Secret Searching in Wireless Sensor Networks with RFIDs

Size: px
Start display at page:

Download "Secret Searching in Wireless Sensor Networks with RFIDs"

Transcription

1 Secret Searchig i Wireless Sesor Networks with RFIDs Shih-I Huag Shiuhpyg Shieh Dept. of Comp. Sci. & Ifo. Eg. Natioal Chiao Tug Uiversity, Hsichu, Taiwa 300 {sihuag,ssp}@csie.ctu.edu.tw Abstract I this paper, we propose a etwork architecture with RFIDs ad sesor odes (ARIES, a mutual autheticatio protocol (AMULET, ad a secret search protocol (ASSART. I ARIES, the distace limitatio ca be relieved with the help of widely deployed RFID-aware sesor odes. AMULET ca perform mutual autheticatio ad reduce the cost for re-autheticatio. ASSART solves the privacy problem by offerig a secret search mechaism over ecrypted data. I this way, data will ot be disclosed durig commuicatio ad query processes. eywords: RFID, Wireless Sesor Networks, Autheticatio, Privacy, Secret Search 1. Itroductio To search uecrypted data i a covetioal remote database is relatively easy, but it leads to a problem that these searchig queries may leak private iformatio durig trasmissio. Oe possible solutio to prevet data leakig is to ecrypt origial data ad put ecrypted data i remote database. However, ecryptio causes problems whe performig queries. I a etwork composed of wireless sesor odes ad RFIDs, ecryptio is almost uaffordable. How to re-desig ecryptio schemes is a challegig task. I these eviromets, the collaboratio of sesor odes ad tags ca form a dyamic, distributed database, where each sesor ode cotais a tiy database, ad each elemet of the database is composed of data stored i RFIDs. Sice sesor odes are widely deployed, they form a group of distictive databases. To solve security problems metioed above, a simple way is to ecrypt ad store data i each database. However, it raises the secret searchig problem whe authorized readers wat to search a specific target i ecrypted form. With highly costraied computatio capability ad storage, Weis et al.[11] suggest a radomized lock protocol for private autheticatio. However, their scheme is either private or secure agaist passive eavesdroppers. Wager et al. [3] propose a PRF-based private autheticatio protocol to improve Weis s protocol. However, i both protocols, the tag eeds to be re-autheticated eve it has bee autheticated by oe authorized reader beforehad. This is computatioally waste ad uecessary. Oe acute secret search problem occurs whe data is ecrypted ad stored i tags. Though data security ca be attaied, data caot retrieved by performig search queries merely by plaitexts [1]. May researchers have ivestigated secret search over ecrypted problem whe usig a utrusted file server or exteral utrusted memory [7]. Oe of the premier research works [2] provides secret search i the sese that the utrusted servers caot lear aythig about the plaitext whe oly give the ciphertext. I their scheme, data eeds to be ecrypted beforehad with complex ecryptio operatios. This is uavailable for both tags ad sesors. Therefore, this scheme is ot well-suitable for RFID applicatios. Aother secret search solutio is to support searchig over ecrypted data by usig multi-party computatio ad oblivious fuctios [5][9]. This solutio requires high computatio overhead, ad therefore is ot applicable i sesor architecture. Our cotributios are threefold. First, we propose a architecture of RFIDs ad

