Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Size: px
Start display at page:

Download "Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,"

Transcription

1 [Type text] [Type text] [Type text] ISSN : Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [ ] Securty lghtweght FID protocol for U- healthcare system Xuqng Chen *, Tanje Cao *, Jngxuan Zha, Yu Guo School of Computer, Chna Unversty of Mnng and Technology, Xuzhou, (CHINA School of Materals Scence and Engneerng, Chna Unversty of Mnng and Technology, Xuzhou, (CHINA E-mal : xuqngchen@6.com ABSTACT ado Frequency Identfcaton systems have been extensvely deployed n the ubqutous healthcare doman. However, healthcare records of patents n database and moble devces can be revealed by a malcous attacker, there are many prvacy threats. In order to meet the practcal requrements of hosptal envronment, ths paper crtcally analyzes all the possble attacks on orgnal protocol and proposes an mproved low-cost lghtweght FID protocol conformng to EPC Class Generaton standards n hosptal scenaros. Therefore, the enhanced protocol s more secure and hgher performance n terms of performance and securty propertes compared wth other schemes. KEYWODS ado frequency dentfcaton; Ubqutous healthcare; Low-cost lghtweght FID protocol; Provably securty; Prvacy property. Trade Scence Inc.

2 BTAIJ, 0(9 04 Tanje Cao et al INTODUCTION ado Frequency Identfcaton (FID systems have been extensvely deployed n the ubqutous health care (U-healthcare doman []. U-healthcare s an evolutonary servce of healthcare appled by wreless networks, FID moble devces, wreless medcal sensors and body area networks (BANs. To mplement U-healthcare servce, developng U-healthcare system n the healthcare ndustry s a sgnfcant tendency va tradtonal wred, moble health (M-health and ubqutous sensor network (USN technologes []. Adopton of the Health Informaton System (HIS based on the wreless network nfrastructure gves a lot of benefts. As a part of the U-healthcare system, many moble devces have been employed n hosptals due to ther outstandng moblty. Immedate access to the Electronc Medcal ecord (EM database (DB offered wth the moble devce can reduce the processng tme to access and update EM [3-5]. Healthcare nformaton of moble devces can be exposed, then there are many securty problems occurred. In order to montor and track patents, automatc solutons based on FID technology have been provded for the nursng staff [6] n U-healthcare envronment. On the one hand, USN s employed as a key factor to rapdly transmt medcal nformaton (bomedcal sgnals to the remote hosptals n prevous health envronments. On the other hand, patent montorng medcal nformaton n real tme can be analyzed by consultants. But there are many securty ssues and lmtatons for the patents' safety. In a passve scenaro and an actve scenaro, the adversary montors and traces the messages n nsecurty channels, such as the channel between a genune tag and a moble reader (a reader and DB. There are U-healthcare scenaros where the adversary can ntate fake transactons between a tag (h by a patent and a moble reader (h by a nurse. The adversary can have an objectve to reconstruct the genune tag key and dsturb the regular arrangement of the nurse. The safety performance and low-cost s the task of desgnng a lghtweght FID scheme n U- healthcare. Ths s why U-healthcare should be as economc and wdely avalable as possble. The doctor should obtan accurately the bologcal nformaton of the patent from wreless medcal sensors BANs (WMSBANs and dagnose promptly the patent s condton. The effcent U-healthcare system applcatons beneft from FID technology, such as the patent traceablty, ownershp transfer procedures, medcaton admnstraton and cost savngs. Ths paper s focused on acute dseases that are ncreasngly threatenng the sustanablty of health care systems due to rapdly-ncreasng ncdence. The mproved scheme requrements for better utlzaton of health care resources, and FID technology can provde effectve medcal checkup n U- healthcare. In order to manage effectvely the related clncal processes, we develop a securty lghtweght FID protocol for the mult-tags and mult-owners. Snce t s common for FID-tagged patents beng owned by mult-owners, a patent s commonly managed by some nurses and doctors. The proposed protocol addresses the dynamc assocated n the u-healthcare scenaros. CYPTANALYSIS OF MOHAMMADALI ET AL S POTOCOL For smplcty, we use the notatons of the orgnal paper. These notatons have been explaned n TABLE. Notatons TABLE : The notatons and descrptons. Descrptons EPC s ;DATA Electronc Product Code; The tag s record. K (P key (access key stored n the tag. C ; ID The -th tag s ndex n DB; reader s dentfer.

