltion properties hs direct reltion on the frequency spectrum of the sequences in the set. If the R AC vlues re poor, the spectrum of the sequence will not e wide-nd nd flt. In order to determine quntittively how significnt this degrdtion is for given set of sequences, Figure of Merit (FoM) is required to judge the suitility of the frequency chrcteristics of the sequences. Sequences with low FoM hs nrrow flt spectrum nd they re neither suitle for CDMA nor for speech encryption. The FoM for sequence, c i (n), of length N hving the uto-correltion function r i (τ) is given s: F x = r 2 i,i () r i,i (τ) 2 = N 2. (4) 2. N r i,i (τ) 2 τ τ= This is nothing more thn the inverse of the MSAAC vlue for given sequence. In our cse, this FoM my e extended to the whole sequence set s ech sequence in the set hs the sme solute vlue of uto-correltion vlue. Thus we my use the inverse of the vlue clculted for the R AC s the FoM. V. SPEECH ENCRYPTION USING PN SEQUENCES Speech signl cn e viewed s sequence of smples nd ech smple cn e viewed s sequence of its. Speech signl cn e encrypted, y removing the correltion etween speech smples, y the XOR opertion of speech smple with PN sequence selected t rndom from tle of PN sequences. Pseudo rndom index genertors (PRIG) [] re used to select specific PN sequence from given list of sequences. The lock digrm of PRIG is similr to tht of m-sequence genertor. The deciml index vlue is generted y converting the inry output of ech shift register in to deciml vlue y using inry to deciml converter. The PN sequence corresponding to this deciml index vlue is tken from the tle nd XOR operted with the its of the ech speech smple to get the encrypted speech smple. At the receiver side sme opertion is performed to get the decrypted speech signl. The performnce of the different PN sequences is compred y nlyzing the encrypted speech signl in time domin nd the spectrum of the encrypted speech signl. 47

4 VI. RESULTS AND DISCUSSIONS The ove proposed techniques, MSAAC, MSACC mesures nd speech encryption using different PN sequences, re implemented in MATLAB. TABLE I APERIODIC CORRELATION MEASURES FOR PN SEQUENCES OF LENGTH 63 BITS Sequence MSAAC MSACC FoM Mx-CC A. Correltion Mesures PN sequences nd orthogonl codes of desired length re generted s descried in Sections 2 nd 3, nd the MSAAC nd MSACC mesures re computed for the code sets. Tle I shows the correltion mesures for PN sequences of length 63 its. From the results, mong ll PN sequences, m-sequences nd Brker sequences hve low MSAAC vlues since these sequences hve single pek uto-correltion function nd ll sideloes mplitudes re very less. The FoM of these sequences is lso high for which these sequences hve flt power spectrum. These sequences, however, re not suitle for speech encryption since there is only one possile sequence for given LFSR length nd given primitive polynomil, nd the security provided y these sequences is therey less. Note here tht the circulr shifted sequences of originl sequences re not tken s different sequences. The Gold nd Gold-like sequences hve four vlued uto-correltion nd three vlued cross-correltion functions with the mximum cross-correltion of t(n)/n [e.g., for n = 6, the mximum correltion vlue is.2698]. However, the FoM of Goldlike sequences is more thn tht of Gold sequences nd the numer of codes tht cn e generted is