An Anonymous Multi-Receiver Encryption Based on RSA

Size: px
Start display at page:

Download "An Anonymous Multi-Receiver Encryption Based on RSA"

Transcription

1 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July A Aoymous Mult-Recever Ecrypto Based o RSA Le Har 1, Ch-Che Chag 2,3, ad Hsao-Lg Wu 2 (Correspodg author: Ch-Che Chag) epartmet of Computer Scece Electrcal Egeerg & Uversty of Mssour- Kasas Cty 1 o Rockhll Rd.,Kasas Cty, MO 64110, USA epartmet of Iformato Egeerg ad Computer Scece & Feg Cha Uversty 2 o. 100, Wehwa Rd., Seatwe, achug, 40724, awa epartmet of Computer Scece ad Iformato Egeerg & Asa Uversty 3 o. 500, Loufeg Rd., Wufeg, achug, 41354, awa (Emal: ala3c@gmal.com) (Receved Mar. 22, 2013; revsed ad accepted May 26, 2013) Abstract Wth the rapd developmet of formato ad etwork techologes, commucato securty has become a mportat ssue may applcatos. here are may publc-key based ecrypto schemes proposed the lterature. etwork applcatos are o loger ust oe-tooe type of commucato; but t volves multple recevers (>1) (e.g., multcast trasmsso). Oe-to-oe type ecrypto s o loger satsfyg ths type of applcatos. Ghodos et al. proposed a threshold RSA cryptosystem her scheme s also called a multrecever ecrypto. I Ghodos et al. s scheme, each recever s decrypto key depeds o all publc keys of recevers. Whe the umber of recevers s large, Ghodos et al. s scheme becomes mpractcal. We proposed a ovel aoymous mult-recever ecrypto. I our scheme, each recever s decrypto key s fxed. I addto, the scheme provdes aoymty of recevers. We clude performace aalyss ad comparsos wth other schemes. Keywords: RSA cryptosystems, Chese Remader heorem, Aoymty, Mult-recever ecrypto 1 Itroducto Publc-key ecryptos [4, 17, 18] allow a seder to sed a ecrypted message to a recever (.e., oe-to-oe type of ecrypto). However, etwork applcatos are o loger ust oe-to-oe type of commucato; but t volves multple recevers (>1), (e.g., multcast trasmsso). Oeto-oe type ecrypto s o loger satsfyg ths type of applcatos. I 1989, Chou ad Che have proposed a secure broadcastg [7] usg the CR for protectg the messages. I ther scheme, recevers eed to have ther publc ad prvate key pars tally. he seder selects a radom sesso key to ecrypt the message. he, the seder uses ay publc-key ecrypto ad the CR to securely trasmt the decrypto key correspodg to the radom sesso key to all legtmate recevers. I summary, the scheme uses the key-ecrypt-key techque to protect the messages. If the key-ecrypt-key algorthm s a publc-key algorthm, the parameters of the publc-key algorthm ca be used for oly oe tme trasmsso; otherwse, f the key-ecrypt-key algorthm s a prvate-key algorthm, ther scheme s a mxed scheme sce t uses both the publc-key ad prvatekey cryptosystems. he oto of broadcast ecrypto was frst troduced by Berkovts [3] ad was gve a formal defto by Fat ad aor [13]. he goal of the broadcast ecrypto s to securely trasmt a message to all legtmate recevers va secure broadcast chaels. I Fat ad aor scheme, each user og the system eeds to obta multple prearraged keys durg regstrato ad the use these keys real-tme operato. here are several papers [2, 10, 19] related to Fat ad aor scheme to dscuss the umber of prvate keys, the sze of cphertext ad computatoal cost. I 2005, u et al. [11] frst proposed a I-based broadcast ecrypto based o Boeh ad Frakl scheme [4] usg matrx. I that scheme, recevers do ot eed to regster wth a ceter tally. However, 2007, Che [6] poted out that ther scheme s secure. I 2005, Wag ad Wu [24] proposed a I-based multcast scheme usg blear parg. here are a key geerato ceter to regster all recevers tally ad a group ceter to sed messages to recevers. Oly the group ceter ca be the seder. Later, Saka ad Furukawa proposed aother I-based broadcast ecrypto [22] that the seder ca be ay user. Most exstg mult-recever ecrypto schemes the lterature [2, 3, 4, 6, 10, 11, 13, 19, 24] caot provde the aoymty of recevers. Fa et al. [12] proposed a aoymous mult-recever I-based ecrypto scheme Wag et al. [25] poted out that ther scheme caot provde the aoymty of recevers ad s secure hey also proposed a modfed scheme. Ufortuately, Zhag et al. [27] poted out that Wag et al. s scheme caot provde the aoymty ad s secure. here are may papers o the parg-based mult-

2 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July recever ecrypto scheme [1, 5, 6, 11, 12, 24, 25, 27]; but oly a few papers are focused o the RSA-based multrecever ecryptos [14, 23]. RSA [21] s oe of the most commoly used publc-key ecryptos. However, there exsts a well-kow attack o the RSA-based broadcast ecrypto whe all recevers use the same publc key. he detal of ths attack ca be foud [16]. Whe each recever uses dfferet publc key, ths attack ca be avoded. he publc keys of recevers are all dstct our proposed scheme. I [14], Ghodos et al. proposed a dyamc threshold cryptosystems based o the RSA. I ther paper, a threshold RSA cryptosystem s the same as a mult-recever ecrypto scheme. I ther scheme, a seder ca arbtrarly select a set of legtmate recevers wthout eedg ay key dstrbuto. Each recever s decrypto key depeds o all publc keys of recevers. Ufortuately, whe the umber of recevers s large, Ghodos et al. s scheme becomes mpractcal. I addto, ther scheme caot provde the aoymty of recevers. I ths paper, we propose a RSA-based mult-recever ecrypto scheme based o the Chese Remader heorem (CR). I the decrypto, each recever ca use hs/her fxed prvet key whch does ot deped o other recevers to decrypt the cphertext. he rest of ths paper s orgazed as follows. I Secto 2, we revew CR, RSA ad Ghodos s threshold RSA scheme. I Secto 3, we propose a aoymous multrecever ecrypto scheme. he, Sectos 4 ad 5 are the dscusso ad aalyses. Cocluso s gve Secto 6. 2 Prelmares I ths secto, we brefly revew basc fudametals used our scheme cludg the CR [8], RSA ecrypto [21], ad Ghodos et al. s scheme [14] based o the RSA ecrypto. 2.1 Chese Remader heorem (CR) Assume that there are postve tegers whch are parwse coprmes, ad arbtrary tegers where he, there exsts a uque teger satsfyg followg system of smultaeous cogruece: X a mod ; 1 1 X a mod ; 2 2 (1) 2.2 RSA Ecrypto I 1978, Rvest, Shamr ad Adlema proposed a publckey cryptosystem [21]. Here, we oly revew the RSA ecrypto ad assume that Alce performs the followg steps to geerate her publc ad prvate keys. 1) Frst, Alce chooses two strog prmes, p ad q, such that p 2p 1 ad q 2q 1, where p ad q are two large prmes. he detal about strog prme ca be foud [24, 25]. he, she computes the product, p q. 2) Secod, she chooses the publc key e, such that e ad are relatvely prme, amely gcd( e, ) 1. 3) After choosg the publc key ad gettg the product, Alce ca compute ( ) ad prvate key d as ed 1(mod ), where ( ) ( p 1) ( q 1). I addto, the Euler s totet fucto ( ) meas the umber of postve tegers whch are less tha ad relatvely prme to. 4) Fally, Alce keeps the prvate key ( d, p, q ) secretly ad publshes the publc key ( e, ). We also assume that Bob wats to sed the message M to Alce secretly, where 0< M<. Bob must employ Alce s publc key e to compute the cphertext as C M e mod ad seds t to Alce. Oce Alce receves the cphertext C, she ca use her prvate key d to decrypt d the cphertext C as C mod M. 2.3 Ghodos et al. s Mult-recever Ecrypto Scheme I ths subsecto, we brefly revew Ghodos et al. s multrecever ecrypto scheme [14]. here s a group G cosstg of users ad oe trusted publc regstry. Each user U has hs/her RSA key par (.e., the publc key s ( e, ) ad the prvate key s d ). Furthermore, the trusted publc regstry stores ad maages all publc keys of users. her scheme cossts of two phases: 1) ecrypto phase ad 2) decrypto phase. A seder S ca ecrypt oe message M ad broadcast the cphertext to all recevers ecrypto phase. I decrypto phase, the recever U eeds to compute a decrypto key frst ad the uses the decrypto key to decrypt the cphertext to obta the message M. where X a mod, X ( ( ) y ) mod, 1 a 1 2, ( ) y 1(mod ), ( ) y 0(mod ) ad 0 X for. Ecrypto Phase Assume that the seder S wats to sed oe message M to the group G. S has to get all recevers publc-key dgtal certfcates ad valdate ther publc keys [26]. If the verfcato s passed, S computes the ecrypto key as E e ad the modulus as 1 2 of 1 the group. he, the seder S computes the cphertext:

