IV054 IV054 IV054 IV054 LITERATURE INTRODUCTION HISTORY OF CRYPTOGRAPHY

Size: px
Start display at page:

Download "IV054 IV054 IV054 IV054 LITERATURE INTRODUCTION HISTORY OF CRYPTOGRAPHY"

Transcription

1 IV5 CODING, CRYPTOGRAPHY ad CRYPTOGRAPHIC PROTOCOLS CONTENTS Prof. Josef Gruska DrSc.. Liear codes 3. Cyclic codes. Classical (secret-key) cryptosystems 5. Public-key cryptography 6. RSA cryptosystem. Prime recogitio ad factorizatio. Other cryptosystems 9. Digital sigatures. Idetificatio ad Autheticatio. Protocols to do seemigly impossible. Zero-kowledge proof protocols 3. Stegaography ad Watermarkig. From theory to practice i cryptography 5. Quatum cryptography IV5 LITERATURE R. Hill: A first course i codig theory, Claredo Press, 95 V. Pless: Itroductio to the theory of error-correctig codes, Joh Willey, 99 J. Gruska: Foudatios of computig, Thomso Iteratioal Computer Press, 99 A. Salomaa: Public-key cryptography, Spriger, 99 D. R. Stiso: Cryptography: theory ad practice, 995 B. Scheier: Applied cryptography, Joh Willey ad Sos, 996 J. Gruska: Quatum computig, McGraw-Hill, 999 (For additios ad updatigs: S. Sigh, The code book, Achor Books, 999 D. Kah: The codebreakers. Two story of secret writig. Macmilla, 996 (A etertaiig ad iformative history of cryptography.) IV5 INTRODUCTION IV5 HISTORY OF CRYPTOGRAPHY Trasmissio of classical iformatio i time ad space is owadays very easy (through oiseless chael). It took ceturies, ad may igeious developmets ad discoveries(writig, book pritig, photography, movies, radio trasmissios,tv,souds recordig) ad the idea of the digitalizatio of all forms of iformatio to discover fully this property of iformatio. Codig theory develops methods to protect iformatio agaist a oise. Iformatio is becomig a icreasigly available commodity for both idividuals ad society. Cryptography develops methods how to protect iformatio agaist a eemy (or a uauthorized user). A very importat property of iformatio is that it is ofte very easy to make ulimited umber of copies of iformatio. Stegaography develops methods to hide importat iformatio i iocetly lookig iformatio (ad that ca be used to protect itellectual properties). The history of cryptography is the story of ceturies-old battles betwee codemakers ad codebreakers, a itellectual arms race that has had a dramatic impact o the course of history. The ogoig battle betwee codemakers ad codebreakers has ispired a whole series of remarkable scietific breakthroughts. History is full of codes. They have decided the outcomes of battles ad led to the deaths of kigs ad quees. 3

2 IV5 CHAPTER : Basics of codig theory ABSTRACT Codig theory - theory of error correctig codes - is oe of the most iterestig ad applied part of mathematics ad iformatics. All real systems that work with digitally represeted data, as CD players, TV, fax machies, iteret, satelites, mobiles, require to use error correctig codes because all real chaels are, to some extet, oisy. Codig theory problems are therefore amog the very basic ad most frequet problems of storage ad trasmissio of iformatio. Codig theory results allow to create reliable systems out of ureliable systems to store ad/or to trasmit iformatio. Codig theory methods are ofte elegat applicatios of very basic cocepts ad methods of (abstract) algebra. Chapter presets ad illustrates the very basic problems, cocepts,methods ad results of codig theory. 5 IV5 Codig - basic cocepts Without codig theory ad error-correctig codes there would be o deep-space travel ad pictures, o satelite TV, o compact disc, o o o. Error-correctig codes are used to correct messages whe they are trasmitted through oisy chaels. Error correctig framework A code C over a alphabet Σ is a subset of Σ* - (C Σ*). A q -ary code is a code over a alphabet of q -symbols. A biary code is a code over the alphabet {,}. s of codes C = {,,, } C = {,,, } C 3 = {,,, } 6 IV5 CHANNEL BASIC IDEA is the physical medium through which iformatio is trasmitted. (Telephoe lies ad the atmosphere are examples of chaels.) NOISE may be caused by supots, lightig, meteor showers, radom radio disturbace, poor typig, poor hearig,. TRANSMISSION GOALS. Fast ecodig of iformatio.. Easy trasmissio of ecoded messages. 3. Fast decodig of received messages.. Reliable correctio of errors itroduced i the chael. 5. Maximum trasfer of iformatio per uit time. METHOD OF FIGHTING ERRORS: REDUNDANCY!!! is ecoded as ad is ecoded as. The details of techiques used to protect iformatio agaist oise i practice are sometimes rather complicated, but basic priciples are easily uderstood. The key idea is that i order to protect a message agaist a oise, we should ecode the message by addig some redudat iformatio to the message. I such a case, eve if the message is corrupted by a oise, there will be eough redudacy i the ecoded message to recover, or to decode the message completely.

