THE Walsh Hadamard transform (WHT) and discrete
|
|
|
- Rosemary Day
- 10 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER Fast Block Center Weighted Hadamard Transform Moon Ho Lee, Senior Member, IEEE, Xiao-Dong Zhang Abstract Motivated by the Hadamard transforms center weighted Hadamard transforms, a new class of block center weighted Hadamard transforms (BCWHT) are proposed, which weights the region of midspatial frequencies of the signal more than the Hadamard transform. Based on the Kronecker product, direct sum operations, the identity matrix recursive relations, the proposed one 2-D fast BCWHTs algorithms through sparse matrix factorization are simply obtained. Index Terms Block center weighted Hadamard transform (BCWHT), center weighted Hadamard transform (CWHT), fast algorithm, sparse matrix decomposition. I. INTRODUCTION THE Walsh Hadamard transform (WHT) discrete Fourier transform (DFT) are highly practical value for representing signals, images mobile communications for orthogonal code designs ([1] [4] [5]). With the technology rapid development, communication systems will require more more transmission storage capacities of multilevel cases in cochannels for numerous clients. Recently, variations of WHT DFT called center weighted Hadamard transform (CWHT) ([6], [7]) complex reverse Jacket transform (CRJT) ([8] [10] [11]) have been proposed their applications to image processing communications have been reported. When the center part of data sequences or the middle range of frequency components are more important, the CWHT can offer better quality than the WHT ([2], [3] [4]). In this paper, motivated by the Hadamard transforms CWHTs ([6] [7]), we propose a new block center weighted Hadamard transform (BCWHT) in Section II, which may be applied to multilevel cases in communication. In Section III, based on the Kronecker product direct sum operations, a fast 1-D BCWHT algorithm is proposed. In Section IV, a fast 2-D BCWHT algorithm is presented through sparse matrix factorization the Kronecker product. Finally, in Section V, we make our conclusion. transform a temporal spatial vector by into a transformed vector Let be the 2 2 identity the lowest order Hadamard matrices, respectively,.i.e, Denote by. The lowest order BCWHT matrix of order 8 is defined to be with each block being 2 Since 2 submatrices. Since (1) (2) (3) (4) (5) II. BCWHT For the 1-D BCWHT matrix of order with, which is partitioned to the block matrix, we can Manuscript received August 29, 2006; revised April 18, This work was supported by the Ministry of information Communication (MIC), Korea, under the IT Foreign Specialist Inviting Program (ITFSIP) supervised by the Institute of Information Technology Assessment (IITA) of the Ministry of Science Technology, Korea. This paper was recommended by Associate Editor S.-M. Phoong. M. H. Lee is with the Institute of Information Communication, Chonbuk National University, Jeonju , Korea ( [email protected]). X.-D. Zhang is with the Department of Mathematics, Shanghai Jiao Tong University, Shanghai , China ( [email protected]). Digital Object Identifier /TCSI the inverse of (3) is (6) (7) /$ IEEE
2 2742 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 Certainly, where denotes the direct sum operator(see [12]). Then we transform the BCWHT of order 8 as (8) This choice of block weighting was indicated, to a large extent, by requirement of digital hardware simplicity. With the aid of Kronecker product Hadamard matrices, the higher order BCWHT matrix is given by the following recursive relation: where is the Kronecker product is the lowest order Hadamard matrix. We are able to show that (9) (10) We can use the induction method to prove this assertion. From (7), (10) holds for. Assume that (10) holds for, i.e., (11) (15) The general permutation matrices are defined to be (16) (17) It is easily checked that both permutation matrices are unitary which satisfy Now we show that (10) holds for. (18) (19) Using the two permutation matrices the definition of BCWHT, the order of BCWHT matrix can be transformed to the following Hence, (10) holds. Therefore, BCWHT is a class of transforms which are simple to calculate easily inverted. Further, the inverse BCWHT can be written as follows: III. FAST 1-D BCWHT ALGORITHM (12) In order to develop the fast 1-D BCWHT algorithm, we first introduce three block permutation matrices, as follows: (20) Hence can be written as (21) shown at the bottom of the next page. Let be the permutation matrix of order 4 as follows: (22) (13) Then (14) (23)