3 390 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 ID The reader dentcaton number. H(; h K ( Hash functon; Keyed hash functon. We analyze the securty of Mohammadal et al's scheme n Fgure. to fnd out varous attacks. Then, we propose several types of attacks aganst ths protocol, such as tag, reader, DB mpersonaton attack and tracng attack. [ TID, K, P, C, K, P, C,] 6. M, DC,, EV,, N 7. for each s ID n DB H( ID N M? VDB If C s verfed PNG( EPCs N PNG( D K K? M x= else: = M K PNG( D K? PNG( EPCs N x= endf If C = 0 = M K PNGD ( K M K PNG( D K = or? PNG( EPCs N x= or x= endf verfes PNG( C K X D KX PX? E f ID = ID:consders ID else: ID endf then computes values below: M = PNG( EPCs NT PX Info = DATA ID hid ( N MAC = H ( DATA N If x= K K PNG( K P P PNG( P C C PNG( NT N else C PNG( NT N endf If ID = ID ID ID H ( ID else do not update the reader's key endf. Generate N. N 4. M, DC,, E 5. V= H( ID N M 8. Info, MAC, M 9. Info ID hid( N = DATA HDATA ( N = MAC ID = H( ID [ K, P, C, TID] 3.Generate NT M = PNGEPC ( s N PNG ( NT K D= NT K If flag = 0, consders C ' else: generates NT ' C = C NT E = NT PNG ( C K P flag = 0. M. verfes M? PNG( EPCs NT P K+ = PNG( K P+ = PNG( P C+ = PNG( NT N flag = 0 Fgure : Mohammadal et al s protocol. ( Impersonaton DB Attack Phase (Learnng: The attacker Adv plays as a blocker and eavesdrops one successful run of protocol and blocks the Step, then stores the exchanged messages {M, D, C, E}, where: Step. The generates a nonce N and sends t to the T.

4 BTAIJ, 0(9 04 Tanje Cao et al. 39 Step. The T generates N T and computes M, D, C, E, then sends them to the. a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C (flag=0 d. E= N T PNG(C K P Step 3. The attacker Adv blocks and stores the nformaton, then stops the sesson. Phase (Impersonaton DB: To mpersonate the DB, Adv ntates a sesson of protocol, where: Step. Adv replays the montored nonce N to the T. Step. The T produces N T and computes M, D, C, E, then sends them to the. Ther equatons are calculated as follows. a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C N T (flag= d. E = N T PNG(C K P Step 3. Adv blocks the messages {M, D, C, E } and modfes the transferred messages as follows: a. M Adv =PNG(EPC s N PNG(N T K b. D Adv = D =N T K c. C Adv = C d. E Adv = E D D =N T PNG(C K P Subsequently, Adv forwards the messages {M Adv, D Adv, C Adv, E Adv } to the reader. Step 4. ( -DB The reader computes V=H(N ID M and sends {M Adv, D Adv,C Adv, E Adv, V, N } to the DB. Step 5. (DB verfcaton DB pcks up each stored ID sequentally to compute H(ID N M Adv wth the same N, and compares the computed V DB wth the receved V. If V DB = V, the DB verfes the legtmate reader. On the other hand, the values {M Adv, D Adv,C Adv, E Adv, V, N } are verfed by the DB. The followng equatons are gven to prove the computatonal process. a. V DB = H(ID N M Adv =V= H(ID N M From the above compared result, the DB can authentcate the. b. The DB compares transferred message M Adv wth the calculated M DB usng the stored keys {EPC s, K } and the receved messages {N, D Adv }. Therefore, the DB verfes M DB = M Adv usng the followng equaton. M DB =PNG(EPC s N PNG(N T K = M Adv c. The DB compares transferred message E Adv wth the calculated E DB usng the followng equaton. E DB =D Adv K PNG(C Adv K P =N T PNG(C K P =E Adv d. After the DB verfes successfully, t computes the messages {M, MAC, nfo} as follows: M = PNG(EPC s N T P Info= DATA ID h ID (N MAC=H(DATA N e. The DB res the related secrets as follows: C + = PNG(N N T The DB forwards the messages {M, MAC, nfo} to the reader.