3 I case of: the ecodig EXAMPLE IV5 EXAMPLE: Codigs of a path avoidig a eemy territory Story Alice ad Bob share a idetical map (Fig. ) gridded as show i Fig.. Oly Alice kows the route through which Bob ca reach her avoidig the eemy territory. Alice wats to sed Bob the followig iformatio about the safe route he should take. the probability of the bit error p, ad the maority votig decodig NNWNNWWSSWWNNNNWWN,,,,,,, the probability of a erroeous message is 3 3 3p ( p) + p = 3p p < p Three ways to ecode the safe route from Bob to Alice are:. C = {,,, } Ay error i the code word would be a disaster.. C = {,,, } A sigle error i ecodig each of symbols N, W, S, E could be detected. 3. C 3 = {,,, } A sigle error i decodig each of symbols N, W, S, E could be corrected. 9 IV5 Basic termiology IV5 Hammig distace Block code - a code with all words of the same legth. Codewords - words of some code. Basic assumptios about chaels. Code legth preservatio Each output codeword of a chael has the same legth as the iput codeword.. Idepedece of errors The probability of ay oe symbol beig affected i trasmissios is the same. Basic strategy for decodig For decodig we use the so-called maximal likehood priciple, or earest eighbor decodig strategy, which says that the receiver should decode a word w' as that codeword w that is the closest oe to w'. The ituitive cocept of closeess'' of two words is well formalized through Hammig distace h(x, y) of words x, y. For two words x, y h(x, y) = the umber of symbols x ad y differ. : h(, ) = 3, h(fourth, eighth) = Properties of Hammig distace () h(x, y) = x = y () h(x, y) = h(y, x) (3) h(x, z) h(x, y) + h(y, z) triagle iequality A importat parameter of codes C is their miimal distace. h(c) = mi {h(x, y) x,y C, x y}, because it gives the smallest umber of errors eeded to chage oe codeword ito ather. Theorem Basic error correctig theorem () A code C ca detected up to s errors if h(c) s +. () A code C ca correct up to t errors if h(c) t +. Proof () Trivial. () Suppose h(c) t +. Let a codeword x is trasmitted ad a word y is recceived with h(x, y) t. If x' x is a codeword, the h(x y) t + because otherwise h(x', y) <t + ad therefore h(x, x') h(x, y) +h(y, x') < t + what cotradicts the assumptio h(c) t +.

4 IV5 Biary symmetric chael IV5 Additio of oe parity-check bit Cosider a trasmitio of biary symbols such that each symbol has probability of error p </. Biary symmetric chael If symbols are trasmitted, the the probability of t errors is t t p ( p) (). t I the case of biary symmetric chaels the earest eighbour decodig strategy is also maximum likehood decodig strategy''. Cosider C = {, } ad the earest eighbour decodig strategy. Probability that the received word is decoded correctly as is ( - p) 3 +3p( - p), as is ( - p) 3 +3p( - p). Therefore P err (C) = - (( - p) 3 +3p( - p) ) is the so-called word error probability. If p =., the P err (C) =.9 ad oly oe word i 3555 will reach the user with a error. 3 Let all of biary words of legth be codewords. Let the probability of a error be -. Let bits be trasmitted at the rate bits per secod. The probability that a word is trasmitted icorrectly is approximately p( p). Therefore =. of words per secod are trasmitted icorrectly. Oe wrog word is trasmitted every secods, 36 erroeous words every hour ad 6 words every day without beig detected! Let oe parity bit be added. Ay sigle error ca be detected. The probability of at least two errors is: 66 ( p) ( p) p ( )( p) p Therefore approximately words per secod are trasmitted with a udetectable error. Corollary Oe udetected error occurs oly every days! ( 9 /(5.5 6).) IV5 TWO-DIMENSIONAL PARITY CODE IV5 Notatio ad s The two-dimesioal parity code arrages the data ito a two-dimesioal array ad the to each row (colum) parity bit is attached. Biary strig is represeted ad ecoded as follows Questio How much better is two-dimesioal ecodig tha oe-dimesioal ecodig? Notatio: A (,M,d) - code C is a code such that - is the legth of codewords. M - is the umber of codewords. d - is the miimum distace i C. ample: C = {,,, } is a (,,)-code. C = {,,, } is a (3,,)-code. C 3 = {,,, } is a (5,,3)-code. Commet: A good (,M,d) code has small ad large M ad d. 5 6