3 LEE AND ZHANG: FAST BCWHT 2743 TABLE I COMPUTATIONAL COMPLEXITY OF THE PROPOSED FAST ALGORITHMS FOR 1-D BCWHT TRANSFORM OF ORDER N =2 From (21) (23), we have Based on the matrix identity in [12] (24) Therefore, the proposed fast 1-D BCWHT algorithm is written as From (21) (23), we have where (25) The permutation matrices do not require computation, since they just perform data permutation. The operation requires additions, since it can be performed by butterflies. Since the permutation matrices do not require computation, the operations of is the same as these of. It is known that the Hadamard transform of order requires additions. Thus, the operation requires additions. On the other h, the operation first performs, which is equivalent to direct connections multiplications, then executes an operation which needs additions. Because the direct sum can be independently divided into two parts, the operation requires additions multiplications. Hence, the proposed algorithm depicted in (25) requires, in total, real additions real multiplications for, while the direct computation for the BCWHT transform requires additions multiplications. The results are summed up as the following Table I. Moreover, Fig. 1 presents an example for a fast BCWHT flow graph with. The first, second last steps st for data permutation, while the third fourth steps st for additions multiplications. IV. 2-D FAST ALGORITHM TRANSFORM The 2-D transforms a temporal/spatial matrix into a transformed matrix as (see [12]) (26) (21)
4 2744 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 Fig. 1. Fast BCWHT flow graph for Generally, the linear transform of matrix shown as can be expressed by the transformation of the column-wise stacking vector of as (see [12]) Clearly, is a sparse matrix whose each row each column block is only at most two nonzero blocks. Moreover, by a calculation, we have Thus, the 2-D BCWHT matrix in (26) can be expressed by Clearly, using the properties of Hadamard matrix the Kronecker product, (28) can be rewritten (27) In order to develop the fast 2-D BCWHT algorithm, we start to define a coefficient block matrix by (28) Hence, can be partitioned to an block matrix whose blocks are 2 2 submatrices. It can be shown that is a sparse block matrix with at most two nonzero blocks for each row each column block. In order to prove this assertion, we first start to compute the lowest 4 4 block matrix (30) Since is block symmetric has at most two nonzero blocks in each row each column blocks, is a sparse block matrix with at most two nonzero blocks for each row each column block by using the recursion relation of (30). Further from, (28), the BCWHT transform can be written (31) Based on (27), (28) (31), the 2-D BCWHT transform in (27) can be written as (29)
5 LEE AND ZHANG: FAST BCWHT 2745 TABLE II COMPUTATIONAL COMPLEXITY OF THE PROPOSED FAST ALGORITHMS FOR 2-D BCWHT TRANSFORM OF ORDER N =2 (32) From (32), The fast algorithm for the 2-D BCWHT transform requires four iterations. It is known that the Hadamard transform of order requires additions. Thus, require additions. Since is a sparse block matrix with at most two nonzero blocks for each row each column block, it is easy to see that requires additions multiplications. Then needs additions multiplications. Therefore, the 2-D fast algorithm for BCWHT transform requires additions multiplications, while the direct computation needs additions multiplications. Table II shows that our proposed algorithm in (32) requires fewer operations. V. CONCLUSION A new nonorthogonal transform, the BCWHT was introduced in this paper. Based on the Kronecker product, direct sum operators sparse matrix factorization, one 2-D fast algorithms for the BCWHT are proposed their inverses are derived. With low complexity highly regular modularity, the proposed one 2-D fast algorithms advance the applicability of the BCWHT for image, signal processing orthogonal code design for mobile communications ([2] [4] [5]). ACKNOWLEDGMENT The authors would like to thank the anonymous referees for valuable comments, corrections suggestions, which results in an improvement of the original manuscript. REFERENCES [1] N. Ahmed K. R. Rao, Orthogonal Transforms for Digital Signal Processing. New York: Springer-Verlag, [2] D. C. Park, M. H. Lee, E. A. Choi, Revisited DFT matrix via the reverse Jacket transform its applications to communication, in Proc. 22nd Symp. Inf. Theory Appl. (SITA 99), Yuzawa, Niigata, Japan, Nov.