5 39 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 Step 6. The reader receves the messages {M, MAC, nfo} and compares the computed value MAC =H(DATA N wth the receved MAC by extractng DATA from nfo. If the receved messages are authentcated by the reader, M s sent to the tag T. Step 7. The tag vertfes M tag usng ts current keys {EPC s, P } and the nonce N T. The prvate keys of the tag are updated as follows: C + = PNG(N N T ( eader Impersonaton Attack Snce the channel between the moble reader and the DB s unsafety, and the adversary has manpulated the reader s outputs, the DB and the tag can authentcate the modfed messages from the spoofed reader. Phase (Learnng: The reader transmts a nonce N to the tag, whle the tag calculates as follows: a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C N T d. E= N T PNG(C K P Phase (Impersonaton eader: To mpersonate the reader, the spoofed attacker modfes the blocked messages, where: Step. The spoofed attacker modfes the blocked messages from tag to reader, where: M =PNG(EPC s N PNG(N T K N Step. The reader computes V= H(ID N M N = H(ID M Step 3. The spoofed attacker modfes the blocked messages from the reader to the DB, where: a. N =0 b. M = M c. V = H(ID M = V Step 4. The DB computes and compares the computed V DB wth the receved V. V DB = H(ID N M =H(ID 0 M = H(ID M = V Therefore, the counterfeted reader s verfed by the DB, the attack succeeds. (3 Impersonaton Tag Attack Phase (Learnng: Adv eavesdropps the frst successful run of protocol and blocks the Step, then stores the exchanged messages {M, D, C, E}, where: Step. The generates a nonce N and sends t to the T. Step. The T generates N T and computes M, D, C, E, then sends them to the a. M =PNG(EPC s N PNG( N T K b. D =N T K c. C = C (flag=0 d. E= N T PNG(C K P Step 3. The computes V= H(ID M N and sends V to the DB. Step 4. After the DB verfes successfully, t computes the messages {M, MAC, nfo} as follows: M = PNG(EPC s N T P Info= DATA ID h ID (N MAC=H(DATA N The DB res the related secrets as C + = PNG(N N T. The attacker Adv blocks and stores these nformaton M, then stops the sesson. Phase (Impersonaton Tag: To mpersonate the tag T, untl the reader ntates a second sesson of protocol, where: Step. the reader ntates a second run of protocol and replays the montored nonce N =0 to the T.

6 BTAIJ, 0(9 04 Tanje Cao et al. 393 Step. The T produces N T and computes {M, D, C, E }, then sends them to the. The equatons are calculated as follows. a. M = PNG(EPC s N N T K b. D =N T K c. C = C N T (flag= d. E = N T PNG(C K P Step 3. Adv blocks the messages {M N, D, C, E } from T to. Step 4. The computes V = H(ID M N N = H(ID M and sends V to Adv. Step 5. Adv modfes the transferred messages as follows: a. M Adv =M N =PNG(EPC s N N T K b. D Adv = D =N T K c. C Adv = C d. E Adv = E D D =N T PNG(C K P e. V Adv =V = H(ID M f. N =0 Subsequently, Adv forwards the messages {M Adv, D Adv, C Adv, E Adv, V Adv, N } to the. Step 6. (DB authentcates the reader and tag From the followng compared result, the DB can authentcate the. If V DB = V Adv, DB compares transferred message {M Adv, E Adv } wth the calculated {M DB, E DB } as followng. V DB = H(ID N M Adv = V Adv = H(ID M From the above compared result, the DB can authentcate the counterfeted. b. If C Adv s not verfed, the DB computes the calculated I. I =M Adv PNG(D Adv K K =PNG(EPC s N =PNG(EPC s X= = Therefore, the DB verfes that the state of the tag's keys s. c. E DB =D Adv K PNG(C Adv K P = D K PNG(C K P =N T PNG(C K P =E Adv After DB verfes E DB =E Adv successfully, t computes the messages {M, MAC, nfo } as follows: d. M = PNG(EPC s N T P Info = DATA ID h ID (N MAC =H(DATA N e. The DB res the related secrets as follows: C + = PNG(N N T The tag mpersonaton attack succeeds. (4 The Tag Tracng Attack The attacker can calculate the xored value DE=PNG(C K P usng the montored messages {D,E}. Therefore, Adv traces the target tag accordng to the fxed value PNG(C K P. THE ENHANCED MOHAMMADALI ET AL. S POTOCOL There s a wde varety of applcatons n a hosptal where secure and effcent authentcaton mechansms are demanded. For nstance, FID technology ensures the safety of transfuson patents, and creates the accurate and effectve medcal servce for treatment. In order to avod transfusonhandlng errors, ths process conssts of two phases. Frst the denttes of the patents and lqud