5 IV5 Notatio ad s (Trasmissio of photographs from the deep space) I Marier -5 took the first photographs of aother plaet - photos. Each photo was divided ito elemetary squares - pixels. Each pixel was assiged 6 bits represetig 6 levels of brightess. Hadamard code was used. Trasmissio rate:.3 bits per secod. I 9- Mariers 6- took such photographs that each picture was broke ito 3 squares. Reed-Muller (3,6,6) code was used. Trasmissio rate was 6 bits per secod. (Much better pictures) IV5 HADAMARD CODE I Marier 5, 6-bit pixels were ecoded usig 3-bit log Hadamard code that could correct up to errors. Hadamard code had 6 codewords. 3 of them were represeted by the 3 3 matrix H ={h IJ }, where i, ad a b + ab ab ( ) where i ad have biary represetatios i = a a 3 a a a, = b b 3 b b b. h i = The remaig 3 codewords were represeted by the matrix -H. Decodig was quite simple. IV5 CODE RATE IV5 The ISBN-code For q-ary (,M,d)-code we defie code rate, or iformatio rate, R, by lgq M R =. The code rate represets the ratio of the umber of iput data symbols to the umber of trasmitted code symbols. Code rate (6/ for Hadamard code), is a importat parameter for real implemetatios, because it shows what fractio of the badwidth is beig used to trasmit actual data. Each recet book has Iteratioal Stadard Book Number which is a -digit codeword produced by the publisher with the followig structure: l p m w = x x laguage publisher umber weighted check sum 953 such that i= ix i ( mod ) The publisher has to put X ito the -th positio if x =. The ISBN code is desiged to detect: (a) ay sigle error (b) ay double error created by a traspositio Sigle error detectio Let X = x x be a correct code ad let Y = x x J- y J x J+ x with y J = x J +a, a I such a case: i= iyi = ixi + a i= ( mod ) 9

6 IV5 The ISBN-code IV5 Equivalece of codes Let x J ad x k be exchaged. i= iyi = ixi + = i= Traspositio detectio ( k ) x + ( k) ( k )( x x ) ( mod ) if k ad x x. k x k k Defiitio Two q -ary codes are called equivalet if oe ca be obtaied from the other by a combiatio of operatios of the followig type: (a) a permutatio of the positios of the code. (b) a permutatio of symbols apperig i a fixed positio. Questio: Let a code be displayed as a M matrix. To what correspod operatios (a) ad (b)? Claim: Distaces betwee codewords are uchaged by operatios (a), (b). Cosequetly, equivalet codes have the same parameters (,M,d) (ad correct the same umber of errors). s of equivalet codes () ( ) Lemma Ay q -ary (,M,d) -code over a alphabet {,,,q -} is equivalet to a (,M,d) -code which cotais the all-zero codeword. Proof Trivial. IV5 The mai codig theory problem IV5 The mai codig theory problem A good (,M,d) -code has small, large M ad large d. The mai codig theory problem is to optimize oe of the parameters, M, d for give values of the other two. Notatio: A q (,d) is the largest M such that there is a q -ary (,M,d) -code. Theorem (a) A q (,) = q ; (b) A q (,) =q. Proof (a) obvios; (b) Let C be a q -ary (,M,) -code. Ay two distict codewords of C differ i all positios. Hece symbols i ay fixed positio of M codewords have to be differet A q (,) q. Sice the q -ary repetitio code is (,q,) -code, we get A q (,) q. Proof that A (5,3) =. (a) Code C 3 is a (5,,3) -code, hece A (5,3). (b) Let C be a (5,M,3) -code with M. By previous lemma we ca assume that C. C cotais at most oe codeword with at least four 's. (otherwise d (x,y) for two such codewords x, y) Sice C there ca be o codeword i C with oe or two. Sice d =3 C caot cotai three codewords with three 's. Sice M there have to be i C two codewords with three 's. (say, ), the oly possible codeword with four or five 's is the. 3