2 RFID-aware sesor etworks (ARIES. Secod, we desig a mutual autheticatio protocol (AMULET, which is feasible for RFIDs ad sesor odes. Third, a secret search protocol (ASSART is proposed for readers to search secret over private data i a ecrypted form. The remaider of this paper is orgaized as follows. Sectio 2 itroduces our proposed architecture of RFID ad sesor etworks. Also, a mutual autheticatio protocol for readers ad tags (AMULET is proposed to prevet passive eavesdroppig. I sectio 3, a secret search protocol (ASSART is proposed to query ecrypted data. No private data will be leaked durig wireless trasmissio. Sectio 4 gives proofs to our proposed schemes, ad sectio 5 cocludes our work. 2. ARIES To solve distace limitatio problem, we propose a ARchitecture of RFIDs ad RFID-aware sesor etworks (ARIES. Sesor odes ca read data o tags as a bridge betwee readers ad tags. I this architecture, every target ca be traced eve they are located far away from readers; therefore, fidig misplaced targets, such as books, ca be solved. A RFID-reader is a device ca perform read, write or overwrite operatios o RFID tags through wireless iterface. All readers share a database storig all authorized IDs. The readers share a uique secret key s with each tag, ad s is saved i both tag ad the database shared by readers. That is, readers save all pairs of ( s, ID i the shared database, ad each tag save its idividual secret key s. Each reader also saves a uique ecryptio key E i to ecrypt data ad o other devices kow this key. Sice E i is privately saved, it ca be used to verify the owership of ecrypted data. A tag is a small, thi, readable, ad writeable device which ca store limited data. Oe restrictio of tags is that each tag has oly limited computatio capability. Computatio itesive operatios, such as ecryptio, are iadequate for tags. To reduce the effort for buildig secure chaels betwee readers ad sesor odes, tags save two secret keys. Oe key is used to build secure chael with readers, the other is used to build secure chael with sesor odes. A RFID-aware sesor ode is a tiy device capable of detectig RFID tags. It has a RFID-aware sesor, ad uses a trasceiver ad a receiver to commuicate with readers ad tags through wireless iterface. Sesor odes are cheap ad ca be widely dispersed. Each sesor saves two secret keys shared with readers ad tags. To prevet replay attacks, we assume that each reader ad sesor ode has a sychroized timer. Therefore, re-autheticatio processes ca use the timer to verify whether curret re-autheticatio process is expired or ot. The sychroizatio does ot eed to perform frequetly because autheticatio may ot operate costatly. Loosely time-sychroizatio would be secure eough for autheticatio. Sice much research has ivestigated o time sychroizatio [6][9], we do ot ited to sped time o this issue. Oe restrictio eeds to solve is distace limitatio. Sice readers caot be widely deployed, sesor odes ca make up for this eed. We assume that every sesor ca multihopped to authorized readers ad every sesor ode has a secret key SR shared with readers. With SR, readers ad sesor odes ca maitai secure commuicatio. We do ot ited to itroduce the security algorithm betwee readers ad sesors. Istead, we merely idicate that the chael betwee readers ad sesor odes are secure by storig shared secret keys or pre-distributig verifiable key pairs [8].

3 Figure 1: ARIES architecture. Figure 1 shows ARIES architecture of usig RFID ad sesor wireless sesor etworks. I the architecture, sesor odes ca collect data stored o tags, ad as a whole ca be viewed as a distributed database with tiy databases. Each attribute of the distributed database represets characteristics of the target. As a example, the distributed tiy database ca be represeted as followig table (Table 1: Target ID Sesor ID Attr 1 Attr 2 Attr N ID 1 Sesor A Attr(A1 Attr(A2 Attr(A ID 2 Sesor A Attr(A1 Attr(A2 Attr(A ID 2 Sesor B Attr (B1 Attr (B2 Attr(B ID 7 Sesor Attr (1 Attr (2 Attr( Table 1: A example of the distributed tiy database. 2.1 AMULET Autheticatio is the first ecessary process to build trust relatioship betwee readers ad tags. Because the commuicatio betwee reader ad tag is wireless, there is a possibility for attackers to eavesdrop the trasmitted data, icludig password. Much research has show that the RFID commuicatio is a asymmetry i sigal stregth. That is, it will be much easier for attackers to eavesdrop o sigals from reader to tag tha o data from tag to reader. With this property, we propose A MUtuaL autheticatio protocol for readers ad tags (AMULET to ehace passwords wireless commuicatio betwee RFID tags ad readers. At setup time, we give each tag a uique secret s ad idetificatio ID, ad the reader has a database D storig all pairs of ( s, ID. As the protocol show i Figure 2, AMULET ivolves the followig steps: 1. The reader chooses a radom umber R 1 {0,1 }, curret time T 1, ad calculates f s ( R 1. All R 1, T 1 ad f s ( R 1 are the set to the tag, icludig a Hello bit to idicate the begiig of the autheticatio process. 2. Whe the tag receives a Hello packet, it chooses a radom umber R 2 {0,1 }, curret time T 2, ad calculates α = ID f s ( R1,,. f s is a pseudo radom fuctio (PRF. The R 2, T 2 ad α are the set back to the reader. The tag also saves oe copy of R 2 ad T 2 i its storage. 3. Wheever the reader receives R 2, T 2 ad α, firstly it checks whether ID = α f s ( R1,, or ot. If the coditio is satisfied ad T 2 > T1, it the picks curret time T ow, calculates β = ID f s ( R1,,( Tow ad seds both T ow ad β together to the tag alog with a Ack bit idicatig the ackowledgemet. Meawhile, the reader updates origial ( s, ID pair to ( s, ID, R 2,. 4. The tag the verify it by checkig ID = β f s ( R1,, ad f s ( R1,,( Tow. If both coditios are satisfied, the autheticatio succeeds. Sice it is harder to eavesdrop o the chael from tag to reader tha from the reader to

