NFC Communications-based Mutual Authentication Scheme for the Internet of Things
|
|
- Amber McDonald
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma (Correspondng author: Yanna Ma) Zheang Unversty of Water Resources and Electrc Power, Zheang , Chna (Emal: (Receved May 10, 2016; revsed and accepted Sept. 3 & Sept. 25, 2016) bstract The ntegraton of Near Feld Communcaton (NFC) nto consumer electroncs devces has opened up opportuntes for the nternet of thngs applcatons such as electronc payment, electronc tcketng and sharng contacts, etc.. Meanwhle, varous securty rsks should not be gnored. Therefore, all knds of dfferent protocols have been released wth the purposng of securng NFC communcatons. Lately, a pseudonym-based NFC protocol for the consumer Internet of thngs was presented. They clamed that ther scheme could wthstand man-n-the mddle attack headed from ther scheme could provde mutual authentcaton. Ths study presents a securty analyss on ther scheme and fnds that ther scheme s not really secure aganst man-n-the-mddle attack. Subsequently, ths paper proposes an enhancement for purpose of thwartng ths securty attack. The securty and performance analyses show that the enhancement s secure and effcent whle keepng prvacy preservng. Keywords: uthentcaton; Key Establshment; Smart Cards; Wreless Communcatons 1 Introducton Several wreless communcatons technques and protocols are avalable n the market, such as luetooth, Zgee, RF, W-F and Infrared, whch have dfferent workng frequences and ranges. more recent technology for short-range wreless (up to 10 cm) s the Near Feld Communcaton (NFC) [16] that enables an easy, fast and secure communcaton between two devces n proxmty. Its communcaton occurs wth MHz operatng frequency whle provdng a hgh-level safety than other wellknown wreless technologes, e.g. luetooth [3, 6]. The prmary characterstc of NFC, leadng to ts wdespread use and popularty s the advent of touch-less transactons, whch leads to no cards, no cons and no laborous connectons and network setup [2]. NFC thus enables the long awated Internet-of-Thngs (IoT) [13], changng the nteractons wth the world n subtle but pervasve ways whle provdng dgtally mmersve experence. lthough the communcaton range of NFC s lmted to a few centmeters, NFC alone does not ensure secure communcatons, especally authentcaton between the sender and the recpent. One of the most mportant propertes for data communcaton s mutual authentcaton whch s defned as the ablty that both communcatng partes can authentcate wth each other, thus preventng mann-the-mddle attack and replay attack [11, 14, 17]. In order to be secure NFC, the NFC securty standards have been proposed n order to defne data exchange format, tag types, and securty protocols, e.g., a key agreement protocol [8, 9, 10]. In the process of key agreement, Certfcate uthorty (C) as the Trusted Thrd Party (TTP) s n charge of generatng the publc key of the correspondents. Recently, Eun et al. [5] proposed an authentcaton scheme for NFC communcatons to prevent replay and man-n-the-mddle attack by provdng mutual authentcaton based on a trusted servce manager. The scheme was based on asymmetrc cryptography and hash functons. y usng an asymmetrc cryptographc system, t was possble to address several securty threats such as an evl twn attack, hotspot or captve portal eavesdroppng, and even man-n-the-mddle attacks [15]. However, He et al. [7] found that the scheme of Eun et al. could not resst mpersonaton attack. s a counter measure to these sufferngs, He et al. presented a modfed authentcaton NFC protocol to amend aforementoned securty weaknesses. Unfortunately, ths study showed that He et al. s modfcaton was not secure aganst the man-n-themddle attack. s a result, a secure NFC mutual authentcaton scheme wth prvacy preservaton for the Internet of thngs was desgned n ths paper. The remander of the paper s arranged as follows. In Secton 2, a bref revew of He et al. s securty protocol. In Secton 3, man-n-the-mddle attack s developed to analyze Eun et al. s protocol. In Secton 4, the proposed NFC communcaton-based protocol. Securty and performance analyses results are gven n Sectons 5 and 6, respectvely. Secton 7 concludes ths paper.
