An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

Size: px
Start display at page:

Download "An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards"

Transcription

1 Journal of Computers Vol. 27, No. 3, 2016, pp do: / An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng Mu 1 1 School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng, Chna @bjtu.edu.cn, hbmu@bjtu.edu.cn Receved 1 July 2015; Revsed 27 July 2015; Accepted 10 August 2015 Abstract. Rado Frequency Identfcaton (RFID) s a new recognton technology used to dentfy each tem n commodty. Durng tradng, tags whch are attached to goods wll be read by the readers and ther ownershp need transferrng to complement the transacton process and servce. Tags and readers are apt to be attacked durng the communcaton between them due to the wreless channel and the weak resource of the RFID tag. Tags n tradng also need forward and backward securty besdes the ordnary securty requrements n other crcumstances. There are many prevously proposed protocols whle most may suffer from spendng problem because they use hash or keyed encrypton functon. In ths paper we propose a secure ownershp transfer protocol that conforms to the EPCglobal Class 1 Generaton 2 (C1G2) standards. Our work ams to propose a low-cost protocol, based on smple XOR, Cyclc Redundancy Check (CRC) and 16- bt pseudo-random number generators (PRNG). We also put a trust model n whch we make some assumpton whch s useful to ntroduce our protocol. Furthermore, we add a sgn bt to mark the tag's state to ntroduce a release-transfer-resumpton mode. The analyss shows that the proposed scheme can resst common attacks and ensure a securty communcaton. Keywords: EPC, Ownershp transfer, RFID, Securty 1 Introducton RFID technology has become a general technology. It makes the dentfcaton of object wthout touchng come true. A typcal RFID system conssts of tags, reader and database. Tags that carry the pvotal nformaton are attached to object. Ths technology has been wdely used n supply chan management, logstcs, healthcare, defense and many other felds. However, RFID tags and readers just provde lmted calculaton resource, whch makes t dffcult to deal wth the securty rsks n wreless communcaton. The secure ownershp transfer of objects from one owner to another has become an mportant feature of RFID system. For example, the manufacturer transports products to the dstrbuton center, and then to warehouse, to retaler, the ownershp of the products always changes frequently n the supply chan [1]. In our knowledge, the process of ownershp transfer has two securty needs: (1) only the new owner could dentfy and communcate wth the tag, the old owner would not dentfy and trace the tag (2) the new owner has no way to know the communcaton process between the old owner and the tag. And we also use the two condtons to judge ownershp havng been transferred from the old owner to the new owner. Formal defntons are put for secure ownershp and ownershp transfer provded by van Deursen, Mauw, Radomrovc and Vullers [2]. Now, we defne a classfcaton method of ownershp transfer protocol and put a trust model. The secure ownershp transfer protocols can be broadly classfed nto double databases and sngle database. In the former, both the old owner and the new owner use prvate database, durng the process of ownershp transfer, the data should be transmt by secure channel (or rely on a trusted ntermedary). In the trust model, that tag meets the needs of low-cost means t just save ID and only use low-cost calculaton, whch makes the tag always readable but only the current owner could dentfy and get useful nformaton. The rest of the paper s organzed as follows. Secton 2 covers the related work n ths area. The trust 41