4 tag, AMULET ca provide security agaist passive eavesdroppig o the reader-to-tag lik. A commo attack to autheticatio protocols is ma-i-the-middle attack. AMULET has the ature to resist such a attack. I AMULET, the reader will sed a radom umber R 1 to the tag. The the tag chooses R 2 {0,1 } ad curret time T 2 ; calculates α = ID f s ( R1,, ; sed them all back to the reader. If a attacker tries to perform ma-i-the-middle attack, he ca eavesdrop o R 1, R 2, T 1, T 2 ad α = ID f s ( R1,,. However, sice the attacker does ot kow the secret key s, he ca ot modify f s ( R1,,. Therefore, ma-i-the-middle attacks will ot success. Therefore, our protocol ca provide security agaist ma-i-the-middle attacks. We will formally prove this property i sectio 4. RFID - reader ( S, ID Hello, R1 Data stored i RFID,, α = ID f s ( R1,, Database Update ( S, ID, R 2, Ack, T = ( Tow, β = ID f s ( R1,, T Datastoredi Database Figure 2: AMULET architecture. Wheever a reader wats to sed commads to autheticated tag, the autheticatio process does ot eed to reru agai. After autheticatio process, reader s database will update origial ( s, ID pair to ( s, ID, R 2,. As show i Figure 3, the autheticated commad ca be verified by the followig two steps: 1. A ew reader ca query the database ad retrieve ( s, ID, R 2,. Whe a reader retrieves ( s, ID, R 2, istead of ( s, ID, it the kows that the tag with this ID is autheticated by aother reader before. As a result, it chooses a radom umber R 1 {0,1 }, curret time T ow ad calculates β = ID f s ( R1,, Tow. The reader the seds its commad Cm d alog with R 1 ad β to the tag. 2. Whe the tag receives Cm d, R 1 ad β, it checks if ID = β f s ( R1,,( Tow ad f s ( R1,,( Tow = β ID. If both coditios are satisfied, the the tag ca execute Cm d. Otherwise, the tag drops it directly. RFID - reader ( S, ID, R 2, T 2 Cmd, Tow, R1, β = ID f s ( R1,,( Tow Figure 3: Commads verificatio without re-autheticatio process. I this way, the re-autheticatio cost ca be reduced. Also, replay attacks ca be solved by checkig whether T ow is expired ad f s ( R1,,( Tow is sustaied or ot. Therefore, both ma-i-the-middle attacks ad replay attacks caot succeed. 3. ASSART To maitai data privacy, oe approach is to ecrypt all attributes so that attackers caot decrypt it ad get that data. However, traditioal cryptographic ecryptio is ot feasible i tags ad sesor odes because their computatio capability is limited. Moreover, it is hard to search o ecrypted data. To solve the problem, we propose A Secret SeARch protocol (ASSART. ASSART saves origial data ito a secret form, ad allow authorized readers to search secret data o tags so that o private iformatio will be disclosed durig trasmissio or query processes.

5 Basically each tag ca store data related to the target. Each characteristic of the target correspods to a attribute of the target. As a example, a tag attached to a book may store the book ID, book title, authors, check-i ad check-out time, borrower IDs, etc. Therefore, the status of a target ca be formally described as B = ( Attr1, L AttrN, where N is the umber of attributes. Some attributes are persoal privacy ad should ot be exposed to uauthorized readers or attackers. As show i Figure 4, ASSART ivolves the followig steps: Figure 4: ASSART operatios for attribute. 1. For a attribute Attr, the reader first geerates H ( s, by iteratively hashig s, R for times, where idicates the umber of sequetial order of Attr. ( 2 2. The reader geerates H ( Ei by iteratively hashig E i for times. 3. The reader calculates f s ( N,, ad cocateates it with N. Let λ = N f ( N, R,., s 2 4. The trasformed attribute Att r = Attr H ( Ei λ. The reader the overwrites Attr by Att r. Figure 5: ASSART operatios. After every attribute is overwritte, attackers will lear othig from the ecrypted data eve they have readers. Sice is differet i all attributes, each attribute geerates differet. With differet H ( s,, eve if some attribute values happe to be the same, it will geerate differet ecrypted attribute values. This will keep attributes private ad secure. Figure 5 shows the overview of ASSART operatios. For authorized readers, wheever a trasformed attribute Att r is give, they ca iversely-trasform it to Attr by computig: Attr = H ( Ei N, f s ( N,,. Sice authorized readers ca retrieve ( S, from the database, they ca easily calculate Attr without exposig sesitive ad private data durig wireless trasformatio. A major cotributio of ASSART is that it ca maitai the rest of attributes private, eve if some attributes are compromised. Sice f s ( N,, varies accordig to differet 1 1, ( + 1 = Attr( + 1 H + ( Ei ( N, f s ( N,, H + ( s, will remai secure eve whe f s ( N,, is compromised. This will keep the rest of attributes ucompromised. For searchig a attribute Attr i a sesor ode, the RFID-reader does ot sed Attr i plaitext durig query process. Istead, the RFID-reader broadcasts

