Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Size: px
Start display at page:

Download "Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment"

Transcription

1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro Mei Deprtment of Computer Science University of Rome L Spienz, Itly

2 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 2 Wireless Sensor Networks Lrge numer of low-end processor sensors;

3 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 2 Wireless Sensor Networks Lrge numer of low-end processor sensors; sensors do not rely on ny infrstructure; wireless communictions; no se sttions;

4 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 2 Wireless Sensor Networks Lrge numer of low-end processor sensors; sensors do not rely on ny infrstructure; wireless communictions; no se sttions; sensors re ttery equipped; energy is n issue; no symmetric cryptogrphy;

5 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 2 Wireless Sensor Networks Lrge numer of low-end processor sensors; sensors do not rely on ny infrstructure; wireless communictions; no se sttions; sensors re ttery equipped; energy is n issue; no symmetric cryptogrphy; sensors re not tmper resistnt.

6 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 2 Wireless Sensor Networks Lrge numer of low-end processor sensors; sensors do not rely on ny infrstructure; wireless communictions; no se sttions; sensors re ttery equipped; energy is n issue; no symmetric cryptogrphy; sensors re not tmper resistnt. Gol: ny pir of sensors should e le to gree on privte key. Compromise of few sensors should not compromise the whole network.

7 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 3 Eschenuer nd Gligor s Seminl Work First, uild lrge pool P of p rndom keys. P

8 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 3 Eschenuer nd Gligor s Seminl Work First, uild lrge pool P of p rndom keys. Key Pre-Deployment For ech sensor s, rndomly select m keys from the pool nd ssign them to the sensor s; P

9 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 3 Eschenuer nd Gligor s Seminl Work First, uild lrge pool P of p rndom keys. Key Pre-Deployment For ech sensor s, rndomly select m keys from the pool nd ssign them to the sensor s; P Key Discovery Two sensors discover common keys nd gree on suset of them to secure the chnnel.

10 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 4 Follow-ups Multi-pth key enforcement: Chn, Perrig, nd Song (S&P 2003); key shring + Blom s scheme: Du, Deng, Hn, nd Vrshney (CCS 2003); key shring + Blundo s scheme: Liu nd Ning (CCS 2003); loction sed predistriution of keys: Liu nd Ning (SASN 2003); coopertive protocol: Di Pietro, Mncini, nd Mei (SASN 2003); pseudo-rndom predistriution of keys: Zhu, Xu, Seti, nd Jjodi (ICNP 2003).

11 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 5 The Olivious nd the Smrt Attcker The olivious ttcker: the next sensor to e tmpered with is chosen rndomly;

12 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 5 The Olivious nd the Smrt Attcker The olivious ttcker: the next sensor to e tmpered with is chosen rndomly; Defn 1. Assume tht the ttcker s gol is to collect suset T of the keys in the pool. The ttcker hs lredy compromised numer of sensors, nd hs collected ll their keys in set W. For every sensor s in the WSN, the key informtion gin G(s) is rndom vrile equl to the numer of keys in the key ring of s which re in T nd re not in W.

13 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 5 The Olivious nd the Smrt Attcker The olivious ttcker: the next sensor to e tmpered with is chosen rndomly; Defn 1. Assume tht the ttcker s gol is to collect suset T of the keys in the pool. The ttcker hs lredy compromised numer of sensors, nd hs collected ll their keys in set W. For every sensor s in the WSN, the key informtion gin G(s) is rndom vrile equl to the numer of keys in the key ring of s which re in T nd re not in W. the smrt ttcker: the next sensor to e tmper with is sensor s, where s mximizes E[G(s) I(s)], the expecttion of the key informtion gin G(s) given informtion I(s) tht the ttcker knows on sensor s key ring.