2 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards model s ntroduced n Secton 3 n detal. Our proposed protocol s descrbed n Secton 4, followed by the detaled securty analyss n Secton 5. Secton 6 concludes the paper. 2 Related work One of the earlest schemes for ownershp transfer was proposed by Osaka, Takag, Yamazak and Takahash [3] whch s based on hash and keyed encrypton functons. Protocol contans wrtng stage and ownershp transfer stage. In the wrtng stage, symmetrc secret key between tag and server should be updated to k' for ownershp transfer phase. In the transfer of ownershp stage, k' and other pvotal nformaton would be transferred, and then the k' s updated to k'' to complete the transfer of ownershp. The cost does not apply to EPC C1G2. Japnnen and Hamalanen [4] proposed a protocol to mprove the orgnal scheme [3]. However, the mprovement brought desynchronzaton problems that had been verfed [5]. For the nose njecton problem, Chen, Lee, Zhao and Chen [6] used a hash functon to protect the key beng transferred. Ths scheme stll suffers from desynchronzaton ssues. Molnar, Soppera and Wagner [7] proposed a protocol based on key-tree, and referred to the problem of ownershp transfer at the end of the artcle. There are two ways to acheve ownershp transfer of the tag: (1) soft falure, the new owner B communcates wth a trusted center TC (Trusted Center) and learns the number k whch was authorzed to the orgnal owner A. B readng the tag k + 1 tmes that makes A can t read the tag. (2) ncreased tag count, c s the tag s count, B sends a new count value c' and c' > c after B and tags establshed a secure channel, whch makes the tag pass all pseudonym authorzed for A and A can t read the tag. The protocol s not completely transferred ownershp, but pseudo shft. Chen, Huang and Jang [8] proposed an ownershp transfer protocol apples for retal and follows the EPC standards. In the purchase phase, the whole authentcaton conssts of sx steps. If A wants to buy the product, A enters hs personal password PW on the reader n the seventh step, the reader uses PW to make a hash functon and sends the value of H(PW) to the server, then the server wrtes H (PW) n the matched lst. In ownershp transfer phase, A sales the object to B, both A and B need to enter the personal password (PW and PW new ), the reader sends H (PW) and H (PW new ) to the server, the server authentcates H(PW) and makes the update operaton. After that, the server sends the acknowledgment Y and C 2 to the reader, the reader uses SN to update the tag after affrms the rght of Y and C 2. Ths protocol just uses CRC to protect the communcaton whch cannot prevent the tag beng forged. The moble phone s used as a reader n [9]. Frst, the moble reader needs to regster on the server. Durng the ownershp transfer process, a sends pvotanformaton to B, B acheves the ownershp transfer by a thrd party AA (Authorzed Agent). L, Hu, He and Pang [10] use a sgn F d to transfer ownershp after two server authentcate each other. 3 The trust model and assumptons 3.1 Trust mode In the supply chan, tag s attached to goods for dentfcaton. For the manufacturer and retaler, they are cooperaton partners n the economy. They need to share much nformaton for common beneft, though there are some key nformaton must to be protected. Based on ths relaton, we make an assumpton that the old owner shouldn t do any attack acton durng the ownershp transfer process. So the attack s source may be the old or new owner after the ownershp transfer process or an ndvdual attacker durng the process. In the trust mode, we use a flag f whch s set to 1 for no-transferrng and 0 for transferrng to present tag s state and dvde the ownershp transfer nto three steps: (1) ownershp release; (2) nformaton transfer; (3) ownershp resumpton. In the frst step, the old owner change the f s value to turn the tag s state nto transferrng; n the second step, the old owner gves some mport nformaton to the new owner; n the last step, the new owner changes the value of f to turn the tag s state nto no-transferrng and gets the ownershp. 42

3 Journal of Computers Vol. 27, No. 3, Notaton Table 1. Notatons SIGN M req N f PID key s CRC PRGN EPC DATA key c Explanaton Request nformaton. Random number. The sgn of tag status. Pseudo dentfcaton code. The key of common. Cyclc Redundancy Check. Pseudo-random number generators. EPC dentfcaton code. Product nformaton. The key of ownershp transfer. 4 An RFID Authentcaton Protocols 4.1 Common communcaton process The f s value of tag s 1, whch means the tag hold no-transferrng states, when the tag recevng the request nformaton from the reader t would use keys n calculaton; The f s value n database s 1, whch means the tag should not be transferred, when the server has recognzed the tag t uses keys n calculaton. Ths protocol s shown n Fg.1. Fg. 1. Common communcaton process Step1: The reader generates a nonce N 1, and then sends M req and N 1 to the tag. Step2: Upon recevng the request message, the tag checks f s value to choose the key; after that, t generates a fresh nonce N 2 and computes A, B: ( 1 2) A= PRNG EPC N N (1) 43

