MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

Size: px
Start display at page:

Download "MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)"

Transcription

1 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG) Arndam Sarkar 1 and J. K. Mandal 2 1 Department of Computer Scence & Engneerng, Unversty of Kalyan, W.B, Inda arndam.vb@gmal.com 2 Department of Computer Scence & Engneerng, Unversty of Kalyan, W.B, Inda jkm.cse@gmal.com ABSTRACT In ths paper, a multlayer perceptron guded key generaton for encrypton/decrypton (MLPKG) has been proposed through recursve replacement usng mutated character code generaton for wreless communcaton of data/nformaton. Multlayer perceptron transmttng systems at both ends accept an dentcal nput vector, generate an output bt and the network are traned based on the output bt whch s used to form a protected varable length secret-key. For each sesson, dfferent hdden layer of multlayer neural network s selected randomly and weghts or hdden unts of ths selected hdden layer help to form a secret sesson key. The plan text s encrypted usng mutated character code table. Intermedate cpher text s yet agan encrypted through recursve replacement technque to from next ntermedate encrypted text whch s agan encrypted to form the fnal cpher text through channg, cascaded xorng of multlayer perceptron generated sesson key. If sze of the fnal block of ntermedate cpher text s less than the sze of the key then ths block s kept unaltered. Recever wll use dentcal multlayer perceptron generated sesson key for performng decpherng process for gettng the recursve replacement encrypted cpher text and then mutated character code table s used for decodng. Parametrc tests have been done and results are compared n terms of Ch-Square test, response tme n transmsson wth some exstng classcal technques, whch shows comparable results for the proposed technque. KEYWORDS Multlayer Perceptron, Sesson Key, Encrypton, Mutated Character Code, Wreless Communcaton. 1. INTRODUCTION In recent tmes wde ranges of technques are developed to protect data and nformaton from eavesdroppers [1, 2, 3, 4, 5, 6, 7, 8, 9]. These algorthms have ther vrtue and shortcomngs. For Example n DES, AES algorthms [1] the cpher block length s nonflexble. In NSKTE [4], NWSKE [5], AGKNE [6], ANNRPMS [7] and ANNRBLC [8] technque uses two neural networks one for sender and another for recever havng one hdden layer for producng synchronzed weght vector for key generaton. Now attacker can get an dea about sender and recever s neural machnes because for each sesson archtecture of neural machne s statc. In NNSKECC algorthm [9] any ntermedate blocks throughout ts cycle taken as the encrypted DOI : /jans

2 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 block and ths number of teratons acts as secret key. Here f n number of teratons are needed for cycle formaton and f ntermedate block s chosen as an encrypted block after n/2 th teraton then exactly same number of teratons.e. n/2 are needed for decode the block whch makes easer the attackers lfe. To solve these types of problems n ths paper we have proposed a multlayer perceptron guded encrypton technque n wreless communcaton. The organzaton of ths paper s as follows. Secton 2 of the paper deals wth the problem doman and methodology. Proposed Multlayer Perceptron based key generaton has been dscussed n secton 3. Character code table generaton technque s gven n secton 4. Recursve replacement encrypton and example of encrypton has been presented n secton 5 and 6 respectvely. Secton 7 and 8 deals wth recursve replacement decrypton and example of decrypton method. Complexty analyss of the technque s gven n secton 9. Expermental results are descrbed n secton 10. Analyss of the results presented n secton 11. Analyss regardng varous aspects of the technque has been presented n secton 12. Conclusons and future scope are drawn n secton 13 and that of references at end. 2. PROBLEM DOMAIN AND METHODOLOGY In securty based communcaton the man problem s dstrbuton of key between sender and recever. Because at the tme of exchange of key over publc channel ntruders can ntercept the key by resdng n between them. Ths partcular problem has been addressed and a technque has been proposed technque addressed ths problem. These are presented n secton 2.1 and 2.2 respectvely Man-In-The-Mddle Attack Intruders nterceptng n the mddle of sender and recever and try to capture all the nformaton transmttng from both partes. Dffe-Hellman key exchange technque [1] suffers from ths type of problems. Intruders can act as sender and recever smultaneously and try to steal secret sesson key at the tme of exchangng key va publc channel Methodology n MLPKG Ths well known problem of mddle man attack has been addressed n MLPKG where secret sesson key s not exchanged over publc nsecure channel. At end of neural weght synchronzaton strategy of both partes generates dentcal weght vectors and actvated hdden layer outputs for both the partes become dentcal. Ths dentcal output of hdden layer for both partes can be use as one tme secret sesson key for secured data exchange. 3. MULTILAYER PERCEPTRON BASED KEY GENERATION SYSTEM A multlayer perceptron synaptc smulated weght based undsclosed key generaton s carred out between recpent and sender. Fgure1 shows multlayer perceptron based synaptc smulaton system. Sender and recevers multlayer perceptron select same sngle hdden layer among multple hdden layers for a partcular sesson. For that sesson all other hdden layers goes n deactvated mode means hdden (processng) unts of other layers do nothng wth the ncomng nput. Ether synchronzed dentcal weght vector of sender and recevers nput layer, actvated hdden layer and output layer becomes sesson key or sesson key can be form usng dentcal output of hdden unts of actvated hdden layer. The key generaton technque and analyss of the 12