7 IV5 The mai codig theory problem IV5 The mai codig theory problem Theorem Suppose d is odd. The a biary (,M,d) -code exists iff a biary ( +,M,d +) -code exists. Proof Oly if case: Let C be a biary code (,M,d) -code. Let C = { x... xx+ x... x C, x+ = ( xi ) mod } i = Sice parity of all codewords i C is eve, d(x,y ) is eve for all x,y C. Hece d(c ) is eve. Sice d d(c ) d + ad d is odd, d(c ) = d +. Hece C is a ( +,M,d +) -code. Corollary: If d is odd, the A (,d) =A ( +,d +). If d} is eve, the A (,d) =A ( -,d -). A (5,3) = A (6,) = (5,,3) -code (6,,) code by addig check. If case: Let D be a ( +,M,d +) -code. Choose code words x, y of D such that d(x,y) =d +. Fid a positio i which x, y differ ad delete this positio from all codewords of D. Resultig code is a (,M,d) -code. 5 6 IV5 A geeral upper boud o A q (,d) IV5 A geeral upper boud o A q (,d) Notatio F q is a set of all words of legth over alphabet {,,,,q -} Defiitio For ay codeword u F q ad ay iteger r the sphere of radius r ad cetre u is deoted by S (u,r) ={v F q d (u,v) r }. Theorem A sphere of radius r i F q, r cotais words. () + ()( q ) + ()( q ) ()( q ) r r Proof Let u be a fixed word i F q. The umber of words that differ from u i m positio is ( )( q m ) m. Theorem (The sphere-packig or Hammig boud) If C is a q -ary (,M,t +) -code, the M {() + ()( q ) ()( q ) } t q Proof Ay two spheres of radius t cetered o distict codewords have o codeword i commo. Hece the total umber of words i M spheres of radius t cetered o M codewords is give by the left side (). This umber has to be less or equal to q. A code which achieves the sphere-packig boud from (), i.e. such that equality holds i (), is called a perfect code. t ()

8 IV5 A geeral upper boud o A q (,d) IV5 LOWER BOUND for A q (,d) A (,M,3) -code is perfect if M ( ) ( + ) = i.e. M =6 A example of such a code: C = {,,,,,,,,,,,,,,, } Table of A (,d) from d = d = d = The followig lower boud for A q (,d) is kow as Gilbert-Varshaov boud: Theorem Give d, there exists a q -ary (,M,d) -code with q M d ( )( ) = q ad therefore q Aq (, d ) d q = ( )( ) For curret best results see IV5 Geeral codig problem IV5 Shao's oisless codig theorem The basic problems of iformatio theory are how to defie formally such cocepts as iformatio ad how to store or trasmit iformatio efficietly. Let X be a radom variable (source) which takes a value x with probability p(x). The etropy of X is defied by S( X ) = p( x) lg p( x) x ad it is cosidered to be the iformatio cotet of X. The maximum iformatio which ca be stored by a -value variable is lg. I a special case of a biary variable X which takes o the value with probability p ad the value with probability p S(X) =H(p) =-plg p -(-p)lg( - p) Problem: What is the miimal umber of bits we eed to trasmit values of X? Basic idea: To ecode more probable outputs of X by shorter biary words. (Morse code) a.- b - c -.-. d -.. e. f..-. g --. h. i k -.- l.-.. m o --- p.--. q --.- r.-. s t - u..- v - w.-- x -..- y -.-- z I a simple form Shao's oisless codig theorem says that i order to trasmit values of X we eed S(X) bits. More exactly, we caot do better ad we ca reach the boud S(X) as close as desirable. Let a source X produce the value with probability p =¼ Let the source X produce the value with probability - p =¾ Assume we wat to ecode blocks of the outputs of X of legth. By Shao's theorem we eed H (¼) = 3.5 bits per blocks (i average) A simple ad practical methods kow as Huffma's code requires i this case 3.3 bits per message. mess. code mess. code mess. code mess. Code Observe that this is a prefix code - o codeword is a prefix of aother codeword. 3

9 IV5 Desig of Huffma code Give a sequece of obects, x,,x with probabilities p p. Stage - shrikig of the sequece. Replace x -, x with a ew obect y - with probability p - + p ad rearrage sequece so oe has agai oicreasig probabilities. Keep doig the above step till the sequece shriks to two obects. IV5 Desig of Huffma code Stage Apply agai ad agai the followig method: If C ={c,,c r } is a prefix optimal code for a source S r, the C' ={c',,c' r+ } is a optimal code for S r+, where c' i = c i i r c' r = c r c' r+ = c r. Stage - extedig the code - Apply agai ad agai the followig method. If C ={c,,c r } is a prefix optimal code for a source S r, the C' ={c',,c' r+ } is a optimal code for S r+, where c' i = c i i r c' r = c r c' r+ = c r IV5 A BIT OF HISTORY IV5 A BIT OF HISTORY The subect of error-correctig codes arose origially as a respose to practical problems i the reliable commuicatio of digitally ecoded iformatio. The disciplie was iitiated i the paper Claude Shao: A mathematical theory of commuicatio, Bell Syst.Tech. Joural V, 9, 39-3, Shao's paper started the scietific disciplie iformatio theory ad error-corectig codes are its part. Origially, iformatio theory was a part of electrical egieerig. Nowadays, it is a importat part of mathematics ad also of iformatics. SHANNON's VIEW I the itroductio to his semial paper A mathematical theory of commuicatio Shao wrote: The fudametal problem of commuicatio is that of reproducig at oe poit either exactly or approximately a message selected at aother poit