4 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards ( s ) B = CRC key A (2) Then, t responds (B, N 2, PID ) to the reader. Step3: Reader receves the message from tag and forwards (B, N 2, N 1, PID ) to the server. Step4: After recevng the authentcaton request from the reader, the server checks ts database. The tag s llegal f there s no matched PID j, and the communcaton process would be termnated. If there s a PID j-old equals PID, whch means the tag sufferng denal of servce attacks durng the prevous authentcaton, the server checks the k s value and computes A' and B': A' = PRNG EPC N N (3) ( s old ') B ' = CRC key A (4) If B' equals B, the authentcaton of the tag s fnshed. Then, the server computes C and D: C = PRNG EPC N N (5) ( s old ) D = CRC C key (6) The server sends (D, DATA) to the reader wthout updatng operaton. If there s a PID j-new equallng PID, whch means the prevous authentcaton s prefect, the server checks the k s value and computes A', B': A' = PRNG EPC N N (7) ( s new ) B ' = CRC key A (8) If B' equals B, the authentcaton of tag s fnshed. Then, the server computes C and D: The server computes key s ' and PID j ' as follows: C = PRNG EPC N N (9) ( s new ) D = CRC C key (10) keys ' = PRNG keys new (11) PID j ' = PRNG PID j new (12) The server sends (D, DATA) to the reader and does update operaton that replaces key s-old wth key s-new, replaces key s-new wth key s ', replaces PID j-old wth PID j-new, replaces PID j-new wth PID j '. Step5: Reader receves the message from the server and sends D to the tag. Step6: After recevng the message from the reader, tag computes C' and D': ( 1 2) C ' = PRNG EPC N N (13) D' = CRC C' keys (14) If D' equals D, the authentcaton of reader and server s fnshed. Then, the tag computes PID ' and key s ': s key ' = PRNG key (15) s PID ' = PRNG PID (16) The tag does the update operaton that replaces key s wth key s ' and replaces PID wth PID '. 44

5 Journal of Computers Vol. 27, No. 3, Ownershp transfer The process of ownershp transfer can be dvded nto three phases: ownershp release, nformaton transfer and ownershp resumpton Ownershp release In ths phase, the old owner communcates wth the tag and uses key c to change tag s state nto transferrng. Ths protocol s shown n Fg.2. Fg. 2. Ownershp release Step1: The reader generates a nonce N 1, and sends M req and N 1 to the tag. Step2: Upon recevng the request message, the tag chooses the key accordng to the value of f; after that, t generates a fresh nonce N 2 and computes A, B: ( 1 2) A= PRNG EPC N N (17) ( s ) B = CRC key A (18) Then, t responds (B, N 2, PID ) to the reader. Step3: Reader receves the message from tag and forwards (B, N 2, N 1, PID ) to server. Step4: After recevng the authentcaton request from the reader, the server checks ts database. The tag s llegal f there s no matched PID j, and the communcaton process would be termnated. The f's value n database s 0 whch means the tag needs to be transferred. If there s a PID j-old equallng PID, whch means the tag sufferng denal of servce attack durng the prevous authentcaton, the server computes A', B': 45

6 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards A' = PRNG EPC N N (19-1) ( s old ') B ' = CRC key A (20-1) If B' equals B, the authentcaton of the tag s fnshed. Then, the server computes E and F: ( ( _ ( 1 2) j s old E = PRNG EPC key N N (21-1) F = CRC ( E key c ) (22-1) The server sends (F, DATA) to the reader wthout updatng operaton. If there s a PID j-new equallng PID, whch means the prevous authentcaton s prefect, the server computes A', B': A' = PRNG EPC N N (19-2) ( s new ) B ' = CRC key A (20-2) If B' equals B, the authentcaton of tag s fnshed. Then, the server computes E and F: The server computes key s ' and PID j ' as follows: ( ( _ ( 1 2) j s new E = PRNG EPC key N N (21-2) F = CRC ( E key c ) (22-2) keys ' = PRNG keys new (23) PID j ' = PRNG PID j new (24) The server sends (F, DATA) to the reader and does update operaton that replaces key s-old wth key s-new, replaces key s-new wth key s ', replaces PID j-old wth PID j-new, replaces PID j-new wth PID j '. Step5: Reader receves the message from the server and sends F to the tag. Step6: After recevng the message from the reader, tag computes C' and D': ( 1 2) C ' = PRNG EPC N N (25) If D' s not equal to F, the tag tres to compute E' and F': D' = CRC C' keys (26) ( ( ( 1 2) E = PRNG EPC key N N (27) ' s F ' = CRC E ' keyc (28) If F' equals F, the tag changes f's value nto 0 and computes PID ' and key s ': s key ' = PRNG key (29) s PID ' = PRNG PID (30) The tag does the update operaton that replaces key s wth key s ' and re places PID wth PID '. 46