14 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction Ech sensor rodcsts the indexes (colors) of its keys;

15 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction lue! Ech sensor rodcsts the indexes (colors) of its keys;

16 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction red! lue! Ech sensor rodcsts the indexes (colors) of its keys;

17 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction green! red! lue! Ech sensor rodcsts the indexes (colors) of its keys;

18 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! Ech sensor rodcsts the indexes (colors) of its keys;

19 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! yellow! Ech sensor rodcsts the indexes (colors) of its keys;

20 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys;

21 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys;

22 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! cyn! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys;

23 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! cyn! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys;

24 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! cyn! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys; Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor;

25 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! cyn! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys; Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor; Energy: k messges hve to e sent nd received.

26 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 6 Index Notifiction ornge! green! red! lue! cyn! red! pink! yellow! Ech sensor rodcsts the indexes (colors) of its keys; Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor; Energy: k messges hve to e sent nd received. Authentiction: Sensor is not sure of the identity of.

27 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

28 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

29 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

30 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

31 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

32 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

33 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys;

34 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys; Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys);

35 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys; Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys); Energy: k messges hve to e sent nd received.

36 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 7 Chllenge Response Ech sensor rodcsts chllenge encrypted with ech of its keys; Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys); Energy: k messges hve to e sent nd received. Authentiction: Sensor is not sure of the identity of.

37 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 8 Pseudo-Rndom Assignment of Keys Keys to e ssigned re selected using pseudo-rndom numer genertor, strting from pulicly known seed dependent on the sensor s id.

38 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 8 Pseudo-Rndom Assignment of Keys Keys to e ssigned re selected using pseudo-rndom numer genertor, strting from pulicly known seed dependent on the sensor s id.

39 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 8 Pseudo-Rndom Assignment of Keys Keys to e ssigned re selected using pseudo-rndom numer genertor, strting from pulicly known seed dependent on the sensor s id. Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor;

40 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 8 Pseudo-Rndom Assignment of Keys Keys to e ssigned re selected using pseudo-rndom numer genertor, strting from pulicly known seed dependent on the sensor s id. Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor; Energy: 0 messges hve to e sent nd received.

41 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 8 Pseudo-Rndom Assignment of Keys Keys to e ssigned re selected using pseudo-rndom numer genertor, strting from pulicly known seed dependent on the sensor s id. Informtion lek: Also the possile ttcker cn know the colors of the keys in ech sensor; Energy: 0 messges hve to e sent nd received. Authentiction: Sensor is proilisticlly sure of the identity of.

42 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 9 Pseudo-Rndom Functions Defn 2. A pseudo-rndom function is n efficient (deterministic) lgorithm which given n h-it seed, y, nd n h-it rgument, x, returns n h-it string, denoted f y (x), so tht it is infesile to distinguish the responses of f y, for uniformly chosen y, from the responses of truly rndom function.

43 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 9 Pseudo-Rndom Functions Defn 2. A pseudo-rndom function is n efficient (deterministic) lgorithm which given n h-it seed, y, nd n h-it rgument, x, returns n h-it string, denoted f y (x), so tht it is infesile to distinguish the responses of f y, for uniformly chosen y, from the responses of truly rndom function. We ssume we hve ccess to pseudo-rndom function f y, where y is uniformly chosen;

44 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 9 Pseudo-Rndom Functions Defn 2. A pseudo-rndom function is n efficient (deterministic) lgorithm which given n h-it seed, y, nd n h-it rgument, x, returns n h-it string, denoted f y (x), so tht it is infesile to distinguish the responses of f y, for uniformly chosen y, from the responses of truly rndom function. We ssume we hve ccess to pseudo-rndom function f y, where y is uniformly chosen; s consequence of the ove definition, the output of f y cn e delt with s eing rndom for ll our purposes.

45 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k);

46 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k); 2. if z 0 mod (p/m) then ssign key k to sensor.

47 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k); 2. if z 0 mod (p/m) then ssign key k to sensor. Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys): f y is one-wy;

48 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k); 2. if z 0 mod (p/m) then ssign key k to sensor. Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys): f y is one-wy; Energy: 0 messges hve to e sent nd received.

49 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k); 2. if z 0 mod (p/m) then ssign key k to sensor. Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys): f y is one-wy; Energy: 0 messges hve to e sent nd received. Authentiction: Sensor is proilisticlly sure of the identity of.