6 Attr H ( Ei to all sesor odes. The each sesor ode calculates Att r by = Attr H ( Ei N, f s ( N,, with its ow s, R 2 ad all ' s. The reaso why each sesor ode eeds to calculate Att r with all ' s is because the sesor ode does ot kow what exactly is. If ay sesor ode fids the Att r, it returs Att r, = 1,2, L, to the RFID-reader. Sice data are ecrypted, data secrecy ad privacy ca be attaied durig trasmissio processes. 4. Security Aalysis I this sectio, we first show AMULET is secure uder ma-i-the-middle attacks. Secod, security aalysis i terms of the resources eeded to break the secret search protocol is discussed. We classify ma-i-the-middle attacks ito three types. Type-1 attack modifies R 1 oly, type-2 attack modifies R 2 oly, ad type-3 attack modifies R 1, R 2, ad α. We will show that these three types of attacks caot work i our autheticatio protocol. Before we start our proof, several defiitios ad theorems is give below. Def 1: (Istace Sice the status B of a target is composed of the target s ID ad attributes, B ca be formally described as B = ( IDB, Attr1, L AttrN. A istace X B is defied as X B = ( Attr1, L, AttrN, ad a verificatio fuctio V f is defied as V ( X = Attri. f B i= 1 Def 2: (Distiguishable Two istaces of a target are distiguishable if they are differet i ay attributes. Def 3: (R-Breakable Let a istace X B = ( Attr1, L, AttrN If X B ca be derived from R ( R N attributes, the it is R-Breakable. Uder the same coditio, a system is R-Breakable if it eeds R resources to break the system. RFID - reader RFID - reader ( S, ID, R 2, RFID - reader Attacker ( S, ID, R 2, T 2 Attacker ( S, ID, R 2, T 2 Attacker R1 R1 R1 R1 R1, T1 R1 T,, (,,,, α = ID f s ( R1,, 2 α = ID f s R1 R1 R 1,, α = ID f s ( R1,, f s ( R1,, f s ( R1,,,, α = ID f s ( R1,,,, α = ID f s ( R1,, R1 R 1 f s ( R1,, f s ( R1,, ID ID Figure 6: Type-1, Type-2 ad Type-3 ma-i-the-middle attacks (left to right Type-1 attacker, show i Figure 6, eavesdrops o R 1, geerates a false value R 1 ad delivers it to the tag. The tag the uses R 2 to geerate α = ID f s ( R1,, ad trasmits R 2, T 2 ad α back to the reader. Sice R 1 R1, the reader will fid that f s ( R1, R 2, f s ( R1,,. Therefore the readers ca prevet type-1 ma-i-the-middle attacks. Type-2 attacker eavesdrops o R 2, geerates a false value R 2, ad trasmits R 2 ad α back to the reader. Sice R 2, the reader will fid that f s ( R1, R 2, f s ( R1,,. Therefore the readers ca prevet type-2 ma-i-the-middle attacks. Type-3 attacker geerates false R 1, R 2, ad α back to the reader ad the tag separately. Sice s is kept i secret, the reader will fid that f s ( R1, R 2, f s ( R1,, ad ID ID. Therefore, type-3 ma-i-the-middle attacks will fails. For ASSART protocol, we will prove their security stregth i terms of the secrecy of attributes. I ASSART, the Att r ca be calculated by the followig equatio = Attr H ( Ei ( N, f s ( N,, (Eq. 1 Theorem 1 proves that it takes both s ad R 2 to compromise Att r. Theorem 1: Let T = f N, R,. T is s, R -breakable. s ( 2 ( 2