7 Journal of Computers Vol. 27, No. 3, Informaton transfer The old owner gves the necessary data (k, EPC, PID j-new, key c-new, key s-new ) to the new owner by secure channel Ownershp resumpton The new owner recovers the tag from transferrng n to no-transferrng. Ths protocol s shown n Fg.3. Fg. 3. Ownershp resumpton Step1: The reader generates a nonce N 1, and then sends M req and N 1 to the tag. Step2: Upon recevng the request message, the tag checks f's value; after that, t generates a fresh nonce N 2 and responds (N 2, PID ) to the reader. Step3: Reader receves the message from tag and forwards (N 2, N 1, PID ) to theserver. Step4: After recevng the authentcaton request from the reader, the server checks ts database. The tag s llegal f there s no matched PID j, and the communcaton process would be termnated. The f s value n database s 0 whch means the tag n transfer state. If there s a PID j-new equalng PID, the server computes E and F: The server computes key s ' and PID j ' as follows: ( ( _ ( 1 2) j s new E = PRNG EPC key N N (31) F = CRC ( E key c ) (32) keys ' = PRNG keys new (33) PID j ' = PRNG PID j new (34) The server sends (F, DATA) to the reader and does update operaton that replaces key s-old wth key s-new, replaces key s-new wth key s ', replaces PID j-old wth PID j-new, replaces PID j-new wth PID j '. Step5: Reader receves the message from the server and sends F to the tag. Step6: After recevng the message from the reader, tag computes E' and F': ( ( ( 1 2) E = PRNG EPC key N N (35) ' s 47

8 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards F ' = CRC E ' keyc (36) If F' equals F, the tag changes f's value nto 1 and computes PID ', key s ': s key ' = PRNG key (37) s PID ' = PRNG PID (38) The tag does the update operaton that replaces key s wth key s ' and re places PID wth PID '. 5 Securty analyss and dscusson In ths part, we wll dscuss the protocol s securty. Frst, we need talk somethng about the attacker M. Our protocol conforms to the EPCglobal C1G2 standards, so M could montor the whole communcaton. Besdes, M could be a manufacturer who once owned the tag, he could know more detal about our protocol. To make an attack, M must montor an ntact communcaton. Some mportant nformaton learned by the legtmate communcaton s used to guess the authentcaton nformaton. 5.1 Resst tag mpersonaton attack For the dentfcaton by the server, after recevng the request message M needs to response B M, PID and N 2 ' to the reader. M may guess B M by XOR calculaton: K s s K B B = CRC key A CRC key A (39) B = B CRC key A CRC key A (40) K s s K K B = B CRC A A (41) ( ( 1 2) ( 1' 2' K K B = B CRC PRNG EPC N N PRNG EPC N N (42) In order to calculate B M, M need A s value, but A don t partcpate communcaton, so M can t get A by lstenng that M can t forge tag by guessng B M. 5.2 Resst server mpersonaton attack To Intate communcaton, M sends M req and N 1 ' to the tag. When recevng the request message from tag, M responses D M. M may guess D M by XOR calculaton: D D = CRC key C CRC key C (43) K s s K D = D CRC key C CRC key C (44) K s s K K D = D CRC C C (45) ( ( 1 2) ( 1' 2' K K D = D CRC PRNG EPC N N PRNG EPC N N (46) In order to calculate D M, M needs C's value, but C don t partcpate communcaton, so M can t get C by lstenng that M can t forge server by guessng D M. 5.3 Resst locaton trackng The attacker M needs to lsten to a legtmate communcaton process and record the traced target T. The process s as follow: 48