3 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July E C M mod. he seder S broadcasts E, ad C to all recevers. C c mod ; 1 1 C c mod ; 2 2 (3) ecrypto Phase ad e of other recevers, for 1, 2,, ad. If ad E are vald, each recever U ca check to determe whether he/she s oe of the teded recevers. If he/she s, each recever U computes the decrypto key as E 1mod ( ). he, each recever U uses to decrypt the cphertext C as E C mod M mod M mod. 3 he Proposed Scheme I ths secto, we propose a mult-recever ecrypto scheme based o the RSA ad CR. Our scheme cossts of two phases: 1) ecrypto phase ad 2) decrypto phase. A seder uses all recevers publc keys to ecrypt the secret message ad the broadcasts the cphertext to the recevers the ecrypto phase. Whe a legtmate recever receves the cphertext, he/she ca decrypt the ecrypted message by usg a fxed decrypto key the decrypto phase. Ecrypto Phase Frst, we assume that there are recevers ad oe seder. Each recever U has oe RSA key par, ( d,( e, )), for 1,2,,. he publc key ad prvate key of each recever are geerated accordg to the procedures descrbed Secto 2.1. Whe a seder wats to sed the message M to recevers, he/she has to valdate publc-key dgtal certfcates of all recevers at the begg. he message M must be smaller tha, where s the mmal modulus the set of {,,, }. he the seder S computes 1 2 ad 1 2 c M mod ; e1 1 1 c M mod ; e2 2 2 e c M mod. Accordg to the CR, whe 1, 2,, are parwse coprmes ad 0 c1 1, 0 c2 2,, 0 c, there exsts a uque soluto C (3) satsfyg followg system of smultaeous cogruece: (2) C c mod. Whe each recever U receves the broadcasted he seder broadcasts C to all recevers. message, ( E,, C ), he/she eeds to valdate publc keys ecrypto Phase Oce recever U obtag the cphertext C, he/she ca perform the followg steps to retract the secret message M. 1) Frst, he/she uses the publc key to execute the modulo reducto, that s, C mod c. 2) After gettg c, recever U ca use the prvate key d to decrypt c as c d ( e ) d M mod M. Sce 0 M, each recever ca retreve the same message M. I decrypto phase, each recever uses hs/her fxed key par to retract the message M. 4 scusso I ths secto, we dscuss the smlartes ad dffereces betwee Ghodos et al. s scheme ad our scheme. here are two smlartes. Frst, both Ghodos et al. ad our scheme use RSA ecrypto to provde mult-recever ecrypto. Secod, the seder ca select ay set of legtmate recevers. O the other had, there are three dffereces betwee Ghodos et al. s scheme ad our scheme. he detals are gve below. 4.1 Computatoal Complexty I Ghodos et al. s scheme, each recever U obtas the cphertext ( CE,, ). U eeds to valdate publc keys e of other recevers, for, 1, 2,,, ad, ad verfyg 1 tmes. he tme complexty s O ( ), where s the total umber of recevers. Whe there are a large umber of recevers, ther scheme s mpractcal. I our scheme, each recever does ot eed to valdate publc keys of other recevers. Furthermore, the ext secto, we wll show that Ghodos et al. s scheme, the seder speds more computatoal tme to ecrypt the message tha the tme eeded our scheme. 4.2 Aoymty of Recevers.e., I Ghodos et al. s scheme, whe recever U gets the, he/she eeds to determe whether he/she s oe of legtmate recevers by computg. Sce ad are publc formato, ther scheme caot provde the aoymty of recevers. I our scheme, seder broadcasts

4 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July C oly. Hece, obody, except the seder, kows who legtmate recevers are. etal aalyss wll be cluded Secto ecrypto Key I Ghodos et al. s scheme, recever U eeds to compute a decrypto key as E 1(mod ). However, E s the product of publc keys of all recevers. Hece, each recever s decrypto key s dyamc for each sesso. But, our scheme, each recever U ca uses hs/her prvate key d to recover the orgal message M as d C mod M. So the decrypto key s fxed for all sessos. 5 Aalyss I ths secto, we dscuss the propertes of correctess, performace, securty ad aoymty. Correctess meas that each legtmate recever ca retreve the message ad the aoymty meas that the dettes of recevers ca be protected. We compare the computatoal cost ad the sze of cphertext amog our scheme ad other schemes. 5.1 Correctess Whe seder wats to sed the message the rage of message M s restrcted to be betwee zero ad whch s the mmal modulus the set of { for 1 }. Accordgly, each legtmate recever havg vald values, d ad, ca retreve the message. 5.2 Performace I ths subsecto, we compare the performace amog ucast RSA, Ghodos et al. scheme ad our scheme. I ucast RSA, the seder eeds to perform RSA ecrypto for tmes ad seds each cphertext to oe of recevers separately. We assume to use the 1024-bts RSA 1024 ecrypto,.e., modulus 2 for 1. Sce modulo expoetato takes more computatoal tme tha other operatos, we oly cosder the tme eeded for RSA ecrypto ad decrypto the followg dscusso. We let, E _1024 E_ 1024 ad deote the 1024-bt RSA ecrypto operato, the ( 1024) -bt RSA ecrypto operato ad the RSA decrypto operato, separately. able 1 shows the comparso results. he computatoal cost ad cphertext sze of ucast RSA s the same as our scheme; but t eeds tmes trasmsso. I addto, there has other traffc formato eeded ucast trasmsso. I the followg aalyss, we adopt results publshed [9] that clude complextes of stadard hardware mplemetato of modulo operatos. For ( 1024) -bt operato, the hardware complexty of able 1: Comparso results amog dfferet schemes Seder Recever Ucast RSA E _1024 Ghodos et al. scheme 1 4 E _1024 (.e., E_ 1024 ) Our scheme E _1024 Sze of cphertext btes btes btes Rouds of 1 1 trasmsso Aoymty of recevers o o Yes : the umber of recevers ca get 4. I summary, the 1 E _ 1024 E _1024 computatoal cost of the seder s 1 4 E _1024 Ghodos et al. s scheme ad s E _1024 our scheme. Furthermore, our scheme, the seder eeds oe CR computato. Although the seder does ot eed to compute CR Ghodos et al. scheme, the decrypto key of each recever s dyamc. O the recever sde, both Ghodos et al. scheme ad our scheme eed oe RSA decrypto. he dfferet s that ther scheme eeds to compute oe multplcatve verse; but ours eeds to compute oe modulo reducto. Obvously, the computatoal complexty of multplcatve verse s much larger tha the computatoal complexty of modulo reducto. herefore, our scheme s more computatoally effcet tha Ghodos et al. s scheme ad the cphertext sze of ours s Securty of the cphertext sze of ther scheme. Sce our scheme uses RSA ecrypto, the securty of our scheme s the same as RSA. amely, the securty of ours s based o the teger factorg problem. If a llegtmate recever wats to decrypt the ecrypted message, he/she eeds to break the RSA assumpto. 5.4 Aoymty 6 Coclusos 1 modular expoetato, s 4 tmes the hardware complexty of 1024-bt modular expoetato. Hece, we We assume that seder S wats to sed the cphertext C to t legtmate recevers a group G cosstg of users, where t. he attacker Eve has tercepted the cphertext C ad kows users publc keys, for 1. Eve Eve ca use C ad to compute e M mod, where s the publc key of oe of the legtmate recevers, Eve caot recover the message ad to detfy dettes of legtmate recevers. Hece, our scheme ca provde the aoymty of recevers. I ths paper, we propose a ovel mult-recever ecrypto scheme whch ca provde the aoymty of recevers. Our