lso similr, therefore these sequences re more preferle thn Gold sequences. The correltion vlues of Brker-like sequences depend on the vlue of m, i.e., the upper ound on the pek correltion function. For Brker sequences of length N = 63 nd for m = 5, the otined MSAAC nd MSACC vlues re shown in Tle I. These sequences hve less uto-correltion vlues nd therefore high FoM vlue. As hs een mentioned, the uto-correltion vlue decreses with the increment of crosscorreltion vlues. Brker-like sequences lso hve less utocorreltion vlues. Although smll Ksmi sequences hve less uto-correltion vlues too nd hence more cross-correltion vlues ut the numer of sequences tht cn e generted re less. Thus the security provided y these sequences is less compred to Brker-like sequences. The smll set of Ksmi sequences hve less MSAAC vlue mking the FoM of these sequences high. On the other hnd, the lrge set of Ksmi sequences hve mny unique fetures. The FoM of these sequences is similr to tht of Brker-like sequences. The mximum cross-correltion vlue of lrge set of Ksmi sequences is sme s tht of Gold sequences. The possile numer of lrge Ksmi sequences for given structure re more when compred with ll other PN sequences. All these fetures mke lrge Ksmi sequences effective for speech encryption. Tle II shows the correltion mesures for 64-it length orthogonl codes. Orthogonl codes hve zero cross-correltion when there is no time shift etween the two sequences ut the correltion vlues re high when there is shift etween the sequences. The correltion vlues of orthogonl codes re high compred to tht of PN sequences. The uto-correltion vlues Mximl Gold Gold-Like Brker (3 it) Brker-Like Smll Ksmi Lrge Ksmi TABLE II APERIODIC CORRELATION MEASURES FOR ORTHOGONAL CODES OF LENGTH 64 BITS Sequence MSAAC MSACC FoM Mx-CC Wlsh Hdmrd MWH OVSF Orthogonl Gold of WH codes re very high nd the FoM vlue is less so the spectrum of these sequences is not so wide nd flt. However, the MWH codes hve less correltion vlues compred to WH codes mking the cross-correltion vlues of these codes high. The correltion functions nd the MSAAC nd MSACC vlues of OVSF codes re lmost sme s tht of MWH codes. The correltion vlues of OVSF codes depends on the repetitive sequence. In Tle II the correltion vlues of OVSF codes re for the repetitive sequence {,,, } nd it is seen tht with this repetitive sequence the otined OVSF codes hve less correltion vlues. The orthogonl Gold codes hve the correltion vlues similr to tht of originl Gold codes. Correltion mesurements of encryption with different 3/32 it sequences re provided in Tle III which cn e compred with Tles I nd II. Also, correltion mesures for different repetitive sequences of OVSF code set of length 6 nd 32 re provided in Tle IV from which one cn choose the optimum sequence ccording to the requirement. B. Speech Encryption with PN Sequences Speech signl smpled t 8 khz is quntized with 2 6 levels, nd it is encrypted with the ove PN sequences s descried in Section 5 nd the residul intelligiility within the encrypted speech signl is oserved. Fig. 2() shows the time domin representtion of 3 ms voiced speech segment tken from the speech utternce /vnde mtrm/ nd Fig. 2() is its spectrogrm representtion computed y 52 point fst Fourier trnsform (FFT). The encrypted speech signl nd its spectrum y using ll the sequences re compred with 48