9 Journal of Computers Vol. 27, No. 3, 2016 (1) R T : M, N (47) req 1 For tracng the target, M lstens to another communcaton process: (2) T R: B, PID, N (48) 1 2 (1) R T : M, N ' (49) req (2) T R: B', PID ', N ' (50) Because the value of PID must be updated each communcaton, M can t judge f the two tags are the same one by PID. Ths protocol could resst trace attack. 5.4 Resst replay attack If M pretends to be a reader, frst, M sends M req,n 1 to the tag, then M receves B', PID ', N from tag, at last M sends D to tag. M can t use B, PID, N 2 to decode EPC and keys, so K can t use the lstened nformaton to make other attack; the tag calculates C' and D' after recevng D: ( 1 2' ) 2 C ' = PRNG EPC N N (51) D ' = CRC C ' key s ' (52) But D' not equals D, tag can t make the authentcaton about M, and tag doesn t update PID and keys yet, so the data between the tag and the database could keep synchronzaton. If M pretends to be a tag, when lstenng to a new communcaton, M sends B, PID, N 2 to the reader. The sever searches n the database to fnd a PID j-new equalng PID and computes A', B': ( j 1' 2) A' = PRNG EPC N N (53) ( s old ') B ' = CRC key A (54) But B' s not equal to B, the server can t make the authentcaton about M, and the communcaton must be nterrupt, the data between the tag and the database would never be changed. 5.5 Resst replay attack Durng the ffth step of the legtmate communcaton, M changes D nto D M. The tag receves D M and computes C', D': ( 1 2' ) C ' = PRNG EPC N N (55) D ' = CRC C ' key s ' (56) Because D' not equals D, tag can t make the authentcaton about server, and tag doesn t update PID and keys yet, but the server has updated the data after sendng nformaton,whch makes the data between the tag and the database not synchronzaton. The database keeps PID j-old, PID j-new, key s-old and key s-new, when the reader communcates wth an attacked tag, the server could fnd PID j-old equals PID, and uses key s-old to compute A', B': If B' equals B, the server computes C and D: A' = PRNG EPC N N (57) ( s old ') B ' = CRC key A (58) 49

10 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards C = PRNG EPC N N (59) ( s old ) Tag receves D from the reader and computes C' and D': D = CRC C key (60) ( 1 2) C ' = PRNG EPC N N (61) D' = CRC C' keys (62) If D' equals D, tag computes PID ', keys', and does the update operaton, whch makes the tag and the database synchronzed n data agan. 5.6 The desynchronzaton of PRNG In our protocol, the PRNG s used to update the pvotal nformaton. The nformaton could keep synchronzaton f there was on attack. The attack behavor makes the tmes of PRNG dfferent that leads to the desynchronzaton ssue. Because the database uses more room to save the new and old nformaton, the server could detect the attack behavor. When the attack behavor has been found, the server nterrupts the current communcaton and sends a specal broadcast to let the tag reset the PRNG that solve the desynchronzaton ssue. 6 Concluson In ths paper, we bult a trust model for Double-database System. Then, we proposed a Secure Ownershp Transfer protocol based on the model. Ths protocol s ultra-lghtweght and meets the EPC C1G2 standard, n whch only CRC, XOR and 16 bt PRNG functons are employed. Securty analyss shows that the protocol can resst tag mpersonaton attack, server mpersonaton attack, locaton trackng, replay attack and man-n-the-mddle attack. In future work, our am s to mprove the protocol and propose a verson for sngle-database. Acknowledgement Ths work s supported by Natonal Natural Scence Foundaton of Chna under Grant References [1] Saravanan Sundaresan, Robn Doss, Wanle Zhou. (2015). Secure ownershp transfer for mult-tag mult-owner passve RFID envronment wth ndvdual-owner-prvacy. Computer Communcatons, 55(C), [2] van Deursen, T., Mauw, S., Radomrovc', S., & Vullers, P. (2009, September). Secure ownershp and ownershp transfer n RFID systems. Paper presented at the 14th European Symposum on Research n Computer Securty-ESORICS 2009, Sant- Malo, France. [3] Osaka, K., Takag, T., Yamazak, K., & Takahash, O. (2006, November). An effcent and secure RFID securty method wth ownershp transfer. Paper presented at the 2006 Internatonal Conference on Computatonal Intellgence and Securty, Guangzhou, Chna. [4] Japnnen, P., & Hamalanen, H. (2008, December). Enhanced RFID securty method wth ownershp transfer. Paper presented at Internatonal Conference on Computatonal Intellgence and Securty (CIS'08), Suzhou, Chna. [5] Kapoor, G., & Pramuthu, S. (2010). Vulnerabltes n some recently proposed RFID ownershp transfer protocols. IEEE 50