5 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July scheme s a smple tegrato of both the RSA ad CR. he proposed scheme s more effcet tha exstg schemes terms of computatoal cost ad cphertext sze. Each recever oly eeds to keep oe prvate key ad uses ths prvate key to decrypt the cphertext. Refereces [1] J. Baek, R. Safav-a, ad W. Suslo, Effcet mult-recever detty-based ecrypto ad ts applcato to broadcast ecrypto, Proceedg of Publc Key Cryptography PKC 05, LCS 3386, pp , Sprger-Verlag, Les ablerets, Swtzerlad, Ja [2] M. Bellare, A. Boldyreva, ad S. Mcal, Publc-key ecrypto a mult-user settg: securty proofs ad mprovemets, Proceedg of Advaces Cryptology Eurocrypt 2000, LCS 1807, pp , Sprger-Verlag, Bruges, Belgum, May [3] S. Berkovts, How to broadcast a secret, Proceedg of Advaces Cryptology Eurocrypt 91, LCS 547, pp , Sprger-Verlag, Brghto, UK, Apr [4]. Boeh ad M. Frakl, Idetty-based ecrypto from the Wel parg, Proceedg of Advaces Cryptology Crypto 01, LCS 2139, pp , Sprger-Verlag, Calfora, USA, Aug [5] Z. H., Che, S.., L, C. Z., Wag ad Y. P. She, wo costructos of multrecever ecrypto supportg costat keys, short cphertexts, ad detty prvacy, Iteratoal Joural of etwork Securty, vol. 14, o. 5, pp , Sep [6] H. Y. Che, Commets o a effcet I-based broadcast ecrypto scheme, IEEE rasatos Broadcast, vol. 53, o. 4, pp , ec [7] G. H. Chou ad W.. Che, Secure broadcastg usg the secure lock IEEE rasatos o Software Egeerg, vol. 15, o. 8, pp , Aug [8] H. Cohe, A Course Computatoal Algebrac umber heory, Sprger, 4th ed., pp , ew York, [9] J. P., avd, K. Kalach, ad. ttley, Hardware complexty of modular multplcato ad expoetato, IEEE rasatos o Computers, vol. 56, o. 10, pp , Oct [10] Y. ods ad. Fazo, Publc key broadcast ecrypto for stateless recevers, Proceedg of gtal Rghts Maagemet 2002, LCS 2696, pp , Sprger-Verlag, Washgto, C, USA, [11] X. u, Y. Wag, J. Ge, ad Y. M. Wag, A Ibased broadcast ecrypto scheme for key dstrbuto, IEEE rasatos Broadcast, vol. 51, o. 2, pp , Jue [12] C. I. Fa, L. Huag, ad P. Ho, Aoymous multrecever detty-based ecrypto, IEEE rasatos o Computers, vol. 59, o. 9, pp , Sep [13] A. Fat ad M. aor, Broadcast ecrypto, Proceedg of Advaces Cryptology Crypto, LCS 839, pp , Sprger-Verlag, Calfora, USA, Aug [14] H. Ghodos, J. Peprzyk, ad R. Safav-a, yamc threshold cryptosystems: a ew scheme group oreted cryptography, Proceedg of Pragocrypt 96: the 1 st Iteratoal Coferce o thw heory ad Applcatos of Crytology, pp , Prague, Czech Republc, Sep [15] J. Gordo, Strog RSA key, IE Electrocs Letters, vol. 20, o. 12, pp , Jue [16] J. Hastad, Solvg smultaeous modular equatos of low degree, SIAM Joural o Computg, vol. 17, o. 2, pp , Apr [17] IEEE Stadard Specfcatos for Publc-Key Cryptography, IEEE Stadard , [18] IEEE raft Stadard for Idetty-Based Cryptographc echques usg Pargs, IEEE P1363/6, [19] K. Kurosawa, Mult-recpet publc-key ecrypto wth shorteed cphertext, Proceedg of Publc Key Cryptography, LCS 2274, Sprger-Verlag, pp , Pars, Frace, February [20] J. H. Moore, Protocol falures cryptosystems, Proceedgs of the IEEE, vol. 76, o. 5, pp , May [21] R. Rvest, A. Shamr, ad L. Adlema, A method for obtag dgtal sgatures ad publc-key cryptosystems, Commucatos of the ACM, vol. 21, o. 2, pp , Feb [22] R. Saka ad J. Furukawa, Idetty-based broadcast ecrypto, Cryptology eprt Archve, Report 2007/217, [23] E. Sgurd, A mult-recever publc key cryptosystem, Proceedgs of orwega Symposum Iformato Securty (ISK), pp , rodhem, orway, ov [24] L. Wag ad C. K. Wu, Effcet detty-based multcast scheme from blear parg, IEE Proceedgs Commucatos, vol. 152, o. 6, pp , ec [25] H. Wag, Y. Zhag, H. Xog, ad B. Q, Cryptaalyss ad mprovemets of a aoymous mult-recever detty-based ecrypto scheme, IE Iformato Securty, vol. 6, o. 1, pp , Mar [26] R. W. Youglove, Publc key frastructure. How t works, Computg & Cotrol Egeerg Joural, vol. 12, o. 2, pp , Apr [27] J. Zhag ad Y. Cu, Commet a aoymous multrecever detty-based ecrypto scheme, Proceedg of 4th Iteratoal coferece o Itellget etworkg ad Collaboratve Systems ( ICoS), pp , Bucharest, Romaa, Sep

6 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July Le Har receved hs BS degree Electrcal Egeerg from the atoal awa Uversty I 1980, he receved hs MS degree Electrcal Egeerg from the State Uversty of ew York-Stoy Brook ad 1984 he receved hs Ph.. degree Electrcal Egeerg from the Uversty of Mesota. Curretly, he s a Full Professor at the epartmet of Computer Scece Electrcal Egeerg, Uversty of Mssour- Kasas Cty, USA. Hs research terests are cryptography, etwork securty ad wreless commucato securty. He has publshed umber of papers o dgtal sgature desg ad applcatos, wreless ad etwork securty. Ch-Che Chag receved hs Ph. computer egeerg 1982 from the atoal Chao ug Uversty, awa. He was the head of, ad a professor, the Isttute of Computer Scece ad Iformato Egeerg at the atoal Chug Cheg Uversty, Chay, awa. From August 1992 to July 1995, he was the dea of the College of Egeerg at the same uversty. From August 1995 to October 1997, he was the provost at the atoal Chug Cheg Uversty. From September 1996 to October 1997, r. Chag was the Actg Presdet at the atoal Chug Cheg Uversty. From July 1998 to Jue 2000, he was the drector of Advsory Offce of the Mstry of Educato of the R.O.C. Sce February 2005, he has bee a Char Professor of Feg Cha Uversty. He s curretly a Fellow of IEEE ad a Fellow of IEE, UK. He also publshed several hudred papers Iformato Sceces. I addto, he has served as a cosultat to several research sttutes ad govermet departmets. Hs curret research terests clude database desg, computer cryptography, mage compresso ad data structures. Hsao-Lg Wu was bor Kaohsug, awa, She receved the BS degree Appled Mathematcs from Feg Cha Uversty, achug, awa She s curretly pursug her Ph.. degree formato egeerg ad computer scece from Feg Cha Uversty, achug, awa. Her curret research terests clude electroc commerce, formato securty, cryptography, ad moble commucatos.

Infinite Series Forms of Double Integrals

Infinite Series Forms of Double Integrals Iteratoal Joural of Data Evelopmet Aalyss ad *Operatos Research*, 4, Vol., No., 6- Avalable ole at http://pubs.scepub.com/jdeaor/// Scece ad Educato Publshg DOI:.69/jdeaor--- Ifte Seres Forms of Double

More information

An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure

An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure A ID-based Proxy Authetcato Protocol Supportg Publc Key Ifrastructure Shuh-Pyg Sheh, Shh-I Huag ad Fu-She Ho Departmet of Computer Scece ad Iformato Egeerg, ABSTRACT The advatage of the ID-based authetcato

More information

A New Mathematical Model for a Redundancy Allocation Problem with Mixing Components Redundant and Choice of Redundancy Strategies

A New Mathematical Model for a Redundancy Allocation Problem with Mixing Components Redundant and Choice of Redundancy Strategies Appled Mathematcal Sceces, Vol, 2007, o 45, 222-2230 A New Mathematcal Model for a Redudacy Allocato Problem wth Mxg Compoets Redudat ad Choce of Redudacy Strateges R Tavakkol-Moghaddam Departmet of Idustral

More information

Privacy Protection among Drivers in Vehicle-to- Vehicle Communication Networks

Privacy Protection among Drivers in Vehicle-to- Vehicle Communication Networks Prvacy Protecto amog Drvers Vehcle-to- Vehcle Commucato Networks Nader. Rabad, ember, IEEE ad Syed. ahmud, ember, IEEE Electrcal ad Computer Egeerg Departmet Waye State Uversty Detrot, chga 48202, USA

More information

On the Techniques for Constructing Even-order Magic Squares using Basic Latin Squares

On the Techniques for Constructing Even-order Magic Squares using Basic Latin Squares Iteratoal Joural of Scetfc ad Research Publcatos, Volume, Issue 9, September 0 ISSN 50-353 O the Techques for Costructg Eve-order Magc Squares usg Basc Lat Squares Tomba I. Departmet of Mathematcs, Mapur

More information

Module 6. Channel Coding. Version 2 ECE IIT, Kharagpur

Module 6. Channel Coding. Version 2 ECE IIT, Kharagpur Module 6 Chael Codg Lesso 36 Coded Modulato Schemes After readg ths lesso, you wll lear about Trells Code Modulato; Set parttog TCM; Decodg TCM; The modulated waveform a covetoal ucoded carrer modulato

More information

K-Map 1. In contrast, Karnaugh map (K-map) method provides a straightforward procedure for simplifying Boolean functions.