2 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) Revew of He et al. s Scheme Ths part concsely revew the NFC mutual authentcaton scheme by He et al. n For ease of presentaton, Table I shows some ntutve abbrevatons and notatons. X T SM G KDF d X X SK E K(m) h( ), f( ) Sg K(m) Table 1: Notatons the dentty of the user X a trusted servce manager the base pont of the ellptc curve a key dervaton functon the prvate key of the user X the publc key of the user X, where X = d XG exclusve-or operaton symmetrc encrypton of usng the key K hash functons sgnature of m usng the key K Once recevng the user s request, the T SM generates n pseudonyms and delvers them to va a prvate channel. The T SM also stores the user s dentty and pseudonyms nto ts database. Next, the T SM computes P N = {, E d T SM (, ), T SM, S T SM } and S T SM = Sg d T SM (, E d T SM (, ), T SM ), where = q G s the publc key of, d = q + h( T SM, P N )d T SM s s prvate key, and S T SM s the T SM s sgnature on the th message. The users and execute the establshment of the sesson key n the followng manner: Step 1: computes = r G and sends the message {P N,, N } to, where r and N are the random numbers generated by, P N s a pseudonym selected by. Step 2: computes = r G and sends back the message {P N,, N } to, where r and N are the random numbers generated by and P N s a pseudonym selected by. Step 3: fter recevng the message, computes Z 1 = r, Z2 = d ( + h( T SM, P N ) T SM ), SK = KDF (N, N,,, Z 1, Z2 ) and MacT ag = f(sk,,,, 2 ). Subsequently, sends the message {MacT ag } to. Step 4: When recevng the message, computes Z 1 = r, Z2 = d ( + h( T SM, P N ) T SM ), SK = KDF (N, N,,, Z 1, Z2 ) and verfes f(sk,,,, ) = MacT ag. If t holds, computes MacT ag = f(sk,,,, ) and sets SK as the sesson key. Fnally, transmts the message {MacT ag } to. Step 5: Once recevng the message, computes: Z 1 = r = r r G = r r G = r, Z 2 = d ( + h( T SM, P N ) T SM ) = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = (q + h( T SM, P N )d T SM ) (q G + h( T SM, P N )d T SM G) = d ( + h( T SM, P N ) T SM ). computes SK and f(sk,,,, ), then, checks the correctness of the value MacT ag. If t does not hold, stops the sesson; Otherwse, agrees on the sesson key SK wth. 3 Weaknesses of He et al. s Scheme He et al. declared that ther mprovements could resst the man-n-the-mddle-attack due to ther proposed scheme could provde the mutual authentcaton between and. ctually, a notable queston s that and are unable to confrm the real dentty of the other entty because of the absence of T SM durng the executon of ther scheme, thus gvng a perfect opportunty for an adversary to launch the man-n-the-mddle attack. The man-n-the-mddle attack s a form of actve eavesdroppng n whch makes ndependent connectons wth the vctms and relays messages between them, makng them beleve that they are talkng drectly to each other over a prvate connecton, whle n fact the entre conversaton s controlled by. Let s descrbe the detals of the attack as follows. Step 1: When the message M 1 = {, P N, N } s sent from to, ntercepts the message and computes = r1 G, and sends the forged message M 1 = {, P N, N 1} to, where r1 and N 1 are the random numbers of. Step 2: When recevng the message, computes = r G and sends the message M 2 = {, P N, N } to. Step 3: ntercepts the message M 2 and computes = r2 G and sends the forged message M 2 = {, P N, N 2} to, where r2 and N 2 are the random numbers of. Step 4: fter recevng the message, computes Z 2 = d1 ( + h( T SM, P N ) T SM ), Z 1 = r, and the sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) and MacT ag =