11 Journal of Computers Vol. 27, No. 3, 2016 Communcaton Letter, 14(3), [6] Chen, H., Lee, W., Zhao, Y., & Chen, Y. (2009, January). Enhancement of the RFID securty method wth ownershp transfer. Paper presented at the Proceedngs of the 3rd Internatonal Conference on Ubqutous Informaton Management and Communcaton (ICUIMC'09), Suwon, Korea. [7] Molnar, D., Soppera, A., & Wagner, D. (2005, August). A scalable, delegatable pseudonym protocol enablng ownershp transfer of RFID tags. Paper presented at Proceedngs ofthesac'05:proceedngs ofthe 2005 ACM Symposum on Appled Computng, New York, NY. [8] Chen, C.-L., Huang, Y.-C., & Jang, J.-R. (2013). A secure ownershp transfer protocol usng EPCglobal Gen-2 RFID. Telecommuncaton Systems, 53(4), [9] Chen, C.-L., & Chen, C.-F. (2013). An ownershp transfer scheme usng moble RFIDs. Wreless Personal Communcatons, 68(3), [10] L, H.-X., Hu, J.-H., He, L.-W., & Pang, L.-J. (2012, November). Mutual authentcaton and ownershp transfer scheme conformng to EPC-C1G2 standard. Paper presented at the 8th Internatonal Conference on Computatonal Intellgence and Securty IEEE Computer Socety, Guangzhou, Chna. 51

12 An effcent ownershp transfer protocol for RFID conformng to EPC Class 1 Generaton 2 standards 52

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou, [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs

LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs LOKS: Low-Overhead Forward and Backward Key Seecy n WSNs Malvka Ashok CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 Roht Vad CSE Department M. M. Engneerng College

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Procedia Computer Science

Procedia Computer Science Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

MASTER TIMING AND TOF MODULE-

MASTER TIMING AND TOF MODULE- MASTER TMNG AND TOF MODULE- G. Mazaher Stanford Lnear Accelerator Center, Stanford Unversty, Stanford, CA 9409 USA SLAC-PUB-66 November 99 (/E) Abstract n conjuncton wth the development of a Beam Sze Montor

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Developing a Gesture Based Remote Human-Robot Interaction System Using Kinect

Developing a Gesture Based Remote Human-Robot Interaction System Using Kinect Developng a Gesture Based Remote Human-Robot Interacton System Usng Knect Kun Qan 1, Je Nu 2 and Hong Yang 1 1 School of Automaton, Southeast Unversty, Nanjng, Chna 2 School of Electrcal and Electronc

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks An Actvty Based Moblty Predcton Strategy Usng Markov Modelng for Wreless Networks R.V. Mathvarun and V.Vadeh Abstract: The foremost objectve of a wreless network s to facltate the communcaton of moble

More information

Monitoring large-scale power distribution grids

Monitoring large-scale power distribution grids Montorng large-scale power dstrbuton grds D. Gavrlov, M. Gouzman, and S. Lury Center for Advanced Technology n Sensor Systems, Stony Brook Unversty, Stony Brook, NY 11794 Keywords: smart grd; sensor network;

More information

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks Mult-hop Coordnaton n Gosspng-based Wreless Sensor Networks Zhlang Chen, Alexander Kuehne, and Anja Klen Communcatons Engneerng Lab, Technsche Unverstät Darmstadt, Germany Emal: {z.chen,a.kuehne,a.klen}@nt.tu-darmstadt.de

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Online Reporting. Online Reporting. A step-by-step guide. Important information for churches, schools and organisations

Online Reporting. Online Reporting. A step-by-step guide.   Important information for churches, schools and organisations Onlne Reportng Onlne Reportng A step-by-step gude www.olr.ccl.com Important nformaton for churches, schools and organsatons May 2016 Reportng s a vtal part of beng a lcence holder... Reportng s a requrement

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

LANDMARC: Indoor Location Sensing Using Active RFID*

LANDMARC: Indoor Location Sensing Using Active RFID* LANDMARC: Indoor Locaton Sensng Usng Actve ID* Lonel M. N,2, Yunhao Lu, Yu Cho Lau and Abhshek P. Patl Department of Computer Scence & Engneerng Mchgan State Unversty East Lansng, Mchgan, USA luyun@msu.edu

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

A New Scalable RFID Delegation Protocol

A New Scalable RFID Delegation Protocol Appl. Math. Inf. Sc. 8, No. 4, 97-94 (4 97 Appled Matheatcs & Inforaton Scences An Internatonal Journal http://dx.do.org/.785/as/845 A New Scalable RFID Delegaton Protocol Xuqng Chen,, anje Cao, and Yu

