Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,
|
|
- Coleen Little
- 5 years ago
- Views:
Transcription
1 [Type text] [Type text] [Type text] ISSN : Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [ ] Securty lghtweght FID protocol for U- healthcare system Xuqng Chen *, Tanje Cao *, Jngxuan Zha, Yu Guo School of Computer, Chna Unversty of Mnng and Technology, Xuzhou, (CHINA School of Materals Scence and Engneerng, Chna Unversty of Mnng and Technology, Xuzhou, (CHINA E-mal : xuqngchen@6.com ABSTACT ado Frequency Identfcaton systems have been extensvely deployed n the ubqutous healthcare doman. However, healthcare records of patents n database and moble devces can be revealed by a malcous attacker, there are many prvacy threats. In order to meet the practcal requrements of hosptal envronment, ths paper crtcally analyzes all the possble attacks on orgnal protocol and proposes an mproved low-cost lghtweght FID protocol conformng to EPC Class Generaton standards n hosptal scenaros. Therefore, the enhanced protocol s more secure and hgher performance n terms of performance and securty propertes compared wth other schemes. KEYWODS ado frequency dentfcaton; Ubqutous healthcare; Low-cost lghtweght FID protocol; Provably securty; Prvacy property. Trade Scence Inc.
2 BTAIJ, 0(9 04 Tanje Cao et al INTODUCTION ado Frequency Identfcaton (FID systems have been extensvely deployed n the ubqutous health care (U-healthcare doman []. U-healthcare s an evolutonary servce of healthcare appled by wreless networks, FID moble devces, wreless medcal sensors and body area networks (BANs. To mplement U-healthcare servce, developng U-healthcare system n the healthcare ndustry s a sgnfcant tendency va tradtonal wred, moble health (M-health and ubqutous sensor network (USN technologes []. Adopton of the Health Informaton System (HIS based on the wreless network nfrastructure gves a lot of benefts. As a part of the U-healthcare system, many moble devces have been employed n hosptals due to ther outstandng moblty. Immedate access to the Electronc Medcal ecord (EM database (DB offered wth the moble devce can reduce the processng tme to access and update EM [3-5]. Healthcare nformaton of moble devces can be exposed, then there are many securty problems occurred. In order to montor and track patents, automatc solutons based on FID technology have been provded for the nursng staff [6] n U-healthcare envronment. On the one hand, USN s employed as a key factor to rapdly transmt medcal nformaton (bomedcal sgnals to the remote hosptals n prevous health envronments. On the other hand, patent montorng medcal nformaton n real tme can be analyzed by consultants. But there are many securty ssues and lmtatons for the patents' safety. In a passve scenaro and an actve scenaro, the adversary montors and traces the messages n nsecurty channels, such as the channel between a genune tag and a moble reader (a reader and DB. There are U-healthcare scenaros where the adversary can ntate fake transactons between a tag (h by a patent and a moble reader (h by a nurse. The adversary can have an objectve to reconstruct the genune tag key and dsturb the regular arrangement of the nurse. The safety performance and low-cost s the task of desgnng a lghtweght FID scheme n U- healthcare. Ths s why U-healthcare should be as economc and wdely avalable as possble. The doctor should obtan accurately the bologcal nformaton of the patent from wreless medcal sensors BANs (WMSBANs and dagnose promptly the patent s condton. The effcent U-healthcare system applcatons beneft from FID technology, such as the patent traceablty, ownershp transfer procedures, medcaton admnstraton and cost savngs. Ths paper s focused on acute dseases that are ncreasngly threatenng the sustanablty of health care systems due to rapdly-ncreasng ncdence. The mproved scheme requrements for better utlzaton of health care resources, and FID technology can provde effectve medcal checkup n U- healthcare. In order to manage effectvely the related clncal processes, we develop a securty lghtweght FID protocol for the mult-tags and mult-owners. Snce t s common for FID-tagged patents beng owned by mult-owners, a patent s commonly managed by some nurses and doctors. The proposed protocol addresses the dynamc assocated n the u-healthcare scenaros. CYPTANALYSIS OF MOHAMMADALI ET AL S POTOCOL For smplcty, we use the notatons of the orgnal paper. These notatons have been explaned n TABLE. Notatons TABLE : The notatons and descrptons. Descrptons EPC s ;DATA Electronc Product Code; The tag s record. K (P key (access key stored n the tag. C ; ID The -th tag s ndex n DB; reader s dentfer.