50 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 10 New Key Discovery For ech sensor, for ech key k of the pool: 1. Compute z = f y ( k); 2. if z 0 mod (p/m) then ssign key k to sensor. Informtion lek: The ttcker cnnot know the colors of the keys in ech sensor (if he does not know the secret keys): f y is one-wy; Energy: 0 messges hve to e sent nd received. Authentiction: Sensor is proilisticlly sure of the identity of. On verge, m keys re ssigned to ech sensor;

51 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 11 New Key Discovery Security Constrint: t lest m m keys in ech vlid sensor; Hrdwre Constrint: t most m keys in ech vlid sensor; if sensor does not meet either the security of the hrdwre constrint, it must e discrded; Prolem: how mny sensors hve to e generted in order to find vlid one, depending on pool size nd m? Answer: just constnt numer! Theorem 1. Provided tht p m, sensor cn e generted in time O(p) such tht its key ring is composed of t lest m o(m) keys nd t most m keys, with high proility.

52 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 12 Experiments on Sensor Genertion % 95% 99% itertions key ring size

53 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 13 Experiments on Attcks Olivious ttker - IN, CR, PKIT Olivious ttker - New 95% Smrt ttker - IN, PKIT Smrt ttker - CR, New 99% sensors to corrupt key ring size

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Two Improvements of Random Key Predistribution for Wireless Sensor Networks Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

PROGRAMMING MANUAL MTMA/01 MTMV/01 FB00329-EN

PROGRAMMING MANUAL MTMA/01 MTMV/01 FB00329-EN RMMING MNUL MTM/01 MTMV/01 FB00329-EN Generl precutions Red the instructions crefully efore eginning the instlltion nd crry out the ctions s specified y the mnufcturer. The instlltion, progrmming, commissioning

More information

A Key Set Cipher for Wireless Sensor Networks

A Key Set Cipher for Wireless Sensor Networks A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing

More information

arxiv: v1 [cs.cc] 29 Mar 2012

arxiv: v1 [cs.cc] 29 Mar 2012 Solving Mhjong Solitire ords with peeking Michiel de Bondt rxiv:1203.6559v1 [cs.cc] 29 Mr 2012 Decemer 22, 2013 Astrct We first prove tht solving Mhjong Solitire ords with peeking is NPcomplete, even if

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Designing Secure and Reliable Wireless Sensor Networks

Designing Secure and Reliable Wireless Sensor Networks Designing Secure and Reliable Wireless Sensor Networks Osman Yağan" Assistant Research Professor, ECE" Joint work with J. Zhao, V. Gligor, and F. Yavuz Wireless Sensor Networks Ø Distributed collection

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

Throughput of Wireless Relay Networks with Interference Processing

Throughput of Wireless Relay Networks with Interference Processing NCC 2009, Jnury 16-18, IIT Guwhti 170 Throughput of Wireless Rely Networks with Interference Processing M. Bm, rikrishn Bhshym nd Andrew Thngrj, eprtment of Electricl Engineering, Indin Institute of Technology,

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different

More information

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links Topology Design in Time-Eoling Dely-Tolernt Networks with Unrelile Links Minsu Hung Siyun Chen Fn Li Yu Wng Deprtment of Computer Science, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 83, USA. School

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Student Book SERIES. Fractions. Name

Student Book SERIES. Fractions. Name D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information

Aquauno Select MINUTES. (duration) FREQUENCY LED. OFF 8h AQUAUNO SELECT 5 MIN FREQUENCY. the timer is being programmed;

Aquauno Select MINUTES. (duration) FREQUENCY LED. OFF 8h AQUAUNO SELECT 5 MIN FREQUENCY. the timer is being programmed; Aquuno Select Pg. INSTALLATION. Attch the timer to cold wter tp, following these simple instructions. Do not instll the timer in pit or vlve ox, elow ground level or indoors. Do not use the timer with

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Available online at ScienceDirect. Procedia Engineering 89 (2014 )