5 TABLE III CORRELATION MEASURES OF A FEW PN/ORTHOGONAL SEQUENCES OF LENGTH 3/32 BITS Sequence MSAAC MSACC m-sequences (3 its) Gold Codes (3 its) Brker Sequence WH Codes MWH Codes TABLE IV CORRELATION MEASURES FOR OVSF CODE SET OF LENGTH 6 AND 32 BITS Repetitive N = 6 N = 32 Sequence MSAAC MSACC MSAAC MSACC (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) (,,, ) the informtion is present in the encrypted speech signl using Brker sequences. 4) Brker-like Sequences: Brker sequences gives etter performnce compred to other sequences. The residul intelligiility of the encrypted speech signl using Brker sequences is very less, it sounds like noise signl. Fig. 2(k)-(l) shows the encrypted speech signl nd its spectrum using Brker sequences. From the figure, we cn oserve tht there is no periodicity preserved in the encrypted signl, the signl looks like rndom noise signl nd the spectrum of the encrypted signl is flt, the formnt peks re suppressed in the spectrum. 5) Ksmi Sequences: The correltion vlues of smll set of Ksmi sequences is less ut the numer of sequences in the set is less, so the residul intelligiility of the encrypted speech is somewht high s compred with the Brker sequences. Lrge set of Ksmi sequences hve etter performnce compred with the ll other sequences since the numer of lrge Ksmi sequences re more, so the residul intelligiility is less. If the numer of sequences re more, y encrypting ech smple with different sequences the smple to smple correltion in speech signl is etter removed, so the residul intelligiility of the encrypted signl is less. Fig. 2(m)-(n) re the time domin nd spectrogrm representtions for encrypted speech signl using smll set of ksmi sequences nd Fig. 2(o)-(p) shows the encrypted speech signl nd its spectrum using lrge set of Ksmi sequences. this voiced speech segment. If we encrypt ech smple of the speech signl with different inry sequence, the residul intelligiility is less s compred with the encrypted speech signl with single sequence. The code set which hve more numer of sequences with good correltion properties hve etter performnce nd the encrypted speech signl sounds like noise signl. ) m-sequences: Speech encryption using m-sequences reduces the residul intelligiility of the encrypted speech ut they re not suitle for rel time pplictions since, there is only one possile sequence of given length. Fig. 2(c)-(d) shows the encrypted speech wveform nd its spectrogrm representtion using m-sequence of length 63 its. From the Fig. 2(c) we cn oserve tht the periodicity of the speech signl is retined in the encrypted signl. 2) Gold Sequences nd Gold-like Sequences: The performnce of Gold sequences is similr to tht of the Goldlike sequences The performnce of the gold sequences is good compred to m-sequences since, y using different Gold sequences the smple to smple correltion is lso reduced. The size of these fmilies is lrge, ut prcticlly gold codes re more suited for speech encryption. Fig. 2(e)-(f) shows the encrypted speech signl nd its spectrum using Gold sequences nd Fig. 2(g)-(h) re the encrypted speech nd its spectrogrm representtions for Gold-like sequences. 3) Brker Sequences: Brker sequences of some length only re existing nd the numer of known Brker sequences re lso less, so these sequences re not suitle for speech encryption. Fig. 2(i)-(j) shows the encrypted speech signl nd its spectrum using Brker sequence of length 3 its. Most of C. Speech Encryption with Orthogonl Codes Orthogonl codes of length 64 its re generted nd ech smple of the coded speech smple is XOR operted with the orthogonl codes to get encrypted speech smple. Ech smple of the speech signl is represented with 6 its, nd four smples of the originl speech signl re XOR operted with the 64 it sequence to get four smples of the encrypted speech signl. ) Wlsh Hdmrd Codes: WH codes stisfies the orthogonl property ut they hve poor correltion properties nd the residul intelligiility present in the encrypted speech signl is lso more. Fig. 3()-() re the wveform of encrypted speech signl nd its spectrogrm representtion using WH codes. 2) Modified Wlsh Hdmrd Codes: Fig. 3(c)-(d) shows the encrypted speech signl nd its spectrogrm representtion using MWH codes. The performnce of MWH codes is good compred with the WH codes ecuse these codes hve etter correltion properties compred to WH codes. The residul intelligiility of the encrypted speech signl is lso less compred to WH codes. 3) Vrile Length Orthogonl Codes: Fig. 3(e)-(f) shows the encrypted speech signl nd its spectrum using OVSF codes with repetitive sequence {,,, }. The MSAAC nd MSACC vlues for this repetitive sequence re less nd the residul intelligiility of the encrypted speech signl is lso less. 4) Orthogonl Gold Codes: The performnce of Orthogonl Gold codes is sme s tht of originl Gold codes since oth hve similr correltion vlues nd the numer of sequences re lso nerly equl. Fig. 3(g)-(h) re the time 49