3 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 633 f(sk,,,, ). Next, sends the message M 3 = {MacT ag } to. Step 5: eavesdrops ths message and computes Z 2 = d1 ( + h( T SM, P N ) T SM ), Z 1 = r 1, and the sesson key SK = KDF (N, N 1,,, Z 1, Z2 ) and MacT ag = f(sk,,,, ). fter that, sends the forged message M 3 = {MacT ag } to. Step 6: When recevng the message M 3, computes Z 1 = r, Z2 = d1 ( +h( T SM, P N ) T SM ) and SK = KDF (N, N 1,,, Z 1, Z2 ). verfes whether f(sk,,,, ) = MacT ag and t s obvous that the equaton s true, because: Z 1 = r = r r 1 G = r 1 = Z 1, Z 2 = d 1 ( + h( T SM, P N ) T SM ) = (q + h( T SM, P N )d T SM ) (q G + h( T SM, P N )d T SM )G) = (q + h( T SM, P N )d T SM ) (q + h( T SM, P N )d T SM )G = d 1 ( + h( T SM, P N ) T SM ) = Z 2. computes MacT ag = f(sk,,,, ) and sends the message M 4 = {MacT ag } to. Step 7: receves the message M 4 from to, computes Z 2 = d ( + h( T SM, P N ) T SM ), Z 1 = r 2 and the sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) and MacT ag = f(sk,,,, ). fter that, sends the forged message M 4 = {MacT ag } to. Step 8: When recevng the message, checks the valdness of MacT ag and t s sure that the equaton wll be equal to f(sk,,,, ). Therefore, agrees on the sesson key SK as the common key amng at encryptng the communcaton messages. In ths way, s successfully authentcated by and, respectvely. That s, shares a sesson key SK = KDF (N, N 2,,, Z 1, Z2 ) wth, at the same tme, he shares a sesson key SK = KDF (N, N 1,,, Z 1, Z2 ) wth. However, both of and do not know that they are communcatng wth an attacker at all. They beleve they successfully have fnshed the handshake agreement wth each other. 4 The Proposed Scheme Ths secton wll present the proposed scheme as Fgure 1. fter recevng the user s request for pseudonyms, the T SM generates n pseudonyms and sends them to va a secret channel. The T SM also stores the user s dentty and pseudonyms nto ts database. There are four partes n a pseudonym P N : the s publc key, s prvate key, the T SM s dentty and the T SM s sgnature. P N = {, Enc({, }, d T SM ), T SM, S T SM }, S T SM = Sg(d T SM,, Enc(, d T SM ), T SM ), d = d T SM + h(, r S )h(, P N ). s the same method, the user could get ts pseudonyms and correspondng prvate key d = d T SM + h(, r S )h(, P N ) and publc key d G. 4.1 Establshment of the Sesson Key When and attempts to establsh the handshake, they perform as follows: Step 1: computes = r G, = r d G, where r s a nonce generated by. Then, sends {, } to. Step 2: When recevng the message, computes (d ) 1 =, = r G, and = r d G, where d G s the publc key of. Fnally, returns {, } to. Step 3: Once recevng the message, computes (d ) 1 =, Z = r,z = d ( T SM + h(, P N ) ), SK = KDF (,, Z, Z ) and MacT ag = f(,, SK, ). t last, sends back the message {MacT ag } to. Step 4: When recevng the messages, computes Z = r,z = d ( T SM + h(, P N ) ), SK = KDF (,, Z, Z ) and verfes whether f(,, SK, ) = MacT ag. If t s equal, sets SK as the sesson key and computes MacT ag = f(,, SK, ). fter that, delvers back the message {MacT ag } to. Step 5: When recevng the message, checks whether f(,, SK, ) = MacT ag. If t holds, successfully negotates the sesson key SK wth. 5 Securty nalyss Ths secton analyze the securty of the proposed scheme, whch ncludes achevng users anonymty, mutual authentcaton, perfect forward sesson key securty, and wthstandng relay attack, mpersonaton attack. The detals descrbe below. 5.1 Users nonymty In the proposed scheme, the users denttes and are respectvely mpled n MacT ag () =