Available online at   ScienceDirect. Procedia Engineering 89 (2014 ) Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

Patterns and Relationships

Patterns and Relationships Series Techer Ptterns nd Reltionships opyright 009 3P Lerning. All rights reserved. First edition printed 009 in Austrli. A ctlogue record for this ook is ville from 3P Lerning Ltd. ISBN 978-1-91860-3-4

More information

Make Your Math Super Powered

Make Your Math Super Powered Mke Your Mth Super Powered: Use Gmes, Chllenges, nd Puzzles Where s the fun? Lern Mth Workshop model by prticipting in one nd explore fun nocost/low-cost gmes nd puzzles tht you cn esily bring into your

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Dijiang Huang Arizona State University Deep Medhi University of Missouri

More information

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Fair Coalitions for Power-Aware Routing in Wireless Networks

Fair Coalitions for Power-Aware Routing in Wireless Networks Fir Colitions for Power-Awre Routing in Wireless Networks Rtul K. Guh, Crl A. Gunter nd Sswti Srkr University of Pennsylvni {rguh@ses, gunter@.cis, swti@.ee }.upenn.edu Astrct Severl power wre routing

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Digital Design. Sequential Logic Design -- Controllers. Copyright 2007 Frank Vahid

Digital Design. Sequential Logic Design -- Controllers. Copyright 2007 Frank Vahid Digitl Design Sequentil Logic Design -- Controllers Slides to ccompny the tetook Digitl Design, First Edition, y, John Wiley nd Sons Pulishers, 27. http://www.ddvhid.com Copyright 27 Instructors of courses

More information

NONCLASSICAL CONSTRUCTIONS II

NONCLASSICAL CONSTRUCTIONS II NONLSSIL ONSTRUTIONS II hristopher Ohrt UL Mthcircle - Nov. 22, 2015 Now we will try ourselves on oncelet-steiner constructions. You cn only use n (unmrked) stright-edge but you cn ssume tht somewhere

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN fall 2008

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN fall 2008 CS224 DIGITAL LOGIC & STATE MACHINE DESIGN fll 28 STAND ALONE XILINX PROJECT 2-TO- MULTIPLEXER. Gols : Lern how to develop stnd lone 2-to- multiplexer () Xilinx project during which the following re introduced

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow Convolutionl Networks Lecture slides for Chpter 9 of Deep Lerning In Goodfellow 2016-09-12 Convolutionl Networks Scle up neurl networks to process very lrge imges / video sequences Sprse connections Prmeter

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

Click Here to BEGIN: Independent Agent Contracting Link

Click Here to BEGIN: Independent Agent Contracting Link LOA Guide : Getting Contrcted with AllWell Centene Medicre Advntge This guide is for ll gents who ssign commissions to n gency. You will NOT need to provide ny gency informtion in this contrcting; s ll

More information

Register Allocation. Goal: replace temporary variable accesses by register accesses Why? Constraints:

Register Allocation. Goal: replace temporary variable accesses by register accesses Why? Constraints: Rgistr Allotion Gol: rpl tmporry vril sss y rgistr sss Why? Constrints: Fix st of rgistrs Two simultnously liv vrils nnot llot to th sm rgistr A vril is liv if it will us gin for ing rfin. 1. Intify Liv

More information

Student Book SERIES. Patterns and Algebra. Name

Student Book SERIES. Patterns and Algebra. Name E Student Book 3 + 7 5 + 5 Nme Contents Series E Topic Ptterns nd functions (pp. ) identifying nd creting ptterns skip counting completing nd descriing ptterns predicting repeting ptterns predicting growing

More information

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design ECE 27 Digitl Logic Shifters, Comprtors, Counters, Multipliers Digitl Design..7 Digitl Design Chpter : Slides to ccompny the textbook Digitl Design, First Edition, by Frnk Vhid, John Wiley nd Sons Publishers,