3 390 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 ID The reader dentcaton number. H(; h K ( Hash functon; Keyed hash functon. We analyze the securty of Mohammadal et al's scheme n Fgure. to fnd out varous attacks. Then, we propose several types of attacks aganst ths protocol, such as tag, reader, DB mpersonaton attack and tracng attack. [ TID, K, P, C, K, P, C,] 6. M, DC,, EV,, N 7. for each s ID n DB H( ID N M? VDB If C s verfed PNG( EPCs N PNG( D K K? M x= else: = M K PNG( D K? PNG( EPCs N x= endf If C = 0 = M K PNGD ( K M K PNG( D K = or? PNG( EPCs N x= or x= endf verfes PNG( C K X D KX PX? E f ID = ID:consders ID else: ID endf then computes values below: M = PNG( EPCs NT PX Info = DATA ID hid ( N MAC = H ( DATA N If x= K K PNG( K P P PNG( P C C PNG( NT N else C PNG( NT N endf If ID = ID ID ID H ( ID else do not update the reader's key endf. Generate N. N 4. M, DC,, E 5. V= H( ID N M 8. Info, MAC, M 9. Info ID hid( N = DATA HDATA ( N = MAC ID = H( ID [ K, P, C, TID] 3.Generate NT M = PNGEPC ( s N PNG ( NT K D= NT K If flag = 0, consders C ' else: generates NT ' C = C NT E = NT PNG ( C K P flag = 0. M. verfes M? PNG( EPCs NT P K+ = PNG( K P+ = PNG( P C+ = PNG( NT N flag = 0 Fgure : Mohammadal et al s protocol. ( Impersonaton DB Attack Phase (Learnng: The attacker Adv plays as a blocker and eavesdrops one successful run of protocol and blocks the Step, then stores the exchanged messages {M, D, C, E}, where: Step. The generates a nonce N and sends t to the T.
4 BTAIJ, 0(9 04 Tanje Cao et al. 39 Step. The T generates N T and computes M, D, C, E, then sends them to the. a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C (flag=0 d. E= N T PNG(C K P Step 3. The attacker Adv blocks and stores the nformaton, then stops the sesson. Phase (Impersonaton DB: To mpersonate the DB, Adv ntates a sesson of protocol, where: Step. Adv replays the montored nonce N to the T. Step. The T produces N T and computes M, D, C, E, then sends them to the. Ther equatons are calculated as follows. a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C N T (flag= d. E = N T PNG(C K P Step 3. Adv blocks the messages {M, D, C, E } and modfes the transferred messages as follows: a. M Adv =PNG(EPC s N PNG(N T K b. D Adv = D =N T K c. C Adv = C d. E Adv = E D D =N T PNG(C K P Subsequently, Adv forwards the messages {M Adv, D Adv, C Adv, E Adv } to the reader. Step 4. ( -DB The reader computes V=H(N ID M and sends {M Adv, D Adv,C Adv, E Adv, V, N } to the DB. Step 5. (DB verfcaton DB pcks up each stored ID sequentally to compute H(ID N M Adv wth the same N, and compares the computed V DB wth the receved V. If V DB = V, the DB verfes the legtmate reader. On the other hand, the values {M Adv, D Adv,C Adv, E Adv, V, N } are verfed by the DB. The followng equatons are gven to prove the computatonal process. a. V DB = H(ID N M Adv =V= H(ID N M From the above compared result, the DB can authentcate the. b. The DB compares transferred message M Adv wth the calculated M DB usng the stored keys {EPC s, K } and the receved messages {N, D Adv }. Therefore, the DB verfes M DB = M Adv usng the followng equaton. M DB =PNG(EPC s N PNG(N T K = M Adv c. The DB compares transferred message E Adv wth the calculated E DB usng the followng equaton. E DB =D Adv K PNG(C Adv K P =N T PNG(C K P =E Adv d. After the DB verfes successfully, t computes the messages {M, MAC, nfo} as follows: M = PNG(EPC s N T P Info= DATA ID h ID (N MAC=H(DATA N e. The DB res the related secrets as follows: C + = PNG(N N T The DB forwards the messages {M, MAC, nfo} to the reader.