6 domin nd spectrogrm representtions for encrypted speech signl using orthogonl Gold codes. VII. CONCLUSION In this pper, we hve investigted different PN nd orthogonl sequences tht re pproprite for speech encryption y the correltion mesures to test the rndomness of these inry sequences. The sequences which hve less correltion vlues hve more noise like properties nd mke the speech signl less intelligile y reducing the correltion mong successive speech smples y encrypting the speech signl with those sequences. The security offered y the system depends on the numer of PN sequences present in the code set. Also, the residul intelligiility is very less if ech smple of the speech signl is encrypted with different sequence insted of using sme sequence for ech smple therefore, the signl is etter encrypted if the code set contins more numer of sequences. Among ll the sequences, m-sequence nd Brker sequences hve very less uto-correltion vlues nd high FoM vlues ut these sequences re not suitle for encryption since there is only one possile sequence for given shift register length. The security offered y these sequences is thus less. Brker-like sequences hve etter uto-correltion properties nd the residul intelligiility within the encrypted speech signl is less ut genertion of these sequences is complex when compred with other sequences. The lrge set of Ksmi sequences hve good correltion vlues, high FoM vlue nd these sequences hve wide flt spectrum which mkes these etter suited for speech encryption. The encrypted speech signl using lrge Ksmi sequences sounds s noise like signl. For given shift register length the numer of possile lrge Ksmi sequences re lso lrge so the security offered y these sequences is lso lrge. The genertion of these sequences is lso esy when compred with Brker like sequences. These sequences re therefore effective for speech encryption. The WH, MWH nd orthogonl Gold codes hve zero cross-correltion when there is no shift in the sequences. They hve, however, very high correltion vlues if there is ny shift in the sequences. These sequences thus my not serve s good option for speech encryption. [9] J. H. Lindholm, An nlysis of the pseudo rndomness properties of the susequences of long m-sequences, IEEE Trns. Inform. Theory, vol. IT-4, pp , July 968. [] I. Oppermnn nd B. S. Vucetic, Complex spreding sequences with wide rnge of correltion properties, IEEE Trns. Commun., vol. COM- 45, pp , Mrch 997. [] L. T. Wng nd E. J. McCluskey, Liner feedck shift register design using cyclic codes, IEEE Trns. Comput., vol. 37, pp , Oct [2] A. Fuster nd L. J. Grci, An efficient lgorithm to generte inry sequences for cryptogrphic purposes, Theoreticl Computer Science, vol. 259, pp , My 2. [3] D. V. Srwte nd M. B. Pursley, Correltion properties of pseudo rndom nd relted sequences, Proc. IEEE, vol. 68, no. 5, pp , My 98. [4] S. W. Golom nd R. A. Scholtz, Generlized Brker sequences, IEEE Trns. Inform. Theory, vol. IT-, no. 4, pp , Oct [5] D. G. Luenerger, On Brker codes of even length, Proc. IEEE, vol. 5, pp , Jn [6] C. K. Chn nd W. H. Lm, Generlised Brker-like PN sequences for qusisynchronous spred spectrum multiple ccess communiction systems, IEE Proc. Commun., vol. 42, no. 2, pp. 9-98, April 995. [7] X. Wng, Y. Wu nd B. Cron, Trnsmitter identifiction using emedded pseudo rndom sequences, IEEE Trns. Brodcsting, vol. 5, no. 3, pp , Sep. 24. [8] V. Milosevic, V. Delic nd V. Senk, Hdmrd trnsform ppliction in speech scrmling, Proc. IEEE, vol., pp , July 997. [9] Ti-Kuo Woo, Orthogonl vrile spreding codes for widend CDMA, IEEE Trns. Vehiculr Tech., vol. 5, no. 4, pp. 7-79, July 22. [2] B. Wysocki nd T. A. Wysocki, Modified Wlsh Hdmrd sequences for DS-CDMA wireless systems, School of Electricl, Computer nd Telecommunictions Engineering, University of Wollongong, Austrli. [Online] Aville: [2] A. Mitr, On Pseudo-Rndom nd Orthogonl Binry Spreding Sequences, to pper in Int. J. Info. Tech., 27. REFERENCES [] H. J. Beker nd F. C. Piper, Secure Speech Communictions, London: Acdemic Press, 985. [2] W. Stllings, Cryptogrphy nd Network Security, Englewoods Cliffs, NJ: Prentice Hll, 23. [3] W. Diffe nd M. E. Hellmn, New directions in cryptogrphy, IEEE Trns. Inform. Theory, vol. 22, pp , Nov [4] N. S. Jynt, B. J. McDermott, S. W. Christensen nd A. M. Quinn, A comprison of four methods for nlog speech privcy, IEEE Trns. Commun., vol. COM-29, pp. 8-23, Jn. 98. [5] B. Goldurg, S. Sridhrn nd E. Dwson, Design nd cryptnlysis of trnsform sed speech scrmlers, IEEE J. Selected Ares Commun., vol., no. 5, pp , June 993. [6] R. L. Pickholtz, D. L. Schilling nd L. B. Milstein, Theory of spred spectrum communictions A tutoril, IEEE Trns. Commun., vol. COM-3, no. 5, My 982. [7] E. H. Dinn nd B. Jri, Spreding codes for direct sequence CDMA nd widend CDMA cellulr networks, IEEE Commun. Mgzine, vol. 36, no. 4, pp , Sep [8] B. Sklr, Digitl Communictions: Fundmentls nd Applictions, 2nd Ed., NJ: Prentice Hll, 2. 5