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Compression Programs. Compression Outline. Multimedia. Lossless vs. Lossy. Encoding/Decoding. Analysis of Algorithms

Compression Programs. Compression Outline. Multimedia. Lossless vs. Lossy. Encoding/Decoding. Analysis of Algorithms Aalysis of Algorithms Compressio Programs File Compressio: Gzip, Bzip Archivers :Arc, Pkzip, Wirar, File Systems: NTFS Piyush Kumar (Lecture 5: Compressio) Welcome to 453 Source: Guy E. Blelloch, Emad,

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

H(X,Y) = H(X) + H(Y X)

H(X,Y) = H(X) + H(Y X) Today s Topics Iformatio Theory Mohamed Hamada oftware gieerig ab The Uiversity of Aizu mail: hamada@u-aizu.ac.jp UR: http://www.u-aizu.ac.jp/~hamada tropy review tropy ad Data Compressio Uiquely decodable

More information

CS3203 #5. 6/9/04 Janak J Parekh

CS3203 #5. 6/9/04 Janak J Parekh CS3203 #5 6/9/04 Jaak J Parekh Admiistrivia Exam o Moday All slides should be up We ll try ad have solutios for HWs #1 ad #2 out by Friday I kow the HW is due o the same day; ot much I ca do, uless you

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

POWERS OF 3RD ORDER MAGIC SQUARES

POWERS OF 3RD ORDER MAGIC SQUARES Fuzzy Sets, Rough Sets ad Multivalued Operatios ad Applicatios, Vol. 4, No. 1, (Jauary-Jue 01): 37 43 Iteratioal Sciece Press POWERS OF 3RD ORDER MAGIC SQUARES Sreerajii K.S. 1 ad V. Madhukar Mallayya

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2 Lossless image compressio Usig Hashig (usig collisio resolutio) Amritpal Sigh 1 ad Racha rajpoot 2 1 M.Tech.* CSE Departmet, 2 Departmet of iformatio techology Guru Kashi UiversityTalwadi Sabo, Bathida

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

BOUNDS FOR OUT DEGREE EQUITABLE DOMINATION NUMBERS IN GRAPHS

BOUNDS FOR OUT DEGREE EQUITABLE DOMINATION NUMBERS IN GRAPHS BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN 2303-4874 (p), ISSN (o) 2303-4955 www.imvibl.org/bulletin Vol. 3(2013), 149-154 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA

More information

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes Ru-Time Error Detectio i Polyomial Basis Multiplicatio Usig Liear Codes Siavash Bayat-Saramdi ad M.A. Hasa Departmet of Electrical ad Computer Egieerig, Uiversity of Waterloo Waterloo, Otario, Caada N2L

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

Insertion/Deletion Correction with Spectral Nulls

Insertion/Deletion Correction with Spectral Nulls 7 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO., MARCH 1997 Isertio/Deletio Correctio with Spectral Nulls H. C. Ferreira, Member, IEEE, W. A. Clarke, A. S. J. Helberg, K. A. S. Abdel-Ghaffar, ad

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

PERMUTATIONS AND COMBINATIONS

PERMUTATIONS AND COMBINATIONS www.sakshieducatio.com PERMUTATIONS AND COMBINATIONS OBJECTIVE PROBLEMS. There are parcels ad 5 post-offices. I how may differet ways the registratio of parcel ca be made 5 (a) 0 (b) 5 (c) 5 (d) 5. I how

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

COLLEGE ALGEBRA LECTURES Copyrights and Author: Kevin Pinegar

COLLEGE ALGEBRA LECTURES Copyrights and Author: Kevin Pinegar OLLEGE ALGEBRA LETURES opyrights ad Author: Kevi iegar 8.3 Advaced outig Techiques: ermutatios Ad ombiatios Factorial Notatio Before we ca discuss permutatio ad combiatio formulas we must itroduce factorial

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

Grade 6 Math Review Unit 3(Chapter 1) Answer Key

Grade 6 Math Review Unit 3(Chapter 1) Answer Key Grade 6 Math Review Uit (Chapter 1) Aswer Key 1. A) A pottery makig class charges a registratio fee of $25.00. For each item of pottery you make you pay a additioal $5.00. Write a expressio to represet

More information

Wavelet Transform. CSEP 590 Data Compression Autumn Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual)

Wavelet Transform. CSEP 590 Data Compression Autumn Wavelet Transformed Barbara (Enhanced) Wavelet Transformed Barbara (Actual) Wavelet Trasform CSEP 59 Data Compressio Autum 7 Wavelet Trasform Codig PACW Wavelet Trasform A family of atios that filters the data ito low resolutio data plus detail data high pass filter low pass filter

More information

We often find the probability of an event by counting the number of elements in a simple sample space.