5 39 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 Step 6. The reader receves the messages {M, MAC, nfo} and compares the computed value MAC =H(DATA N wth the receved MAC by extractng DATA from nfo. If the receved messages are authentcated by the reader, M s sent to the tag T. Step 7. The tag vertfes M tag usng ts current keys {EPC s, P } and the nonce N T. The prvate keys of the tag are updated as follows: C + = PNG(N N T ( eader Impersonaton Attack Snce the channel between the moble reader and the DB s unsafety, and the adversary has manpulated the reader s outputs, the DB and the tag can authentcate the modfed messages from the spoofed reader. Phase (Learnng: The reader transmts a nonce N to the tag, whle the tag calculates as follows: a. M = PNG(EPC s N PNG(N T K b. D =N T K c. C = C N T d. E= N T PNG(C K P Phase (Impersonaton eader: To mpersonate the reader, the spoofed attacker modfes the blocked messages, where: Step. The spoofed attacker modfes the blocked messages from tag to reader, where: M =PNG(EPC s N PNG(N T K N Step. The reader computes V= H(ID N M N = H(ID M Step 3. The spoofed attacker modfes the blocked messages from the reader to the DB, where: a. N =0 b. M = M c. V = H(ID M = V Step 4. The DB computes and compares the computed V DB wth the receved V. V DB = H(ID N M =H(ID 0 M = H(ID M = V Therefore, the counterfeted reader s verfed by the DB, the attack succeeds. (3 Impersonaton Tag Attack Phase (Learnng: Adv eavesdropps the frst successful run of protocol and blocks the Step, then stores the exchanged messages {M, D, C, E}, where: Step. The generates a nonce N and sends t to the T. Step. The T generates N T and computes M, D, C, E, then sends them to the a. M =PNG(EPC s N PNG( N T K b. D =N T K c. C = C (flag=0 d. E= N T PNG(C K P Step 3. The computes V= H(ID M N and sends V to the DB. Step 4. After the DB verfes successfully, t computes the messages {M, MAC, nfo} as follows: M = PNG(EPC s N T P Info= DATA ID h ID (N MAC=H(DATA N The DB res the related secrets as C + = PNG(N N T. The attacker Adv blocks and stores these nformaton M, then stops the sesson. Phase (Impersonaton Tag: To mpersonate the tag T, untl the reader ntates a second sesson of protocol, where: Step. the reader ntates a second run of protocol and replays the montored nonce N =0 to the T.
6 BTAIJ, 0(9 04 Tanje Cao et al. 393 Step. The T produces N T and computes {M, D, C, E }, then sends them to the. The equatons are calculated as follows. a. M = PNG(EPC s N N T K b. D =N T K c. C = C N T (flag= d. E = N T PNG(C K P Step 3. Adv blocks the messages {M N, D, C, E } from T to. Step 4. The computes V = H(ID M N N = H(ID M and sends V to Adv. Step 5. Adv modfes the transferred messages as follows: a. M Adv =M N =PNG(EPC s N N T K b. D Adv = D =N T K c. C Adv = C d. E Adv = E D D =N T PNG(C K P e. V Adv =V = H(ID M f. N =0 Subsequently, Adv forwards the messages {M Adv, D Adv, C Adv, E Adv, V Adv, N } to the. Step 6. (DB authentcates the reader and tag From the followng compared result, the DB can authentcate the. If V DB = V Adv, DB compares transferred message {M Adv, E Adv } wth the calculated {M DB, E DB } as followng. V DB = H(ID N M Adv = V Adv = H(ID M From the above compared result, the DB can authentcate the counterfeted. b. If C Adv s not verfed, the DB computes the calculated I. I =M Adv PNG(D Adv K K =PNG(EPC s N =PNG(EPC s X= = Therefore, the DB verfes that the state of the tag's keys s. c. E DB =D Adv K PNG(C Adv K P = D K PNG(C K P =N T PNG(C K P =E Adv After DB verfes E DB =E Adv successfully, t computes the messages {M, MAC, nfo } as follows: d. M = PNG(EPC s N T P Info = DATA ID h ID (N MAC =H(DATA N e. The DB res the related secrets as follows: C + = PNG(N N T The tag mpersonaton attack succeeds. (4 The Tag Tracng Attack The attacker can calculate the xored value DE=PNG(C K P usng the montored messages {D,E}. Therefore, Adv traces the target tag accordng to the fxed value PNG(C K P. THE ENHANCED MOHAMMADALI ET AL. S POTOCOL There s a wde varety of applcatons n a hosptal where secure and effcent authentcaton mechansms are demanded. For nstance, FID technology ensures the safety of transfuson patents, and creates the accurate and effectve medcal servce for treatment. In order to avod transfusonhandlng errors, ths process conssts of two phases. Frst the denttes of the patents and lqud