7 Proof: Sice N ad may be eavesdropped by attackers, oly s ad R 2 are kept secret. Therefore, attackers eed to compromise both s ad R 2 to compromise T. Therefore T is ( s, -breakable. To evaluate the security stregth of a system, a approach is to verify the umber of resources eeded to compromise the system. It is show i the theorem that it eeds both s ad R 2 to compromise a attribute. A istace is a collectio of all attributes of a tag. The security stregth of a istace is defied as the umber of attributes eeded to be compromised. As more attributes are distiguishable, higher security level ca be attaied. Theorem 2: For all Att r I, J, where I J ad X is a istace composed of Att r I ad Att r J, X = V f ( I, J. There does ot exist Att r I, J, such that V f ( I, J = V f ( I, J Proof: Let AttrI ad AttrJ are two origial attributes ad I > J. Att r I ad Att r J are trasformed attributes, ad X = V f ( I, J. If the attacker geerates Att r I ad Att r J, we will prove that it caot satisfies X = V f ( I + J. Sice X = V f ( I + J, therefore I I J J X = ( AttrI H ( Ei ( N, fs( N, ( + ( AttrJ H ( Ei ( N, fs( N, (. Oe major property i our data trasformatio protocol is that AttrI ca be used to autheticate AttrJ by checkig followig equatio. J J I I = H ( (Eq. 2 Therefore if attacker geerate Att r I ad Att r J, H I ( s, ad H J ( s, ca be calculated by the followig two equatios. I I AttrI = N, f s ( N,, (Eq. 3 J J AttrJ = N, f s ( N,, (Eq. 4 Sice s ad R 2 are kept secret oly betwee authorized readers ad tags, the attackers caot geerate false H I ( s, ad H J ( s,. Therefore, two attributes are distiguishable. Sice ay two attributes are distiguishable, eve attackers ca geerate differet attributes, the attackers caot cheat readers. Next, we will show that a istace of a target B is N-breakable ad distiguishable, where N is the umber of attributes of B. Theorem 3: Let V ( B = Attri = L+ Attr N. B is N-breakable ad f i= 0 distiguishable. Proof: Let B = ( Attr1, L, AttrN ad B be the data after trasformatio ad B = ( 1, 2, L, N. We prove N-breakable property of a istace by iductio. Let N = 2. Accordig to theorem 2, it is show that B is 2-breakable. Suppose whe N=P, B is P-breakable. We wat to prove B is P-breakable whe N=P+1. Without lost of geerosity, we assume that B = ( Attr1, L, AttrN ad B is P-breakable. Without lost of geerosity, let B1 = ( Attr1, L, AttrN, AttrN + 1. From theorem 2, we kow that every two attributes are distiguishable. Therefore, AttrN + 1 ad AttrM are 1 distiguishable for M = 1,2, LN by verifyig H N + s, R ad ( N,, L, respectively. Sice all N+1 attributes are distiguishable, it is proved that a istace of a target is N-breakable. If the ew attribute Attr is iserted betwee Attr 1 to AttrN, Attr ca be verified