7 () () (c) (d) (e) (f) (g) (h) (i) (j) (k) (l) (m) (n) (o) (p) Fig. 2. Time domin nd its spectrogrm representtion for 3 ms speech segment of the utternce /vnde mtrm/ re shown in ()-(). The encrypted time domin speech segment nd its spectrogrm re shown using: (c)-(d) m-sequences, (e)-(f) Gold sequences, (g)-(h) Gold-like sequences, (i)-(j) Brker sequences, (k)-(l) Brker-like sequences, (m)-(n) smll set of Ksmi sequences, nd (o)-(p) lrge set of Ksmi sequences. 5

8 () () (c) (d) (e) (f) (g) (h) (i) (j) Fig. 3. Time domin nd its spectrogrm representtion for the sme 3 ms speech segment when encrypted with: ()-() orthogonl codes, (c)-(d) Wlsh Hdmrd codes, (e)-(f) modified Wlsh Hdmrd codes, (g)-(h) OVSF codes, nd (i)-(j) orthogonl Gold codes. 52

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA)

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA) 16 Q Wireless Communiction Engineering #1 Spred Spectrum & Code Division Multiple Access (CDMA Kei Skguchi skguchi@mobile.ee. July 9, 16 Course Schedule ( Dte ext Contents #7 July 15 4.6 Error correction

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Analysis of circuits containing active elements by using modified T - graphs

Analysis of circuits containing active elements by using modified T - graphs Anlsis of circuits contining ctive elements using modified T - grphs DALBO BOLEK *) nd EA BOLKOA**) Deprtment of Telecommunictions *) dioelectronics **) Brno Universit of Technolog Purknov 8, 6 Brno CECH

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

DIGITAL multipliers [1], [2] are the core components of

DIGITAL multipliers [1], [2] are the core components of World Acdemy of Science, Engineering nd Technology 9 8 A Reduced-Bit Multipliction Algorithm for Digitl Arithmetic Hrpreet Singh Dhillon nd Ahijit Mitr Astrct A reduced-it multipliction lgorithm sed on

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

AN ANALYSIS ON SYNTHETIC APERTURE RADAR DATA AND ENHANCEMENT OF RECONSTRUCTED IMAGES

AN ANALYSIS ON SYNTHETIC APERTURE RADAR DATA AND ENHANCEMENT OF RECONSTRUCTED IMAGES AN ANALYSIS ON SYNTHETIC APERTURE RADAR DATA AND ENHANCEMENT OF RECONSTRUCTED IMAGES Cihn Erş e-mil: ers@eh.itu.edu.tr Istnul Technicl University, Fculty of Electricl nd Electronics Engineering, Deprtment

More information

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies

Two-layer slotted-waveguide antenna array with broad reflection/gain bandwidth at millimetre-wave frequencies Two-lyer slotted-wveguide ntenn rry with rod reflection/gin ndwidth t millimetre-wve frequencies S.-S. Oh, J.-W. Lee, M.-S. Song nd Y.-S. Kim Astrct: A 24 24 slotted-wveguide rry ntenn is presented in

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

Markov mode-multiplexing mode in OFDM outphasing transmitters

Markov mode-multiplexing mode in OFDM outphasing transmitters Crro et l. EURASIP Journl on Wireless Communictions nd Networking 18 18:36 https://doi.org/1.1186/s13638-18-141-5 RESEARCH Open Access Mrkov mode-multiplexing mode in OFDM outphsing trnsmitters Pedro L.

More information

Improved Ensemble Empirical Mode Decomposition and its Applications to Gearbox Fault Signal Processing

Improved Ensemble Empirical Mode Decomposition and its Applications to Gearbox Fault Signal Processing IJCSI Interntionl Journl of Computer Science Issues, Vol. 9, Issue, No, Novemer ISSN (Online): 9- www.ijcsi.org 9 Improved Ensemle Empiricl Mode Decomposition nd its Applictions to Gerox Fult Signl Processing

More information

DESIGN OF CONTINUOUS LAG COMPENSATORS

DESIGN OF CONTINUOUS LAG COMPENSATORS DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch

DP4T RF CMOS Switch: A Better Option to Replace the SPDT Switch and DPDT Switch Send Orders of Reprints t reprints@enthmscience.org 244 Recent Ptents on Electricl & Electronic Engineering 2012, 5, 244-248 DP4T RF CMOS Switch: A Better Option to Replce the SPDT Switch nd DPDT Switch

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

PRO LIGNO Vol. 11 N pp

PRO LIGNO Vol. 11 N pp THE INFLUENCE OF THE TOOL POINT ANGLE AND FEED RATE ON THE DELAMINATION AT DRILLING OF PRE-LAMINATED PARTICLEBOARD Mihi ISPAS Prof.dr.eng. Trnsilvni University of Brsov Fculty of Wood Engineering Address:

More information

Address for Correspondence

Address for Correspondence Mrndn et l., Interntionl Journl of Advnced Engineering Technology E-ISSN 0976-3945 Reserch Pper A LATTICE REDUCTION-AIDED INFORMATION PRECODER FOR MULTIUSER COMMUNICATION SYSTEM S. Mrndn, N. Venteswrn