7 394 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 medcne bags are confrmed (authentcaton protocol and then the matchng between both enttes s checked (verfcaton step. The process s sketched n Fgure. and an authentcaton protocol s at the core of ths applcaton. Our authentcaton protocol are shown n Fgure. and descrbed below: Step : T: N. When the physcan arrves at the bed, the reader s her sends a query sgnal and a nonce N to the tag. Step :T : {M,E,F}. The tag generates a nonce N T and computes the encrypted messages contaned patent dentfer, concrete dsease and medcaton lsts. The most common servce n a hosptal envronment have patent data and medcaton lsts, whch call automatcally at the dsplay of moble reader. [ TID, K, P, C, K, P, C, ID, ID ] 6. M, EFVG,,,. Generate N. N 4. M, EF, 5. G= ID N V = H( ID N M [ K, P, C, TID] 3.Generate NT M = PNG ( EPC s N TN PNG ( K D= NT K E= PNG ( C N TK P F= C N D 7. for each s ID n DB N = ID G HID ( N M? V DB extract C and Dfrom F If C =0 For each tuple( EPC, K, K = M PNG( K = M PNG( K or? PNG( EPC N D K X= or s s X else: C or C? C X= or endf PNG ( EPC D K N PNG( K? M verfes PNG( C D K K P? E f ID = ID :consders ID else: ID endf then computes values below : s X X X X M = PNG( EPC N P MAC = H( DATA N If x= K K PNG( K N P P PNG( P N C C PNG( N N else C PNG( N N endf If ID = ID s T Info = DATA ID N T T ID ID H( ID else do not update the reader's key endf 8. Info, MAC, M 9. Info ID N = DATA HDATA ( N = MAC ID = H( ID N. verfes M PNG( EPC N P 0. M K = PNG( K N + P = PNG( P N + s T C = PNG( N N + T Fgure : The mproved protocol. Step 3: DB : {M, E, F, V, G}. Upon recevng the messages, the reader computes V =H(ID N M and forwards (N, M, F, V, E to the DB. The nurse or the doctor forwards the messages such as patent dentfer, concrete dsease and medcaton lsts, to the DB.
8 BTAIJ, 0(9 04 Tanje Cao et al. 395 Step 4: DB verfcaton and computaton After recevng {M, E, F, V, G}, the DB performs the followng operatons: a. The DB searches ts look-up table for a value ID that satsfes N =ID G and V=H(ID N M. If the above equaton s set up, the DB authentcates the reader of the her s legal. Some patents need more care and regular checks. For example, f a patent needs a regular check three tmes a day, the FID system should remnd the responsble personnel. Therefore an automatc checklst can be created. b. If C = 0, t stands for the frst access. For each tuple (K,P,C,K,P,C,EPC s, the DB computes values I =M PNG(K and I =M PNG(K n ts DB, and checks whether I (I matches PNG(EPC s D EPC s N. The process s teratvely repeated for each entry untl t fnds authentcaton key (K or K. c. When C 0, the DB consders C as an ndex to fnd the related keys n the database. If C =C, the DB sets X =, otherwse (C =C X=. Then the DB nvestgates whether M s equal to the computed value PNG(EPC s D K X N K X. d. The DB uses K X and D to obtan N T, then checks whether the receved E matches PNG(C X D K X K X P X computed by the DB. If the two values match, the back-end server verfes the tag, otherwse termnates the sesson. e. The DB computes M =PNG(EPC s N T P X. When the next shft nurse knows whch tasks have been done and whch have not, another problem n hosptals s that change of shft report whch ncludes the tasks that have been done. The checklst can be created automatcally by ths way. If ID = ID, the DB uses ID to compute nfo and MAC; otherwse, ID =ID. If X=, nfo= DATA ID N and MAC=H(DATA N, then DB sends t to the reader. If X=, the DB updates just C + = PNG(N T N. Otherwse, t updates the record by replacng K wth K,P wth P and C =C. New values K, P and C are reset as PNG(K N T, PNG(P N T and C =PNG(N T N. f. The reader updates secret values ID =ID, ID =H(ID N, when the receved messages are verfed successfully. Otherwse, the back-end server does not update the keys of the reader. Step 5:DB :{M, MAC, nfo} The DB forwards the messages {M, MAC, nfo} to the reader. Step 6: T:{M } The reader obtans DATA, then checks whether the receved MAC s equal to H(DATA N. If the message MAC s verfed, the reader sends M to the tag and updates secret value ID=H(ID N. After recevng M, the tag computes PNG(EPC s N T P based on the saved value (N T, P, EPC s, then compares the receved value M wth the computed value. If the equatons h, the tag authentcates the reader and updates the ts keys as K + =PNG(K N, P + =PNG(P N and C + =PNG(N T N. Data acquston equpments of FID system and patent data measurng equpments of the clncal manfestaton would perform data synchronous updatng mechansm accordng to relevant applcaton requrements. Moreover, the update mechansm that have mportant meanng towards control condton developng and reducng ts harm n tme. THE SECUITY AND PEFOMANCE POPETIES ANALYSIS ( Tag Impersonaton esstance In order to mpersonate a tag, an adversary should have the forged messages {M, E,F}. In order to compute M, the Adv needs EPC s,k and N T that are unknown for Adv. On the other hand, the current value of E s ndependent of the value D. Adv can not fnd the relatons from the messages {M,E,F}. Therefore, Adv can not mpersonate the tag. ( DB Impersonaton esstance The enhanced protocol s DB mpersonaton resstance. It s mpossble for Adv to obtan nfo and MAC. Even f the DB receves the replayed N n the DB'S verfcaton process,the computatons of