7 394 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 medcne bags are confrmed (authentcaton protocol and then the matchng between both enttes s checked (verfcaton step. The process s sketched n Fgure. and an authentcaton protocol s at the core of ths applcaton. Our authentcaton protocol are shown n Fgure. and descrbed below: Step : T: N. When the physcan arrves at the bed, the reader s her sends a query sgnal and a nonce N to the tag. Step :T : {M,E,F}. The tag generates a nonce N T and computes the encrypted messages contaned patent dentfer, concrete dsease and medcaton lsts. The most common servce n a hosptal envronment have patent data and medcaton lsts, whch call automatcally at the dsplay of moble reader. [ TID, K, P, C, K, P, C, ID, ID ] 6. M, EFVG,,,. Generate N. N 4. M, EF, 5. G= ID N V = H( ID N M [ K, P, C, TID] 3.Generate NT M = PNG ( EPC s N TN PNG ( K D= NT K E= PNG ( C N TK P F= C N D 7. for each s ID n DB N = ID G HID ( N M? V DB extract C and Dfrom F If C =0 For each tuple( EPC, K, K = M PNG( K = M PNG( K or? PNG( EPC N D K X= or s s X else: C or C? C X= or endf PNG ( EPC D K N PNG( K? M verfes PNG( C D K K P? E f ID = ID :consders ID else: ID endf then computes values below : s X X X X M = PNG( EPC N P MAC = H( DATA N If x= K K PNG( K N P P PNG( P N C C PNG( N N else C PNG( N N endf If ID = ID s T Info = DATA ID N T T ID ID H( ID else do not update the reader's key endf 8. Info, MAC, M 9. Info ID N = DATA HDATA ( N = MAC ID = H( ID N. verfes M PNG( EPC N P 0. M K = PNG( K N + P = PNG( P N + s T C = PNG( N N + T Fgure : The mproved protocol. Step 3: DB : {M, E, F, V, G}. Upon recevng the messages, the reader computes V =H(ID N M and forwards (N, M, F, V, E to the DB. The nurse or the doctor forwards the messages such as patent dentfer, concrete dsease and medcaton lsts, to the DB.