4 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 634 Key agreement (1)Select r, PN (5)( d Z Z ) 1 r SK KDF( MacTag, d ( (9) f( TSM f(, r G, r d G., h(,, SK,, Z,, PN, Z ) ),, SK, ). ) MacTag ),. (2),, PN (4),, PN (6)MacTag (8)MacTag (7) Z Z (3)Select f( ( d d ), 1 r r d r G, ( SK KDF( MacTag r TSM, f( G.,, SK, h(,, Z ) MacTag,, PN, Z ) ),, SK, ). ), Fgure 1: Mutual authentcaton and key agreement of our scheme f(,, SK, () ), where SK s the sesson key, () = r ()d () () G, r () and d () () are the random numbers and the prvate keys. Therefore, s not able to be derved from Z wthout knowng the users prvate key, owng to the one-way property of the hash functon. Therefore, the proposed scheme preserves dentty prvacy. 5.2 Mutual uthentcaton In the proposed scheme, authentcates by checkng = (d ) 1 and MacT ag = f(,, SK, ), where SK = KDF (,, r, d d G). ddtonally, authentcates by verfyng whether = (d ) 1 and MacT ag = f(,, SK, ), where SK = KDF (,, r, d d G). 5.3 Perfect Forward Securty of the Sesson Key Gven,,, and d d, the sesson key SK = KDF (,, r, d d G) cannot be calculated wthout the knowledge of r and r, owng to the Dffe-Hellman problem. ddtonally, gven MacT ag = f(,, SK, ) and MacT ag = f(,, SK, ). SK cannot be determned due to the one-way property of the hash functon and no knowledge of users denttes. Therefore, the sesson key cannot be derved from the revealed messages n the proposed scheme. 5.4 Known Sesson Key Securty In the proposed scheme, the sesson key s computed as SK = KDF (,, r r G, d d G), whch does not gve any useful nformaton for computng the next sesson keys because r and r are randomly generated n dfferent runs and are ndependent of each other among scheme executons. Therefore, the proposed scheme has the property of known-key securty. 5.5 Resstance to relay attack Relay ttack s also popularly known as man n the mddle attack n network securty. n attacker acts as a mddleman between two NFC devces to ntercept the data
5 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 635 Table 2: Computatonal cost comparson Eun et al. [5] He et al. [7] The Proposal 3T ecm + 1T eca + 2T h + 2T mm + 1T kdf 4T ecm + 1T eca + 2T h + 1T kdf 4T ecm + 1T m + 2T h + 1T kdf T ecm + 1T eca + 2T h + 2T mm + 1T kdf 4T ecm + 1T eca + 3T h + 1T kdf 4T ecm + 1T m + 2T h + 1T kdf Total 6T ecm + 2T eca + 4T h + 4T mm + 2T kdf 8T ecm + 2T eca + 5T h + 2T kdf 8T ecm + 2T m + 4T h + 2T kdf wthout the knowledge of the two NFC devces. The attacker ether reads and records or manpulates the data before relayng t to the recevng devce [18]. If an adversary ntends to mpersonate as a legal user to cheat and, he cannot accomplsh hs well as he wshed. ecause and each hold the data whch s only verfed by the other sde, any forgery data wll be detected by the recever. Specfcally, sends Z = d d G whch s concealed n the sesson key and = r d G to, where d G s a secret value of. fter verfyng the correctness of the two values, udges whether the sender s the real. Smlarly, can also authentcate the valdty of by checkng Z = d d G and = r d G. 5.6 Resstance to Impersonaton ttack In the establshment of the sesson key, transmts = r d G to, where d s the secret key of, only knows d. Others are mpossble to know the value of d G and cannot compute Z. Wthout the value of Z, an adversary cannot pass the authentcaton of. Meanwhle, also sends back the value d G whch s hdden n = r d G, where d G s the secret nformaton only known by of and, and only knows d. That s, any unauthorzed user cannot compute the correct Z and hence cannot be verfed by wthout the value of d G. In ths way, the proposed scheme can wthstand the mpersonaton attack. 5.7 No Key Control In the proposed scheme, both and ontly compute the sesson key SK = KDF (,, r r G, d d G) and therefore, fals to predetermne a sesson key snce SK contans r and d, where r and d are the secret values of and ndependent among scheme executons. In other word, or cannot determne a sesson key alone and hence, the proposed scheme provdes the no key control property. 5.8 Verfcaton Usng Scyther Tool Scyther s a tool for the automatc verfcaton of securty protocols. In ths part, we use Scyther-w32-v1.1.3 [4] to analyze the proposed scheme. Fgure 1 shows a summary of the clams n the proposed scheme. The verfcaton result (Fguer 2) shows our scheme s correct. 