9 396 Securty lghtweght FID protocol for U-healthcare system BTAIJ, 0(9 04 {M,D,E, M } need check the ntegrty of N T whch s known for Adv. Therefore, t s mpossble for Adv to reveal the tag's nformaton. (3 eader Impersonaton esstance It s clear that the forged value V cannot be dentfed by the DB whch checks the ntegrty of N and M. Even f Adv compromses the current key ID cur, the next key of the reader s updated usng N whch s not known for Adv. (4 Tracng Attack esstance If Adv uses the montored messages {M, E,F} to analyze the tag's keys, we encrypt K and C usng N T and PNG (N T respectvely n the mproved protocol. Therefore, Adv can not obtan any other secret values and trace the tag. TABLE and TABLE 3 show the comparson of securty and performance propertes for the fve protocols. TABLE : The comparson of securty propertes Protocols S S S3 S4 Protocol [8] NO NO NO NO Protocol [9] NO NO NO NO Protocol [0] NO NO NO NO Protocol [7] NO NO NO YES ours YES YES YES YES S : Tag mpersonaton resstance; S : Server Impersonaton esstance; S3 : eader Impersonaton esstance; S4 : Tracng Attack esstance. The protocol [7] shows that protocols [8-0] has some weaknesses ncludng tracng attack, DB mpersonaton, tag mpersonaton and DATA forgery attack. Moreover, we also show that protocol [7] suffers from the reader mpersonaton, DB mpersonaton, tag mpersonaton attack and tracng attack. Snce our scheme s more secure than other schemes. TABLE 3. The comparson of performance propertes Protocols T T T3 T4 T5 Protocol [8] 0 6 hash 4 NO Protocol [9] hash 6PNG 4 YES Protocol [0] 0 6PNG 4 YES Protocol [7] hash 7PNG 4 YES ours hash 6PNG 3 YES T : Type and number of encrypton functons on reader; T : Type and number of encrypton functons on tag; T3 : Number of pseudo-random nonces on tag; T4 : Number of outputs on tag; T5: EPC CG complance. In our protocol, the tags need not mplement hash functons, so that the huge computatonal workloads can be reduced. Further, the tag computaton s restrcted to XO operatons and PNG. Thus, performance propertes of our scheme s superor to four protocols. Thus, we see that our scheme provdes the requred securty propertes whle at the same tme conformng to EPC Class- Gen- standards n the u-healthcare system. CONCLUSIONS In our scheme, the tag computaton s restrcted to btwse operatons, concatenaton calculatons and pseudo random number generaton. All the methods are wthn the capabltes of EPC Class- Gen
10 BTAIJ, 0(9 04 Tanje Cao et al. 397 tags. Further, snce the tags need not mplement hash functons, the huge computatonal workloads can be reduced. We have demonstrated that Mohammadal et al's protocol s vulnerable to varous attacks. Subsequently, we have proposed a FID authentcaton protocol for u-healthcare envronment. As an allevaton, we clam that these enhanced protocols are secure aganst DB mpersonaton attack, tag mpersonaton attack, reader mpersonaton attack, and afford untraceablty and forward secrecy based on the Vaudenay's formal prvacy model. Apart from guaranteeng some essental securty propertes, the mproved protocol clams to solve the trade-off between locaton prvacy and low-cost n u-healthcare envronment. EFEENCES [] S.D.Kaul, A.K.Awasth; FID Authentcaton Protocol to Enhance Patent Medcaton Safety. Journal of medcal systems, 37(6, -6 (03. [] J.T.Km; Enhanced Secure Authentcaton for Moble FID Healthcare System n Wreless Sensor Networks [M]. Computer Applcatons for Database, Educaton, and Ubqutous Computng. Sprnger (0. [3] J.T.Km; Prvacy and Securty Issues for FID Healthcare System n Wreless Sensor Networks [M]. Convergence and Hybrd Informaton Technology. Sprnger, (0. [4] P.Pcazo-Sanchez, N.Bagher et al.; Two FID Standard-based Securty Protocols for Healthcare Envronments. Journal of medcal systems, 37(5, - (03. [5] Y.en,.W.N.Pazz et al.; Montorng patents va a secure and moble healthcare system. Wreless Communcatons, IEEE, 7(, (00. [6] A.opponen, M.Lnnavuo et al.; A novel concept of a wearable nformaton applance usng context-based human computer nteracton. Personal and Ubqutous Computng, 7(, (03. [7] A.Mohammadal, Z.Ahmadan et al.; Analyss and Improvement of the securng FID systems conformng to EPC Class Generaton standard. IAC Cryptology eprnt Archve, (03. [8].H.E.Alakrut, A.Samsudn et al.; Provably Lghtweght FID Mutual Authentcaton Protocol. Internatonal Journal of Securty & Its Applcatons, 7(4, (03. [9] E.J.Yoon; Improvement of the securng rfd systems conformng to epc class generaton standard. Expert Syst.Appl., 39(, (0. [0] T.C.Yeh, Y.J.Wang, T.C.Kuo, S.S.Wang; Securng FID systems conformng to EPC Class Generaton standard, Expert Systems wth Applcatons, Avalable onlne, (00.