We often find the probability of an event by counting the number of elements in a simple sample space. outig Methods We ofte fid the probability of a evet by coutig the umber of elemets i a simple sample space. Basic methods of coutig are: Permutatios ombiatios Permutatio A arragemet of objects i a defiite

More information

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters?

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters? COMBINATORICS EXERCISES Stepha Wager 1. How may possible ways are there to form five-letter words usig oly the letters A H? How may such words cosist of five distict letters? 2. How may differet umber

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

PERMUTATIONS AND COMBINATIONS

PERMUTATIONS AND COMBINATIONS Chapter 7 PERMUTATIONS AND COMBINATIONS Every body of discovery is mathematical i form because there is o other guidace we ca have DARWIN 7.1 Itroductio Suppose you have a suitcase with a umber lock. The

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

YGNEQOG VQ ETASVQITCSJA NGEVWTG

YGNEQOG VQ ETASVQITCSJA NGEVWTG CODING, CRYPTOGRAPHY and CRYPTOGRAPHIC PROTOCOLS prof. RNDr. Jozef Gruska, DrSc. Faculty of Informatics Masaryk University YGNEQOG VQ ETASVQITCSJA NGEVWTG October 6, 2016 CONTENTS Technické řešení této

More information

Cooperative Diversity Based on Code Superposition

Cooperative Diversity Based on Code Superposition 1 Cooperative Diversity Based o Code Superpositio Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daiel J. Costello, Jr. Departmet of Electrical Egieerig, Uiversity of Notre Dame, Notre Dame, IN 46556, USA Email:

More information

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes

Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes Performace Limits ad Practical Decodig of Iterleaved Reed-Solomo Polar Cocateated Codes Hessam Mahdavifar, Mostafa El-Khamy, Jugwo Lee, Iyup Kag 1 arxiv:1308.1144v1 [cs.it] 6 Aug 2013 Abstract A scheme

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Lecture 13: DUART serial I/O, part I

Lecture 13: DUART serial I/O, part I Lecture 13: DUART serial I/O, part I The bi picture of serial commuicatios Aalo commuicatios Modems Modulatio-demodulatio methods Baud rate Vs. Bits Per Secod Diital serial commuicatios Simplex, half-duplex

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Shuffling Cards. D.J.W. Telkamp. Utrecht University Mathematics Bachelor s Thesis. Supervised by Dr. K. Dajani

Shuffling Cards. D.J.W. Telkamp. Utrecht University Mathematics Bachelor s Thesis. Supervised by Dr. K. Dajani Shufflig Cards Utrecht Uiversity Mathematics Bachelor s Thesis D.J.W. Telkamp Supervised by Dr. K. Dajai Jue 3, 207 Cotets Itroductio 2 2 Prerequisites 2 2. Problems with the variatio distace................

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Shuffling. Shahrzad Haddadan. March 7, 2013

Shuffling. Shahrzad Haddadan. March 7, 2013 Shufflig Shahrzad Haddada March 7, 2013 Abstract I this paper we will talk about two well-kow shufflig methods, the Top to Radom ad the Riffle Shuffle. We are iterested i the umber of shuffles that will

More information

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013 Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Receptio Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity

More information

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel Decode-forward ad Compute-forward Codig Schemes for the Two-Way Relay Chael Peg Zhog ad Mai Vu Departmet of Electrical ad Computer Egieerig McGill Uiversity Motreal, QC, Caada H3A A7 Emails: peg.zhog@mail.mcgill.ca,

More information

PERMUTATION AND COMBINATION

PERMUTATION AND COMBINATION MPC 1 PERMUTATION AND COMBINATION Syllabus : Fudametal priciples of coutig; Permutatio as a arragemet ad combiatio as selectio, Meaig of P(, r) ad C(, r). Simple applicatios. Permutatios are arragemets

More information

AMC AMS AMR ACS ACR ASR MSR MCR MCS CRS

AMC AMS AMR ACS ACR ASR MSR MCR MCS CRS Sectio 6.5: Combiatios Example Recall our five frieds, Ala, Cassie, Maggie, Seth ad Roger from the example at the begiig of the previous sectio. The have wo tickets for a cocert i Chicago ad everybody