8 by both its previous attribute Attr ( 1 ad it followig attributes Attr + 1 by the followig equatios: 1 H R = R (Eq. 5 H ( ( = (Eq. 6 If both eq.5 ad eq.6 are satisfied, the added attributed Attr is valid. Otherwise, Attr is ivalid ad should be discarded. Theorem 3 idicates that attackers eed to compromise all attributes to cheat readers. If oly a portio of attributes are compromised, still the reader ca verity it. 5. Coclusio I this paper, we preset a AREIS architecture to solve the distace limitatio problem i RFID applicatios. Targets at a distace still ca be moitored with the assistace of RFID-aware sesor odes. A autheticatio protocol, AMULET, is also proposed to mutually autheticate readers ad tags. AMULET ca resist ma-i-the-middle attacks ad reduce re-autheticatio overhead. Fially we propose a search protocol, ASSART, to search o secret data. Iformatio will ot be disclosed durig the search process. ASSART uses a key chai to improve data security. Eve if some attributes are compromised; the rest of attributes are still kept i private. 6. Refereces [1] B. Chor, O. Goldreich, E. ushilevitz, ad M. Suda, Private Iformatio Retrieval, I Proceedigs Joural of the ACM, pp , [2] D. Sog, D. Wager, ad A. Perrig, Practical Techiques for Searches o Ecrypted Data., I Proceedigs of IEEE Symposium o Security ad Privacy, pp.44-55, [3] David Molar ad David Wager, Privacy ad Security i Library RFID Issues, Practices, ad Architectures, I Proceedigs of ACM Coferece o Computer ad Commuicatio Security, pp , [4] Estri, D., Govida, R., Heidema, J., umar, Next Cetury Challeges: Scalable Coordiatio i Sesor Networks. I Proceedigs of the 5 th aual ACM/IEEE Iteratioal Coferece o Mobile Computig ad Networkig, pp , [5] H.-M. Su ad S.-P. Shieh, A Efficiet Ccostructio of Perfect Secret Sharig Schemes for Graph-based Access Structures, I Proceedigs of Computers ad Mathematics with Applicatios, pp , 1996 [6] Jaa va Greue ad Ja Rabaey, Lightweight Time Sychroizatio for Sesor Networks, I Proceedigs of the 2 d ACM Iteratioal Coferece o Wireless Sesor Networks ad Applicatios, pp.11-19, [7]. Beett, C. Grothoff, T. Horozov, ad I. Patrascu, Efficiet Sharig of Ecrypted Data, I Proceedigs of the 7th Australia Coferece o Iformatio Security ad Privacy, pp , [8] Lauret Escheauer, Virgil D. Gligor, A key-maagemet scheme for distributed sesor etworks, I Proceedigs of the 9 th ACM Coferece o Computer ad Commuicatio Security, pp.41-47, [9] Saurabh Geeriwal, Ram umar ad Mai B. Srivastava, Time-syc Protocol for Sesor Networks, I Proceedigs of the 1 st Iteratioal Coferece o Embedded Networked Sesor Systems, pp , [10] Srisathaporphat, C., Jaikaeo, C., Chie-Chug She, Sesor Iformatio Networkig Architecture, I Proceedigs of Iteratioal Workshop o Parallel Processig, pp.92-95, [11] Stephe A. Weis, Sajay E. Sarma, Roald L. Rivest, ad Daiel W. Egels, Security ad Privacy Aspects of Low-Cost Radio Frequecy Idetificatio Systems, I Proceedigs of Pervasive Computig, pp , 2004.

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Introduction to OSPF

Introduction to OSPF Itroductio to OSPF ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 3 rd October

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB

PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB 1 of 7 PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB BEFORE YOU BEGIN PREREQUISITE LABS Itroductio to Oscilloscope Itroductio to Arbitrary/Fuctio Geerator EXPECTED KNOWLEDGE Uderstadig of LTI systems. Laplace

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System

Subcarriers and Bits Allocation in Multiuser Orthogonal Frequency Division Multiplexing System Sesors & Trasducers, Vol. 168, Issue 4, April 014, pp. 10-15 Sesors & Trasducers 014 by IFSA Publishig, S. L. http://www.sesorsportal.com Subcarriers ad Bits Allocatio i Multiuser Orthogoal Frequecy Divisio

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Neighbor Discovery for Cognitive Radio Ad Hoc Networks

Neighbor Discovery for Cognitive Radio Ad Hoc Networks Neighbor Discovery for Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig, Kyug Hee Uiversity, 1 Seocheo,Giheug, Yogi, Gyeoggi 449-701 Korea +8-10-561-811 htike@etworkig.khu.ac.kr,

More information

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network

A novel adaptive modulation and coding strategy based on partial feedback for enhanced MBMS network THE JOURNAL OF CHINA UNIVERSITIES OF POSTS AND TELECOMMUNICATIONS Volume 5, Issue, March 2008 SHENG Yu, PENG Mu-ge, WANG We-bo A ovel adaptive modulatio ad codig strategy based o partial feedback for ehaced

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

Acquisition of GPS Software Receiver Using Split-Radix FFT

Acquisition of GPS Software Receiver Using Split-Radix FFT 006 IEEE Coferece o Systems, Ma, ad Cyberetics October -, 006, Taipei, Taiwa Acquisitio of GPS Software Receiver Usig Split-Radix FFT W. H. Li, W. L. Mao, H. W. Tsao, F. R. Chag, ad W. H. Huag Abstract

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

Lecture 13: DUART serial I/O, part I

Lecture 13: DUART serial I/O, part I Lecture 13: DUART serial I/O, part I The bi picture of serial commuicatios Aalo commuicatios Modems Modulatio-demodulatio methods Baud rate Vs. Bits Per Secod Diital serial commuicatios Simplex, half-duplex

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks 2012 IEEE Wireless Commuicatios ad Networkig Coferece: Mobile ad Wireless Networks Optimizatio of Fractioal Frequecy Reuse i Log Term Evolutio Networks Dimitrios Bilios 1,2, Christos Bouras 1,2, Vasileios