An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards
Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationNFC Communications-based Mutual Authentication Scheme for the Internet of Things
Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationImproving the Authentication Scheme and Access Control Protocol for VANETs
Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu
More informationCryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
Internatonal Journal of Securt and Its pplcatons pp.151-160 http://d.do.org/10.14257/jsa.2014.8.4.14 rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee
More informationCMOS Implementation of Lossy Integrator using Current Mirrors Rishu Jain 1, Manveen Singh Chadha 2 1, 2
Proceedngs of Natonal Conference on Recent Advances n Electroncs and Communcaton Engneerng CMOS Implementaton of Lossy Integrator usng Current Mrrors Rshu Jan, Manveen Sngh Chadha 2, 2 Department of Electroncs
More informationSensors for Motion and Position Measurement
Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationAn Efficient and Flexible Decentralized Multicast Key Distribution Scheme
IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationGustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185
An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre
More informationA New Scalable RFID Delegation Protocol
Appl. Math. Inf. Sc. 8, No. 4, 97-94 (4 97 Appled Matheatcs & Inforaton Scences An Internatonal Journal http://dx.do.org/.785/as/845 A New Scalable RFID Delegaton Protocol Xuqng Chen,, anje Cao, and Yu
More informationTime-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock
Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty
More informationA Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)
A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationGraphical User-ID with Partial Match Scheme and Application for Mobile Web-Services
Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,
More informationMulti-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks
Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com
More informationThe Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game
8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang
More informationOptimizing a System of Threshold-based Sensors with Application to Biosurveillance
Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationJoint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding
Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationPassive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)
Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called
More informationEPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication
94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationGeneralized Incomplete Trojan-Type Designs with Unequal Cell Sizes
Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,
More informationA Simple Satellite Exclusion Algorithm for Advanced RAIM
A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationDRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School
DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationHIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY
Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,
More informationNetwork Reconfiguration in Distribution Systems Using a Modified TS Algorithm
Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty
More informationA MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS
A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr
More informationAn Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks
An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,
More informationThroughput Maximization by Adaptive Threshold Adjustment for AMC Systems
APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal
More informationCoverage Maximization in Mobile Wireless Sensor Networks Utilizing Immune Node Deployment Algorithm
CCECE 2014 1569888203 Coverage Maxmzaton n Moble Wreless Sensor Networs Utlzng Immune Node Deployment Algorthm Mohammed Abo-Zahhad, Sabah M. Ahmed and Nabl Sabor Electrcal and Electroncs Engneerng Department
More informationDecision aid methodologies in transportation
Decson ad methodologes n transportaton Lecture 7: More Applcatons Prem Kumar prem.vswanathan@epfl.ch Transport and Moblty Laboratory Summary We learnt about the dfferent schedulng models We also learnt
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationFigure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13