More information

Alignment in linear space

Alignment in linear space Sequece Aligmet: Liear Space Aligmet i liear space Chapter 7 of Joes ad Pevzer Q. Ca we avoid usig quadratic space? Easy. Optimal value i O(m + ) space ad O(m) time. Compute OPT(i, ) from OPT(i-1, ). No

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

Voice Command Recognition System Based on MFCC and VQ Algorithms

Voice Command Recognition System Based on MFCC and VQ Algorithms Voice Commad Recogitio System Based o MFCC ad VQ Algorithms Mahdi Shaeh, ad Azizollah Taheri Abstract The goal of this project is to desig a system to recogitio voice commads. Most of voice recogitio systems

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

Hash-and-Forward Relaying for Two-Way Relay Channel

Hash-and-Forward Relaying for Two-Way Relay Channel Hash-ad-Forward elayig for Two-Way elay Chael Erha Yılmaz ad aymod Kopp EUECOM, Sophia Atipolis, Frace {yilmaz, kopp}@eurecom.fr arxiv:1102.3082v2 [cs.it] 16 Feb 2011 Abstract This paper cosiders a commuicatio

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

On the Number of Permutations on n Objects with. greatest cycle length

On the Number of Permutations on n Objects with. greatest cycle length Ž. ADVANCES IN APPLIED MATHEMATICS 0, 9807 998 ARTICLE NO. AM970567 O the Number of Permutatios o Obects with Greatest Cycle Legth k Solomo W. Golomb ad Peter Gaal Commuicatio Scieces Istitute, Uiersity

More information

Sorting, Selection, and Routing on the Array with Reconfigurable Optical Buses

Sorting, Selection, and Routing on the Array with Reconfigurable Optical Buses IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO., NOVEMBER 997 Sortig, Selectio, ad Routig o the Array with Recofigurable Optical Buses Saguthevar Raasekara, Member, IEEE Computer Society,

More information

Objectives. Some Basic Terms. Analog and Digital Signals. Analog-to-digital conversion. Parameters of ADC process: Related terms

Objectives. Some Basic Terms. Analog and Digital Signals. Analog-to-digital conversion. Parameters of ADC process: Related terms Objectives. A brief review of some basic, related terms 2. Aalog to digital coversio 3. Amplitude resolutio 4. Temporal resolutio 5. Measuremet error Some Basic Terms Error differece betwee a computed

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Subband Coding of Speech Signals Using Decimation and Interpolation

Subband Coding of Speech Signals Using Decimation and Interpolation 3 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 3, May 6 8, 9, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +() 459 43638, Fax: +() 698

More information

Converge-Cast with MIMO

Converge-Cast with MIMO Coverge-Cast with MIMO Luoyi Fu, Yi Qi 2, Xibig Wag 3, Xue Liu 4,2,3 Depart. of Electroic Egieerig, Shaghai Jiaotog Uiversity, Chia 4 Depart. of Computer Sciece & Egieerig, Uiversity of Nebraska Licol,

More information

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING H. Chadsey U.S. Naval Observatory Washigto, D.C. 2392 Abstract May sources of error are possible whe GPS is used for time comparisos. Some of these mo

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

Output. Function f. Characteristic Predictor. Predicted Output Characteristic. Checker. Output. Error

Output. Function f. Characteristic Predictor. Predicted Output Characteristic. Checker. Output. Error WHICH CONCURRENT ERROR DETECTION SCHEME TO CHOOSE? Subhasish Mitra ad Edward J. McCluskey Ceter for Reliable Computig Departmets of Electrical Egieerig ad Computer Sciece Staford Uiversity, Staford, Califoria

More information

Direct Link Networks - Encoding

Direct Link Networks - Encoding Direct Lik Networks - Ecodig Readig: Peterso ad Davie, Chapter 2 Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are we? Applicatio Layers BitTorret (P2P) HTTP (Web) Skype (VOIP) IPTV (streamig media)

More information

Chapter 2: Sample Questions, Problems and Solutions Bölüm 2: Örnek Sorular, Problemler ve Çözümleri

Chapter 2: Sample Questions, Problems and Solutions Bölüm 2: Örnek Sorular, Problemler ve Çözümleri Chapter : Sample Questios, Problems ad Solutios Bölüm : Örek Sorular, Problemler ve Çözümleri Örek Sorular (Sample Questios): Fourier series What is a badwidth? What is a voice-grade? Nyquist theorem Shao

More information

Power Ratio Reduction with OFDM Signals for Broadband Wireless Mobile Communication