K-Map 1. In contrast, Karnaugh map (K-map) method provides a straightforward procedure for simplifying Boolean functions. K-Map Lesso Objectves: Eve though Boolea expressos ca be smplfed by algebrac mapulato, such a approach lacks clear regular rules for each succeedg step ad t s dffcult to determe whether the smplest expresso

More information

A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks

A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks (IJASA) Iteratoal Joural of Advaced omputer Scece ad Applcatos, Vol 7, o, 6 A Radom-Walk Based Prvacy-Preservg Access otrol for Ole Socal etworks You-sheg Zhou ollege of omputer Scece ad Techology, hogqg

More information

Lecture6: Lossless Compression Techniques. Conditional Human Codes

Lecture6: Lossless Compression Techniques. Conditional Human Codes ecture6: ossless Compresso Techques Codtoal uma Codes -Cosder statoary dscrete arov process, = { s, s, s } wth codtoal pmfs P P s s wth,, tates o Ps/so.9.5.5 Ps/s.5.8.5 Ps/s.5.5.6 -The margal probabltes

More information

An Improved DV-Hop Localization Algorithm Based on the Node Deployment in Wireless Sensor Networks

An Improved DV-Hop Localization Algorithm Based on the Node Deployment in Wireless Sensor Networks Iteratoal Joural of Smart Home Vol. 9, No. 0, (05), pp. 97-04 http://dx.do.org/0.457/jsh.05.9.0. A Improved DV-Hop Localzato Algorthm Based o the Node Deploymet Wreless Sesor Networks Jam Zhag, Ng Guo

More information

The optimization of emergency resource-mobilization based on harmony search algorithm

The optimization of emergency resource-mobilization based on harmony search algorithm Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(7):483-487 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 The optmzato of emergecy resource-moblzato based o harmoy search

More information

Long Number Bit-Serial Squarers

Long Number Bit-Serial Squarers Log Number Bt-Seral Squarers E. Chaotaks, P. Kalvas ad K. Z. Pekmestz are th the Natoal Techcal Uversty of Athes, 7 73 Zographou, Athes, Greece. E-mal: lchaot, paraskevas, pekmes@mcrolab.tua.gr Abstract

More information

Voltage Contingency Ranking for IEEE 39-Bus System using Newton- Raphson Method

Voltage Contingency Ranking for IEEE 39-Bus System using Newton- Raphson Method WSEAS TRANSACTIONS o OWER SSTEMS Haer m, Asma Meddeb, Souad Chebb oltage Cotgecy Rag for IEEE 39-Bus System usg Newto- Raphso Method HAER MII, ASMA MEDDEB ad SOUAD CHEBBI Natoal Hgh School of Egeers of

More information

Short Note: Merging Secondary Variables for Geophysical Data Integration

Short Note: Merging Secondary Variables for Geophysical Data Integration Short Note: Mergg Secodary Varables for Geophyscal Data Itegrato Steve Lyster ad Clayto V. Deutsch Departmet of Cvl & Evrometal Egeerg Uversty of Alberta Abstract Multple secodary data from geophyscal

More information

Evolutionary Algorithm With Experimental Design Technique

Evolutionary Algorithm With Experimental Design Technique Evolutoary Algorthm Wth Expermetal Desg Techque Qgfu Zhag Departmet of Computer Scece Uversty of Essex Wvehoe Park Colchester, CO4 3SQ Uted Kgdom Abstract: - Major steps evolutoary algorthms volve samplg

More information

DYNAMIC BROADCAST SCHEDULING IN ASYMMETRIC COMMUNICATION SYSTEMS: PUSH AND PULL DATA BASED ON SCHEDULING INDEX AND OPTIMAL CUT-OFF POINT YUFEI GUO

DYNAMIC BROADCAST SCHEDULING IN ASYMMETRIC COMMUNICATION SYSTEMS: PUSH AND PULL DATA BASED ON SCHEDULING INDEX AND OPTIMAL CUT-OFF POINT YUFEI GUO DYNAMIC BROADCAST SCHEDULING IN ASYMMETRIC COMMUNICATION SYSTEMS: PUSH AND PULL DATA BASED ON SCHEDULING INDEX AND OPTIMAL CUT-OFF POINT by YUFEI GUO Preseted to the Faculty of the Graduate School of The

More information

Assignment#4 Due: 5pm on the date stated in the course outline. Hand in to the assignment box on the 3 rd floor of CAB.

Assignment#4 Due: 5pm on the date stated in the course outline. Hand in to the assignment box on the 3 rd floor of CAB. MATH Assgmet#4 Due: 5pm o the date stated the course outle. Had to the assgmet box o the 3 rd floor of CAB.. Let deote the umber of teror regos of a covex polygo wth sdes, dvded by all ts dagoals, f o

More information

A New Aggregation Policy for RSS Services

A New Aggregation Policy for RSS Services A New Aggregato Polcy for RSS Servces Youg Geu Ha Sag Ho Lee Jae Hw Km Yaggo Km 2 School of Computg, Soogsl Uversty Seoul, Korea {youggeu,shlee99,oassdle}@gmal.com 2 Dept. of Computer ad Iformato Sceces,

More information

Efficient Utilization of FlexRay Network Using Parameter Optimization Method

Efficient Utilization of FlexRay Network Using Parameter Optimization Method Iteratoal Joural of Egeerg ad Techology, Vol. 8, No. 6, December 2016 Effcet Utlzato of FlexRay Network Usg Parameter Optmzato Method Y. X. Wag, Y. H. Xu, ad Y. N. Xu Abstract FlexRay s a hgh rate of bus

More information

A Novel Bandwidth Optimization Manager for Vehicle Controller Area Network, CAN, System

A Novel Bandwidth Optimization Manager for Vehicle Controller Area Network, CAN, System A Novel Badwdth Optmzato Maager for Vehcle Cotroller Area Network, CAN, System Y WANG, Z-y YOU, L-hu HUI Guzhou Normal Uversty, Guyag, Guzhou 550001, Cha Abstract Ths paper cosders the badwdth lmtato of

More information

Geometric Distribution as a Randomization Device: Implemented to the Kuk s Model

Geometric Distribution as a Randomization Device: Implemented to the Kuk s Model It. J. Cotem. Math. Sceces, Vol. 8, 03, o. 5, 43-48 HIKARI Ltd, www.m-hkar.com Geometrc Dstrbuto as a Radomzato Devce: Imlemeted to the Kuk s Model Sarjder Sgh Deartmet of Mathematcs Texas A&M Uversty-Kgsvlle

More information

Efficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems

Efficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Electrocs ad Commucato Egeerg Vol:3, No:4, 9 Effcet Large Numbers Karatsuba-Ofma Multpler Desgs for Embedded Systems M.Machhout, M.Zeghd,

More information

A Secure RSU-Aided Aggregation and Batch- Verification Scheme for Vehicular Networks

A Secure RSU-Aided Aggregation and Batch- Verification Scheme for Vehicular Networks Iteratoal Coferece o Soft Computg ad ts ApplcatosICSCA'202 August 25-26 202 Kuala Lumpur Malaysa A Secure RSU-Aded Aggregato ad Batch- Verfcato Scheme for Vehcular Networs Sagara Mohaty Debassh Jea ad

More information

Zigbee wireless sensor network localization evaluation scheme with weighted centroid method

Zigbee wireless sensor network localization evaluation scheme with weighted centroid method Zgbee wreless sesor etwork localzato evaluato scheme wth weghted cetrod method Loesy Thammavog 1, Khamphog Khogsomboo 1, Thaadol Tegthog 2 ad Sathapor Promwog 2,* 1 Departmet of Electrocs ad Telecommucato