A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationVRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,
VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationJoint Adaptive Modulation and Power Allocation in Cognitive Radio Networks
I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,
More informationTraffic balancing over licensed and unlicensed bands in heterogeneous networks
Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty
More informationAn Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks
An Improved Prole-Based Locaton Cachng wth Fxed Local Anchor Based on Group Deregstraton or Wreless Networks Md. Kowsar Hossan, Mousume Bhowmck, Tumpa Ran Roy 3 Department o Computer Scence and Engneerng,
More informationGenetic Algorithm for Sensor Scheduling with Adjustable Sensing Range
Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationThe Dynamic Utilization of Substation Measurements to Maintain Power System Observability
1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator
More informationarxiv: v2 [cs.dc] 31 Jul 2017
Usng Blockchan for Peer-to-Peer Proof-of-Locaton Gacomo Bramblla, Mchele Amorett, and Francesco Zanchell Dept. of Engneerng and Archtecture, Unversty of Parma, Italy Contact: mchele.amorett@unpr.t arxv:1607.00174v2
More informationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1. Jiawen Kang, Rong Yu, Member, IEEE, Xumin Huang, and Yan Zhang, Senior Member, IEEE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Prvacy-Preserved Pseudonym Scheme for Fog Computng Supported Internet of Vehcles Jawen Kang, Rong Yu, Member, IEEE, Xumn Huang, and Yan Zhang,
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationTHE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER
VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationLANDMARC: Indoor Location Sensing Using Active RFID*
LANDMARC: Indoor Locaton Sensng Usng Actve ID* Lonel M. N,2, Yunhao Lu, Yu Cho Lau and Abhshek P. Patl Department of Computer Scence & Engneerng Mchgan State Unversty East Lansng, Mchgan, USA luyun@msu.edu
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationAn efficient cluster-based power saving scheme for wireless sensor networks
RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm
More informationSimulation of the adaptive neuro-fuzzy inference system (ANFIS) inverse controller using Matlab S- function
Vol. 8(1), pp. 875-884, 4 June, 013 DOI 10.5897/SRE11.1538 ISSN 199-48 013 Academc Journals http://www.academcjournals.org/sre Scentfc Research and Essays Full Length Research Paper Smulaton of the adaptve
More informationArterial Travel Time Estimation Based On Vehicle Re-Identification Using Magnetic Sensors: Performance Analysis
Arteral Travel Tme Estmaton Based On Vehcle Re-Identfcaton Usng Magnetc Sensors: Performance Analyss Rene O. Sanchez, Chrstopher Flores, Roberto Horowtz, Ram Raagopal and Pravn Varaya Department of Mechancal
More informationROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION
7th European Sgnal Processng Conference (EUSIPCO 9 Glasgow, Scotland, August 4-8, 9 ROBUST IDENTIFICATION AND PREDICTION USING WILCOXON NORM AND PARTICLE SWARM OPTIMIZATION Babta Majh, G. Panda and B.
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationErgodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power
7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power
More informationAn Efficient Positioning Algorithm using Ultrasound and RF
5. Internatonal B. Km, C. Journal Park, D.-Y. of Control, Kang, H. Automaton, H. Yun, B.-C. and Ahn, ystems, E. J. Cha, vol. 6, and no.., J. pp. Lee 5-55, August 8 An Effcent Postonng Algorthm usng Ultrasound
More informationAdaptive Fault Tolerance in Real-Time Information Systems
Shubnsky I.B., Rozenberg I.N., Papc L. Adaptve Fault Tolerance n Real-Tme Informaton Systems Shubnsky I.B., Rozenberg I.N., Papc L. Russa, Moscow, JSC NIIAS, Serba, Prjevor, ICDQM Abstract Real-tme nformaton
More informationsensors ISSN
Sensors 009, 9, 8593-8609; do:10.3390/s91108593 Artcle OPEN ACCESS sensors ISSN 144-80 www.mdp.com/journal/sensors Dstrbuted Envronment Control Usng Wreless Sensor/Actuator Networks for Lghtng Applcatons
More informationPrediction-based Interacting Multiple Model Estimation Algorithm for Target Tracking with Large Sampling Periods
44 Internatonal Jon Ha Journal Ryu, Du of Hee Control, Han, Automaton, Kyun Kyung and Lee, Systems, and Tae vol. Lyul 6, Song no., pp. 44-53, February 8 Predcton-based Interactng Multple Model Estmaton
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More information1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION
An Improved Cellular postonng technque based on Database Correlaton B D S Lakmal 1, S A D Das 2 Department of Electronc & Telecommuncaton Engneerng, Unversty of Moratuwa. { 1 shashka, 2 dleeka}@ent.mrt.ac.lk
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationDESIGN OF FREQUENCY REGULATION SERVICE MARKET BASED ON PRICE AND DEMAND ELASTICITY BIDS
DESIG OF FREQUECY REGULATIO SERVICE MARKET BASED O ICE AD DEMAD ELASTICITY BIDS Hadan Zhao and Kanar Bhattacharya Department of Electrcal and Computer Engneerng Unversty of Waterloo, Waterloo, Ontaro,
More informationA Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute
More informationPrivacy-Preserving Data Mining Shared analysis without shared data. 16 February 2011 Chris Clifton
Prvacy-Preservng Data Mnng Shared analyss wthout shared data 16 February 2011 Chrs Clfton Idea: Collaborate to learn (only) desred results Data owners and FDA partcpate n protocol Results same as f all
More informationTransformer winding modal parameter identification based on poly-reference least-square complex frequency domain method
Internatonal Conference on Advanced Electronc Scence and Technology (AEST 2016) Transformer wndng modal parameter dentfcaton based on poly-reference least-square complex frequency doman method Yanng L
More informationLow Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery
017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang
More informationStudy of the Improved Location Algorithm Based on Chan and Taylor
Send Orders for eprnts to reprnts@benthamscence.ae 58 The Open Cybernetcs & Systemcs Journal, 05, 9, 58-6 Open Access Study of the Improved Locaton Algorthm Based on Chan and Taylor Lu En-Hua *, Xu Ke-Mng
More informationResearch Article A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments
Internatonal Dstrbuted Sensor etworks Volume 3, Artcle ID 3847, 7 pages http://dx.do.org/.55/3/3847 Research Artcle A Utlty-Based Rate Allocaton of MM Servce n Heterogeneous Wreless Envronments Yao Huang,
More informationArticle Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge
Artcle ocalaton-free Detecton of Replca Node Attacks n Wreless Sensor Networks Usng Smlarty Estmaton wth Group Deployment Knowledge Chao Dng 1, jun Yang, * and Meng Wu 3, * 1 College of Computer Scence,
More informationLatency Insertion Method (LIM) for IR Drop Analysis in Power Grid
Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,
More informationRadial Distribution System Reconfiguration in the Presence of Distributed Generators
4th Internatonal Conference on Coputer, Mechatroncs, Control and Electronc Engneerng (ICCMCEE 205) Radal Dstrbuton Syste Reconfguraton n the Presence of Dstrbuted Generators Xngquan J, a, Q Lu, GuoZheng
More informationA Proposal of Mode Shape Estimation Method Using Pseudo-Modal Response : Applied to Steel Bridge in Building
A Proposal of Mode Shape Estmaton Method Usng Pseudo-Modal Response : Appled to Steel Brdge n Buldng More nfo about ths artcle: http://www.ndt.net/?d=19899 Doyoung Km 1, Hak Bo Shm 2, Hyo Seon Park 1 1
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationLow Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages
Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng
More informationIntelligent Wakening Scheme for Wireless Sensor Networks Surveillance
The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese
More informationMachine Learning in Production Systems Design Using Genetic Algorithms
Internatonal Journal of Computatonal Intellgence Volume 4 Number 1 achne Learnng n Producton Systems Desgn Usng Genetc Algorthms Abu Quder Jaber, Yamamoto Hdehko and Rzauddn Raml Abstract To create a soluton
More informationA Three-Dimensional Network Coverage Optimization Algorithm in Healthcare System
204 IEEE 6th Internatonal Conference on e-health Networkng, Applcatons and Servces (Healthcom) A Three-Dmensonal Network Coverage Optmzaton Algorthm n Healthcare System Xaoshuang Lu, Guxa Kang, Nngbo Zhang,
More informationThe Effect Of Phase-Shifting Transformer On Total Consumers Payments
Australan Journal of Basc and Appled Scences 5(: 854-85 0 ISSN -88 The Effect Of Phase-Shftng Transformer On Total Consumers Payments R. Jahan Mostafa Nck 3 H. Chahkand Nejad Islamc Azad Unversty Brjand
More informationUtility-based Routing
Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton
More informationAn Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG
An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh
More informationIntelligent pipeline control - a simulation study in the automotive sector
Intellgent ppelne control - a smulaton study n the automotve sector Phlp G. Brabazon, Andrew Woodcock, Bart L. MacCarthy Mass Customzaton Research Centre, Nottngham Unversty Busness School, Jublee Campus,
More information