An Anonymous Multi-Receiver Encryption Based on RSA
|
|
- Jasmine Carter
- 5 years ago
- Views:
Transcription
1 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July A Aoymous Mult-Recever Ecrypto Based o RSA Le Har 1, Ch-Che Chag 2,3, ad Hsao-Lg Wu 2 (Correspodg author: Ch-Che Chag) epartmet of Computer Scece Electrcal Egeerg & Uversty of Mssour- Kasas Cty 1 o Rockhll Rd.,Kasas Cty, MO 64110, USA epartmet of Iformato Egeerg ad Computer Scece & Feg Cha Uversty 2 o. 100, Wehwa Rd., Seatwe, achug, 40724, awa epartmet of Computer Scece ad Iformato Egeerg & Asa Uversty 3 o. 500, Loufeg Rd., Wufeg, achug, 41354, awa (Emal: ala3c@gmal.com) (Receved Mar. 22, 2013; revsed ad accepted May 26, 2013) Abstract Wth the rapd developmet of formato ad etwork techologes, commucato securty has become a mportat ssue may applcatos. here are may publc-key based ecrypto schemes proposed the lterature. etwork applcatos are o loger ust oe-tooe type of commucato; but t volves multple recevers (>1) (e.g., multcast trasmsso). Oe-to-oe type ecrypto s o loger satsfyg ths type of applcatos. Ghodos et al. proposed a threshold RSA cryptosystem her scheme s also called a multrecever ecrypto. I Ghodos et al. s scheme, each recever s decrypto key depeds o all publc keys of recevers. Whe the umber of recevers s large, Ghodos et al. s scheme becomes mpractcal. We proposed a ovel aoymous mult-recever ecrypto. I our scheme, each recever s decrypto key s fxed. I addto, the scheme provdes aoymty of recevers. We clude performace aalyss ad comparsos wth other schemes. Keywords: RSA cryptosystems, Chese Remader heorem, Aoymty, Mult-recever ecrypto 1 Itroducto Publc-key ecryptos [4, 17, 18] allow a seder to sed a ecrypted message to a recever (.e., oe-to-oe type of ecrypto). However, etwork applcatos are o loger ust oe-to-oe type of commucato; but t volves multple recevers (>1), (e.g., multcast trasmsso). Oeto-oe type ecrypto s o loger satsfyg ths type of applcatos. I 1989, Chou ad Che have proposed a secure broadcastg [7] usg the CR for protectg the messages. I ther scheme, recevers eed to have ther publc ad prvate key pars tally. he seder selects a radom sesso key to ecrypt the message. he, the seder uses ay publc-key ecrypto ad the CR to securely trasmt the decrypto key correspodg to the radom sesso key to all legtmate recevers. I summary, the scheme uses the key-ecrypt-key techque to protect the messages. If the key-ecrypt-key algorthm s a publc-key algorthm, the parameters of the publc-key algorthm ca be used for oly oe tme trasmsso; otherwse, f the key-ecrypt-key algorthm s a prvate-key algorthm, ther scheme s a mxed scheme sce t uses both the publc-key ad prvatekey cryptosystems. he oto of broadcast ecrypto was frst troduced by Berkovts [3] ad was gve a formal defto by Fat ad aor [13]. he goal of the broadcast ecrypto s to securely trasmt a message to all legtmate recevers va secure broadcast chaels. I Fat ad aor scheme, each user og the system eeds to obta multple prearraged keys durg regstrato ad the use these keys real-tme operato. here are several papers [2, 10, 19] related to Fat ad aor scheme to dscuss the umber of prvate keys, the sze of cphertext ad computatoal cost. I 2005, u et al. [11] frst proposed a I-based broadcast ecrypto based o Boeh ad Frakl scheme [4] usg matrx. I that scheme, recevers do ot eed to regster wth a ceter tally. However, 2007, Che [6] poted out that ther scheme s secure. I 2005, Wag ad Wu [24] proposed a I-based multcast scheme usg blear parg. here are a key geerato ceter to regster all recevers tally ad a group ceter to sed messages to recevers. Oly the group ceter ca be the seder. Later, Saka ad Furukawa proposed aother I-based broadcast ecrypto [22] that the seder ca be ay user. Most exstg mult-recever ecrypto schemes the lterature [2, 3, 4, 6, 10, 11, 13, 19, 24] caot provde the aoymty of recevers. Fa et al. [12] proposed a aoymous mult-recever I-based ecrypto scheme Wag et al. [25] poted out that ther scheme caot provde the aoymty of recevers ad s secure hey also proposed a modfed scheme. Ufortuately, Zhag et al. [27] poted out that Wag et al. s scheme caot provde the aoymty ad s secure. here are may papers o the parg-based mult-