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

A study on traffic accident measures in municipal roads by using GIS

A study on traffic accident measures in municipal roads by using GIS icccbe 010 Nottigham Uiversity Press Proceedigs of the Iteratioal Coferece o Computig i Civil ad Buildig Egieerig W Tizai (Editor) A study o traffic accidet measures i muicipal roads by usig GIS Satoshi

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

Join a Professional Association

Join a Professional Association Joi a Professioal Associatio 1. The secret job resource: professioal orgaizatios. You may ot kow this, but the career field you re i, or plaig to work i i the future, probably has at least oe professioal

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Cooperative Diversity Based on Code Superposition

Cooperative Diversity Based on Code Superposition 1 Cooperative Diversity Based o Code Superpositio Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daiel J. Costello, Jr. Departmet of Electrical Egieerig, Uiversity of Notre Dame, Notre Dame, IN 46556, USA Email:

More information

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications Measuremets of the Commuicatios viromet i Medium Voltage Power Distributio Lies for Wide-Bad Power Lie Commuicatios Jae-Jo Lee *,Seug-Ji Choi *,Hui-Myoug Oh *, Wo-Tae Lee *, Kwa-Ho Kim * ad Dae-Youg Lee

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING H. Chadsey U.S. Naval Observatory Washigto, D.C. 2392 Abstract May sources of error are possible whe GPS is used for time comparisos. Some of these mo

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

Technical Explanation for Counters

Technical Explanation for Counters Techical Explaatio for ers CSM_er_TG_E Itroductio What Is a er? A er is a device that couts the umber of objects or the umber of operatios. It is called a er because it couts the umber of ON/OFF sigals

More information

Random Block Verification: Improving the Norwegian Electoral Mix Net

Random Block Verification: Improving the Norwegian Electoral Mix Net Radom Block Verificatio: Improvig the Norwegia Electoral Mix Net Deise Demirel 1,2, Hugo Joker 3, Melaie Volkamer 1,2 1 CASED, Darmstadt 2 SeCuSo group, TU Darmstadt 3 SaToSS group, Uiversity of Luxembourg

More information

Fast Sensor Deployment for Fusion-based Target Detection

Fast Sensor Deployment for Fusion-based Target Detection Fast Sesor Deploymet for Fusio-based Target Detectio Zhaohui Yua*, Rui Ta*, Guoliag Xig*, Cheyag Lu, Yixi Che *Departmet of Computer Sciece, City Uiversity of Hog Kog Departmet of Computer Sciece ad Egieerig,

More information

Multisensor transducer based on a parallel fiber optic digital-to-analog converter

Multisensor transducer based on a parallel fiber optic digital-to-analog converter V Iteratioal Forum for Youg cietists "pace Egieerig" Multisesor trasducer based o a parallel fiber optic digital-to-aalog coverter Vladimir Grechishikov 1, Olga Teryaeva 1,*, ad Vyacheslav Aiev 1 1 amara

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks

Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks Iteratioal Joural of Scietific Research Egieerig & Techology (IJSRET), ISSN 2278 0882 66 Efficiet Aoymous Key Exchage Protocol for Roamig i Wireless Networks 1 Joshua J. Tom, 2 Prof. Boiface K. Alese,

More information

Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing

Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing Efficiet ad Privacy-Preservig Data Aggregatio i Mobile Sesig Qighua Li, Guohog Cao Departmet of Computer Sciece ad Egieerig The Pesylvaia State Uiversity, Uiversity Park Email: {qxl8, gcao}@cse.psu.edu

More information

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ.

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ. ELECTRONICS 00 September, Sozopol, BLGARIA MEASREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQENCY RANGE 0,0-0KHZ. Plame Agelov Agelov Faculty for Computer Sciece, Egieerig ad Natural Studies,

More information

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im sible umber of wavelegths. The wave~~gt~ ~ ~ ~ c ~ b~dwidth is set low eo~gh to iterfax vices. Oe of the most im ed trasmitters ad ysis much more CO "The author is also f Cumputer sciece Departmet, Uiversity

More information

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN

A New Energy Consumption Algorithm with Active Sensor Selection Using GELS in Target Coverage WSN IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 11 A New Eergy Cosumptio Algorithm with Active Sesor Selectio

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

202 Chapter 9 n Go Bot. Hint

202 Chapter 9 n Go Bot. Hint Chapter 9 Go Bot Now it s time to put everythig you have leared so far i this book to good use. I this chapter you will lear how to create your first robotic project, the Go Bot, a four-wheeled robot.