More information

Throughput of Wireless Relay Networks with Interference Processing

Throughput of Wireless Relay Networks with Interference Processing NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques

Performance Monitoring Fundamentals: Demystifying Performance Assessment Techniques Simplifying PID Control. Optimizing Plnt Performnce. Performnce Monitoring Fundmentls: Demystifying Performnce Assessment Techniques Roert C. Rice, PhD Rchelle R. Jyringi Dougls J. Cooper, PhD Control

More information

D I G I TA L C A M E R A S PA RT 4

D I G I TA L C A M E R A S PA RT 4 Digitl Cmer Technologies for Scientific Bio-Imging. Prt 4: Signl-to-Noise Rtio nd Imge Comprison of Cmers Yshvinder Shrwl, Solexis Advisors LLC, Austin, TX, USA B I O G R A P H Y Yshvinder Shrwl hs BS

More information

A Key Set Cipher for Wireless Sensor Networks

A Key Set Cipher for Wireless Sensor Networks A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing

More information

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow Convolutionl Networks Lecture slides for Chpter 9 of Deep Lerning In Goodfellow 2016-09-12 Convolutionl Networks Scle up neurl networks to process very lrge imges / video sequences Sprse connections Prmeter

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

EXIT CHARTS FOR TURBO RECEIVERS IN MIMO SYSTEMS

EXIT CHARTS FOR TURBO RECEIVERS IN MIMO SYSTEMS EXIT CHATS FO TUBO ECEIVES IN MIMO SYSTEMS Césr Hermosill Universidd Técnic Federico Snt Mrí Vlpríso, Chile hermosil@inrs-telecomuquebecc Leszek Szczeciński Institut Ntionl de l echerche Scientifique-EMT

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

Secret Key Generation and Agreement in UWB Communication Channels

Secret Key Generation and Agreement in UWB Communication Channels Secret Key Genertion nd greement in UW Communiction Chnnels Msoud Ghoreishi Mdiseh, Michel L. McGuire, Stephen S. Neville, Lin Ci, Michel Horie Deprtment of Electricl nd Computer Engineering University

More information

Performance Comparison between Network Coding in Space and Routing in Space

Performance Comparison between Network Coding in Space and Routing in Space Performnce omprison etween Network oding in Spce nd Routing in Spce Yunqing Ye, Xin Hung, Ting Wen, Jiqing Hung nd lfred Uwitonze eprtment of lectronics nd Informtion ngineering, Huzhong University of

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

An Efficient SC-FDM Modulation Technique for a UAV Communication Link

An Efficient SC-FDM Modulation Technique for a UAV Communication Link electronics Article An Efficient SC-FDM Modultion Technique for UAV Communiction Link Sukhrob Aev 1, Oh-Heum Kwon 1, Suk-Hwn Lee 2 Ki-Ryong Kwon 1, * 1 Deprtment of IT Convergence Appliction Engineering,

More information

Experiment 3: The research of Thevenin theorem

Experiment 3: The research of Thevenin theorem Experiment 3: The reserch of Thevenin theorem 1. Purpose ) Vlidte Thevenin theorem; ) Mster the methods to mesure the equivlent prmeters of liner twoterminl ctive. c) Study the conditions of the mximum

More information

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5 21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies

More information

Automatic Synthesis of Compressor Trees: Reevaluating Large Counters

Automatic Synthesis of Compressor Trees: Reevaluating Large Counters Automtic Snthesis of Compressor Trees: Reevluting Lrge Counters Aj K. Verm AjKumr.Verm@epfl.ch Polo Ienne Polo.Ienne@epfl.ch Ecole Poltechnique Fédérle de Lusnne (EPFL) School of Computer nd Communiction

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

Modeling of Conduction and Switching Losses in Three-Phase Asymmetric Multi-Level Cascaded Inverter

Modeling of Conduction and Switching Losses in Three-Phase Asymmetric Multi-Level Cascaded Inverter Proceedings of the 5th WEA nt. onf. on Power ystems nd Electromgnetic omptibility, orfu, Greece, August 23-25, 2005 (pp176-181) Modeling of onduction nd witching Losses in Three-Phse Asymmetric Multi-Level

More information

Compared to generators DC MOTORS. Back e.m.f. Back e.m.f. Example. Example. The construction of a d.c. motor is the same as a d.c. generator.