2 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July recever ecrypto scheme [1, 5, 6, 11, 12, 24, 25, 27]; but oly a few papers are focused o the RSA-based multrecever ecryptos [14, 23]. RSA [21] s oe of the most commoly used publc-key ecryptos. However, there exsts a well-kow attack o the RSA-based broadcast ecrypto whe all recevers use the same publc key. he detal of ths attack ca be foud [16]. Whe each recever uses dfferet publc key, ths attack ca be avoded. he publc keys of recevers are all dstct our proposed scheme. I [14], Ghodos et al. proposed a dyamc threshold cryptosystems based o the RSA. I ther paper, a threshold RSA cryptosystem s the same as a mult-recever ecrypto scheme. I ther scheme, a seder ca arbtrarly select a set of legtmate recevers wthout eedg ay key dstrbuto. Each recever s decrypto key depeds o all publc keys of recevers. Ufortuately, whe the umber of recevers s large, Ghodos et al. s scheme becomes mpractcal. I addto, ther scheme caot provde the aoymty of recevers. I ths paper, we propose a RSA-based mult-recever ecrypto scheme based o the Chese Remader heorem (CR). I the decrypto, each recever ca use hs/her fxed prvet key whch does ot deped o other recevers to decrypt the cphertext. he rest of ths paper s orgazed as follows. I Secto 2, we revew CR, RSA ad Ghodos s threshold RSA scheme. I Secto 3, we propose a aoymous multrecever ecrypto scheme. he, Sectos 4 ad 5 are the dscusso ad aalyses. Cocluso s gve Secto 6. 2 Prelmares I ths secto, we brefly revew basc fudametals used our scheme cludg the CR [8], RSA ecrypto [21], ad Ghodos et al. s scheme [14] based o the RSA ecrypto. 2.1 Chese Remader heorem (CR) Assume that there are postve tegers whch are parwse coprmes, ad arbtrary tegers where he, there exsts a uque teger satsfyg followg system of smultaeous cogruece: X a mod ; 1 1 X a mod ; 2 2 (1) 2.2 RSA Ecrypto I 1978, Rvest, Shamr ad Adlema proposed a publckey cryptosystem [21]. Here, we oly revew the RSA ecrypto ad assume that Alce performs the followg steps to geerate her publc ad prvate keys. 1) Frst, Alce chooses two strog prmes, p ad q, such that p 2p 1 ad q 2q 1, where p ad q are two large prmes. he detal about strog prme ca be foud [24, 25]. he, she computes the product, p q. 2) Secod, she chooses the publc key e, such that e ad are relatvely prme, amely gcd( e, ) 1. 3) After choosg the publc key ad gettg the product, Alce ca compute ( ) ad prvate key d as ed 1(mod ), where ( ) ( p 1) ( q 1). I addto, the Euler s totet fucto ( ) meas the umber of postve tegers whch are less tha ad relatvely prme to. 4) Fally, Alce keeps the prvate key ( d, p, q ) secretly ad publshes the publc key ( e, ). We also assume that Bob wats to sed the message M to Alce secretly, where 0< M<. Bob must employ Alce s publc key e to compute the cphertext as C M e mod ad seds t to Alce. Oce Alce receves the cphertext C, she ca use her prvate key d to decrypt d the cphertext C as C mod M. 2.3 Ghodos et al. s Mult-recever Ecrypto Scheme I ths subsecto, we brefly revew Ghodos et al. s multrecever ecrypto scheme [14]. here s a group G cosstg of users ad oe trusted publc regstry. Each user U has hs/her RSA key par (.e., the publc key s ( e, ) ad the prvate key s d ). Furthermore, the trusted publc regstry stores ad maages all publc keys of users. her scheme cossts of two phases: 1) ecrypto phase ad 2) decrypto phase. A seder S ca ecrypt oe message M ad broadcast the cphertext to all recevers ecrypto phase. I decrypto phase, the recever U eeds to compute a decrypto key frst ad the uses the decrypto key to decrypt the cphertext to obta the message M. where X a mod, X ( ( ) y ) mod, 1 a 1 2, ( ) y 1(mod ), ( ) y 0(mod ) ad 0 X for. Ecrypto Phase Assume that the seder S wats to sed oe message M to the group G. S has to get all recevers publc-key dgtal certfcates ad valdate ther publc keys [26]. If the verfcato s passed, S computes the ecrypto key as E e ad the modulus as 1 2 of 1 the group. he, the seder S computes the cphertext:
3 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July E C M mod. he seder S broadcasts E, ad C to all recevers. C c mod ; 1 1 C c mod ; 2 2 (3) ecrypto Phase ad e of other recevers, for 1, 2,, ad. If ad E are vald, each recever U ca check to determe whether he/she s oe of the teded recevers. If he/she s, each recever U computes the decrypto key as E 1mod ( ). he, each recever U uses to decrypt the cphertext C as E C mod M mod M mod. 3 he Proposed Scheme I ths secto, we propose a mult-recever ecrypto scheme based o the RSA ad CR. Our scheme cossts of two phases: 1) ecrypto phase ad 2) decrypto phase. A seder uses all recevers publc keys to ecrypt the secret message ad the broadcasts the cphertext to the recevers the ecrypto phase. Whe a legtmate recever receves the cphertext, he/she ca decrypt the ecrypted message by usg a fxed decrypto key the decrypto phase. Ecrypto Phase Frst, we assume that there are recevers ad oe seder. Each recever U has oe RSA key par, ( d,( e, )), for 1,2,,. he publc key ad prvate key of each recever are geerated accordg to the procedures descrbed Secto 2.1. Whe a seder wats to sed the message M to recevers, he/she has to valdate publc-key dgtal certfcates of all recevers at the begg. he message M must be smaller tha, where s the mmal modulus the set of {,,, }. he the seder S computes 1 2 ad 1 2 c M mod ; e1 1 1 c M mod ; e2 2 2 e c M mod. Accordg to the CR, whe 1, 2,, are parwse coprmes ad 0 c1 1, 0 c2 2,, 0 c, there exsts a uque soluto C (3) satsfyg followg system of smultaeous cogruece: (2) C c mod. Whe each recever U receves the broadcasted he seder broadcasts C to all recevers. message, ( E,, C ), he/she eeds to valdate publc keys ecrypto Phase Oce recever U obtag the cphertext C, he/she ca perform the followg steps to retract the secret message M. 1) Frst, he/she uses the publc key to execute the modulo reducto, that s, C mod c. 2) After gettg c, recever U ca use the prvate key d to decrypt c as c d ( e ) d M mod M. Sce 0 M, each recever ca retreve the same message M. I decrypto phase, each recever uses hs/her fxed key par to retract the message M. 4 scusso I ths secto, we dscuss the smlartes ad dffereces betwee Ghodos et al. s scheme ad our scheme. here are two smlartes. Frst, both Ghodos et al. ad our scheme use RSA ecrypto to provde mult-recever ecrypto. Secod, the seder ca select ay set of legtmate recevers. O the other had, there are three dffereces betwee Ghodos et al. s scheme ad our scheme. he detals are gve below. 4.1 Computatoal Complexty I Ghodos et al. s scheme, each recever U obtas the cphertext ( CE,, ). U eeds to valdate publc keys e of other recevers, for, 1, 2,,, ad, ad verfyg 1 tmes. he tme complexty s O ( ), where s the total umber of recevers. Whe there are a large umber of recevers, ther scheme s mpractcal. I our scheme, each recever does ot eed to valdate publc keys of other recevers. Furthermore, the ext secto, we wll show that Ghodos et al. s scheme, the seder speds more computatoal tme to ecrypt the message tha the tme eeded our scheme. 4.2 Aoymty of Recevers.e., I Ghodos et al. s scheme, whe recever U gets the, he/she eeds to determe whether he/she s oe of legtmate recevers by computg. Sce ad are publc formato, ther scheme caot provde the aoymty of recevers. I our scheme, seder broadcasts
