R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)

Size: px
Start display at page:

Download "R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)"

Transcription

1 R-AS: AS FUNCTION USING RANDO QUADRATIC POLYNOIALS OVER GF() Dhananoy Dey 1, Noopur Shrotrya 1, Indranath Sengupta 1 SAG, etcalfe ouse, Delh-11 54, INDIA. {dhananoydey, noopurshrotrya}@sag.drdo.n Department of athematcs, Jadavpur Unversty, Kolkata, WB 7 3, INDIA. sengupta.ndranath@gmal.com ABSTRACT In ths paper we descrbe an mproved verson of F-hash [7] vz. R-hash: ash Functon Usng Random Quadratc Polynomals Over GF(). The compresson functon of F-hash conssts of 3 polynomals wth 64 varables over GF(), whch were taken from the frst 3 polynomals of FE challenge-1 by forcng last 16 varables as. The mode operaton used n computng F-hash was erkle-damgard. We have randomly selected 3 quadratc non-homogeneous polynomals havng 64 varables over GF() n case of R-hash to mprove the securty of the compresson functon used n F-hash. In desgnng R-hash, we have also changed the mode operaton used n F-hash, because of the theoretcal weakness found n the erkle-damgard constructon. In ths paper we wll prove that R-hash s more secure than F-hash and SA-56 as well as we wll show that t s also faster than F-hash. KEYWORDS Dedcated hash functons, dfferental attack, Q problem, premage attack. 1. INTRODUCTION After recent cryptanalytc attack on D5 [][15] [8] [31] and SA-1 [5] [6] [3] [4] [9], the securty of ther successor, SA- famly [1], aganst all knds of cryptanalytc attacks has become an mportant ssue. Although many theoretcal attacks [1], [18], [19], [], [1], [6] on the reduced round of SA-56 have been publshed durng 3 to 8, but there s stll no threat to the securty of SA-56. In 7 NIST announced the SA-3 competton [] for selectng a new hash functon, whch would resst length extenson attack and other theoretcal weakness of erkle-damgard constructon. The desgn prncples of all submtted hash functons for SA-3 competton are dfferent from erkle-damgard constructon. We can broadly categorse all the submtted hash functons accordng to ther desgn prncple n the followng way: balanced Festel network, unbalanced Festel network, wde ppe desgn, key schedule, DS matrx, output transformaton, S-box and feedback regster. NIST has already declared the DOI : 1.511/cst

2 SA-3 hash functon on Oct 1. NIST has selected Keccak [3] as the SA-3 hash from the fve SA-3 fnalsts, vz., Blake [1], Grøstl [9], J [7], Keccak [3] and Sken [8]. The compresson functon of F-hash [7] was desgned n such a way that t conssts of the frst 3 polynomals wth frst 64 varables taken from the polynomals of FE challenge-1 by forcng last 16 varables of the 8 varables to. A new hash functon R-hash has been desgned by modfyng F-hash by takng random quadratc polynomals to mprove the securty as well as the effcency of F-hash. The compresson functon of R-hash depends on the followng wellknown facts: It s easy to compute the values of a random set of m multvarate polynomals n n varables over a fnte feld F vz., p ( x,, x ),, p ( x,, x )) for any fxed n ( x 1,, x n ) F. ( 1 1 n m 1 n Solvng random system of polynomal equatons s an NP-hard problem * [11]. In desgnng R-hash, we have changed the paddng procedure, from the one we have appled n F-hash, to ncrease the sze of the nput to the hash functon. We have also changed the erkle- Damgard constructon appled n F-hash by applyng double-ppe desgn to remove the multcollsons attack [13], length extenson attack, fxed-pont attack [16] and herdng attack [14]. A complete descrpton of R-hash and ts analyss wll be presented n the followng subsequent sectons.. R-AS FUNCTION R-hash functon can take arbtrary length ( 64 < 51-bt block) of nput and gves 56 bts 51 * 56 output,.e. we can wrte R hash : ( Z ) Z. We have desgned R-hash by changng the compresson functon as well as the mode operaton. The compresson functon conssts of 3 random polynomals wth 64 varables of degree over GF(). Snce the number of coeffcents of a polynomal of degree wth 64 varables over GF() s at most 81, to generate 3 random polynomals wth 64 varables of degree over GF() requres 6659 random bts. These bts were generated n the followng way: () Frst we compute SA-51 of a fle contanng 968bb576eeb7c6def469a6b48497c4739ac188ef1f948d8a15399b3af8deb91db ef377e366ba9f3e11a85bc41dc49f716d5a1489aec7. () Then we apply SA-51 to the output of the above fle. () We repeat the above process 131 tmes. * It s true even f we restrct the total degree of these polynomals to at least. 16