-Dec. 30 3, 1999, pp [3] J. Hou M. H. Lee, Enhancing data throughput lower correlations quasi-orthogonal functions for 3G CDMA systems., Int. J. Commun. Syst, to be published. [4] J. Hou M. H. Lee, QPSK differential space time coding on different unitary matrices sets initialization, Int. J. Commun. Syst,to be published. [5] J. Hou M. H. Lee, Construction of the dual OVSF codes with lower correlations, IEICE Trans., to be published. [6] M. H. Lee, The center weighted Hadamard transform, IEEE Trans. Circuits Syst., vol. 36, no. 9, pp , Sep [7] C. P. Fan J. F. Yang, Fast center weighted Hadamard transform algorithms, IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 45, no. 3, pp , Mar [8] M. H. Lee, A new reverse Jacket tranform its fast algorithm, IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 47, no. 1, pp , Jan [9] K. Finlayson, M. H. Lee, J. Seberry, M. Yamada, Jacket matrices constructed from Hadamard matrix generalized Hadamard matrices, Australas. J. Combinatorics, vol. 35, no. 1, pp , Jun [10] K. J. Horadam, A generalised Hadamard transform, in Proc IEEE Int. Symp. Inf. Theory (ISIT), Australia, Sep. 4 9, [11] M. H. Lee J. Hou, Fast block inverse Jacket transform, IEEE Signal Process. Lett., vol. 13, pp , Aug [12] R. A. Horn C. R. Johnson, Topics in Matrix Analysis. New York: Cambridge Univ. Press, Moon Ho Lee (S 81 M 85 SM 86) received the Ph.D. degree in electronic engineering from Chonnam National University, Kwangju, Korea in 1984, the University of Tokyo, Tokyo, Japan, in 1990, respectively. From 1970 to 1980, he was a Chief Engineer with Namyang Moonhwa Broadcasting Corp., Jeju, Korea. Since 1980, he was been a Professor in the Department of information Communication at Chonbuk National University, Jeonju, Korea. From 1985 to 1986, he was also with the University of Minnesota as a Post-Doctoral Researcher. He has held visiting positions with the University of Hannover (1990), University of Aachen (1992,1996), University of Munich (1998), University of Kaislerlautern (2001), RMIT (2004), the University of Wollongong, Australia. His research interests include multidimensional source channel coding, mobile communication, heterogeneous network. He has authored 33 books including Digital Communication (Youngil, 1999), 95 SCI international journal papers, 20 patents. Dr. Lee is a Registered Telecommunication Professional Engineer a member of the National Academy of Engineering in Korea. He was recipient of the paper prize award from the Korea Institute of Communication Science in , the Korea Institute of Electronics Engineers in 1987, Chonbuk Province in 1992, Chonbuk National University in 2002, commendation of the Prime Minister (2002) Science Technology Doyak Gold Medal from Korea Government (2007) for the invention of the Jacket matrix, which is widely helpful in communication signal processing, mobile networking, cryptography. He was the Guest Editor of the IEEE Communications MagazineSpecial Issue on the Quality of Service Based Routing Algorithms for Heterogeneous Networks. Xiao-Dong Zhang was born in Jiangsu, China. He received the Master s degree in pure mathematics from Anhui University, Hefei, China in 1992 the Ph.D. degree in applied mathematics from University of Science Technology of China, Hefei, China, in He is a Professor in the Department of Mathematics at Shanghai JiaoTong University (SJTU), Shanghai, China. Before he joined SJTU in 2002, he took various academic positions at Universitdad de Chile, Kyungpook National University, the Technion-Israel Institute of Technology (Lady Davis Postdoctoral fellowship) Anhui University. His research interests include combinatorics, graph theory, complex network, matrix theory their applications in computer science, digital communication, signal processing. He has authored or coauthored over 50 refereed papers.