8 BTAIJ, 0(9 04 Tanje Cao et al. 395 Step 4: DB verfcaton and computaton After recevng {M, E, F, V, G}, the DB performs the followng operatons: a. The DB searches ts look-up table for a value ID that satsfes N =ID G and V=H(ID N M. If the above equaton s set up, the DB authentcates the reader of the her s legal. Some patents need more care and regular checks. For example, f a patent needs a regular check three tmes a day, the FID system should remnd the responsble personnel. Therefore an automatc checklst can be created. b. If C = 0, t stands for the frst access. For each tuple (K,P,C,K,P,C,EPC s, the DB computes values I =M PNG(K and I =M PNG(K n ts DB, and checks whether I (I matches PNG(EPC s D EPC s N. The process s teratvely repeated for each entry untl t fnds authentcaton key (K or K. c. When C 0, the DB consders C as an ndex to fnd the related keys n the database. If C =C, the DB sets X =, otherwse (C =C X=. Then the DB nvestgates whether M s equal to the computed value PNG(EPC s D K X N K X. d. The DB uses K X and D to obtan N T, then checks whether the receved E matches PNG(C X D K X K X P X computed by the DB. If the two values match, the back-end server verfes the tag, otherwse termnates the sesson. e. The DB computes M =PNG(EPC s N T P X. When the next shft nurse knows whch tasks have been done and whch have not, another problem n hosptals s that change of shft report whch ncludes the tasks that have been done. The checklst can be created automatcally by ths way. If ID = ID, the DB uses ID to compute nfo and MAC; otherwse, ID =ID. If X=, nfo= DATA ID N and MAC=H(DATA N, then DB sends t to the reader. If X=, the DB updates just C + = PNG(N T N. Otherwse, t updates the record by replacng K wth K,P wth P and C =C. New values K, P and C are reset as PNG(K N T, PNG(P N T and C =PNG(N T N. f. The reader updates secret values ID =ID, ID =H(ID N, when the receved messages are verfed successfully. Otherwse, the back-end server does not update the keys of the reader. Step 5:DB :{M, MAC, nfo} The DB forwards the messages {M, MAC, nfo} to the reader. Step 6: T:{M } The reader obtans DATA, then checks whether the receved MAC s equal to H(DATA N. If the message MAC s verfed, the reader sends M to the tag and updates secret value ID=H(ID N. After recevng M, the tag computes PNG(EPC s N T P based on the saved value (N T, P, EPC s, then compares the receved value M wth the computed value. If the equatons h, the tag authentcates the reader and updates the ts keys as K + =PNG(K N, P + =PNG(P N and C + =PNG(N T N. Data acquston equpments of FID system and patent data measurng equpments of the clncal manfestaton would perform data synchronous updatng mechansm accordng to relevant applcaton requrements. Moreover, the update mechansm that have mportant meanng towards control condton developng and reducng ts harm n tme. THE SECUITY AND PEFOMANCE POPETIES ANALYSIS ( Tag Impersonaton esstance In order to mpersonate a tag, an adversary should have the forged messages {M, E,F}. In order to compute M, the Adv needs EPC s,k and N T that are unknown for Adv. On the other hand, the current value of E s ndependent of the value D. Adv can not fnd the relatons from the messages {M,E,F}. Therefore, Adv can not mpersonate the tag. ( DB Impersonaton esstance The enhanced protocol s DB mpersonaton resstance. It s mpossble for Adv to obtan nfo and MAC. Even f the DB receves the replayed N n the DB'S verfcaton process,the computatons of

9 396 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 {M,D,E, M } need check the ntegrty of N T whch s known for Adv. Therefore, t s mpossble for Adv to reveal the tag's nformaton. (3 eader Impersonaton esstance It s clear that the forged value V cannot be dentfed by the DB whch checks the ntegrty of N and M. Even f Adv compromses the current key ID cur, the next key of the reader s updated usng N whch s not known for Adv. (4 Tracng Attack esstance If Adv uses the montored messages {M, E,F} to analyze the tag's keys, we encrypt K and C usng N T and PNG (N T respectvely n the mproved protocol. Therefore, Adv can not obtan any other secret values and trace the tag. TABLE and TABLE 3 show the comparson of securty and performance propertes for the fve protocols. TABLE : The comparson of securty propertes Protocols S S S3 S4 Protocol [8] NO NO NO NO Protocol [9] NO NO NO NO Protocol [0] NO NO NO NO Protocol [7] NO NO NO YES ours YES YES YES YES S : Tag mpersonaton resstance; S : Server Impersonaton esstance; S3 : eader Impersonaton esstance; S4 : Tracng Attack esstance. The protocol [7] shows that protocols [8-0] has some weaknesses ncludng tracng attack, DB mpersonaton, tag mpersonaton and DATA forgery attack. Moreover, we also show that protocol [7] suffers from the reader mpersonaton, DB mpersonaton, tag mpersonaton attack and tracng attack. Snce our scheme s more secure than other schemes. TABLE 3. The comparson of performance propertes Protocols T T T3 T4 T5 Protocol [8] 0 6 hash 4 NO Protocol [9] hash 6PNG 4 YES Protocol [0] 0 6PNG 4 YES Protocol [7] hash 7PNG 4 YES ours hash 6PNG 3 YES T : Type and number of encrypton functons on reader; T : Type and number of encrypton functons on tag; T3 : Number of pseudo-random nonces on tag; T4 : Number of outputs on tag; T5: EPC CG complance. In our protocol, the tags need not mplement hash functons, so that the huge computatonal workloads can be reduced. Further, the tag computaton s restrcted to XO operatons and PNG. Thus, performance propertes of our scheme s superor to four protocols. Thus, we see that our scheme provdes the requred securty propertes whle at the same tme conformng to EPC Class- Gen- standards n the u-healthcare system. CONCLUSIONS In our scheme, the tag computaton s restrcted to btwse operatons, concatenaton calculatons and pseudo random number generaton. All the methods are wthn the capabltes of EPC Class- Gen