3 The hash value of a message of length followng manner: L = 51 l + 8r bts can be computed n the Paddng: Frst we append 1 to the end of the message to ndcate the termnaton of the message. Let k be the number of zeros added for paddng. Frst, 7-bt representaton of r bytes s appended to the end of k zeros and then 64-bt representaton of l blocks s placed to the end of 7- bt representaton of r bytes. Now k wll be the smallest non-negatve nteger satsfyng the followng condton: 8r + 1+ k mod 51. e., k + 8r 44 mod 51 The paddng procedure s shown n Fgure 1. Accordng to ths paddng procedure, we can 9 64 compute the hash value of a message of length ( 1) bts. 1 k-bt 7-bt 64-bt Fgure 1: Paddng Procedure Parsng: Let l' be the length of the padded message. Dvde the padded message nto n ( = l' / 51) 51-bt block.e. sxteen 3-bt words nstead of 448-bt block, whch s () appled n F-hash to mprove the effcency. Let denote the th block of the padded message, where 1 n and each word of th block s denoted by for 15. Intal Value: Take the frst 56 bts ntal value.e., eght 3-bt words from the expanson of the fractonal part of and hexadecmal representaton of these eght words are gven below: () = 43F6A88, = A4938, Thus IV =. 1 = 85A38D3, = 99F31D, 6 = 13198AE, = 8EFA98, 3 7 = , = EC4E6C89. ( 1) () ( n) ash Computaton: For each 51-bt block,,,, the followng four steps are executed for all the values of from 1 to n. 1. Intalzaton: The frst channg varable CV = 1 7 s the 56-bt ntal value IV.. Transformaton: Dvde the nput message block nto two equal parts,.e., = L R. Transform the message block n the followng way: L ( L CV counter ), ' 1 161

4 where counter mod 64 =. Xorng counter removes the fxed pont attack, because as the number of blocks ncreases, counter wll be dfferent for each block. Now, = L' R. We dvde ths 3. Iteraton: () nto sxteen 3-bt words, 1,, 15. For = to 6 (a) For k = to 7 k p( k k + 1) (b) R' ( R ( 1 7 )) (c) For = to 15 + mod 16 where p : Z 64 Z 3 be a functon defned by p 31 3 ( x) =. p1( x1,, x64) +. p( x1,, x64) p3( x1,, x64 x Z can be represented by 1x x64, Snce any element 64 x where x1x x64 denotes the bnary representaton of x n decreasng order of ther sgnfcance. p x 1,, x ) denotes the th polynomal wth 64 varables. ( 64 ) For = 7 CV R'' ' (a) p( ) k k k + 1 R ''' ( R'' ( 1 7 (b) )) The fnal hash value of the message wll be Ln, attack, multcollson attack and herdng attack. Snce to remove the length extenson CV s the ntal value for ( +1) the block and CVn s not known; hence appendng any extra block to compute the R-hash would not be possble. The complete algorthm s gven n Algorthm 1 and block dagram of R-hash s shown n Fgure. Process of Implementaton: In order to compute R-hash(), frst the paddng rule s appled and then the padded message s dvded nto 51-bt blocks. Now each 51-bt block s dvded nto sxteen 3-bt words and each 3-bt word s read n lttle endan format. For example, suppose we have to read an ASCII fle wth data abcd, t wll be read as x

5 R hash ( a ) 3. ANALYSIS OF R-AS = 7 A8 FA 11 D 7 E1E B 8 EB 55 F 19 D 39 C 6488 CBE C 61 9 E E 7 DBE 8 A 3 AAEFE 38 R hash ( ab ) = 69 C 8 E F 75 DDBC 5 A8 A 687 B 97 BE 9 A 6 F 48 E 75 BB 73 B 3 FC 17 AD F 5 E 88 R hash ( abc ) = AE 1771 AE 76 C 49 CB D 8 B 8 A9 849 FAF 9 5 E 51 BC 14 DBBF 4 AE 7 AA 8 F Test Value of F-hash: Test values of the three nputs are gven below: In ths secton we wll present the complete analyss of R-hash, whch ncludes propertes, effcency, as well as the securty analyss of ths functon Effcency of R-hash Functon The followng table gves a comparatve study n the effcency of R-hash wth F-hash on an Intel CoreDuo PC wth P84 Ghz processor wth GB RA. Fle Sze (n B) F-hash (n sec) R-hash (n Sec) Table 1: Comparatve n the Effcency of R-hash Ths shows that R-hash s almost three tmes faster than F-hash. 3.. Premage Resstance To fnd premage of R-hash, one has to solve 3 random quadratc multvarate polynomal equatons wth 64 varables over GF() whch s an Q-problem. If t s easy to fnd out premage of R-hash, then Q-problem s no longer an NP-hard problem, whch s a contradcton. Thus R-hash s premage resstant hash functon Second Premage Resstance We know that collson resstance mples second premage resstance. Therefore, the proof of collson resstance of R-hash gves the second premage resstance of R-hash Collson Resstance Snce we have totally changed the desgn prncple of the compresson functon n R-hash, therefore the dfferental attack appled for SA- and SA-1 by Chabaud and Joux n [4] and by Wang et al. n [3], [9] to fnd the collson s not applcable to R-hash functon. All these attacks use the message expanson relaton to fnd the collson, 163