More information

Multiset Permutations in Lexicographic Order

Multiset Permutations in Lexicographic Order Webste: www.jetae.com ISSN 2250-2459, ISO 9001:2008 Certfed Joural, Volume 4, Issue 1, Jauary 2014 Multset Permutatos Lexcographc Order Tg Kuo Departmet of Marketg Maagemet, Takmg Uversty of Scece ad Techology,

More information

ISSN (Print), ISSN (Online) Volume 5, Issue 1, January (2014), IAEME AND TECHNOLOGY (IJARET)

ISSN (Print), ISSN (Online) Volume 5, Issue 1, January (2014), IAEME AND TECHNOLOGY (IJARET) Iteratoal INTERNATIONAL Joural JOURNAL of Advaced OF Research ADANED Egeerg RESEARH ad Techology IN ENGINEERING (IJARET), ISSN 976 648(Prt), ISSN 976 6499(Ole) olume 5, Issue, Jauary (4), IAEME AND TEHNOLOGY

More information

Thermometer-to-binary Encoder with Bubble Error Correction (BEC) Circuit for Flash Analog-to-Digital Converter (FADC)

Thermometer-to-binary Encoder with Bubble Error Correction (BEC) Circuit for Flash Analog-to-Digital Converter (FADC) Thermometer-to-bary Ecoder wth Bubble Error Correcto (BEC) Crcut for Flash Aalog-to-Dgtal Coverter (FADC) Bu Va Heu, Seughyu Beak, Seughwa Cho +, Jogkook Seo ±, Takyeog Ted. Jeog,* Dept. of Electroc Egeerg,

More information

K-sorted Permutations with Weakly Restricted Displacements

K-sorted Permutations with Weakly Restricted Displacements K-sorted Permutatos wth Weakly Restrcted Dsplacemets Tg Kuo Departmet of Marketg Maagemet, Takmg Uversty of Scece ad Techology Tape 5, Tawa, ROC tkuo@takmg.edu.tw Receved February 0; Revsed 5 Aprl 0 ;

More information

Performance Comparison of Two Inner Coding Structures in Concatenated Codes for Frequency-Hopping Spread Spectrum Multiple-Access Communications

Performance Comparison of Two Inner Coding Structures in Concatenated Codes for Frequency-Hopping Spread Spectrum Multiple-Access Communications Iteratoal Joural o Recet ad Iovato Treds Computg ad Commucato IN: 31-8169 Volume: 3 Issue: 741-745 erformace Comparso of Two Ier Codg tructures Cocateated Codes for Frequecy-Hoppg pread pectrum Multple-Access

More information

SAIDI MINIMIZATION OF A REMOTE DISTRIBUTION FEEDER. Kai Zou, W. W. L. Keerthipala and S. Perera

SAIDI MINIMIZATION OF A REMOTE DISTRIBUTION FEEDER. Kai Zou, W. W. L. Keerthipala and S. Perera SAIDI INIIZATIN F A RETE DISTRIBUTIN FEEDER Ka Zou, W. W.. Keerthpala ad S. Perera Uversty of Wollogog School of Electrcal ad Computer Telecommucato Egeerg Wollogog, NSW 2522, Australa Abstract Dstrbuto

More information

A CONTROL CHART FOR HEAVY TAILED DISTRIBUTIONS. K. Thaga. Department of Statistics University of Botswana, Botswana

A CONTROL CHART FOR HEAVY TAILED DISTRIBUTIONS. K. Thaga. Department of Statistics University of Botswana, Botswana A CONTROL CHART FOR HEAVY TAILED DISTRIBUTIONS K. Thaga Departmet of Statstcs Uversty of Botswaa, Botswaa thagak@mopp.ub.bw ABSTRACT Stadard cotrol charts wth cotrol lmts determed by the mea ad stadard

More information

Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Deterministic Random Number Generator Algorithm for Cryptosystem Keys Iteratoal Joural of Computer ad Iformato Egeerg Determstc Radom Number Geerator Algorthm for Cryptosystem Keys Ad A. Maata, Hamza A. A. Al_Sewad Abstract Oe of the crucal parameters of dgtal cryptographc

More information

A Spectrally Efficient Frequency Division Multiplexing Based Communications System M. R. D. Rodrigues and I. Darwazeh

A Spectrally Efficient Frequency Division Multiplexing Based Communications System M. R. D. Rodrigues and I. Darwazeh IOWo'03, 8th Iteratoal OFDM-Workshop, Proceedgs, Hamburg, DE, Sep 24-25, 2003 (Prepublcato draft) A Spectrally Effcet Frequecy Dvso Multplexg Based Commucatos System M. R. D. Rodrgues ad I. Darwazeh Laboratory

More information

Frequency Assignment for IEEE Wireless Networks

Frequency Assignment for IEEE Wireless Networks Frequecy Assgmet for IEEE 8 Wreless Networks K K Leug Bell Labs, Lucet Techologes Murray Hll, NJ 7974 k@bell-labscom Byoug-Jo J Km AT&T Labs Research Mddletow, NJ 7748 macsbug@researchattcom Abstract The

More information

Simulation of rainfall-runoff process by artificial neural networks and HEC-HMS model (case study Zard river basin)

Simulation of rainfall-runoff process by artificial neural networks and HEC-HMS model (case study Zard river basin) Proceedgs of The Fourth Iteratoal Ira & Russa Coferece 43 Smulato of rafall-ruoff process by artfcal eural etworks ad HEC-HMS model (case study Zard rver bas Mehrdad Akbarpour MSc. Graguate, Water Structures

More information

SVD-based Collaborative Filtering with Privacy

SVD-based Collaborative Filtering with Privacy SVD-based Collaboratve Flterg wth Prvacy Husey Polat Departmet of Electrcal Egeerg ad Computer Scece Syracuse Uversty, 121 L Hall Syracuse, NY 13244-1240, USA Phoe: +1 315 443 4124 hpolat@ecs.syr.edu Welag

More information

Distributed Online Matching Algorithm For Multi-Path Planning of Mobile Robots

Distributed Online Matching Algorithm For Multi-Path Planning of Mobile Robots Proect Paper for 6.854 embers: Seugkook Yu (yusk@mt.edu) Sooho Park (dreameo@mt.edu) Dstrbuted Ole atchg Algorthm For ult-path Plag of oble Robots 1. Itroducto Curretly, we are workg o moble robots whch

More information

SIMPLE RANDOM SAMPLING

SIMPLE RANDOM SAMPLING UIT IMPL RADOM AMPLIG mple Radom amplg tructure. Itroducto Obectves. Methods of electo of a ample Lottery Method Radom umber Method Computer Radom umber Geerato Method.3 Propertes of mple Radom amplg Merts

More information

An Enhanced Posterior Probability Anti-Collision Algorithm Based on Dynamic Frame Slotted ALOHA for EPCglobal Class1 Gen2

An Enhanced Posterior Probability Anti-Collision Algorithm Based on Dynamic Frame Slotted ALOHA for EPCglobal Class1 Gen2 Joural of Commucatos Vol. 9,. 0, October 204 A Ehaced Posteror Probablty At-Collso Algorthm Based o Dyamc Frame Slotted ALOHA for EPCglobal Class Ge2 Lta Dua,Wewe Pag 2, ad Fu Dua 2 College of Iformato

More information

Switching Angle Design for Pulse Width Modulation AC Voltage Controller Using Genetic Algorithm and Distributed Artificial Neural Network

Switching Angle Design for Pulse Width Modulation AC Voltage Controller Using Genetic Algorithm and Distributed Artificial Neural Network Swtchg Agle Desg for Pulse Wdth Modulato AC Voltage Cotroller Usg Geetc Algorthm ad Dstrbuted Artfcal Neural Network Pattarapor Jtta, Somyot Katwadvla ad Atthapol Ngaoptakkul Abstract. Ths paper proposes

More information

Information Theory and Coding

Information Theory and Coding Iformato heory ad Codg Itroducto What s t all aout? Refereces: C..hao, A Mathematcal heory of Commucato, he Bell ystem echcal Joural, Vol. 7, pp. 379 43, 63 656, July, Octoer, 948. C..hao Commucato the

More information

The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic

The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic Sesors 205, 5, 954-9559; do:0.3390/s508954 Artcle OPEN ACCESS sesors ISSN 424-8220 www.mdp.com/joural/sesors The Balaced Cross-Layer Desg Routg Algorthm Wreless Sesor Networks Usg Fuzzy Logc Ng L *, José-Ferá

More information

A Two Objective Model for Location-Allocation in a Supply Chain

A Two Objective Model for Location-Allocation in a Supply Chain AmrHosse Nobl, Abolfazl Kazem,Alreza Alejad/ TJMCS Vol. 4 No. 3 (22) 392 4 The Joural of Mathematcs ad Computer Scece Avalable ole at http://www.tjmcs.com The Joural of Mathematcs ad Computer Scece Vol.