More information

Spiral Tilings with C-curves

Spiral Tilings with C-curves Spirl Tilings with -curves Using ombintorics to Augment Trdition hris K. Plmer 19 North Albny Avenue hicgo, Illinois, 0 chris@shdowfolds.com www.shdowfolds.com Abstrct Spirl tilings used by rtisns through

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks

Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks Properties of distinct-difference configurations and lightweight key predistribution schemes for grid-based networks Simon R. lackburn 1 Keith M. Martin 1 Tuvi Etzion 2 Maura. Paterson 1 1 Information

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Specifying Data-Flow Requirements for the Automated Composition of Web Services

Specifying Data-Flow Requirements for the Automated Composition of Web Services Specifying Dt-Flow Requirements for the Automted Composition of We Services Annpol Mrconi ITC-Irst - Trento - Itly mrconi@itc.it Mrco Pistore University of Trento - Itly pistore@dit.unitn.it Polo Trverso

More information

Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks

Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks Modeling Pirwise Key Estlisment for Rndom Key Predistriution in Lrge-scle Sensor Networs Dijing Hung, Memer, IEEE, Mnis Met, Memer, IEEE, Appie vn de Liefvoort, Memer, IEEE, Deep Medi, Senior Memer, IEEE,

More information

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

A Practical DPA Countermeasure with BDD Architecture

A Practical DPA Countermeasure with BDD Architecture A Prcticl DPA Countermesure with BDD Architecture Toru Akishit, Msnou Ktgi, Yoshikzu Miyto, Asmi Mizuno, nd Kyoji Shiutni System Technologies Lortories, Sony Corportion, -7- Konn, Minto-ku, Tokyo 8-75,

More information

Unit 1: Chapter 4 Roots & Powers

Unit 1: Chapter 4 Roots & Powers Unit 1: Chpter 4 Roots & Powers Big Ides Any number tht cn be written s the frction mm, nn 0, where m nd n re integers, is nn rtionl. Eponents cn be used to represent roots nd reciprocls of rtionl numbers.

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Secret Key Generation and Agreement in UWB Communication Channels

Secret Key Generation and Agreement in UWB Communication Channels Secret Key Genertion nd greement in UW Communiction Chnnels Msoud Ghoreishi Mdiseh, Michel L. McGuire, Stephen S. Neville, Lin Ci, Michel Horie Deprtment of Electricl nd Computer Engineering University

More information

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chpter 2 Literture Review 2.1 ADDER TOPOLOGIES Mny different dder rchitectures hve een proposed for inry ddition since 1950 s to improve vrious spects of speed, re nd power. Ripple Crry Adder hve the simplest

More information

Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks

Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks Aville online t www.sciencedirect.com Computer Communictions (8) 999 www.elsevier.com/locte/comcom Quick convergecst in ZigBee econ-enled tree-sed wireless sensor networks Meng-Shiun Pn *, Yu-Chee Tseng

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Analysis of circuits containing active elements by using modified T - graphs

Analysis of circuits containing active elements by using modified T - graphs Anlsis of circuits contining ctive elements using modified T - grphs DALBO BOLEK *) nd EA BOLKOA**) Deprtment of Telecommunictions *) dioelectronics **) Brno Universit of Technolog Purknov 8, 6 Brno CECH

More information

Arduino for Model Railroaders

Arduino for Model Railroaders Steve Mssikker Arduino for Model Rilroders Ornge Book Protocol 2 Full Description November 28 Tble of contents Dontors Documenttion Kit V.4-8 Pge 2 I wnt to tke the time to sincerely thnk you for your

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol

An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol JOUNAL OF COMPUES, VOL 8, NO 9, SEPEMBE 2013 2405 An One-wy Hsh Function Bsed Lightweight Mutul Authentiction FID Protocol Xuping en Institute of Softwre nd Intelligent echnology, HngZhou Dinzi University,

More information

SOLVING TRIANGLES USING THE SINE AND COSINE RULES

SOLVING TRIANGLES USING THE SINE AND COSINE RULES Mthemtics Revision Guides - Solving Generl Tringles - Sine nd Cosine Rules Pge 1 of 17 M.K. HOME TUITION Mthemtics Revision Guides Level: GCSE Higher Tier SOLVING TRIANGLES USING THE SINE AND COSINE RULES