3 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 technque usng random number of nodes (neurons) and the correspondng algorthm s dscussed n the subsectons 3.1 to 3.5 n detals. Fgure 1. A Multlayer Perceptron wth 3 Hdden Layers Sender and recever multlayer perceptron n each sesson acts as a sngle layer network wth dynamcally chosen one actvated hdden layer and K no. of hdden neurons, N no. of nput neurons havng bnary nput vector, x { 1, + 1}, dscrete weghts, are generated from nput to j output, are les between -L and +L, w j { L, L+ 1,..., + L}.Where = 1,,K denotes the th hdden unt of the perceptron and j = 1,,N the elements of the vector and one output neuron. Output of the hdden unts s calculated by the weghted sum over the current nput values. So, the state of the each hdden neurons s expressed usng (eq.1) 1 1 = (1) N h wx = w, jx, j N N j= 1 Output of the th hdden unt s defned as = sgn( h ) (2) But n case of h = 0 then sum over ts nputs s postve, or else t s nactve, product of the hdden unts expressed n (eq. 2) = -1 to produce a bnary output. Hence a, = +1, f the weghted = -1. The total output of a perceptron s the = K = 1 (3) 3.1 Multlayer Perceptron Smulaton Algorthm Input: - Random weghts, nput vectors for both multlayer perceptrons. Output: - Secret key through synchronzaton of nput and output neurons as vectors. Method:- Step 1. Intalzaton of random weght values of synaptc lnks between nput layer and randomly selected actvated hdden layer. 13

4 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Where, w j { L L + 1,..., + L}, (4) Step 2. Step 3. Step 4. Step 5. Repeat step 3 to 6 untl the full synchronzaton s acheved, usng Hebban-learnng rules. w j A ( w ( ) ( B + x Θ Θ )) + = g (5),, j, j Generate random nput vector X. Inputs are generated by a thrd party or one of the communcatng partes. Compute the values of the actvated hdden neurons of actvated hdden layer usng (eq. 6) 1 1 = (6) N h wx = w, jx, j N N j= 1 Compute the value of the output neuron usng K = (7) = 1 Compare the output values of both multlayer perceptron by exchangng the system outputs. f Output (A) Output (B), Go to step 3 else f Output (A) = Output (B) then one of the sutable learnng rule s appled only the hdden unts are traned whch have an output bt dentcal to the common output. Update the weghts only f the fnal output values of the perceptron are equvalent. When synchronzaton s fnally acheved, the synaptc weghts are dentcal for both the system. 3.2 Multlayer Perceptron Learnng rule At the begnnng of the synchronzaton process multlayer perceptron of A and B start wth A / B uncorrelated weght vectors w. For each tme step K, publc nput vectors are generated randomly and the correspondng output bts A/B are calculated. Afterwards A and B communcate ther output bts to each other. If they dsagree, A B, the weghts are not changed. Otherwse learnng rules sutable for synchronzaton s appled. In the case of the Hebban learnng rule [10] both neural networks learn from each other. + A ( w ( ) ( )) B + x Θ Θ w j = g, (8), j, j The learnng rules used for synchronzng multlayer perceptron share a common structure. That s why they can be descrbed by a sngle (eq. 4) w j A B ( + f(, ) x ) +, = gw, j,, j (9) 14

5 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 A B wth a functon f (, ),, whch can take the values -1, 0, or +1. In the case of bdrectonal nteracton t s gven by Hebban learnng A B A A B f (,, ) = Θ( ) Θ( ) ant-hebban learnng Random walk learnng 1 (10) A A B A B The common part Θ( ) Θ( ) of f (, ), controls, when the weght vector of a hdden unt s adjusted. Because t s responsble for the occurrence of attractve and repulsve steps [6]. 3.3 Weght Dstrbuton of Multlayer Perceptron In case of the Hebban rule (eq. 8), A's and B's multlayer perceptron learn ther own output. Therefore the drecton n whch the weght w, j moves s determned by the product x, j. As the output s a functon of all nput values, the probabltes to observe x, j = +1 or x, j correspondng weght w, [11, 13, 14, 15, 16]. j 1 ( ) w, j P x, j = 1 = 1 + erf 2 2 NQ w, j Accordng to ths equaton, x, j = sgn( w, j ) x, j and are correlated random varables. Thus = -1 are not equal, but depend on the value of the (11) occurs more often than the opposte, x, j = sgn( w, j ). Consequently, the Hebban learnng rule (eq. 8) pushes the weghts towards the boundares at -L and +L. In order to quantfy ths effect the statonary probablty dstrbuton of the weghts for t s calculated for the transton probabltes. Ths leads to [11]. P ( w = w ), j = P w 0 m = 1 m erf NQ m 1 erf NQ m Here the normalzaton constant 0 P 0 L w = w = L m = erf erf ( m 1) NQ 2 2 s gven by NQ m m 1 ( m 1 ) m 2 2 In the lmt N the argument of the error functons vanshes, so that the weghts stay unformly dstrbuted. In ths case the ntal length of the weght vectors s not changed by the process of synchronzaton. 1 (12) (13) 15