10 BTAIJ, 0(9 04 Tanje Cao et al. 397 tags. Further, snce the tags need not mplement hash functons, the huge computatonal workloads can be reduced. We have demonstrated that Mohammadal et al's protocol s vulnerable to varous attacks. Subsequently, we have proposed a FID authentcaton protocol for u-healthcare envronment. As an allevaton, we clam that these enhanced protocols are secure aganst DB mpersonaton attack, tag mpersonaton attack, reader mpersonaton attack, and afford untraceablty and forward secrecy based on the Vaudenay's formal prvacy model. Apart from guaranteeng some essental securty propertes, the mproved protocol clams to solve the trade-off between locaton prvacy and low-cost n u-healthcare envronment. EFEENCES [] S.D.Kaul, A.K.Awasth; FID Authentcaton Protocol to Enhance Patent Medcaton Safety. Journal of medcal systems, 37(6, -6 (03. [] J.T.Km; Enhanced Secure Authentcaton for Moble FID Healthcare System n Wreless Sensor Networks [M]. Computer Applcatons for Database, Educaton, and Ubqutous Computng. Sprnger (0. [3] J.T.Km; Prvacy and Securty Issues for FID Healthcare System n Wreless Sensor Networks [M]. Convergence and Hybrd Informaton Technology. Sprnger, (0. [4] P.Pcazo-Sanchez, N.Bagher et al.; Two FID Standard-based Securty Protocols for Healthcare Envronments. Journal of medcal systems, 37(5, - (03. [5] Y.en,.W.N.Pazz et al.; Montorng patents va a secure and moble healthcare system. Wreless Communcatons, IEEE, 7(, (00. [6] A.opponen, M.Lnnavuo et al.; A novel concept of a wearable nformaton applance usng context-based human computer nteracton. Personal and Ubqutous Computng, 7(, (03. [7] A.Mohammadal, Z.Ahmadan et al.; Analyss and Improvement of the securng FID systems conformng to EPC Class Generaton standard. IAC Cryptology eprnt Archve, (03. [8].H.E.Alakrut, A.Samsudn et al.; Provably Lghtweght FID Mutual Authentcaton Protocol. Internatonal Journal of Securty & Its Applcatons, 7(4, (03. [9] E.J.Yoon; Improvement of the securng rfd systems conformng to epc class generaton standard. Expert Syst.Appl., 39(, (0. [0] T.C.Yeh, Y.J.Wang, T.C.Kuo, S.S.Wang; Securng FID systems conformng to EPC Class Generaton standard, Expert Systems wth Applcatons, Avalable onlne, (00.

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol

Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee

More information

CMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2

CMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2 Proceedngs of Natonal Conference on Recent Advances n Electroncs and Communcaton Engneerng CMOS Implementaton of Lossy Integrator usng Current Mrrors Rshu Jan, Manveen Sngh Chadha 2, 2 Department of Electroncs

More information

Sensors for Motion and Position Measurement

Sensors for Motion and Position Measurement Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

A New Scalable RFID Delegation Protocol

A New Scalable RFID Delegation Protocol Appl. Math. Inf. Sc. 8, No. 4, 97-94 (4 97 Appled Matheatcs & Inforaton Scences An Internatonal Journal http://dx.do.org/.785/as/845 A New Scalable RFID Delegaton Protocol Xuqng Chen,, anje Cao, and Yu

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm

Coverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm CCECE 2014 1569888203 Coverage Maxmzaton n Moble Wreless Sensor Networs Utlzng Immune Node Deployment Algorthm Mohammed Abo-Zahhad, Sabah M. Ahmed and Nabl Sabor Electrcal and Electroncs Engneerng Department

More information

Decision aid methodologies in transportation

Decision aid methodologies in transportation Decson ad methodologes n transportaton Lecture 7: More Applcatons Prem Kumar prem.vswanathan@epfl.ch Transport and Moblty Laboratory Summary We learnt about the dfferent schedulng models We also learnt