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Computation of Forward and Inverse MDCT Using Clenshaw s Recurrence Formula
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 5, MAY 2003 1439 Computation of Forward Inverse MDCT Using Clenshaw s Recurrence Formula Vladimir Nikolajevic, Student Member, IEEE, Gerhard Fettweis,
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
General Framework for an Iterative Solution of Ax b. Jacobi s Method
2.6 Iterative Solutions of Linear Systems 143 2.6 Iterative Solutions of Linear Systems Consistent linear systems in real life are solved in one of two ways: by direct calculation (using a matrix factorization,
350 Serra Mall, Stanford, CA 94305-9515
Meisam Razaviyayn Contact Information Room 260, Packard Building 350 Serra Mall, Stanford, CA 94305-9515 E-mail: [email protected] Research Interests Education Appointments Large scale data driven optimization
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
MOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
On an algorithm for classification of binary self-dual codes with minimum distance four
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 105 110 On an algorithm for classification of binary self-dual codes with minimum
5. Orthogonal matrices
L Vandenberghe EE133A (Spring 2016) 5 Orthogonal matrices matrices with orthonormal columns orthogonal matrices tall matrices with orthonormal columns complex matrices with orthonormal columns 5-1 Orthonormal
A note on companion matrices
Linear Algebra and its Applications 372 (2003) 325 33 www.elsevier.com/locate/laa A note on companion matrices Miroslav Fiedler Academy of Sciences of the Czech Republic Institute of Computer Science Pod
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
Publications. Camilla Hollanti Department of Mathematics Aalto University, Finland [email protected] December 1, 2011
Publications Camilla Hollanti Department of Mathematics Aalto University, Finland [email protected] December 1, 2011 Refereed journal articles 2011 1. R. Vehkalahti, C. Hollanti, and F. Oggier,
Matrix Factorizations for Reversible Integer Mapping
2314 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 49, NO 10, OCTOBER 2001 Matrix Factorizations for Reversible Integer Mapping Pengwei Hao, Member, IEEE, and Qingyun Shi Abstract Reversible integer mapping
Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE
7618 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 11, NOVEMBER 2011 Several Classes of Codes Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, Tor Helleseth,
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property
A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property Venkat Chandar March 1, 2008 Abstract In this note, we prove that matrices whose entries are all 0 or 1 cannot achieve
An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel. Gou HOSOYA, Hideki YAGI, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA
2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007 Hawaii, USA, May 29 31, 2007 An Adaptive Decoding Algorithm of LDPC Codes over the Binary Erasure Channel Gou HOSOYA, Hideki YAGI,
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES
GE_LAYOUT_Layout 12/1/14 2:4 PM Page 2 MOBILE C O N V E RGED N E T W O RKS MOBILE CONVERGED NETWORKS: FRAMEWORK, OPTIMIZATION, AND CHALLENGES TAO HAN, YANG YANG, XIAOHU GE, AND GUOQIANG MAO Tao Han and
Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
6. Cholesky factorization
6. Cholesky factorization EE103 (Fall 2011-12) triangular matrices forward and backward substitution the Cholesky factorization solving Ax = b with A positive definite inverse of a positive definite matrix
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Degree Reduction of Interval SB Curves
International Journal of Video&Image Processing and Network Security IJVIPNS-IJENS Vol:13 No:04 1 Degree Reduction of Interval SB Curves O. Ismail, Senior Member, IEEE Abstract Ball basis was introduced
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
Multiuser Communications in Wireless Networks
Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: [email protected], tel. +358445000180 Course period
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks K. Thiagarajan, Department of Mathematics, PSNA College of Engineering and Technology, Dindigul, India. A. Veeraiah,
Big Text Data Clustering using Class Labels and Semantic Feature Based on Hadoop of Cloud Computing
Vol.8, No.4 (214), pp.1-1 http://dx.doi.org/1.14257/ijseia.214.8.4.1 Big Text Data Clustering using Class Labels and Semantic Feature Based on Hadoop of Cloud Computing Yong-Il Kim 1, Yoo-Kang Ji 2 and
INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2
ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena
Linear Authentication Codes: Bounds and Constructions
866 IEEE TRANSACTIONS ON INFORMATION TNEORY, VOL 49, NO 4, APRIL 2003 Linear Authentication Codes: Bounds and Constructions Huaxiong Wang, Chaoping Xing, and Rei Safavi-Naini Abstract In this paper, we
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
Optimum Frequency-Domain Partial Response Encoding in OFDM System
1064 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 51, NO 7, JULY 2003 Optimum Frequency-Domain Partial Response Encoding in OFDM System Hua Zhang and Ye (Geoffrey) Li, Senior Member, IEEE Abstract Time variance
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree of PhD of Engineering in Informatics
INTERNATIONAL BLACK SEA UNIVERSITY COMPUTER TECHNOLOGIES AND ENGINEERING FACULTY ELABORATION OF AN ALGORITHM OF DETECTING TESTS DIMENSIONALITY Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree
Fast Device Discovery for Remote Device Management in Lighting Control Networks
J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in
1 A duality between descents and connectivity.
The Descent Set and Connectivity Set of a Permutation 1 Richard P. Stanley 2 Department of Mathematics, Massachusetts Institute of Technology Cambridge, MA 02139, USA [email protected] version of 16 August
! #! % & % ( )! & +,,.! / 0 1 /) ) %222 3 4 1 5 6. /,,, %778,,9 / 6, : 0 9, 99, 3 +,, 9 9
! #! % & % ( )! & +,,.! / 0 1 /) ) %222 3 4 1 5 6. /,,, %778,,9 / 6, : 0 9, 99, 3 +,, 9 9 ; 896 IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, VOL. 56, NO. 4, APRIL 2008 A Circuit-Theoretic Approach
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal
Measurement of Multi-Port S-Parameters using Four-Port Network Analyzer
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.13, NO.6, DECEMBER, 2013 http://dx.doi.org/10.5573/jsts.2013.13.6.589 Measurement of Multi-Port S-Parameters using Four-Port Network Analyzer Jongmin
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +
Mobile Network Security Technology Research Center Kyungpook National University
The sprit of Truth, Pride, and Service Mobile Network Security Technology Research Center Kyungpook National University June 2006 History June, 2000 August, 2000 Applied for the University Information
Adaptive Equalization of binary encoded signals Using LMS Algorithm
SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) volume issue7 Sep Adaptive Equalization of binary encoded signals Using LMS Algorithm Dr.K.Nagi Reddy Professor of ECE,NBKR
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
Factorization Theorems
Chapter 7 Factorization Theorems This chapter highlights a few of the many factorization theorems for matrices While some factorization results are relatively direct, others are iterative While some factorization
Time-Frequency Detection Algorithm of Network Traffic Anomalies
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies
Operation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
Two classes of ternary codes and their weight distributions
Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight
7. LU factorization. factor-solve method. LU factorization. solving Ax = b with A nonsingular. the inverse of a nonsingular matrix
7. LU factorization EE103 (Fall 2011-12) factor-solve method LU factorization solving Ax = b with A nonsingular the inverse of a nonsingular matrix LU factorization algorithm effect of rounding error sparse
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Fast Fourier Transform: Theory and Algorithms
Fast Fourier Transform: Theory and Algorithms Lecture Vladimir Stojanović 6.973 Communication System Design Spring 006 Massachusetts Institute of Technology Discrete Fourier Transform A review Definition
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
Huilan Chang 張 惠 蘭. Associate Professor, Applied Mathematics, National University of Kaohsiung
Huilan Chang 張 惠 蘭 Associate Professor, Applied Mathematics, National University of Kaohsiung No. 700, Kaohsiung University Road, Nantzu District, Kaohsiung, Taiwan 811, ROC +886-7-5916572 [email protected]
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927
Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: [email protected] Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,
LU Factorization Method to Solve Linear Programming Problem
Website: wwwijetaecom (ISSN 2250-2459 ISO 9001:2008 Certified Journal Volume 4 Issue 4 April 2014) LU Factorization Method to Solve Linear Programming Problem S M Chinchole 1 A P Bhadane 2 12 Assistant
Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels
Coding Schemes for a Class of eceiver Message Side Information in AWG Broadcast Channels Behzad Asadi Lawrence Ong and Sarah J. Johnson School of Electrical Engineering and Computer Science The University
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
TEO, Chung Piaw ( 张 俊 标 ) Department of Decision Sciences, NUS Business School Email: [email protected]
TEO, Chung Piaw ( 张 俊 标 ) Department of Decision Sciences, NUS Business School Email: [email protected] Education and Appointment 1996 Massachusetts Institute of Technology, Cambridge, MA Ph.D. in Operations
Loudspeaker Equalization with Post-Processing
EURASIP Journal on Applied Signal Processing 2002:11, 1296 1300 c 2002 Hindawi Publishing Corporation Loudspeaker Equalization with Post-Processing Wee Ser Email: ewser@ntuedusg Peng Wang Email: ewangp@ntuedusg
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
α = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network
, pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and
Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm
Applied Mathematics Volume 2013, Article ID 252808, 5 pages http://dxdoiorg/101155/2013/252808 Research Article Determination of Pavement Rehabilitation Activities through a Permutation Algorithm Sangyum
When is missing data recoverable?