Power Ratio Reduction with OFDM Signals for Broadband Wireless Mobile Communication Volume-4, Issue-, February-4, ISSN No.: 5-758 Iteratioal Joural of Egieerig ad Maagemet Research Available at: www.ijemr.et Page Number: 66-7 Power Ratio Reductio with OFDM Sigals for Broadbad Wireless

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC)

Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC) It. J. Commuicatios, Network ad System Scieces, 2009, 6, 469-479 doi:10.4236/ijcs.2009.26051 Published Olie September 2009 (http://www.scirp.org/joural/ijcs/). 469 Beam Patter Scaig (BPS) versus Space-Time

More information

COMBINATORICS 2. Recall, in the previous lesson, we looked at Taxicabs machines, which always took the shortest path home

COMBINATORICS 2. Recall, in the previous lesson, we looked at Taxicabs machines, which always took the shortest path home COMBINATORICS BEGINNER CIRCLE 1/0/013 1. ADVANCE TAXICABS Recall, i the previous lesso, we looked at Taxicabs machies, which always took the shortest path home taxipath We couted the umber of ways that

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Encode Decode Sample Quantize [ ] [ ]

Encode Decode Sample Quantize [ ] [ ] Referece Audio Sigal Processig I Shyh-Kag Jeg Departmet of Electrical Egieerig/ Graduate Istitute of Commuicatio Egieerig M. Bosi ad R. E. Goldberg, Itroductio to Digital Audio Codig ad Stadards, Kluwer

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

Information-Theoretic Analysis of an Energy Harvesting Communication System

Information-Theoretic Analysis of an Energy Harvesting Communication System Iformatio-Theoretic Aalysis of a Eergy Harvestig Commuicatio System Omur Ozel Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 omur@umd.edu ulukus@umd.edu

More information

Making sure metrics are meaningful

Making sure metrics are meaningful Makig sure metrics are meaigful Some thigs are quatifiable, but ot very useful CPU performace: MHz is ot the same as performace Cameras: Mega-Pixels is ot the same as quality Cosistet ad quatifiable metrics

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

ELEC 204 Digital Systems Design

ELEC 204 Digital Systems Design Fall 2013, Koç Uiversity ELEC 204 Digital Systems Desig Egi Erzi College of Egieerig Koç Uiversity,Istabul,Turkey eerzi@ku.edu.tr KU College of Egieerig Elec 204: Digital Systems Desig 1 Today: Datapaths

More information

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications Measuremets of the Commuicatios viromet i Medium Voltage Power Distributio Lies for Wide-Bad Power Lie Commuicatios Jae-Jo Lee *,Seug-Ji Choi *,Hui-Myoug Oh *, Wo-Tae Lee *, Kwa-Ho Kim * ad Dae-Youg Lee

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Department of Electrical and Computer Engineering, Cornell University. ECE 3150: Microelectronics. Spring Due on April 26, 2018 at 7:00 PM

Department of Electrical and Computer Engineering, Cornell University. ECE 3150: Microelectronics. Spring Due on April 26, 2018 at 7:00 PM Departmet of Electrical ad omputer Egieerig, orell Uiersity EE 350: Microelectroics Sprig 08 Homework 0 Due o April 6, 08 at 7:00 PM Suggested Readigs: a) Lecture otes Importat Notes: ) MAKE SURE THAT

More information

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS

CHAPTER 8 JOINT PAPR REDUCTION AND ICI CANCELLATION IN OFDM SYSTEMS CHAPTER 8 JOIT PAPR REDUCTIO AD ICI CACELLATIO I OFDM SYSTEMS Itercarrier Iterferece (ICI) is aother major issue i implemetig a OFDM system. As discussed i chapter 3, the OFDM subcarriers are arrowbad

More information

Hierarchical Beamforming for Large One-Dimensional Wireless Networks

Hierarchical Beamforming for Large One-Dimensional Wireless Networks Hierarchical Beamformig for Large Oe-Dimesioal Wireless Networks Alla Merzakreeva, Olivier Lévêque Swiss Federal Istitute of Techology - Lausae, Switzerlad {alla.merzakreeva, olivier.leveque}@epfl.ch Ayfer

More information

FROM IMAGE TO AUDIO WATERMARKING USING SELF-INVERTING PERMUTATIONS

FROM IMAGE TO AUDIO WATERMARKING USING SELF-INVERTING PERMUTATIONS FROM IMAGE TO AUDIO WATERMARKING USING SELF-INVERTING PERMUTATIONS Maria Chroi, Agelos Fylakis, ad Stavros D. Nikolopoulos Departmet of Computer Sciece ad Egieerig, Uiversity of Ioaia, GR-45110 Ioaia,

More information