Compared to generators DC MOTORS. Back e.m.f. Back e.m.f. Example. Example. The construction of a d.c. motor is the same as a d.c. generator. Compred to genertors DC MOTORS Prepred by Engr. JP Timol Reference: Electricl nd Electronic Principles nd Technology The construction of d.c. motor is the sme s d.c. genertor. the generted e.m.f. is less

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest

More information

This is a repository copy of Four-port diplexer for high Tx/Rx isolation for integrated transceivers.

This is a repository copy of Four-port diplexer for high Tx/Rx isolation for integrated transceivers. This is repository copy of Four-port diplexer for high Tx/Rx isoltion for integrted trnsceivers. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/124000/ Version: Accepted Version

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

Comparison of soundscape on the ground floor of tube-houses in Hanoi and open urban space in Bordeaux

Comparison of soundscape on the ground floor of tube-houses in Hanoi and open urban space in Bordeaux Comprison of soundscpe on the ground floor of tue-houses in Hnoi nd open urn spce in Bordeux Tun Anh Nguyen GRECAU Bordeux, Ecole Ntionle Supérieure d Architecture et de Pysge de Bordeux, Tlence, Frnce

More information

Modeling Time-Variant Fast Fading Statistics of Mobile Peer-to-Peer Radio Channels

Modeling Time-Variant Fast Fading Statistics of Mobile Peer-to-Peer Radio Channels Modeling Time-Vrint Fst Fding Sttistics of Moile Peer-to-Peer Rdio Chnnels Mingming Gn, Nicoli Czink, Polo Cstiglione, Clude Oestges 2, Fredrik Tufvesson 3, Thoms Zemen FTW Forschungszentrum Telekommuniktion

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

Software for the automatic scaling of critical frequency f 0 F2 and MUF(3000)F2 from ionograms applied at the Ionospheric Observatory of Gibilmanna

Software for the automatic scaling of critical frequency f 0 F2 and MUF(3000)F2 from ionograms applied at the Ionospheric Observatory of Gibilmanna ANNALS OF GEOPHYSICS, VOL. 47, N. 6, Decemer 2004 Softwre for the utomtic scling of criticl frequency f 0 F2 nd MUF(3000)F2 from ionogrms pplied t the Ionospheric Oservtory of Giilmnn Michel Pezzopne nd

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

A Practical DPA Countermeasure with BDD Architecture

A Practical DPA Countermeasure with BDD Architecture A Prcticl DPA Countermesure with BDD Architecture Toru Akishit, Msnou Ktgi, Yoshikzu Miyto, Asmi Mizuno, nd Kyoji Shiutni System Technologies Lortories, Sony Corportion, -7- Konn, Minto-ku, Tokyo 8-75,

More information

Alternating-Current Circuits

Alternating-Current Circuits chpter 33 Alternting-Current Circuits 33.1 AC Sources 33.2 esistors in n AC Circuit 33.3 Inductors in n AC Circuit 33.4 Cpcitors in n AC Circuit 33.5 The LC Series Circuit 33.6 Power in n AC Circuit 33.7

More information

This is a repository copy of Design Guidelines for Fractional Slot Multi-Phase Modular Permanent Magnet Machines.

This is a repository copy of Design Guidelines for Fractional Slot Multi-Phase Modular Permanent Magnet Machines. This is repository copy of Design Guidelines for Frctionl Slot Multi-Phse Modulr Permnent Mgnet Mchines. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/110126/ Version: Accepted

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

CDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"

CDMA One. International summer students courses: Plugged In: Modern Networks and Services in Telecommunication INTRAROM S.A. ROMANIAN TELECOMMUNICATIONS AND ELECTRONICS INDUSTRY ROMANIA, Buchrest, 17 Fbric de Glucoz St., Sector 2 Cod 72322, Tel:(+40 1) 2040600 Fx:(+40 1) 2040611 http://www.intrrom.ro Interntionl

More information

Design of UHF Fractal Antenna for Localized Near-Field RFID Application

Design of UHF Fractal Antenna for Localized Near-Field RFID Application 1 Design of UHF Frctl Antenn for Loclized Ner-Field RFID Appliction Yonghui To, Erfu Yng, Yxin Dong, nd Gng Wng, Memer, IEEE Astrct In this pper, frctl structure is proposed for loclized ner-field UHF

More information

Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures

Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures Suword Permuttion Instructions for Two-Dimensionl Multimedi Processing in MicroSIMD rchitectures Ruy. Lee Princeton University rlee@ee.princeton.edu strct MicroSIMD rchitectures incorporting suword prllelism

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

Analog computation of wavelet transform coefficients in real-time Moreira-Tamayo, O.; Pineda de Gyvez, J.