6 Input Repeat for each block w o w 15 L R CV -1 Counter L R L R <<< 64 p Repeat 6 tmes L R p L R... CV L n R n R hash Fgure : Block Dagram of R-hash 164

7 but n our desgn, we have not appled the message expanson algorthm. ence, ths hash functon s collson resstance aganst the above methods. Snce the desgn of the compresson functon of R-hash s dfferent from SA- famly, the cross dependence equaton descrbed by Sanadhya and Sarkar n [5] cannot be formed n R-hash. Thus ths procedure too cannot be appled to our hash functon for fndng collsons. Besdes these, we have computed R-hash for a number of fles by changng only one bt to the nput. In most of the cases, we found that 17 bts changed after one round computaton of R-hash and 51 bts changed after two rounds. So t would be dffcult to control these bts as the number of rounds ncreases. Thus, dfferental attack to fnd the collson for R- hash would be dffcult Avalanche Effect We have taken an nput fle consstng of 51 bts and computed R-hash(). By th changng the bt of, the fles have been generated, for Thus ammng dstance of each from s exactly 1 for We then computed R- hash( ) for 1 51, computed the ammng dstances d between R-hash() and R- hash( ), for 1 51 and fnally computed the dstances between correspondng eght 3-bt words of the hash values. The followng table shows the maxmum, the mnmum, the mode and the mean values of the above dstances. Changes W1 W W3 W4 W5 W6 W7 8 W F-hash R-hash ax n ode ean Table : ammng Dstances To satsfy strct avalanche crteron, each d should be 18 for But we have found that d ' s were lyng between 14 and 165 for the above fles and n most of the cases d = 131. The observed devaton s acceptable so as to resst collson search usng dfferental attack. The followng table and fgure show the dstrbuton of the 51 fles wth respect to ther dfferences (dstance) n bts. Range of Dstance No. of Fles % F-hash % R-hash 18 ± ± ± ± Table 3: Dstrbuton of the Dfferences of R-hash by Changng a Sngle Bt 165

8 3.6. Randomness Test Fgure 3: Dstrbuton of the Dfferences of R-hash by Changng a Sngle Bt To conduct randomness test, we have generated a fle consstng of bts by concatenatng all the output of R-hash of the fles, 1,,, 51. After that, we have dvded bts nto 64 blocks of length 48 bts each, 3 blocks of length 496 bts each, 16 blocks of length 819 bts each, 8 blocks of length bts each, 4 blocks of length 3768 bts each, blocks of length bts each and 1 block of the complete bts. Thus we have generated 17 blocks n total and conducted fve basc randomness tests n these blocks. The concse result s shown n the followng table The Bt-Varance Test Test No. of Passed Faled % Blocks Frequency Seral Poker Runs Autocorrelaton Table 4: Result of Randomness Test The bt varance test conssts of measurng the mpact of change n nput message bts on the dgest bts. ore specfcally, gven an nput message, all the small changes as well as the large changes of ths nput message bts are taken and the bts n the correspondng dgest are evaluated for each such change. Afterwards, for each dgest bt the probabltes 166