6 Performance Comparsons Ths secton wll evaluate the performance of the proposed scheme, and compare t wth other related schemes [5, 7] for performance and functonalty aspects. In order to facltate the analyss of the performance, some notatons was defned as below: T ecm : the tme consumpton for an ellptc curve pont multplcaton operaton; T h : the tme consumpton for a hash functon operaton; T eca : the tme consumpton for an ellptc curve pont addton operaton; T kdf : the tme consumpton for a key dervaton functon operaton; T mm : the tme consumpton for a modular multplcaton operaton; T m : The tme consumpton for a modular nverson operaton. Generally, T mm s far greater than T ecm, T eca and T h. ccordng to [1], under the envronment of 2.2 GHz CPU and 2.0G RM, T ecm and T eca are and ms, T m, T mm and T h are 5.565, and 2.3 µs, respectvely. Table 2 demonstrates that the proposed scheme has less computatonal effcency as compared wth He et al. [7] but a slghter hgher than Eun et al. [5] schemes, where the computatonal cost for executng the scheme once s only half of the tme needed for other related scheme due to the proposed scheme needs more ellptc curve pont multplcaton computaton than Eun et al. s scheme, and employ modular nverson computaton nstead of ellptc curve pont addton computaton. Table 3 shows the functonalty analyss of the proposed scheme wth Eun et al. s [5] and He et al. s [7] schemes. It s observed that the proposed scheme outperforms as compared to He et al. s and Eun et al. s schemes as the proposed scheme supports extra features lsted n
6 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 636 hashfuncton H;hashfuncton KDF; const dd: Functon;const Mul: Functon; usertype Strng;const a,b: Strng; protocol lu(,) { role { fresh Ra, G, PNa, PNb, tsm: Nonce; var a1, a2, b1, b2, Za1, Za2: Nonce; var SK, MacTaga, MacTagb: Nonce; match(a1,mul(ra, G));match(a2,Mul(Ra,pk())); send_!1(,,a1,a2,pna);recv_!2(,,b1,b2,pnb); match(za1,mul(ra,b1));match(za2,{dd(mul(h(b,pnb),a1),tsm)}sk()); match(sk,kdf(a, b, Za1, Za2)); match(mactaga,h(a, b, SK, b1));send_!3(,,mactaga); recv_!4(,,mactagb);clam_1(,secret,mactaga);clam_2(,secret,a1); clam_3(,secret,a2);clam_4(,secret,b1); clam_5(,secret,b1);clam_6(,lve); clam_7(,weakagree);clam_8(,nagree); clam_9(,nsynch);} role { fresh Rb, G, PNa, PNb, tsm: Nonce; var a1, a2, b1, b2, Zb1, Zb2: Nonce; var SK, MacTaga, MacTagb: Nonce; recv_!1(,,a1,a2,pna);match(b1,mul(rb, G)); match(b2,mul(rb,pk()));send_!2(,,b1,b2,pnb); recv_!3(,,mactaga);match(zb1,mul(rb,a1)); match(zb2,{dd(mul(h(a,pnb),b1),tsm)}sk()); match(sk,kdf(a, b, Zb1, Zb2)); match(mactagb,h(a, b, SK, a1)); send_!4(,,mactagb);clam_1(,secret,mactagb); clam_2(,secret,a1);clam_3(,secret,a2); clam_4(,secret,b1);clam_5(,secret,b1); clam_6(,lve);clam_7(,weakagree); clam_8(,nagree);clam_9(,nsynch);}} Fgure 2: The scheme descrpton Table 3: Comparson of functonalty features Eun et al. [5] He et al. [7] The Proposal Mutual authentcaton Yes Yes Yes User anonymty Yes Yes Yes No key control Yes Yes Yes Known sesson key securty Yes Yes Yes Impersonaton attack No Yes Yes Perfect forward securty of the sesson key - - Yes Relay attack - No Yes
7 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 637 Fgure 3: Test result. ths table and s also more secure than He et al. s scheme. s a result, the proposed scheme s much sutable for practcal applcatons as compared to the recently proposed He et al. s scheme. 7 Concluson Ths paper have nvestgated the NFC communcatonsbased mutual authentcaton scheme presented by He et al.. y cryptanalyzng studes, a fatal securty weakness n He et al. s scheme have been found. In order to remedy ths flaw, an enhancement based on He et al. s scheme have been presented. ased on the securty analyss, the proposed scheme has been demonstrated to be satsfed both the verfablty and prvacy of attrbutes. ccordng to the performance comparson results, the effcency and feasblty of the proposed scheme under dfferent prvacy requrements for the IOT have been shown. References [1] H. rshad, and M. Nkooghadam, n effcent and secure authentcaton and key agreement scheme for ses-