More information

OPTIMAL BUS DISPATCHING POLICY UNDER VARIABLE DEMAND OVER TIME AND ROUTE LENGTH

OPTIMAL BUS DISPATCHING POLICY UNDER VARIABLE DEMAND OVER TIME AND ROUTE LENGTH OPTIMAL BUS DISPATCHING POLICY UNDER VARIABLE DEMAND OVER TIME AND ROUTE LENGTH Amal S. Kumarage, Professor of Cvl Egeerg, Uversty of Moratuwa, Sr Laka H.A.C. Perera, Cetral Egeerg Cosultacy Bureau, Sr

More information

CHAPTER-4 WIDE BAND PASS FILTER DESIGN 4.1 INTRODUCTION

CHAPTER-4 WIDE BAND PASS FILTER DESIGN 4.1 INTRODUCTION CHAPTER-4 WIDE BAND PASS FILTER DESIGN 4. INTRODUCTION The bad pass flters suested last chapter are hav the FBW less tha the 2%. I cotrast of that ths chapter deals wth the des of wde bad pass flter whch

More information

Optimal Packetization Interval for VoIP Applications Over IEEE Networks

Optimal Packetization Interval for VoIP Applications Over IEEE Networks 145 Afrca Joural of Iformato ad Commucato Techology, Vol. 2, No. 4, December 2006 Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Departmet of Electrcal & Computer Egeerg

More information

Enhancing Topology Control Algorithms in Wireless Sensor Network using Non-Isotropic Radio Models

Enhancing Topology Control Algorithms in Wireless Sensor Network using Non-Isotropic Radio Models IJCSNS Iteratoal Joural of Computer Scece ad Network Securty, VOL.6 No.8B, August 6 5 Ehacg Topology Cotrol Algorthms Wreless Sesor Network usg No-Isotropc Rado Models Ma.Vctora Que ad Wo-Joo Hwag Departmet

More information

Sixth Edition. Chapter 7 Point Estimation of Parameters and Sampling Distributions Mean Squared Error of an 7-2 Sampling Distributions and

Sixth Edition. Chapter 7 Point Estimation of Parameters and Sampling Distributions Mean Squared Error of an 7-2 Sampling Distributions and 3//06 Appled Statstcs ad Probablty for Egeers Sth Edto Douglas C. Motgomery George C. Ruger Chapter 7 Pot Estmato of Parameters ad Samplg Dstrbutos Copyrght 04 Joh Wley & Sos, Ic. All rghts reserved. 7

More information

Block-based Feature-level Multi-focus Image Fusion

Block-based Feature-level Multi-focus Image Fusion Block-based Feature-level Mult-focus Image Fuso Abdul Bast Sddqu, M. Arfa Jaffar Natoal Uversty of Computer ad Emergg Sceces Islamabad, Paksta {bast.sddqu,arfa.affar}@u.edu.pk Ayyaz Hussa, Awar M. Mrza

More information

Color Image Enhancement using Modify Retinex and Histogram Equalization Algorithms Depending on a Bright Channel Prior

Color Image Enhancement using Modify Retinex and Histogram Equalization Algorithms Depending on a Bright Channel Prior Iteratoal Joural of Applcato or Iovato Egeerg & Maagemet (IJAIEM) Web Ste: www.jaem.org Emal: edtor@jaem.org Color Image Ehacemet usg Modfy Retex ad Hstogram Equalzato Algorthms Depedg o a Brght Chael

More information

OPTIMAL DG PLACEMENT FOR MAXIMUM LOSS REDUCTION IN RADIAL DISTRIBUTION SYSTEM USING ABC ALGORITHM

OPTIMAL DG PLACEMENT FOR MAXIMUM LOSS REDUCTION IN RADIAL DISTRIBUTION SYSTEM USING ABC ALGORITHM teratoal Joural of Revews Computg 009-00 JRC & LLS. All rghts reserved. JRC SSN: 076-338 www.jrc.org E-SSN: 076-3336 OPTMAL PLACEMENT FOR MAXMUM LOSS REDUCTON N RADAL DSTRBUTON SYSTEM USNG ABC ALGORTHM

More information

A Novel Phase Detection System for Linear All- Digital Phase Locked Loop

A Novel Phase Detection System for Linear All- Digital Phase Locked Loop A Novel Phase Detecto System for Lear All- Dgtal Phase Locked Loop Abhshek Das, Suraj Dash, B.Chtt Babu, Member, IEEE, ad Ajt Kumar Sahoo, Member, IEEE. Abstract-- I ths paper, a ovel fast phase detecto

More information

Comparison of Measurement and Prediction of ITU-R Recommendation P.1546

Comparison of Measurement and Prediction of ITU-R Recommendation P.1546 Comparso of Measuremet ad Predcto of ITU-R Recommedato P.546 Chag-Hoo Lee *, Nam-Ryul Jeo *, Seog-Cheol Km *, Jug-m Lm * Isttute of New Meda ad Commucatos, Seoul Natoal Uversty, Cosoldated Mateace Depot,

More information

Chaotic Maps: A Tool to Enhance the Performance of OFDM Systems

Chaotic Maps: A Tool to Enhance the Performance of OFDM Systems Chaotc Maps: A Tool to Ehace the Performace of OFDM Systems E. M. El-Bakary, O. Zahra, S. A. El-Doll, ad F. E. Abd El-Same Departmet of Electrocs ad Electrcal Commucatos Egeerg, Faculty of Electroc Egeerg,

More information

Research on System-level Calibration of Automated Test Equipment based. Least Square Method

Research on System-level Calibration of Automated Test Equipment based. Least Square Method Research o System-level Calbrato of Automated Test Equpmet based Least Square Method Wag Yog*,,, Zhag Juwe,, Qu Laku,, Zhag Lwe, ad Su Shbao 3 College of Electrcal Egeerg, Hea Uversty of Scece ad Techology,

More information

DISTRIBUTION VOLTAGE MONITORING AND CONTROL UTILIZING SMART METERS

DISTRIBUTION VOLTAGE MONITORING AND CONTROL UTILIZING SMART METERS 4 th Iteratoal Coferece o Electrcty Dstrbuto Glasgow, -5 Jue 07 DISTRIBUTION VOLTAGE MONITORING AND CONTROL UTILIZING SMART METERS Yoshhto. KINOSHITA Kazuor. IWABUCHI Yasuyuk. MIYAZAKI Toshba Japa Toshba

More information

QUANTUM QUERY COMPLEXITY TO DETERMINE CENTER OF A GRAPH

QUANTUM QUERY COMPLEXITY TO DETERMINE CENTER OF A GRAPH www.jrcar.com Vol. Issue 8, Pg.: 1-7 August 014 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 30-7345 QUANTUM QUERY COMPLEXITY TO DETERMINE CENTER OF A GRAPH Majula Gadh

More information

THE FOURIER SERIES USED IN ANALYSE OF THE CAM MECHANISMS FOR THE SHOEMAKING MACHINES (PART I)

THE FOURIER SERIES USED IN ANALYSE OF THE CAM MECHANISMS FOR THE SHOEMAKING MACHINES (PART I) ANNALS OF HE UNIVERSIY OF ORADEA FASCICLE OF EXILES, LEAHERWORK HE FOURIER SERIES USED IN ANALYSE OF HE CAM MECHANISMS FOR HE SHOEMAKING MACHINES (PAR I) IOVAN-DRAGOMIR Ala, DRIȘCU Maraa, Gheorghe Asach

More information

Development and Studies of Instant Messaging System Based on Android Platform

Development and Studies of Instant Messaging System Based on Android Platform Revsta de la Facultad de Igeería U.C.V., Vol. 3, N 4, pp. 48-54, 07 Abstract Developmet ad Studes of Istat Messagg System Based o Adrod Platform Zhpg Zhou, Hogya Zhag Software Departmet, Hebe Software