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

IEEE Protocol Implementation And Measurement Of Current Consumption by Rajan Rai

IEEE Protocol Implementation And Measurement Of Current Consumption by Rajan Rai Electrical ad Computer Egieerig Departmet IEEE 82.15.4 Protocol Implemetatio Ad Measuremet Of Curret Cosumptio by Raja Rai Advisor : Dr. James M. Corad Committee : Dr. Iva L. Howitt Dr. Yogedra P. Kakad

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK Giovai Huiske ad Eric va Berkum Dept. of Civil Egieerig - Uiversity of Twete - 7500 AE Eschede - The Netherlads E-mail: g.huiske@ctw.utwete.l ad

More information

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n Sectio 6 7A Samplig Distributio of the Sample Meas To Create a Samplig Distributio of the Sample Meas take every possible sample of size from the distributio of x values ad the fid the mea of each sample

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

Measurement of Equivalent Input Distortion AN 20

Measurement of Equivalent Input Distortion AN 20 Measuremet of Equivalet Iput Distortio AN 2 Applicatio Note to the R&D SYSTEM Traditioal measuremets of harmoic distortio performed o loudspeakers reveal ot oly the symptoms of the oliearities but also

More information

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ

Reducing Power Dissipation in Complex Digital Filters by using the Quadratic Residue Number System Λ Reducig Power Dissipatio i Complex Digital Filters by usig the Quadratic Residue Number System Λ Agelo D Amora, Alberto Naarelli, Marco Re ad Gia Carlo Cardarilli Departmet of Electrical Egieerig Uiversity

More information

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network Optimizatio of Base Statio ad Maximizig the Lifetime of Wireless Sesor Network P.Parthiba 1, G.Sudararaj 2, K.A.Jagadheesh 3, P.Maiiarasa 4 SS1 Research Scholar, P.S.G College of Techology, Coimbatore,

More information

Adaptive Resource Allocation in Multiuser OFDM Systems

Adaptive Resource Allocation in Multiuser OFDM Systems Adaptive Resource Allocatio i Multiuser OFDM Systems Fial Report Multidimesioal Digital Sigal Processig Malik Meherali Saleh The Uiversity of Texas at Austi malikmsaleh@mail.utexas.edu Sprig 005 Abstract

More information

Importance Analysis of Urban Rail Transit Network Station Based on Passenger

Importance Analysis of Urban Rail Transit Network Station Based on Passenger Joural of Itelliget Learig Systems ad Applicatios, 201, 5, 22-26 Published Olie November 201 (http://www.scirp.org/joural/jilsa) http://dx.doi.org/10.426/jilsa.201.54027 Importace Aalysis of Urba Rail

More information

Zero Pre-shared Secret Key Establishment in the Presence of Jammers

Zero Pre-shared Secret Key Establishment in the Presence of Jammers Zero Pre-shared Secret Key Establishmet i the Presece of ammers Tao i College of Computer Sciece Northeaster Uiversity Bosto, MA 25 taoji@ccs.eu.edu Guevara Noubir College of Computer Sciece Northeaster

More information

Novel Steganography System using Lucas Sequence

Novel Steganography System using Lucas Sequence Novel Stegaography System usig ucas Sequece Fahd Alharbi Faculty of Egieerig Kig Abdulaziz Uiversity Rabigh, KSA Abstract Stegaography is the process of embeddig data ito a media form such as image, voice,

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems

A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems 530 OURAL OF COMMUICATIOS, VOL. 5, O. 7, ULY 00 A Radio Resource Allocatio Algorithm for QoS Provisio i PMP-based Systems Pig Wag Broadbad Wireless commuicatios ad Multimedia laboratory, Key Laboratory

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks Eergy-Optimal Olie Algorithms for Broadcastig i Wireless Networks Shay Kutte, Hirotaka Oo, David Peleg, Kuihiko Sadakae, ad Masafumi Yamashita Abstract The paper cosiders the desig of eergy-efficiet olie

More information

POWERS OF 3RD ORDER MAGIC SQUARES

POWERS OF 3RD ORDER MAGIC SQUARES Fuzzy Sets, Rough Sets ad Multivalued Operatios ad Applicatios, Vol. 4, No. 1, (Jauary-Jue 01): 37 43 Iteratioal Sciece Press POWERS OF 3RD ORDER MAGIC SQUARES Sreerajii K.S. 1 ad V. Madhukar Mallayya

More information