More information

Patterns and Algebra

Patterns and Algebra Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing

More information

Designers of fifth-generation (5G) wireless networks

Designers of fifth-generation (5G) wireless networks Enling Nonorthogonl Multiple Access in the Sprse Code Domin istockphoto.com/vertigo3d TOWARD 5G WIRELESS INTERFACE TECHNOLOGY Fn Wei, Wen Chen, Yongpeng Wu, Jun Li, nd Yun Luo Designers of fifth-genertion

More information

Kyushu Institute of Technology

Kyushu Institute of Technology Title: Integrted Rescue Service Stellite (IRS-St) Primry Point of Contct (POC): Mohmed Ibrhim Co-uthors: Btsuren Amglnbt, Puline Fure, Kevin Chou Orgniztion:, 1-1 Sensui, Tobt, Kitkyushu 804-8550, Jpn

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

Regular languages can be expressed as regular expressions.

Regular languages can be expressed as regular expressions. Regulr lnguges cn e expressed s regulr expressions. A generl nondeterministic finite utomton (GNFA) is kind of NFA such tht: There is unique strt stte nd is unique ccept stte. Every pir of nodes re connected

More information

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material. clble Multicst ecurity in Dynmic Groups. Rek Molv, Alin Pnnetrt Institut Eurecom, ophi-antipolis, Frnce. fmolv,pnnetrg@eurecom.fr Abstrct In this pper we propose new frmework for multicst security bsed

More information

Boolean Linear Dynamical System (Topological Markov Chain)

Boolean Linear Dynamical System (Topological Markov Chain) / 23 Boolen Liner Dynmicl System (Topologicl Mrkov Chin) Yokun Wu (~ˆn) Shnghi Jio Tong University (þ ÏŒA) S ŒAŽA AAH 7 ÊcÊ ÔF(.õ&F) Dynmicl system sed on one digrph 2 / 23 2 5 3 4 Figure: A digrph, representing,

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Package truncdist. August 30, 2016

Package truncdist. August 30, 2016 Version 1.0-2 Dte 2016-08-29 Pckge truncdist August 30, 2016 Author, Mintiner Frederick Novomestky Depends R (>= 2.0.1), stts4,evd A collection of tools to evlute proility density functions,

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

Separation Constraint Partitioning - A New Algorithm for Partitioning. Non-strict Programs into Sequential Threads. David E. Culler, Seth C.

Separation Constraint Partitioning - A New Algorithm for Partitioning. Non-strict Programs into Sequential Threads. David E. Culler, Seth C. Seprtion Constrint Prtitioning - A New Algorithm or Prtitioning Non-strict Progrms into Sequentil Threds Klus E. Schuser Deprtment o Computer Science Universit o Cliorni, Snt Brr Snt Brr, CA 93106 schuser@cs.ucs.edu

More information

Congruences for Stirling Numbers of the Second Kind Modulo 5

Congruences for Stirling Numbers of the Second Kind Modulo 5 Southest Asin Bulletin of Mthemtics (2013 37: 795 800 Southest Asin Bulletin of Mthemtics c SEAMS. 2013 Congruences for Stirling Numbers of the Second Kind Modulo 5 Jinrong Zho School of Economic Mthemtics,

More information

Mesh and Node Equations: More Circuits Containing Dependent Sources

Mesh and Node Equations: More Circuits Containing Dependent Sources Mesh nd Node Equtions: More Circuits Contining Dependent Sources Introduction The circuits in this set of problems ech contin single dependent source. These circuits cn be nlyzed using mesh eqution or

More information

Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures

Subword Permutation Instructions for Two-Dimensional Multimedia Processing in MicroSIMD Architectures Suword Permuttion Instructions for Two-Dimensionl Multimedi Processing in MicroSIMD rchitectures Ruy. Lee Princeton University rlee@ee.princeton.edu strct MicroSIMD rchitectures incorporting suword prllelism

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information