8 Internatonal Journal of Network Securty, Vol.19, No.4, PP , July 2017 (DOI: /IJNS (4).17) 638 son ntaton protocol usng ECC, Multmeda Tools and pplcatons, vol. 75, no. 1, pp , [2] G. roll, S. Sorpaes, E. Rukzo, M. Paolucc, J. Hamard, M. Wagner and. Schmdt, Supportng moble servce usage through physcal moble nteracton, n 5th nnual IEEE Internatonal Conference on Pervasve Computng and Communcatons, Whte Plans, NY, US [3] V. Coskun, K. Ok, and. Ozdenzc, Near Feld Communcaton (NFC): From Theory to Practce, London, Wley, February, [4] C. Cremers, The Scyther Tool, pr. 4, ( scyther/) [5] H. Eun, H. Lee, and H. Oh, Condtonal prvacy preservng securty protocol for NFC applcatons, IEEE Transacton on Consumer Electroncs, vol. 59, no. 1, pp , [6] E. Hasoo, L. Hoonung, S. Junggab, K. Sangn, and O. Heekuck, Condtonal prvacy preservng securty protocol for NFC applcatons, n IEEE Internatonal Conference on Consumer Electroncs, pp , [7] D. He, N. Kumar, and J. H. Lee, Secure pseudonymbased near feld communcaton protocol for the consumer nternet of thngs, IEEE Transactons on Consumer Electroncs, vol. 61, no. 1, pp , [8] ISO/IEC, Informaton Technology-Securty Methods- Cryptographc Methods ased on Ellptc Curves - Part 1: General, ISO/IEC , pr [9] ISO/IEC, Informaton Technology Telecommuncatons and Informaton Exchange etween Systems- NFC Securty - Part 1: NFC-SEC NFCIP-1 Securty Servce and Protocol, ISO/IEC : 2010, May [10] ISO/IEC, Informaton Technology Telecommuncatons and Informaton Exchange etween Systems- NFC Securty - Part 2: NFC-SEC Cryptography Standard Usng ECDH and ES, ISO/IEC : 2010, May [11] P. Kumar,. Gurtov, J. Inatt, and S. G. Lee, Delegaton-based robust authentcaton model for wreless roamng usng portable communcaton devces, IEEE Transacton on Consumer Electroncs, vol. 60, no.4, pp , [12] Y. Lu, X. Wu, X. Yang, secure anonymous authentcaton scheme for wreless communcatons usng smart cards, Internatonal Journal of Network Securty, vol. 17, no. 3, pp , [13] W. Lumpkns, and M. Joyce, Near-feld communcaton: It pays: Moble payment systems explaned and explored, IEEE Consumer Electroncs Magazne, vol. 4, no. 2, pp , [14] G. Madlmayr, J. Langer, and C. Kantner, NFC devces: Securty and prvacy, n 3th nnual IEEE Internatonal Conference on valablty, Relablty and Securty, pp , [15]. Matos, D. Romao, and P. Trezentos, Secure hotspot authentcaton through a near feld communcaton sde-channel, n 2012 IEEE 8th Internatonal Conference on Wreless and Moble Computng, Networkng and Communcatons, pp , Oct [16] K. F. Warnck, R.. Gottula, S. Shrestha, and J. Smth, Optmzng power transfer effcency and bandwdth for near feld communcaton systems, IEEE Transacton on ntennas and Propagaton, vol. 61, no. 2, pp , [17] T. Sunl,. Rabn, and M. Sangman, NFC and ts applcaton to moble payment: Overvew and comparson, n th IEEE Internatonal Conference on Informaton Scence and Dgtal Content Technology, pp , [18] C. Thammarat, R. Chokngamwong, C. Techapanupreeda, and S. Kungpsdan, secure lghtweght protocol for NFC communcatons wth mutual authentcaton based on lmted-use of sesson keys, n Proceedngs of 2015 IEEE Internatonal Conference on Informaton Networkng, pp , ography Yan-Na Ma receved the.s. degree n electrcal engneerng from Dalan Unversty (DUT) of Technology, Dalan, Chna, n 2009 and the M.S. and Ph.D. degree n communcatons and ntegrated system from Tokyo Insttute of Technology, Tokyo, Japan, n 2011 and 2014, respectvely. Currently, she s a faculty member wth School of Informaton Engneerng and rt Desgn, Zheang Unversty of Water Resources and Electrc Power, Chna. Her research nterests are speech sgnal processng, nose reducton, near feld communcaton and ther applcatons to communcaton devces.
Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationXiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng
More informationImproving the Authentication Scheme and Access Control Protocol for VANETs
Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu
More informationAn Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationDRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School
DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationEMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.
student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete
More informationEPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication
94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationVRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,
VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationAn Efficient and Flexible Decentralized Multicast Key Distribution Scheme
IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationSecure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,
More informationCryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee
More informationFigure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13
A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationHardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems
Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa
More informationGustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185
An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationEPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing
EPDA: Enhancng Prvacy-Preservng Data Authentcaton for Moble Crowd Sensng arxv:8.375v [cs.cr] 9 Nov 8 Jngwe Lu, Fanghu Ca, Longfe Wu, Rong Sun, Lehuang Zhu and Xaojang Du State Key Lab of ISN, Xdan Unversty,
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationDefense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code
Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar. 2016 12 Defense Aganst Selfsh PUEA n Cogntve Rado Networks Based on Hash Message Authentcaton Code Wald Ramadan
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationFAST ELECTRON IRRADIATION EFFECTS ON MOS TRANSISTOR MICROSCOPIC PARAMETERS EXPERIMENTAL DATA AND THEORETICAL MODELS
Journal of Optoelectroncs and Advanced Materals Vol. 7, No., June 5, p. 69-64 FAST ELECTRON IRRAIATION EFFECTS ON MOS TRANSISTOR MICROSCOPIC PARAMETERS EXPERIMENTAL ATA AN THEORETICAL MOELS G. Stoenescu,
More informationRC Filters TEP Related Topics Principle Equipment
RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)
More informationTime-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock
Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationInternational Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.
Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationBroadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem
Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese
More informationTile Values of Information in Some Nonzero Sum Games
lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1
Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,
More informationControl Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart
Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationResearch on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d
Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,
More informationNetwork Reconfiguration in Distribution Systems Using a Modified TS Algorithm
Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationTh P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)
-4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.
More informationPOLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources
POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three
More informationSensors for Motion and Position Measurement
Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where
More informationAccelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module
Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research
More informationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,
More informationTHE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER
VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON
More informationAn efficient cluster-based power saving scheme for wireless sensor networks
RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationDistributed Uplink Scheduling in EV-DO Rev. A Networks
Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationStrain Gauge Measuring Amplifier BA 660
Stran Gauge Measurng Amplfer BA 660 Orgnal of the Manual BA660 / IP20 BA660 / IP66 Table of Contents 1. Safety precautons...2 1.1. Feld of applcaton...2 1.2. Installaton...2 1.3. Mantenance...2 2. Functon...2
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationArticle Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge
Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,
More informationcommunications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.
Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal
More informationCMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2
Proceedngs of Natonal Conference on Recent Advances n Electroncs and Communcaton Engneerng CMOS Implementaton of Lossy Integrator usng Current Mrrors Rshu Jan, Manveen Sngh Chadha 2, 2 Department of Electroncs
More informationThe Dynamic Utilization of Substation Measurements to Maintain Power System Observability
1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator
More informationFall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes
5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationSTUDY ON LINK-LEVEL SIMULATION IN MULTI- CELL LTE DOWNLINK SYSTEM
Proceedngs of IEEE IC-BMT0 TUDY O LIK-LEVEL IMULATIO I MULTI- CELL LTE DOWLIK YTEM Yang Zhang, Ruoyu Jn, Xn Zhang, Dacheng Yang Beng Unversty of Posts and Telecommuncatons, Beng 00876, Chna 05330@bupt.edu.cn
More informationEvaluating Different One to Many Packet Delivery Schemes for UMTS
Evaluatng Dfferent One to Many Packet Delvery Schemes for UMTS Antonos Alexou, Dmtros Antonells, Chrstos Bouras Research Academc Computer Technology Insttute, Greece and Computer Engneerng and Informatcs
More informationGuidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014
Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,
More informationLecture 10: Bipolar Junction Transistor Construction. NPN Physical Operation.