6 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Q ( t = 0 ) = L ( L + 1 ) 3 (14) But, for fnte N, the probablty dstrbuton tself depends on the order parameter Q Therefore ts expectaton value s gven by the soluton of the followng equaton: L Q = wpw 2, j w= L ( = w) 3.4 Order Parameters In order to descrbe the correlatons between two multlayer perceptron caused by the synchronzaton process, one can look at the probablty dstrbuton of the weght values n each hdden unt. It s gven by (2L + 1) varables. A B ( = a w b) Pa b = P w, j, j =, (16) whch are defned as the probablty to fnd a weght wth w A j (15), = a n A's multlayer perceptron and w B, j = b n B's multlayer perceptron. In both cases, smulaton and teratve calculaton, the standard order parameters, whch are also used for the analyss of onlne learnng, can be calculated as functons of P, [12]. a b L L A 1 A A 2 Q = w w = a P a, b N a = L b = L 1 L L B B B 2 Q = w w = b P a, b N a = L b = L 1 L L AB A B R = w w = abp a, b N a = L b = L Then the level of synchronzaton s gven by the normalzed overlap between two correspondng hdden unts (17) (18) (19) AB = w A w w A A w B w B w B = R Q AB A Q B (20) 3.5 Hdden Layer as a Secret Sesson Key At end of full weght synchronzaton process, weght vectors between nput layer and actvated hdden layer of both multlayer perceptron systems become dentcal. Actvated hdden layer s output of source multlayer perceptron s used to construct the secret sesson key. Ths sesson key s not get transmtted over publc channel because recever multlayer perceptron has same dentcal actvated hdden layer s output. Compute the values of the each hdden unt by 16

7 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 N = sgn wj x j= 1 j sgn( x) 1 f = 0 f 1 f x < 0, x = 0, x > 0. For example consder 8 hdden unts of actvated hdden layer havng absolute value (1, 0, 0, 1, 0, 1, 0, 1) becomes an 8 bt block. Ths become a secret sesson key for a partcular sesson and cascaded xored wth recursve replacement encrypted text. Now fnal sesson key based encrypted text s transmtted to the recever end. Recever has the dentcal sesson key.e. the output of the hdden unts of actvated hdden layer of recever. Ths sesson key used to get the recursve replacement encrypted text from the fnal cpher text. In the next sesson both the machnes started tunng agan to produce another sesson key. Identcal weght vector derved from synaptc lnk between nput and actvated hdden layer of both multlayer perceptron can also becomes secret sesson key for a partcular sesson after full weght synchronzaton s acheved. 4. CHARACTER CODE TABLE GENERATION For plan text tree fgure 2 shows correspondng tree representaton of probablty of occurrence of each character n the plan text. Character t and r occur once and character e occurs twce. Each character code can be generated by travellng the tree usng preorder traversal. Character values are extracted from the decmal representaton of character code. Left branch s coded as 0 and that of rght branch 1. Table 1 shows the code and value of a partcular character n the plan text. From the orgnal tree mutated tree s derved usng mutaton. Fgure 3, 4 and 5 are the mutated trees. After mutaton new code values as obtaned are tabulated n table 2. Tree havng (n-1) ntermedate nodes can generate 2 n-1 mutated trees. In order to obtan unque value, the code length s added to the character f the value s dentcal n the table. (21) 17

8 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Character Plan text Table1. Code table Code Value t 10 2 r 11 3 e 0 0 Code Table2. Mutated code table Value Code Value Code Value t r e RECURSIVE REPLACEMENT ENCRYPTION Step 1: Decompose the source stream, say, nto a fnte number of blocks, each preferably of the same sze, say, L. Step 2: Calculate the total number of prmes and nonprmes n the range of 0 to (2 L -1). Accordngly, fnd mnmum how many bts are requred to represent each of these two numbers. Step 3 to be appled for all the blocks. Step 3: For the block under consderaton, calculate the decmal number correspondng to that. Say, t s D. Fnd out f D s prme or nonprme. If D s prme, the code value for that block s 1 and f not so, t s 0.In the seres of prmes or nonprmes (whchever be applcable for D) n the range of 0 to (2 L -1), fnd the poston of D. Represent ths poston n terms of bnary values. Ths s the rank of ths block. After repeatng ths step 3 for all the blocks, followng steps are to be followed. Step 4: Say, there are N number of blocks. In the target stream of bts, put all the N code values one by one startng from the MSB poston. So, n the target stream, the frst N bts are code values for N blocks. Step 5: For puttng all the rank values n the target stream, we are to start from the N th bt from the MSB poston and then to come back bt-by-bt. Immedately after the N th bt, put the rank value of the N th block, followed by the rank value of the (N-1) th block, and so on. In ths way, the rank value of the frst block wll be placed at the last. Step 6: Combnng all the code values as well as the rank values, f the total number of bts n the target stream s not a multple of 8, then to make t so, at most 7 bts may have to be nserted. Inserton of these extra bts s to be started from the (N+1) th poston. So, a maxmum of 7 rght shftng operatons may have to be performed n the (N+1) th poston, where that many 0 s are nserted. 18