9 of takng on the values of 1 and are measured consderng all the dgests produced by applyng nput message bt changes. If P ( 1) = P () = 1/ for all dgest bts = 1,, 56 then, the R-hash functon has attaned maxmum performance n terms of the bt varance test [17]. The bt varance test actually measures the unformty of each bt of the dgest. Snce t s computatonally dffcult to consder all nput message bt changes, we have evaluated the results for only up to 513 fles, vz., 1,,, 51, whch we have generated for conductng avalanche effect, and found the followng results: Number of dgests = 513 ean frequency of 1s (expected) = 56.5 ean frequency of 1s (calculated) = CONCLUSIONS In ths paper a dedcated hash functon R-hash has been presented whose securty s based on the Q-problem over fnte feld. Ths hash functon has the followng advantages over F-hash: t s much more effcent, t s secure aganst multcollson attack, fxed pont attack, length extenson attack and herdng attack. oreover, analyss of ths hash functon vz. avalanche effect, bt-varance test, randomness test as well as securty proof are also descrbed here. From these expermental results, t s clear that ths hash functon can also be used as a pseudo-random number generator because of the good randomness property of ts output besdes the other applcatons of cryptographc hash functons. ACKNOWLEDGEENTS The frst two authors are thankful to rs Pratbha Yadav, SAG, for her support to carry out ths work and are also very thankful to Dr. P. K. Saxena, Drector SAG, for hs encouragement to pursue ths work. The authors are thankful to r. Bharat Lal Jangd, SAG, for carryng out the randomness tests of R-hash. The authors are also thankful to Dr. P. R. shra, SAG, for hs crtcal suggestons and comments on the frst draft of ths paper. REFERENCES [1] J. Aumasson, L. enzen, W. eer, R. Phan, SA-3 Proposal BLAKE (9), submsson to NIST s SA-3 competton. [] J. Black,. Cochran & T. ghland, A Study of the D5 Attacks: Insghts and Improvements, n Proceedngs of Fast Software Encrypton FSE 6, LNCS 447, Sprnger, 6. [3] G. Berton, J. Daemen,. Peeters, G. Assche, The KECCAK sponge functon famly (9), submsson to NISTs SA-3 competton. [4] F. Chabaud & A. Joux, Dfferental Collsons n SA-, advances n Cryptology - CRYPTO 98, LNCS 146, Sprnger-Verlag, [5] C. Cannere, F. endel & C. Rechberger, Collsons for 7-step SA-1: On the Full Cost of Collson Search, n Proceedngs of SAC 7, LNCS 4876, Sprnger, 7. [6] C. Cannere & C. Rechberger, Premages for Reduced SA- and SA-1, advances n Cryptology - CRYPTO 8, LNCS 5157, Sprnger-Verlag,

10 [7] D. Dey, P. R. shra & I. Sengupta, F-hash: ash Functons Usng Restrcted FE Challenge-1, Internatonal Journal of Advanced Scence and Technology Vol. 37, Dec 11. Avalable onlne at [8] N. Ferguson, S. Lucks, B. Schneer, D. Whtng,. Bellare, T. Kohno, J. Callas, J. Walker, The Sken ash Functon Famly (9), submsson to NIST s SA-3 competton. [9] P. Gauravaram, L. Knudsen, K. atusewcz, F. endel, C. Rechberger,. Schlaffer, S. Thomsen, Grøstl a SA-3 Canddate (9), submsson to NIST s SA-3 competton. [1]. Glbert &. andschuh, Securty Analyss of SA-56 and Ssters, n Proceedngs of SAC 3, LNCS 36, Sprnger, 3. [11]. Garey & D. Johnson, Computers and Intractablty - A Gude to the Theory of NPcompleteness, Freeman and Co., [1] S. Indesteege, F. endel, B. Preneel & C. Rechberger, Collsons and other Non-Random Propertes for Step-Reduced SA-56. Cryptology eprnt Archve. Avalable onlne at [13] A. Joux, ultcollsons n Iterated ash Functons - Applcaton to Cascaded Constructons, advances n Cryptology CRYPTO 4, LNCS 315, Sprnger, 4. [14] J. Kelsey & T. Kohno, erdng ash Functons and the Nostradamus Attack, advances n Cryptology EUROCRYPT 6, LNCS 44, Sprnger-Verlag, 6. [15] V. Klma, Tunnels n ash Functons: D5 Collsons wthn a nute, Cryptology eprnt Archve. Avalable onlne at [16] J. Kelsey & B. Schneer, Second Premages on n-bt ash Functons for uch Less Than n Work, advances n Cryptology EUROCRYPT 5, LNCS 3494, Sprnger-Verlag, 5. [17] D.Karras & V. Zorkads, A Novel Sute of Tests for Evaluatng One-Way ash Functons for Electronc Commerce Applcatons, IEEE,. [18] F. endel, N. Pramstaller, C. Rechberger & V. Rmen, Analyss of Step-Reduced SA-56, n Proceedngs of FSE 6, LNCS 447, Sprnger, 6. [19] F. endel, N. Pramstaller, C. Rechberger & V. Rmen, Analyss of Step-Reduced SA-56, Cryptology eprnt Archve. Avalable onlne at [] I. Nkolc & A. Bryukov, Collsons for Step-Reduced SA-56 n Proceedngs of FSE 8, Sprnger, 8. [1] Natonal Insttute of Technology, Secure ash Standard, FIPS Publcaton-18-,. Avalable onlne at [] Natonal Insttute of Standards and Technology, Cryptographc ash Proect, Avalable onlne at [3] N. Pramstaller, C. Rechberger & V. Rmen, Explotng Codng Theory for Collson Attacks on SA-1, n Cryptography and Codng, 1th IA Internatonal Conference Proceedngs, LNCS 3796, Sprnger, 5. [4]. Sugta,. Kawazoe &. Ima, Groebner Bass Based Cryptanalyss of SA-1, Cryptology eprnt Archve. Avalable onlne at [5] S. Sanadhya & P. Sarkar, Non-Lnear Reduced Round Attacks Aganst SA- ash famly, Informaton Securty and Prvacy - ACISP 8, LNCS, Sprnger, 8. [6] S. Sanadhya & P. Sarkar, Attackng Step Reduced SA- Famly n a Unfed Framework, Cryptology eprnt Archve. Avalable onlne at [7]. Wu, The ash Functon J (9), submsson to NIST s SA-3 competton. [8] X. Wang &. Yu, ow to Break D5 and Other ash Functons, advances n Cryptology EUROCRYPT 5, LNCS 3494, Sprnger, 5. [9] X. Wang, Y. Yn &. Yu, Fndng Collsons n the Full SA-1, advances n Cryptology CRYPTO 5, LNCS 361, pages 17-36, Sprnger, 5. [3] X. Wang,. Yu & Y. Yn, Effcent Collson Search Attacks on SA-, n Advances n Cryptology - CRYPTO 5, LNCS 361, Sprnger, 5. [31] T. Xe, D. Feng & F. Lu, A New Collson Dfferental for D5 wth ts Full Dfferental Path, Cryptology eprnt Archve. Avalable onlne at 168