More information

BER ANALYSIS OF V-BLAST MIMO SYSTEMS UNDER VARIOUS CHANNEL MODULATION TECHNIQUES IN MOBILE RADIO CHANNELS

BER ANALYSIS OF V-BLAST MIMO SYSTEMS UNDER VARIOUS CHANNEL MODULATION TECHNIQUES IN MOBILE RADIO CHANNELS 202 Iteratoal Coferece o Computer Techology ad Scece (ICCTS 202) IPCSIT vol. 47 (202) (202) IACSIT Press, Sgapore DOI: 0.7763/IPCSIT.202.V47.24 BER ANALYSIS OF V-BLAST MIMO SYSTEMS UNDER VARIOUS CANNEL

More information

UCAIPM: Ubiquitous Computing Agile Information Protection Mechanism

UCAIPM: Ubiquitous Computing Agile Information Protection Mechanism CAIPM: bqutous Computg Agle Iformato Protecto Mechasm Daoqg Su, ad Qyg Cao Abstract I order to mprove the securty of ubqutous computg system, CAIPM, a ew ovel ubqutous computg agle formato protecto mechasm

More information

ZigBee-based positioning system for coal miners

ZigBee-based positioning system for coal miners Avalable ole at www.scecedrect.com Proceda Egeerg 26 (2011 ) 2406 2414 Frst Iteratoal Symposum o Me Safety Scece ad Egeerg ZgBee-based postog system for coal mers WANG Logkag a, NIE Basheg a, ZHANG Rumg

More information

Time-Frequency Entropy Analysis of Arc Signal in Non-Stationary Submerged Arc Welding

Time-Frequency Entropy Analysis of Arc Signal in Non-Stationary Submerged Arc Welding Egeerg, 211, 3, 15-19 do:1.4236/eg.211.3213 Publshed Ole February 211 (http://www.scrp.org/joural/eg) Tme-Frequecy Etropy Aalyss of Arc Sgal o-statoary Submerged Arc Weldg Abstract Kuafag He 1, Swe Xao

More information

Low Complexity LMMSE Channel Estimation on GPP

Low Complexity LMMSE Channel Estimation on GPP 0 7th Iteratoal ICT Coferece o Commucatos ad etworkg Cha (CIACOM) Low Complexty LMME Chael Estmato o GPP We h, Tao Peg, Rogrog Qa Key Lab. Of Uversal Wreless Commucato, Mstry of Educato, BUPT Bejg 00876,

More information

Speculative Completion for the Design of High-Performance Asynchronous Dynamic Adders

Speculative Completion for the Design of High-Performance Asynchronous Dynamic Adders I: 1997 IEEE Iteratoal Symposum o Advaced Research Asychroous Crcuts ad Systems ( Asyc97 Symposum), Edhove, The Netherlads Speculatve Completo for the Desg of Hgh-Performace Asychroous Dyamc Adders Steve

More information

A Two Stage Methodology for Siting and Sizing of DG for Minimum Loss in Radial Distribution System using RCGA

A Two Stage Methodology for Siting and Sizing of DG for Minimum Loss in Radial Distribution System using RCGA teratoal Joural of Computer Applcatos (0975 8887) Volume 5 No., July 0 A Two Stage Methodology for Stg ad Szg of for Mmum Loss adal Dstrbuto System usg CGA Dr.M.adma ltha EEE Member rofessor & HOD Dept.

More information

Descriptive Statistics

Descriptive Statistics Math 3 Lecture I Descrptve tatstcs Descrptve statstcs are graphcal or umercal methods utlsed to summarze data such a way that mportat features of the sample ca be depcted. tatstcs: tatstcs s cocered wth

More information

On LDPC Code Based Massive Random-Access Scheme for the Gaussian Multiple Access Channel

On LDPC Code Based Massive Random-Access Scheme for the Gaussian Multiple Access Channel O LDPC Code Based Massve Radom-Access Scheme for the Gaussa Multple Access Chael Luza Medova, Ato Glebov, Pavel Ryb, ad Alexey Frolov Ist. for Iformato Trasmsso Problems, Moscow, Russa, pryb@tp.ru Moscow

More information

Economic Load Dispatch Based on a Hybrid Particle Swarm Optimization

Economic Load Dispatch Based on a Hybrid Particle Swarm Optimization Ecoomc Load Dspatch Based o a Hybrd artcle Swarm Optmzato Jog-Bae ar, K-Sog Lee, Joog-R Sh, Gyu-Ha Choe, Kwag Y. Lee Abstract Ths paper presets a ew approach to ecoomc load dspatch (ELD) problems usg a

More information

Energy-aware Routing Algorithm Based on Combinatorial Optimization Theory

Energy-aware Routing Algorithm Based on Combinatorial Optimization Theory Eergy-aware Routg Algorthm Based o Combatoral Optmzato Theory L Qao 1, Hu-l Jag 1, Y-de Fu 2 1 School of Computer ad Iformato Techology Shagqu Normal College Shagqu, 476000, Cha 2 School of Computer Scece

More information

Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming

Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming (IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, ol. 9, No. 2, 218 Proposed a Adaptve Btrate Algorthm based o Measurg Badwdth ad deo Buffer Occupacy for Provdg Smoothly deo Streamg Saba

More information

A HIGH ACCURACY HIGH THROUGHPUT JITTER TEST SOLUTION ON ATE FOR 3GBPS AND 6GBPS SERIAL-ATA

A HIGH ACCURACY HIGH THROUGHPUT JITTER TEST SOLUTION ON ATE FOR 3GBPS AND 6GBPS SERIAL-ATA A HIGH ACCURACY HIGH THROUGHPUT JITTER TEST SOLUTION ON ATE FOR 3GBPS AND 6GBPS SERIAL-ATA Yogqua Fa, Y Ca ad Zeljko Zlc LSI Corporato 0 Amerca Parkway NE, Alletow, Pesylvaa 809 Emal: y.ca@ls.com Departmet

More information

An innovative transmission mechanism applicable to variable speed wind turbines

An innovative transmission mechanism applicable to variable speed wind turbines Europea ssocato for the Developmet of Reewable Eerges, Evromet ad Power Qualty (E4EPQ) Iteratoal Coferece o Reewable Eerges ad Power Qualty (ICREPQ 1) Graada (S), 23th to 25th March, 21 ovatve trasmsso

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

5. Random Processes. 5-3 Deterministic and Nondeterministic Random Processes

5. Random Processes. 5-3 Deterministic and Nondeterministic Random Processes 5. Radom Processes 5- Itroducto 5- Cotuous ad Dscrete Radom Processes 5-3 Determstc ad Nodetermstc Radom Processes 5-4 Statoary ad Nostatoary Radom Processes 5-5 rgodc ad Noergodc Radom Processes 5-6 Measuremet

More information

Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks

Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 2008 51 Vehcle Idetfcato usg Dscrete Spectrums Wreless Sesor Networs Seug S. Yag Vrga State Uersty/Departmet of Computer Iformato Systems, Petersburg, U.S.A. Emal:

More information

A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands

A Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands IJCSI Iteratoal Joural of Computer Scece Issues, Vol. 9, Issue 5, No, September 0 ISSN (Ole): 694-084 www.ijcsi.org 0 A No-Bld Watermarkg Scheme for Gray Scale Images Dscrete Wavelet Trasform Doma usg

More information

Forecasting the Exchange Rate of US Dollar-China Renminbi Using Hybrid Techniques of Statistical and Soft Computing Approaches

Forecasting the Exchange Rate of US Dollar-China Renminbi Using Hybrid Techniques of Statistical and Soft Computing Approaches Joural of Idustral ad Itellget Iformato Vol. 4, o. 4, July 206 Forecastg the Exchage Rate of US Dollar-Cha Remb Usg Hybrd Techques of Statstcal ad Soft Computg Approaches Yuehje E. Shao, Che-Ch L, ad Po-Yu

More information

Robust Location Tag Generation from Noisy Location Data for Security Applications

Robust Location Tag Generation from Noisy Location Data for Security Applications Robust Locato Tag Geerato from Nosy Locato Data for Securty Applcatos D Qu, Da Boeh, Sherma Lo, Per Ege, Staford Uversty BIOGRAPHY D Qu s a Ph.D. caddate Aeroautcs ad Astroautcs workg the Global Postog

More information

Provded by the author(s) ad Uversty College Dubl Lbrary accordace wth publsher polces. Please cte the publshed verso whe avalable. Ttle Gaussa Pulse-Based Two-Threshold Parallel Scalg Toe Reservato for

More information

Weighted Centroid Correction Localization in Cellular Systems

Weighted Centroid Correction Localization in Cellular Systems Amerca J. of Egeerg ad Appled Sceces 4 (): 37-4, 20 ISSN 94-7020 200 Scece Publcatos Weghted Cetrod Correcto Localzato Cellular Systems Rog-Zheg L, X-Log Luo ad Ja-Ru L Key Laboratory of Uversal Wreless