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

PSO and ACO Algorithms Applied to Location Optimization of the WLAN Base Station

PSO and ACO Algorithms Applied to Location Optimization of the WLAN Base Station PSO and ACO Algorthms Appled to Locaton Optmzaton of the WLAN Base Staton Ivan Vlovć 1, Nša Burum 1, Zvonmr Špuš 2 and Robert Nađ 2 1 Unversty of Dubrovn, Croata 2 Unversty of Zagreb, Croata E-mal: van.vlovc@undu.hr,

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

An Improved Weighted Centroid Localization Algorithm

An Improved Weighted Centroid Localization Algorithm Internatonal Journal of Future Generaton Communcaton an Networng Vol.6, No.5 (203), pp.45-52 http://x.o.org/0.4257/fgcn.203.6.5.05 An Improve Weghte Centro Localzaton Algorthm L Bn, Dou Zheng*, Nng Yu

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

Study of the Improved Location Algorithm Based on Chan and Taylor

Study of the Improved Location Algorithm Based on Chan and Taylor Send Orders for eprnts to reprnts@benthamscence.ae 58 The Open Cybernetcs & Systemcs Journal, 05, 9, 58-6 Open Access Study of the Improved Locaton Algorthm Based on Chan and Taylor Lu En-Hua *, Xu Ke-Mng

More information

D-STATCOM Optimal Allocation Based On Investment Decision Theory

D-STATCOM Optimal Allocation Based On Investment Decision Theory Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 2016) D-STATCOM Optmal Allocaton Based On Investment Decson Theory Yongjun Zhang1, a, Yfu Mo1, b and Huazhen

More information

Sensors for Motion and Position Measurement

Sensors for Motion and Position Measurement Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/ PTB-Semnar, 3./4. November

More information

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception Enhancng Throughput n Wreless Mult-Hop Network wth Multple Packet Recepton Ja-lang Lu, Paulne Vandenhove, We Shu, Mn-You Wu Dept. of Computer Scence & Engneerng, Shangha JaoTong Unversty, Shangha, Chna

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication Modelng and Smulaton of New Encodng Schemes for Hgh-Speed UHF RFID Communcaton Sang-Hyun Mo, J-Hoon Bae, Chan-Won Park, Hyo-Chan Bang, and Hyung Chul Park In ths paper, we present novel hgh-speed transmsson

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis Arteral Travel Tme Estmaton Based On Vehcle Re-Identfcaton Usng Magnetc Sensors: Performance Analyss Rene O. Sanchez, Chrstopher Flores, Roberto Horowtz, Ram Raagopal and Pravn Varaya Department of Mechancal

More information

Centralized approach for multi-node localization and identification

Centralized approach for multi-node localization and identification Centralzed approach for mult-node localzaton and dentfcaton Ola A. Hasan Electrcal Engneerng Department Unversty of Basrah Basrah, Iraq Lolastar91@gmal.com Ramzy S. Al Electrcal Engneerng Department Unversty

More information

A Pervasive Indoor-Outdoor Positioning System

A Pervasive Indoor-Outdoor Positioning System 70 JOURNAL OF NETWORKS, VOL. 3, NO. 8, NOVEMBER 008 A Pervasve Indoor-Outdoor Postonng System Lonel Reyero 1, Glles Delsle 1 INRS-EMT, Unversté du Québec, Montréal, Canada, H5A 1K6, lonel.reyero@telecom.com

More information

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,

More information

Multicast Transmission Protocol for Multimedia Services in Smart Home

Multicast Transmission Protocol for Multimedia Services in Smart Home Multcast Transmsson rotocol for Multmeda Servces n Smart Home Jeong-Jun Suh, Shan Guo Quan, Jong-Ku ar, Jong Hyu ar 3 and Young Yong Km Department of Electrcal and Electronc Engneerng, Yonse nversty 34

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

Modeling and Analysis of WSN-Based Emergency Braking Control for High-Speed Trains

Modeling and Analysis of WSN-Based Emergency Braking Control for High-Speed Trains Modelng and Analyss of WSN-Based Emergency Brakng Control for Hgh-Speed Trans Xaoshu Wang 1, Tanyun Sh 1, Xaojun Lv 1, Xaobo Ch 2, Dong Zhou 1 1. Insttute of Computng Technology, Chna Academy of Ralway

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information