Whtes, EE 320 Lecture 10 Page 1 of 9 Lecture 10: Bpolar Juncton Transstor Constructon. NPN Physcal Operaton. For the remander of ths semester we wll be studyng transstors and transstor crcuts. The transstor
More informationOn Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution
Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed
More informationSECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE
More informationOptimization Frequency Design of Eddy Current Testing
Optmzaton Frequency Desgn of Eddy Current Testng NAONG MUNGKUNG 1, KOMKIT CHOMSUWAN 1, NAONG PIMPU 2 AND TOSHIFUMI YUJI 3 1 Department of Electrcal Technology Educaton Kng Mongkut s Unversty of Technology
More informationPassive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)
Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called
More informationFigure 1. DC-DC Boost Converter
EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton
More informationMulti-hop Coordination in Gossiping-based Wireless Sensor Networks
Mult-hop Coordnaton n Gosspng-based Wreless Sensor Networks Zhlang Chen, Alexander Kuehne, and Anja Klen Communcatons Engneerng Lab, Technsche Unverstät Darmstadt, Germany Emal: {z.chen,a.kuehne,a.klen}@nt.tu-darmstadt.de
More informationMultiple Error Correction Using Reduced Precision Redundancy Technique
Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract
More informationA High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode
A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute
More informationChapter 2 Basics of Efficient Secure Function Evaluation
Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationBit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection
011 Internatonal Conerence on Inormaton and Electroncs Engneerng IPCSIT vol.6 (011) (011) IACSIT Press, Sngapore Bt Error Proalty o Cooperatve Dversty or M-ary QAM OFDM-ased system wth Best Relay Selecton
More informationApplication Form. Welsh Government Learning Grant Further Education 2017/18. student finance wales cyllid myfyrwyr cymru
student fnance wales cylld myfyrwyr cymru Welsh Government Learnng Grant Further Educaton 2017/18 Applcaton Form www.studentfnancewales.co.uk/wglgfe sound advce on STUDENT FINANCE /A How to complete ths
More informationEnergy Efficiency Analysis of a Multichannel Wireless Access Protocol
Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San
More informationThe Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game
8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang
More informationIndex Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.
ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá
More informationA High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree
World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee
More informationWireless Sensor Network Coverage Optimization Based on Fruit Fly Algorithm
Wreless Sensor Network Coverage Optmzaton Based on Frut Fly Algorthm https://do.org/10.3991/joe.v1406.8698 Ren Song!! ", Zhchao Xu, Yang Lu Jln Unversty of Fnance and Economcs, Jln, Chna rensong1579@163.com
More informationAn Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach
2 3rd Internatonal Conference on Machne Learnng and Computng (ICMLC 2) n daptve chedulng lgorthm for et Cover Problem n Wreless ensor Networks: Cellular Learnng utomata pproach eza Ghader Computer Engneerng
More informationApplication Form Academic year 2015/16
EDUCATION MAINTENANCE ALLOWANCE (EMA) Applcaton Form Academc year 2015/16 www.ndrect.gov.uk Apply Now! How to complete ths applcaton form Follow the nstructons, we ll tell you what questons you need to
More informationJoint Adaptive Modulation and Power Allocation in Cognitive Radio Networks
I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,
More informationLow Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages
Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng
More informationA Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping
77 Journal of ower Electroncs, ol 9, No 5, September 009 JE 9-5- A Novel Soft-Swtchng Two-Swtch Flybac Converter wth a Wde Operatng Range and Regeneratve Clampng Marn-Go Km and Young-Seo Jung * Dvson of
More informationAdaptive System Control with PID Neural Networks
Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal
More informationAn Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks
An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,
More informationECE315 / ECE515 Lecture 5 Date:
Lecture 5 Date: 18.08.2016 Common Source Amplfer MOSFET Amplfer Dstorton Example 1 One Realstc CS Amplfer Crcut: C c1 : Couplng Capactor serves as perfect short crcut at all sgnal frequences whle blockng
More informationBLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS
BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln
More information