9 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Now, MLP (multlayer perceptron) based secret sesson key s use to xor the recursve replacement encrypted stream. Ths MLP secret sesson key s use to xored wth the same length frst ntermedate cpher text block to produce the frst fnal cpher block (MLP secret sesson key XOR wth same length cpher text). Ths newly generated block agan xored wth the mmedate next block and so on. Ths channg of cascaded xorng mechansm s performed untl all the blocks get exhausted. If the last block sze of ntermedate cpher text s less than the requre xorng block sze (.e. weght vector sze) then ths block s kept untouched. 6. EXAMPLE Consder a stream S= of only 16 bts. Apply these steps to obtan the target stream T correspondng to S usng the recursve replacement technque. Decompose S nto four 4-bt blocks takng bts four by four from the MSB, whch are D 1 =1010, D 2 =1001,D 3 =0101 and D 4 =0010. So, as per step 1, L=4. Obtan the total number of prmes n the range of 0 to 2 4-1=15 s 6 (2, 3, 5, 7, 11, 13) and that of nonprmes s 10 (0, 1, 4, 6, 8, 9, 10, 12, 14, 15). To represent the poston of a prme number the number of bts requred s 3, because snce there are 6 prmes, ther postons range from 0 to 5, Smlarly, to represent the poston of a nonprme number the number of bts requred s 4 because ther postons range from 0 to 9 as there are 10 nonprme numbers. Apply the next step 3 for blocks D 1, D 2, D 3 and D 4. The decmal equvalent of D 1 =1010 s 10, whch s the 6 th nonprme. So, the code value of D 1 s C 1 =0 and the rank s R 1 =0110. The decmal equvalent of D 2 =1001 s 9, whch s the 5 th nonprme. So, the code value of D 2 s C 2 =0 and the rank s R 2 =0101. The decmal equvalent of D 3 =0101 s 5, whch s the 2 nd prme. So, the code value of D 3 s C 3 =1 and the rank s R 3 =010. The decmal equvalent of D 4 =0010 s 2, whch s the 0 th prme. So, the code value of D 4 s C 4 =1 and the rank s R 4 =000. To form the target stream, frst we put all the code values one by one startng from the MSB poston to get 0/0/1/1 and they are followed by the rank values of all the blocks startng from the last,.e., 000/010/0101/0110. Here / works just as the separator. Combnng these code values and rank values we obtan , a stream of length 18. To make the length a multple of 8, a block s to be nserted between the code values and the rank values, so that the stream 0011/000000/ s formed. Therefore correspondng to the 16-bt source stream S= , the 24-bt target stream s T= as follows. 19

10 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Source Stream S= Block wse Decomposton S=1010/1001/0101/0010 D 1 =1010 D 2 =1001 D 3 =0101 D 4 =0010 Code=0 Code=0 Code=1 Code= Insert between Code values and Rank values Target Stream Fgure 6. Pctoral Representaton of Encryptng S= In ths way, we obtan the target stream as T= Now further MLP generated key and recursvely replacement encrypted text s use to fnally encrypt the block. 7. RECURSIVE REPLACEMENT DECRYPTION Durng decrypton, t s to be noted that the recever wll take MLP secret sesson key. Then cascaded xorng operaton s performed usng MLP secret sesson key wth the cpher text. The technque of performng xorng s same that was n encrypton process. Then MLP secret sesson key s use to decpherng the outcomes of the prevous step. Fnally from the outcomes ntermedate encrypted block (E) s extracted and now key s use to decpher the E to get the source stream. 20

11 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Followng are the set of steps to be followed for the purpose of recursve replacement decrypton: Step 1: Get the unque block length from the key. Say, t s L. Step 2: r Step 3: Calculate the total number of blocks generated from the source stream of bts. The followng does ths calculaton: Total Number of Blocks (B) = Source Stream Sze / Unque Block Length, / denotng the nteger dvson. So, the frst B number of bts, startng from poston 0 (MSB poston) to poston (B -1) n the encrypted stream denotes the code values of B blocks. Calculate the total number of prmes n the range of 0 to (2 L -1). Say, t s P. Hence calculate how many maxmum bts are requred to express P n bnary form. Say, t s X. Then X = log 2 P + 1, where log 2 P denotes the ntegral part of log 2 P. Step 4: Step 5: Step 6: Calculate the total number of nonprmes n the range of 0 to (2 L -1). Say, t s Q. hence calculates how many maxmum bts are requred to express Q n bnary form. Say, t s Y. Then Y = log 2 Q + 1, where log 2 Q denotes the ntegral part of log 2 Q. It s mentonable here that Q = 2 L P. Consder the MSB. It s the code value of the frst source block. If MSB=1, Consder the last block of X bts, convert the bnary number represented by ths block of bts nto the correspondng decmal, Say, t s M. Mark ths block as beng processed. Fnd the M th prme number n the seres of natural numbers (wth the assumpton that the poston of the frst prme number s 0, not 1). The L-bt bnary number correspondng to the decmal prme number obtaned n 2 s the frst source block. Mark the MSB as beng processed. If MSB=0,Consder the last block of Y bts; convert the bnary number represented by ths block of bts nto the correspondng decmal, Say, t s M. Mark ths block as beng processed. Fnd the M th prme number n the seres of natural numbers (wth the assumpton that the poston of the frst prme number s 0, not 1). The L-bt bnary number correspondng to the decmal nonprme number obtaned n 2 s the frst source block. Mark the MSB as beng processed. Repeat step 7 and step 8 for (B-1) number of tmes for the values of I rangng from 1 to (B-1) as there are (B-1) more blocks left to be consdered. Set I = 1. Step 7: Consder the I th bt from the MSB poston. Let t be denoted by T I. If T I = 1, Consder the frst unprocessed block of P bts n the LSB-to-MSB drecton, convert the bnary number represented by ths block of bts nto the correspondng decmal, Say, t s M. Mark ths block beng processed. Fnd the M th prme number n the seres of natural numbers (wth the assumpton that the posto n of the frst prme number s 0, not 1). The L-bt bnary number correspondng to the decmal prme number obtaned n 2 s the I th source block. If T I = 0, Consder the frst unprocessed block of Q bts n the LSB-to- MSB drecton, convert the bnary number represented by ths block of bts nto the correspondng decmal, Say, t s M. Mark ths block beng processed. Fnd the M th nonprme number n the seres of natural numbers (wth the assumpton that the poston of the frst prme number s 0, not 1). The L-bt bnary number correspondng to the decmal nonprme number obtaned n 2 s the I th source block. Step 8: Let I = I