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

An Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks

An Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks An Improved Prole-Based Locaton Cachng wth Fxed Local Anchor Based on Group Deregstraton or Wreless Networks Md. Kowsar Hossan, Mousume Bhowmck, Tumpa Ran Roy 3 Department o Computer Scence and Engneerng,

More information

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

arxiv: v2 [cs.dc] 31 Jul 2017

arxiv: v2 [cs.dc] 31 Jul 2017 Usng Blockchan for Peer-to-Peer Proof-of-Locaton Gacomo Bramblla, Mchele Amorett, and Francesco Zanchell Dept. of Engneerng and Archtecture, Unversty of Parma, Italy Contact: mchele.amorett@unpr.t arxv:1607.00174v2

More information

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

LANDMARC: Indoor Location Sensing Using Active RFID*

LANDMARC: Indoor Location Sensing Using Active RFID* LANDMARC: Indoor Locaton Sensng Usng Actve ID* Lonel M. N,2, Yunhao Lu, Yu Cho Lau and Abhshek P. Patl Department of Computer Scence & Engneerng Mchgan State Unversty East Lansng, Mchgan, USA luyun@msu.edu

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

Simulation of the adaptive neuro-fuzzy inference system (ANFIS) inverse controller using Matlab S- function

Simulation of the adaptive neuro-fuzzy inference system (ANFIS) inverse controller using Matlab S- function Vol. 8(1), pp. 875-884, 4 June, 013 DOI 10.5897/SRE11.1538 ISSN 199-48 013 Academc Journals http://www.academcjournals.org/sre Scentfc Research and Essays Full Length Research Paper Smulaton of the adaptve

More information

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis

Arterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis Arteral Travel Tme Estmaton Based On Vehcle Re-Identfcaton Usng Magnetc Sensors: Performance Analyss Rene O. Sanchez, Chrstopher Flores, Roberto Horowtz, Ram Raagopal and Pravn Varaya Department of Mechancal

More information

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION

ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION 7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

An Efficient Positioning Algorithm using Ultrasound and RF

An Efficient Positioning Algorithm using Ultrasound and RF 5. Internatonal B. Km, C. Journal Park, D.-Y. of Control, Kang, H. Automaton, H. Yun, B.-C. and Ahn, ystems, E. J. Cha, vol. 6, and no.., J. pp. Lee 5-55, August 8 An Effcent Postonng Algorthm usng Ultrasound

More information

Adaptive Fault Tolerance in Real-Time Information Systems

Adaptive Fault Tolerance in Real-Time Information Systems Shubnsky I.B., Rozenberg I.N., Papc L. Adaptve Fault Tolerance n Real-Tme Informaton Systems Shubnsky I.B., Rozenberg I.N., Papc L. Russa, Moscow, JSC NIIAS, Serba, Prjevor, ICDQM Abstract Real-tme nformaton

More information

sensors ISSN

sensors ISSN Sensors 009, 9, 8593-8609; do:10.3390/s91108593 Artcle OPEN ACCESS sensors ISSN 144-80 www.mdp.com/journal/sensors Dstrbuted Envronment Control Usng Wreless Sensor/Actuator Networks for Lghtng Applcatons

More information

Prediction-based Interacting Multiple Model Estimation Algorithm for Target Tracking with Large Sampling Periods

Prediction-based Interacting Multiple Model Estimation Algorithm for Target Tracking with Large Sampling Periods 44 Internatonal Jon Ha Journal Ryu, Du of Hee Control, Han, Automaton, Kyun Kyung and Lee, Systems, and Tae vol. Lyul 6, Song no., pp. 44-53, February 8 Predcton-based Interactng Multple Model Estmaton

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION

1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION An Improved Cellular postonng technque based on Database Correlaton B D S Lakmal 1, S A D Das 2 Department of Electronc & Telecommuncaton Engneerng, Unversty of Moratuwa. { 1 shashka, 2 dleeka}@ent.mrt.ac.lk

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

DESIGN OF FREQUENCY REGULATION SERVICE MARKET BASED ON PRICE AND DEMAND ELASTICITY BIDS

DESIGN OF FREQUENCY REGULATION SERVICE MARKET BASED ON PRICE AND DEMAND ELASTICITY BIDS DESIG OF FREQUECY REGULATIO SERVICE MARKET BASED O ICE AD DEMAD ELASTICITY BIDS Hadan Zhao and Kanar Bhattacharya Department of Electrcal and Computer Engneerng Unversty of Waterloo, Waterloo, Ontaro,