When is missing data recoverable? Yin Zhang CAAM Technical Report TR06-15 Department of Computational and Applied Mathematics Rice University, Houston, TX 77005 October, 2006 Abstract Suppose a non-random
ON THE DEGREES OF FREEDOM OF SIGNALS ON GRAPHS. Mikhail Tsitsvero and Sergio Barbarossa
ON THE DEGREES OF FREEDOM OF SIGNALS ON GRAPHS Mikhail Tsitsvero and Sergio Barbarossa Sapienza Univ. of Rome, DIET Dept., Via Eudossiana 18, 00184 Rome, Italy E-mail: [email protected], [email protected]
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery
Clarify Some Issues on the Sparse Bayesian Learning for Sparse Signal Recovery Zhilin Zhang and Bhaskar D. Rao Technical Report University of California at San Diego September, Abstract Sparse Bayesian
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM
OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM S. Sofia 1, M.Varghese 2 1 Student, Department of CSE, IJCET 2 Professor, Department of CSE, IJCET Abstract This paper proposes fault node recovery
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
Linear Algebra Review. Vectors
Linear Algebra Review By Tim K. Marks UCSD Borrows heavily from: Jana Kosecka [email protected] http://cs.gmu.edu/~kosecka/cs682.html Virginia de Sa Cogsci 8F Linear Algebra review UCSD Vectors The length
Analysis of SFCL s in DC System with Renewable Energy Sources
Analysis of SFCL s in DC System with Renewable Energy Sources S. Mohanram * 1, R.Chandralekha # 2 *1 Assistant Professor, Department of Electrical and Electronics Engineering, Vel Tech Multitech, Avadi,
Analysis on the Balanced Class-E Power Amplifier for the Load Mismatch Condition
Analysis on the Class-E Power Amplifier for the Load Mismatch Condition Inoh Jung 1,1, Mincheol Seo 1, Jeongbae Jeon 1, Hyungchul Kim 1, Minwoo Cho 1, Hwiseob Lee 1 and Youngoo Yang 1 Sungkyunkwan University,
A Wavelet Based Prediction Method for Time Series
A Wavelet Based Prediction Method for Time Series Cristina Stolojescu 1,2 Ion Railean 1,3 Sorin Moga 1 Philippe Lenca 1 and Alexandru Isar 2 1 Institut TELECOM; TELECOM Bretagne, UMR CNRS 3192 Lab-STICC;
Educational Requirement Analysis for Information Security Professionals in Korea
Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea [email protected]
DCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding Stebin Sunny 1, Chinju Jacob 2, Justin Jose T 3 1 Final Year M. Tech. (Cyber Security), KMP College
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
Wavelet analysis. Wavelet requirements. Example signals. Stationary signal 2 Hz + 10 Hz + 20Hz. Zero mean, oscillatory (wave) Fast decay (let)
Wavelet analysis In the case of Fourier series, the orthonormal basis is generated by integral dilation of a single function e jx Every 2π-periodic square-integrable function is generated by a superposition
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List Mehmet Kurt 1, Can Atilgan 2, Murat Ersen Berberler 3 1 Izmir University, Department of Mathematics and Computer Science, Izmir
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
FFT Algorithms. Chapter 6. Contents 6.1
Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT
Sparse Matrix Decomposition with Optimal Load Balancing
Sparse Matrix Decomposition with Optimal Load Balancing Ali Pınar and Cevdet Aykanat Computer Engineering Department, Bilkent University TR06533 Bilkent, Ankara, Turkey apinar/aykanat @cs.bilkent.edu.tr