12 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Step 9: Concatenate all the blocks obtaned so far n the sequence of ther generaton and ths s the source stream. The length of the source stream s (L * B) and accordngly L T (L * B) number of 0 s n the postons between the code values and the target values n the target stream wll reman beng unmarked, as these 0 s were nserted at the end of the encrypton process; L T beng consdered as the length of the target stream. 8. EXAMPLE We contnue wth the same example, where the target stream we obtaned was T = Now, from step 1, from the key we get the unque block length L = 4. Followng step 2, we obtan the total number of blocks as B = 16 / 4 = 4, as t s assumed to be known to the recever that the source stream before beng encrypted was of length 16 bts. Therefore n the encrypted stream, the frst four bts are the code values of four blocks. Followng step 3, we calculate the total number of prmes n the range of 0 to 15 (.e., 2 4 1), whch s P = 6, and to represent t by a bnary number the maxmum number of bts needed s X = 3. Smlarly, followng step 4, we calculate the total number of nonprmes n the range of 0 to 15 (.e., 2 4 1), whch s P = 10, and to represent t by a bnary number the maxmum number of bts needed s Y = 4. Now, followng step 5, we fnd the MSB as 0, so that we are to consder the block of the last Y = 4 number of bts, whch s 0110, the decmal of whch s M = 6. So, we are to fnd the 6 th nonprme number n the seres of natural numbers. It s 10 (assumng that 0 s the 0 th nonprme, 1 s the 1 st nonprme, and so on), the 4-bt bnary of whch s Hence the frst source block s Usng step 6, we can say that step 7 and step 8 are to be repeated for 3 tmes as there are stll 3 blocks left. Step 7 only does the job of movng from one block to another and, n fact, step 8 works n the same way as step 5. So, proceedng n the same way, we obtan the remanng blocks as 1001, 0101 and Followng step 9, we concatenate all the blocks n the same sequence of ther generaton to obtan the source stream S =

13 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Fgure 7. Pctoral Representaton of Decryptng T = COMPLEXITY ANALYSIS The complexty of the technque wll be O(L), whch can be computed usng followng three steps. Step 1. To generate a MLP guded key of length N needs O(N) Computatonal steps. The average synchronzaton tme s almost ndependent of the sze N of the networks, at least up to N=1000.Asymptotcally one expects an ncrease lke O (log N). Step 2. Complexty of the encrypton technque s O(L). Step Recursve replacement of bts usng prme nonprme recognton encrypton process takes O(L). Step MLP based encrypton technque takes O(L) amount of tme. Step 3. Complexty of the decrypton technque s O(L). Step In MLP based decrypton technque, complexty to convert fnal cpher text nto recursve replacement cpher text T takes O(L). Step Transformaton of recursve replacement cpher text T nto the correspondng stream of bts S = s 0 s 1 s 2 s 3 s 4 s L-1, whch s the source block takes O(L) as ths step also takes constant amount of tme for mergng s 0 s 1 s 2 s 3 s 4 s L-1. So, overall tme complexty of the entre technque s O(L). 23

14 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July EXPERIMENT RESULTS In ths secton the results of mplementaton of the proposed MLPKG technque has been presented n terms of encrypton decrypton tme, Ch-Square test, source fle sze vs. encrypton tme along wth source fle sze vs. encrypted fle sze. The results are also compared wth exstng RSA [1] technque, exstng ANNRBLC [8] and NNSKECC [9].. Table 3. Encrypton / decrypton tme vs. Fle sze Encrypton Tme (s) Decrypton Tme (s) Source NNSKECC Encrypted MLPKG MLPKG NNSKECC Sze (bytes) [9] Sze (bytes) [9] Table 3 shows encrypton and decrypton tme wth respect to the source and encrypted sze respectvely. It s also observed the alternaton of the sze on encrypton. In fgure 8 stream sze s represented along X axs and encrypton / decrypton tme s represented along Y-axs. Ths graph s not lnear, because of dfferent tme requrement for fndng approprate MLP key. It s observed that the decrypton tme s almost lnear, because there s no MLP key generaton process durng decrypton. Encrypton & decrypton tme Source sze Encrypton Decrypton Fgure 8. Source sze vs. encrypton tme & decrypton tme Table 4 shows Ch-Square value for dfferent source stream sze after applyng dfferent encrypton algorthms. It s seen that the Ch-Square value of MLPKG s better compared to the algorthm ANNRBLC [8] and comparable to the Ch-Square value of the RSA algorthm. Stream Sze (bytes) Ch-Square value (TDES) [1] Table 4. Source sze vs. Ch-Square value Ch-Square Ch-Square value n value (MLPKG) (ANNRBLC) [8] Ch-Square value (RSA) [1]

15 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 Fgure 9 shows graphcal representaton of table 4. Fgure 9. Source sze vs. Ch-Square value Table 5 shows total number of teraton needed and number of data beng transferred for MLP key generaton process wth dfferent numbers of nput(n) and actvated hdden(h) neurons and varyng synaptc depth(l). No. of Input Neurons(N) Table 5. Data Exchanged and No. of Iteratons For Dfferent Parameters Value No. of Actvated Hdden Neurons(K) Synaptc Weght (L) Total No. of Iteratons Followng fgure 10. Shows the snapshot of MLP key smulaton process. Data Exchanged (Kb) Fgure 10. MLP Key Smulaton Snapshot wth N=12, K=10 and L=6 25

