Open Access. Powered by Scholars. Published by Universities.®

Applied Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Applied Mathematics

Electromagnetic Scattering Solutions For Digital Signal Processing, Jonathan Blackledge Nov 2009

Electromagnetic Scattering Solutions For Digital Signal Processing, Jonathan Blackledge

Other resources

Electromagnetic scattering theory is fundamental to understanding the interaction between electromagnetic waves and inhomogeneous dielectric materials. The theory unpins the engineering of electromagnetic imaging systems over a broad range of frequencies, from optics to radio and microwave imaging, for example. Developing accurate scattering models is particularly important in the field of image understanding and the interpretation of electromagnetic signals generated by scattering events. To this end there are a number of approaches that can be taken. For relatively simple geometric configurations, approximation methods are used to develop a transformation from the object plane (where scattering events take place) to the …


Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle Sep 2009

Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle

Conference papers

This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …


A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …


Converging Flow Between Coaxial Cones, O. Hall, A. D. Gilbert, C. P. Hills Jan 2009

Converging Flow Between Coaxial Cones, O. Hall, A. D. Gilbert, C. P. Hills

Articles

Fluid flow governed by the Navier-Stokes equation is considered in a domain bounded by two cones with the same axis. In the first, 'non-parallel' case, the two cones have the same apex and different angles θ = α and β in spherical polar coordinates (r, θ, φ). In the second, 'parallel' case, the two cones have the same opening angle α, parallel walls separated by a gap h and apices separated by a distance h/sinα. Flows are driven by a source Q at the origin, the apex of the lower cone in the parallel case. The Stokes solution for the …


Nonaxisymmetric Stokes Flow Between Concentric Cones, O. Hall, C. P. Hills, A. D. Gilbert Jan 2009

Nonaxisymmetric Stokes Flow Between Concentric Cones, O. Hall, C. P. Hills, A. D. Gilbert

Articles

We study the fully three-dimensional Stokes flow within a geometry consisting of two infinite cones with coincident apices. The Stokes approximation is valid near the apex and we consider the dominant flow features as it is approached. The cones are assumed to be stationary and the flow to be driven by an arbitrary far-field disturbance. We express the flow quantities in terms of eigenfunction expansions and allow for the first time for nonaxisymmetric flow regimes through an azimuthal wave number. The eigenvalue problem is solved numerically for successive wave numbers. Both real and complex sequences of eigenvalues are found, their …