Analog computation of wavelet transform coefficients in real-time Moreira-Tamayo, O.; Pineda de Gyvez, J. Anlog computtion of wvelet trnsform coefficients in rel-time Moreir-Tmyo, O.; Pined de Gyvez, J. Published in: IEEE Trnsctions on Circuits nd Systems. I, Fundmentl Theory nd Applictions DOI: 0.09/8.558443

More information

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato Softdecision Viterbi Decoding with Diversity Combining T.Ski, K.Kobyshi, S.Kubot, M.Morikur, S.Kto NTT Rdio Communiction Systems Lbortories 2356 Tke, Yokosukshi, Kngw, 2383 Jpn ABSTRACT Diversity combining

More information

Electronic Circuits I - Tutorial 03 Diode Applications I

Electronic Circuits I - Tutorial 03 Diode Applications I Electronic Circuits I - Tutoril 03 Diode Applictions I -1 / 9 - T & F # Question 1 A diode cn conduct current in two directions with equl ese. F 2 When reverse-bised, diode idelly ppers s short. F 3 A

More information

Logic Design of Elementary Functional Operators in Quaternary Algebra

Logic Design of Elementary Functional Operators in Quaternary Algebra Interntionl Journl of Computer Theory nd Engineering, Vol. 8, No. 3, June 206 Logic Design of Elementry unctionl Opertors in Quternry Alger Asif iyz, Srh Nhr Chowdhury, nd Khndkr Mohmmd Ishtik Astrct Multivlued

More information

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso

More information

Calculation of Off-Core Inductance in Dual-Circuit Model of Transformer

Calculation of Off-Core Inductance in Dual-Circuit Model of Transformer Clcultion of Off-Core Inductnce in Dul-Circuit Model of Trnsformer As Lotfi NTNU Trondheim, Norwy s.lotfi@ntnu.no Hns Kr. Hoidlen NTNU Trondheim, Norwy hns.hoidlen@ntnu.no Nicol Chies Sttoil Trondheim,

More information

Lab 8. Speed Control of a D.C. motor. The Motor Drive

Lab 8. Speed Control of a D.C. motor. The Motor Drive Lb 8. Speed Control of D.C. motor The Motor Drive Motor Speed Control Project 1. Generte PWM wveform 2. Amplify the wveform to drive the motor 3. Mesure motor speed 4. Mesure motor prmeters 5. Control

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

5 I. T cu2. T use in modem computing systems, it is desirable to. A Comparison of Half-Bridge Resonant Converter Topologies

5 I. T cu2. T use in modem computing systems, it is desirable to. A Comparison of Half-Bridge Resonant Converter Topologies 74 EEE TRANSACTONS ON POER ELECTRONCS, VOL. 3, NO. 2, APRL 988 A Comprison of Hlf-Bridge Resonnt Converter Topologies Abstrct-The hlf-bridge series-resonnt, prllel-resonnt, nd combintion series-prllel

More information

University of Dayton Research Institute Dayton, Ohio, Materials Laboratory Wright Patterson AFB, Ohio,

University of Dayton Research Institute Dayton, Ohio, Materials Laboratory Wright Patterson AFB, Ohio, LEAKY PLATE WAVE INSPECTION OF BIAXIAL COMPOSITES Richrd W. Mrtin University of Dyton Reserch Institute Dyton, Ohio, 45469-0001 Dle E. Chimenti Mterils Lortory Wright Ptterson AFB, Ohio, 45433-6533 INTRODUCTION

More information

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals

Localization of Latent Image in Heterophase AgBr(I) Tabular Microcrystals Interntionl ymposium on ilver Hlide Technology Locliztion of Ltent Imge in Heterophse AgBr(I) Tulr Microcrystls Elen V. Prosvirkin, Aigul B. Aishev, Timothy A. Lrichev, Boris A. echkrev Kemerovo tte University,

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

Translate and Classify Conic Sections

Translate and Classify Conic Sections TEKS 9.6 A.5.A, A.5.B, A.5.D, A.5.E Trnslte nd Clssif Conic Sections Before You grphed nd wrote equtions of conic sections. Now You will trnslte conic sections. Wh? So ou cn model motion, s in E. 49. Ke

More information