16 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July ANALYSIS OF RESULTS From results obtaned t s clear that the technque wll acheve optmal performances. Encrypton tme and decrypton tme vares almost lnearly wth respect to the block sze. For the algorthm presented, Ch-Square value s very hgh compared to some exstng algorthms. A user nput key has to transmt over the publc channel all the way to the recever for performng the decrypton procedure. So there s a lkelhood of attack at the tme of key exchange. To defeat ths nsecure secret key generaton technque a neural network based secret key generaton technque has been devsed. The securty ssue of exstng algorthm can be mproved by usng MLP secret sesson key generaton technque. In ths case, the two partners A and B do not have to share a common secret but use ther ndstngushable weghts or output of actvated hdden layer as a secret key needed for encrypton. The fundamental concepton of MLP based key exchange protocol focuses mostly on two key attrbutes of MLP. Frstly, two nodes coupled over a publc channel wll synchronze even though each ndvdual network exhbts dsorganzed behavour. Secondly, an outsde network, even f dentcal to the two communcatng networks, wll fnd t exceptonally dffcult to synchronze wth those partes, those partes are communcatng over a publc network. An attacker E who knows all the partculars of the algorthm and records through ths channel fnds t thorny to synchronze wth the partes, and hence to calculate the common secret key. Synchronzaton by mutual learnng (A and B) s much qucker than learnng by lstenng (E) [10]. For usual cryptographc systems, we can mprove the safety of the protocol by ncreasng of the key length. In the case of MLP, we mproved t by ncreasng the synaptc depth L of the neural networks. For a brute force attack usng K hdden neurons, K*N nput neurons and boundary of weghts L, gves (2L+1)KN possbltes. For example, the confguraton K = 3, L = 3 and N = 100 gves us 3*10253 key possbltes, makng the attack unfeasble wth today s computer power. E could start from all of the (2L+1)3N ntal weght vectors and calculate the ones whch are consstent wth the nput/output sequence. It has been shown, that all of these ntal states move towards the same fnal weght vector, the key s unque. Ths s not true for smple perceptron the most unbeaten cryptanalyss has two supplementary ngredents frst; a group of attacker s used. Second, E makes extra tranng steps when A and B are quet [10]-[12]. So ncreasng synaptc depth L of the MLP we can make our MLP safe. 12. SECURITY ISSUE The man dfference between the partners and the attacker n MLP s that A and B are able to A nfluence each other by communcatng ther output bts & B whle E can only lsten to these messages. Of course, A and B use ther advantage to select sutable nput vectors for adjustng the weghts whch fnally leads to dfferent synchronzaton tmes for partners and attackers. However, there are more effects, whch show that the two-way communcaton between A and B makes attackng the MLP protocol more dffcult than smple learnng of examples. These confrm that the securty of MLP key generaton s based on the bdrectonal nteracton of the partners. Each partener uses a seperate, but dentcal pseudo random number generator. As these devces are ntalzed wth a secret seed state shared by A and B. They produce exactly the same sequence of nput bts. Whereas attacker does not know ths secret seed state. By ncreasng synaptc depth average synchronze tme wll be ncreased by polynomal tme. But success probablty of attacker wll be drop exponentally Synchonzaton by mutual learnng s much faster than learnng by adoptng to example generated by other network. Undrectonal learnng and bdrectonal synchronzaton. As E can t nfluence A and B at the tme they stop transmt due to synchrnzaton. Only one weght get changed where, = T. So, dffcult to fnd weght for attacker to know the actual weght wthout knowng nternal representaton t has to guess. 26