More information

Anomaly Detection Based on a Multi-class CUSUM Algorithm for WSN

Anomaly Detection Based on a Multi-class CUSUM Algorithm for WSN 6 JOURNAL OF COMPUTERS, VOL., NO. 2, FEBRUARY Aomaly Detecto Based o a Mult-class Algorthm for WSN Xao heghog School of Iformato Scece ad Egeerg, Cetral South Uersty, Chagsha (483), Cha School of Computer

More information

A Signal Driven Adaptive Resolution Short-Time Fourier Transform

A Signal Driven Adaptive Resolution Short-Time Fourier Transform Iteratoal Joural of Iformato ad Commucato Egeerg 5:3 009 A Sgal Drve Adaptve Resoluto Short-Tme Fourer Trasform Saeed Ma Qasar, Lauret Fesquet ad Marc Reaud Abstract The frequecy cotets of the o-statoary

More information

Study of algorithms to optimize frequency assignment for autonomous IEEE access points

Study of algorithms to optimize frequency assignment for autonomous IEEE access points IJCSI Iteratoal Joural of Computer Scece Issues, Vol. 7, Issue 5, September 1 ISSN (Ole): 1694-814 64 Study of algorthms to optmze frequecy assgmet for autoomous IEEE 8.11 access pots Mchael Fsterbusch

More information

Face Recognition Algorithm Using Muti-direction Markov Stationary Features and Adjacent Pixel Intensity Difference Quantization Histogram

Face Recognition Algorithm Using Muti-direction Markov Stationary Features and Adjacent Pixel Intensity Difference Quantization Histogram ICSNC 2012 : The Seveth Iteratoal Coferece o Systems ad Networks Commucatos Face Recogto Algorthm Usg Mut-drecto Markov Statoary Features ad Adjacet xel Itesty Dfferece Quatzato Hstogram Fefe Lee, Koj

More information

Fairness of High-Speed TCP Protocols with Different Flow Capacities

Fairness of High-Speed TCP Protocols with Different Flow Capacities JOURNAL OF NETWORKS, VOL. 4, NO. 3, MAY 9 63 Faress of Hgh-Speed TP Protocols wth Dfferet Flow apactes Rachd Mbarek, Mohamed Tahar Be Othma*, Salem Nasr *Seor Member, IEEE ollege of omputer, Qassm Uversty,

More information

2008 Machine Intelligence Research Laboratories (MIR Labs)

2008 Machine Intelligence Research Laboratories (MIR Labs) X. Wag, X. Z. Gao, ad S. J. Ovaska. 8. A ovel partcle swarm based method for olear fucto optmzato. Iteratoal Joural of Computatoal Itellgece Research, volume 4, umber 3, pages 8 89. 8 Mache Itellgece Research

More information

Dual-Module Data Fusion of Infrared and Radar for Track before Detect

Dual-Module Data Fusion of Infrared and Radar for Track before Detect JOURAL OF COMPUTERS, VOL. 7, O. 2, DECEMBER 22 286 Dual-Module Data Fuso of Ifrared ad Radar for Trac before Detect Afu ZHU orth Cha Uversty of Water Resources ad Electrc Power Uversty,Zhegzhou, P.R.Cha

More information

Automatic Construction of Semantic Dictionary for Question Categorization

Automatic Construction of Semantic Dictionary for Question Categorization Automatc Costructo of Sematc Dctoary for Questo Categorzato Tayog HAO Departmet of Computer Scece, Cty Uversty of Hog Kog Hog Kog, Cha Xglag NI Departmet of Computer Scece ad Techology, Uversty of Scece

More information

Project Scheduling with Two Constrained Resources

Project Scheduling with Two Constrained Resources Proect Schedulg wth Two Costraed Resources Rog-Hwa Huag, Hsag-L Hsao, Szu-ha Hu, Shh-Tg Syu, ug-a Ho, Rou-We Hsu, Yu-Y Lu Departmet of Busess Admstrato Fu e Catholc Uversty No.50, Chug-Cheg Rd., Hschuag

More information

An ANOVA-Based GPS Multipath Detection Algorithm Using Multi-Channel Software Receivers

An ANOVA-Based GPS Multipath Detection Algorithm Using Multi-Channel Software Receivers A ANOVA-Based GPS Multpath Detecto Algorthm Usg Mult-Chael Software Recevers M.T. Breema, Y.T. Morto, ad Q. Zhou Dept. of Electrcal ad Computer Egeerg Mam Uversty Oxford, OH 4556 Abstract: We preset a

More information

Installation and Dispatch of the Traffic Patrol Service Platform

Installation and Dispatch of the Traffic Patrol Service Platform Iteratoal Joural of Statstcs ad Probablty; Vol. 6, No. 1; Jauary 2017 ISSN 1927-7032 E-ISSN 1927-7040 Publshed by Caada Ceter of Scece ad Educato Istallato ad Dspatch of the Traffc Patrol Servce Platform

More information

Fault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks

Fault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks 1 Fault-Tolerat Small Cells Locatos Plag G/G Heterogeeous Wreless Networks Tamer Omar 1, Zakha Abchar, Ahmed E. Kamal 3, J. Morrs Chag ad Mohammad Aluem 1 Departmet of Techology Systems, East Carola Uversty,

More information

Characterization and Construction of Permutation Graphs

Characterization and Construction of Permutation Graphs Ope Joural of Dscrete Mathematcs, 03, 3, 33-38 http://dxdoorg/036/odm033007 Publshed Ole Jauary 03 (http://wwwscrporg/oural/odm) Characterzato ad Costructo of Permutato Graphs Seero V Geraco, Teofa A Rapaut,

More information

An Evolutionary Stochastic Approach for Efficient Image Retrieval using Modified Particle Swarm Optimization

An Evolutionary Stochastic Approach for Efficient Image Retrieval using Modified Particle Swarm Optimization (IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, A Evolutoary Stochastc Approach for Effcet Image Retreval usg Modfed Partcle Swarm Optmzato Hads Hedar Departmet of Computer Egeerg Raz

More information

Exam. Real-time systems, basic course, CDT315. Grading: Swedish grades: ECTS grades:

Exam. Real-time systems, basic course, CDT315. Grading: Swedish grades: ECTS grades: 6 Exam eal-tme systems, basc course, 35 eacher: amr Isovc Phoe: 0 3 73 Exam durato: 08:30 3:30 Help alloed: Pots: calculator ad a laguage dctoary 48 p Gradg: Sedsh grades: ES grades: Importat formato:

More information

CS519K: M ULTIMEDIA SYSTEMS STUDENT PROJECTS DATE ANNOUNCED: OCTOBER 25, 2002 DUE DATE:

CS519K: M ULTIMEDIA SYSTEMS STUDENT PROJECTS DATE ANNOUNCED: OCTOBER 25, 2002 DUE DATE: CS519K: M ULTIMEDIA SYSTEMS STUDENT PROJECTS DATE ANNOUNCED: OCTOBER 25, 2002 DUE DATE: DECEMBER 5, 2002, 11:59PM Basc gropg: Groups of 2 studets each; (or dvdual 1-member groups) There are 6 projects.

More information

Fault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks

Fault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks Ths artcle has bee accepted for publcato a future ssue of ths joural, but has ot bee fully edted. Cotet may chage pror to fal publcato. Ctato formato: DOI 10.1109/TVT.016.613, IEEE Trasactos o Vehcular

More information

LECTURE 4 QUANTITATIVE MODELS FOR FACILITY LOCATION: SERVICE FACILITY ON A LINE OR ON A PLANE

LECTURE 4 QUANTITATIVE MODELS FOR FACILITY LOCATION: SERVICE FACILITY ON A LINE OR ON A PLANE LECTUE 4 QUANTITATIVE MODELS FO FACILITY LOCATION: SEVICE FACILITY ON A LINE O ON A PLANE Learg objectve 1. To demostrate the quattatve approach to locate faclt o a le ad o a plae 6.10 Locatg Faclt o a

More information

Robot Path Planning Based on Random Coding Particle Swarm Optimization

Robot Path Planning Based on Random Coding Particle Swarm Optimization (IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, Vol. 6, No. 4, 5 Robot Path Pla Based o Radom Cod Partcle Swarm Optmzato Ku Su Collee of Electroc ad Electrcal Eeer Shaha Uversty of Eeer

More information