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Privacy-Preserving Data Mining Shared analysis without shared data. 16 February 2011 Chris Clifton

Privacy-Preserving Data Mining Shared analysis without shared data. 16 February 2011 Chris Clifton Prvacy-Preservng Data Mnng Shared analyss wthout shared data 16 February 2011 Chrs Clfton Idea: Collaborate to learn (only) desred results Data owners and FDA partcpate n protocol Results same as f all

More information

Transformer winding modal parameter identification based on poly-reference least-square complex frequency domain method

Transformer winding modal parameter identification based on poly-reference least-square complex frequency domain method Internatonal Conference on Advanced Electronc Scence and Technology (AEST 2016) Transformer wndng modal parameter dentfcaton based on poly-reference least-square complex frequency doman method Yanng L

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

Study of the Improved Location Algorithm Based on Chan and Taylor

Study of the Improved Location Algorithm Based on Chan and Taylor Send Orders for eprnts to reprnts@benthamscence.ae 58 The Open Cybernetcs & Systemcs Journal, 05, 9, 58-6 Open Access Study of the Improved Locaton Algorthm Based on Chan and Taylor Lu En-Hua *, Xu Ke-Mng

More information

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments

Research Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments Internatonal Dstrbuted Sensor etworks Volume 3, Artcle ID 3847, 7 pages http://dx.do.org/.55/3/3847 Research Artcle A Utlty-Based Rate Allocaton of MM Servce n Heterogeneous Wreless Envronments Yao Huang,

More information

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

Article Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Radial Distribution System Reconfiguration in the Presence of Distributed Generators

Radial Distribution System Reconfiguration in the Presence of Distributed Generators 4th Internatonal Conference on Coputer, Mechatroncs, Control and Electronc Engneerng (ICCMCEE 205) Radal Dstrbuton Syste Reconfguraton n the Presence of Dstrbuted Generators Xngquan J, a, Q Lu, GuoZheng

More information

A Proposal of Mode Shape Estimation Method Using Pseudo-Modal Response : Applied to Steel Bridge in Building

A Proposal of Mode Shape Estimation Method Using Pseudo-Modal Response : Applied to Steel Bridge in Building A Proposal of Mode Shape Estmaton Method Usng Pseudo-Modal Response : Appled to Steel Brdge n Buldng More nfo about ths artcle: http://www.ndt.net/?d=19899 Doyoung Km 1, Hak Bo Shm 2, Hyo Seon Park 1 1

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Machine Learning in Production Systems Design Using Genetic Algorithms

Machine Learning in Production Systems Design Using Genetic Algorithms Internatonal Journal of Computatonal Intellgence Volume 4 Number 1 achne Learnng n Producton Systems Desgn Usng Genetc Algorthms Abu Quder Jaber, Yamamoto Hdehko and Rzauddn Raml Abstract To create a soluton

More information

A Three-Dimensional Network Coverage Optimization Algorithm in Healthcare System

A Three-Dimensional Network Coverage Optimization Algorithm in Healthcare System 204 IEEE 6th Internatonal Conference on e-health Networkng, Applcatons and Servces (Healthcom) A Three-Dmensonal Network Coverage Optmzaton Algorthm n Healthcare System Xaoshuang Lu, Guxa Kang, Nngbo Zhang,

More information

The Effect Of Phase-Shifting Transformer On Total Consumers Payments

The Effect Of Phase-Shifting Transformer On Total Consumers Payments Australan Journal of Basc and Appled Scences 5(: 854-85 0 ISSN -88 The Effect Of Phase-Shftng Transformer On Total Consumers Payments R. Jahan Mostafa Nck 3 H. Chahkand Nejad Islamc Azad Unversty Brjand

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh

More information

Intelligent pipeline control - a simulation study in the automotive sector

Intelligent pipeline control - a simulation study in the automotive sector Intellgent ppelne control - a smulaton study n the automotve sector Phlp G. Brabazon, Andrew Woodcock, Bart L. MacCarthy Mass Customzaton Research Centre, Nottngham Unversty Busness School, Jublee Campus,

More information