17 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July FUTURE SCOPE & CONCLUSION Ths paper presented a novel approach for generaton of secret key proposed algorthm usng MLP smulaton. Ths technque enhances the securty features of the key exchange algorthm by ncreasng of the synaptc depth L of the MLP. Here two partners A and B do not have to exchange a common secret key over a publc channel but use ther ndstngushable weghts or outputs of the actvated hdden layer as a secret key needed for encrypton or decrypton. So lkelhood of attack proposed technque s much lesser than the smple key exchange algorthm. Future scope of ths technque s that ths MLP model can be used n wreless communcaton. Some evolutonary algorthm can be ncorporated wth ths MLP model to get well dstrbuted weght vector. ACKNOWLEDGEMENTS The author deep sense of grattude to the DST, Govt. of Inda, for fnancal assstance through INSPIRE Fellowshp leadng for a PhD work under whch ths work has been carred out. REFERENCES [1] Atul Kahate, Cryptography and Network Securty, 2003, Tata McGraw-Hll publshng Company Lmted, Eghth reprnt [2] Sarkar Arndam, Mandal J. K, Artfcal Neural Network Guded Secured Communcaton Technques: A Practcal Approach LAP Lambert Academc Publshng ( ), ISBN: , 2012 [3] Sarkar Arndam, Karforma S, Mandal J. K, Object Orented Modelng of IDEA usng GA based Effcent Key Generaton for E-Governance Securty (OOMIG), Internatonal Journal of Dstrbuted and Parallel Systems (IJDPS) Vol.3, No.2, March 2012, DOI : /jdps , ISSN : [Onlne] ; [Prnt]. Indexed by: EBSCO, DOAJ, NASA, Google Scholar, INSPEC and WorldCat, [4] Mandal J. K., Sarkar Arndam, Neural Sesson Key based Trangularzed Encrypton for Onlne Wreless Communcaton (NSKTE), 2nd Natonal Conference on Computng and Systems, (NaCCS 2012), March 15-16, 2012, Department of Computer Scence, The Unversty of Burdwan, Golapbag North, Burdwan , West Bengal, Inda. ISBN , [5] Mandal J. K., Sarkar Arndam, Neural Weght Sesson Key based Encrypton for Onlne Wreless Communcaton (NWSKE), Research and Hgher Educaton n Computer Scence and Informaton Technology, (RHECSIT- 2012),February 21-22, 2012, Department of Computer Scence, Sammlan Mahavdyalaya, Kolkata, West Bengal, Inda. ISBN ,2012 [6] Mandal J. K., Sarkar Arndam, An Adaptve Genetc Key Based Neural Encrypton For Onlne Wreless Communcaton (AGKNE), Internatonal Conf erence on Recent Trends In Informaton Systems (RETIS 2011) BY IEEE, December 2011, Jadavpur Unversty, Kolkata, Inda. ISBN , 2011 [7] Mandal J. K., Sarkar Arndam, An Adaptve Neural Network Guded Secret Key Based Encrypton Through Recursve Postonal Modulo-2 Substtuton For Onlne Wreless Communcaton (ANNRPMS), Internatonal Conference on Recent Trends In Informaton Technology (ICRTIT 2011) BY IEEE, 3-5 June 2011, Madras Insttute of Technology, Anna Unversty, Chenna, Taml Nadu, Inda /11, 2011 [8] Mandal J. K., Sarkar Arndam, An Adaptve Neural Network Guded Random Block Length Based Cryptosystem (ANNRBLC), 2nd Internatonal Conference on Wreless Communcatons, Vehcular Technology, Informaton Theory And Aerospace & Electronc System Technology (Wreless Vtae 2011) By IEEE Socetes, February 28- March 03, 2011,Chenna, Taml Nadu, Inda. ISBN ,

18 Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 [9] Mandal J. K., Sarkar Arndam, Neural Network Guded Secret Key based Encrypton through Cascadng Channg of Recursve Postonal Substtuton of Prme Non-Prme (NNSKECC), Internatonal Confference on Computng and Systems, ICCS 2010, November, 2010,Department of Computer Scence, The Unversty of Burdwan, Golapbag North, Burdwan , West Bengal, Inda.ISBN , 2010 [10] R. Mslovaty, Y. Perchenok, I. Kanter, and W. Knzel. Secure key-exchange protocol wth an absence of njectve functons. Phys. Rev. E, 66:066102,2002. [11] A. Ruttor, W. Knzel, R. Naeh, and I. Kanter. Genetc attack on neural cryptography. Phys. Rev. E, 73(3):036121, [12] A. Engel and C. Van den Broeck. Statstcal Mechancs of Learnng. Cambrdge Unversty Press, Cambrdge, [13] T. Godhavar, N. R. Alanelu and R. Soundararajan Cryptography Usng Neural Network IEEE Indcon 2005 Conference, Chenna, Inda, Dec gg [14] Wolfgang Knzel and ldo Kanter, "Interactng neural networks and cryptography", Advances n Sold State Physcs, Ed. by B. Kramer (Sprnger, Berln. 2002), Vol. 42, p. 383 arxv- cond-mat/ , 2002 [15] Wolfgang Knzel and ldo Kanter, "Neural cryptography" proceedngs of the 9th nternatonal conference on Neural Informaton processng(iconip 02).h [16] Dong Hu "A new servce based computng securty model wth neural cryptography"ieee07/2009.j Arndam Sarkar INSPIRE Fellow (DST, Govt. of Inda), MCA (VISVA BHARATI, Santnketan, Unversty Frst Class Frst Rank Holder), M.Tech (CSE, K.U, Unversty Frst Class Frst Rank Holder). Total number of publcatons 8. Jyotsna Kumar Mandal M. Tech.(Computer Scence, Unversty of Calcutta), Ph.D.(Engg., Jadavpur Unversty) n the feld of Data Compresson and Error Correcton Technques, Professor n Computer Scence and Engneerng, Unversty of Kalyan, Inda. Lfe Member of Computer Socety of Inda snce 1992 and lfe member of cryptology Research Socety of Inda. Dean Faculty of Engneerng, Technology & Management, workng n the feld of Network Securty, Steganography, Remote Sensng & GIS Applcaton, Image Processng. 25 years of teachng and research experences. Eght Scholars awarded Ph.D. one submtted and 8 are pursung. Total number of publcatons

KEY SWAP OVER AMONG GROUP OF MULTILAYERPERCEPTRONS FOR ENCRYPTION IN WIRELESS COMMUNICATION (KSOGMLPE)

KEY SWAP OVER AMONG GROUP OF MULTILAYERPERCEPTRONS FOR ENCRYPTION IN WIRELESS COMMUNICATION (KSOGMLPE) Internatonal Journal of Informaton Technology, Control and Automaton (IJITCA) Vol.3, No.1, January 2013 KEY SWAP OVER AMONG GROUP OF MULTILAYERPERCEPTRONS FOR ENCRYPTION IN WIRELESS COMMUNICATION (KSOGMLPE)

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Development of Neural Networks for Noise Reduction

Development of Neural Networks for Noise Reduction The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 00 89 Development of Neural Networks for Nose Reducton Lubna Badr Faculty of Engneerng, Phladelpha Unversty, Jordan Abstract:

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Adaptive System Control with PID Neural Networks

Adaptive System Control with PID Neural Networks Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Networks. Backpropagation. Backpropagation. Introduction to. Backpropagation Network training. Backpropagation Learning Details 1.04.