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

We are now ready to answer the question: What are the possible cardinalities for finite fields?

We are now ready to answer the question: What are the possible cardinalities for finite fields? Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

Usage of LCG/CLCG numbers for electronic gambling applications

Usage of LCG/CLCG numbers for electronic gambling applications Usage of LCG/CLCG numbers for electronc gamblng applcatons Anders Knutsson Smovts Consultng, Wenner-Gren Center, Sveavägen 166, 113 46 Stockholm, Sweden anders.knutsson@smovts.com Abstract. Several attacks

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt Examensarbete Rotatng Workforce Schedulng Carolne Granfeldt LTH - MAT - EX - - 2015 / 08 - - SE Rotatng Workforce Schedulng Optmerngslära, Lnköpngs Unverstet Carolne Granfeldt LTH - MAT - EX - - 2015

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes

A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes Journal of Computer Scence 7 (5): 785-789, 2011 ISSN 1549-3636 2011 Scence Publcatons A Novel Enhancement Technque of the Hll Cpher for Effectve Cryptographc Purposes 1 A.F.A. Abdn, 1 O.Y. Chuan and 2

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Finite Math Chapter 10: Study Guide and Solution to Problems

Finite Math Chapter 10: Study Guide and Solution to Problems Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

Design of Output Codes for Fast Covering Learning using Basic Decomposition Techniques

Design of Output Codes for Fast Covering Learning using Basic Decomposition Techniques Journal of Computer Scence (7): 565-57, 6 ISSN 59-66 6 Scence Publcatons Desgn of Output Codes for Fast Coverng Learnng usng Basc Decomposton Technques Aruna Twar and Narendra S. Chaudhar, Faculty of Computer

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Faraday's Law of Induction

Faraday's Law of Induction Introducton Faraday's Law o Inducton In ths lab, you wll study Faraday's Law o nducton usng a wand wth col whch swngs through a magnetc eld. You wll also examne converson o mechanc energy nto electrc energy

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato

More information

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2 Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Sensor placement for leak detection and location in water distribution networks

Sensor placement for leak detection and location in water distribution networks Sensor placement for leak detecton and locaton n water dstrbuton networks ABSTRACT R. Sarrate*, J. Blesa, F. Near, J. Quevedo Automatc Control Department, Unverstat Poltècnca de Catalunya, Rambla de Sant

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

A machine vision approach for detecting and inspecting circular parts

A machine vision approach for detecting and inspecting circular parts A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information