Networks. Backpropagation. Backpropagation. Introduction to. Backpropagation Network training. Backpropagation Learning Details 1.04. Networs Introducton to - In 1986 a method for learnng n mult-layer wor,, was nvented by Rumelhart Paper Why are what and where processed by separate cortcal vsual systems? - The algorthm s a sensble approach

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

Enhanced Artificial Neural Networks Using Complex Numbers

Enhanced Artificial Neural Networks Using Complex Numbers Enhanced Artfcal Neural Networks Usng Complex Numers Howard E. Mchel and A. A. S. Awwal Computer Scence Department Unversty of Dayton Dayton, OH 45469-60 mchel@cps.udayton.edu Computer Scence & Engneerng

More information

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve

More information

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION 7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J. ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm CCECE 2014 1569888203 Coverage Maxmzaton n Moble Wreless Sensor Networs Utlzng Immune Node Deployment Algorthm Mohammed Abo-Zahhad, Sabah M. Ahmed and Nabl Sabor Electrcal and Electroncs Engneerng Department

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels Markov Chan Monte Carlo Detecton for Underwater Acoustc Channels Hong Wan, Rong-Rong Chen, Jun Won Cho, Andrew Snger, James Presg, and Behrouz Farhang-Boroujeny Dept. of ECE, Unversty of Utah Dept. of

More information

Introduction to Coalescent Models. Biostatistics 666 Lecture 4

Introduction to Coalescent Models. Biostatistics 666 Lecture 4 Introducton to Coalescent Models Bostatstcs 666 Lecture 4 Last Lecture Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles Expected to decrease wth dstance

More information

Key-Words: - Automatic guided vehicles, Robot navigation, genetic algorithms, potential fields

Key-Words: - Automatic guided vehicles, Robot navigation, genetic algorithms, potential fields Autonomous Robot Navgaton usng Genetc Algorthms F. ARAMBULA COSIO, M. A. PADILLA CASTAÑEDA Lab. de Imágenes y Vsón Centro de Instrumentos, UNAM Méxco, D.F., 451 MEXICO Abstract: - In ths paper s presented

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Adaptive Phase Synchronisation Algorithm for Collaborative Beamforming in Wireless Sensor Networks

Adaptive Phase Synchronisation Algorithm for Collaborative Beamforming in Wireless Sensor Networks 213 7th Asa Modellng Symposum Adaptve Phase Synchronsaton Algorthm for Collaboratve Beamformng n Wreless Sensor Networks Chen How Wong, Zhan We Sew, Renee Ka Yn Chn, Aroland Krng, Kenneth Tze Kn Teo Modellng,

More information

New Parallel Radial Basis Function Neural Network for Voltage Security Analysis

New Parallel Radial Basis Function Neural Network for Voltage Security Analysis New Parallel Radal Bass Functon Neural Network for Voltage Securty Analyss T. Jan, L. Srvastava, S.N. Sngh and I. Erlch Abstract: On-lne montorng of power system voltage securty has become a very demandng

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint Dynamc Lghtpath Protecton n WDM Mesh etworks under Wavelength Contnuty Constrant Shengl Yuan* and Jason P. Jue *Department of Computer and Mathematcal Scences, Unversty of Houston Downtown One Man Street,

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

STATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size

STATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size STATISTICS ImPORTANT TERmS, DEFINITIONS AND RESULTS l The mean x of n values x 1, x 2, x 3,... x n s gven by x1+ x2 + x3 +... + xn x = n l mean of grouped data (wthout class-ntervals) () Drect method :

More information

COMPLEX NEURAL NETWORK APPROACH TO OPTIMAL LOCATION OF FACTS DEVICES FOR TRANSFER CAPABILITY ENHANCEMENT

COMPLEX NEURAL NETWORK APPROACH TO OPTIMAL LOCATION OF FACTS DEVICES FOR TRANSFER CAPABILITY ENHANCEMENT ARPN Journal of Engneerng and Appled Scences 006-010 Asan Research Publshng Networ (ARPN). All rghts reserved. www.arpnournals.com COMPLEX NEURAL NETWORK APPROACH TO OPTIMAL LOCATION OF FACTS DEVICES FOR

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information

Introduction to Coalescent Models. Biostatistics 666

Introduction to Coalescent Models. Biostatistics 666 Introducton to Coalescent Models Bostatstcs 666 Prevously Allele frequences Hardy Wenberg Equlbrum Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles

More information

Subcarrier allocation for OFDMA wireless channels using lagrangian relaxation methods

Subcarrier allocation for OFDMA wireless channels using lagrangian relaxation methods Unversty of Wollongong Research Onlne Faculty of Informatcs - Papers (Archve) Faculty of Engneerng and Informaton Scences 2006 Subcarrer allocaton for OFDMA wreless channels usng lagrangan relaxaton methods

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER 7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables S. Aucharyamet and S. Srsumrannukul / GMSARN Internatonal Journal 4 (2010) 57-66 Optmal Allocaton of Statc VAr Compensator for Actve Power oss Reducton by Dfferent Decson Varables S. Aucharyamet and S.

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information