4 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July C oly. Hece, obody, except the seder, kows who legtmate recevers are. etal aalyss wll be cluded Secto ecrypto Key I Ghodos et al. s scheme, recever U eeds to compute a decrypto key as E 1(mod ). However, E s the product of publc keys of all recevers. Hece, each recever s decrypto key s dyamc for each sesso. But, our scheme, each recever U ca uses hs/her prvate key d to recover the orgal message M as d C mod M. So the decrypto key s fxed for all sessos. 5 Aalyss I ths secto, we dscuss the propertes of correctess, performace, securty ad aoymty. Correctess meas that each legtmate recever ca retreve the message ad the aoymty meas that the dettes of recevers ca be protected. We compare the computatoal cost ad the sze of cphertext amog our scheme ad other schemes. 5.1 Correctess Whe seder wats to sed the message the rage of message M s restrcted to be betwee zero ad whch s the mmal modulus the set of { for 1 }. Accordgly, each legtmate recever havg vald values, d ad, ca retreve the message. 5.2 Performace I ths subsecto, we compare the performace amog ucast RSA, Ghodos et al. scheme ad our scheme. I ucast RSA, the seder eeds to perform RSA ecrypto for tmes ad seds each cphertext to oe of recevers separately. We assume to use the 1024-bts RSA 1024 ecrypto,.e., modulus 2 for 1. Sce modulo expoetato takes more computatoal tme tha other operatos, we oly cosder the tme eeded for RSA ecrypto ad decrypto the followg dscusso. We let, E _1024 E_ 1024 ad deote the 1024-bt RSA ecrypto operato, the ( 1024) -bt RSA ecrypto operato ad the RSA decrypto operato, separately. able 1 shows the comparso results. he computatoal cost ad cphertext sze of ucast RSA s the same as our scheme; but t eeds tmes trasmsso. I addto, there has other traffc formato eeded ucast trasmsso. I the followg aalyss, we adopt results publshed [9] that clude complextes of stadard hardware mplemetato of modulo operatos. For ( 1024) -bt operato, the hardware complexty of able 1: Comparso results amog dfferet schemes Seder Recever Ucast RSA E _1024 Ghodos et al. scheme 1 4 E _1024 (.e., E_ 1024 ) Our scheme E _1024 Sze of cphertext btes btes btes Rouds of 1 1 trasmsso Aoymty of recevers o o Yes : the umber of recevers ca get 4. I summary, the 1 E _ 1024 E _1024 computatoal cost of the seder s 1 4 E _1024 Ghodos et al. s scheme ad s E _1024 our scheme. Furthermore, our scheme, the seder eeds oe CR computato. Although the seder does ot eed to compute CR Ghodos et al. scheme, the decrypto key of each recever s dyamc. O the recever sde, both Ghodos et al. scheme ad our scheme eed oe RSA decrypto. he dfferet s that ther scheme eeds to compute oe multplcatve verse; but ours eeds to compute oe modulo reducto. Obvously, the computatoal complexty of multplcatve verse s much larger tha the computatoal complexty of modulo reducto. herefore, our scheme s more computatoally effcet tha Ghodos et al. s scheme ad the cphertext sze of ours s Securty of the cphertext sze of ther scheme. Sce our scheme uses RSA ecrypto, the securty of our scheme s the same as RSA. amely, the securty of ours s based o the teger factorg problem. If a llegtmate recever wats to decrypt the ecrypted message, he/she eeds to break the RSA assumpto. 5.4 Aoymty 6 Coclusos 1 modular expoetato, s 4 tmes the hardware complexty of 1024-bt modular expoetato. Hece, we We assume that seder S wats to sed the cphertext C to t legtmate recevers a group G cosstg of users, where t. he attacker Eve has tercepted the cphertext C ad kows users publc keys, for 1. Eve Eve ca use C ad to compute e M mod, where s the publc key of oe of the legtmate recevers, Eve caot recover the message ad to detfy dettes of legtmate recevers. Hece, our scheme ca provde the aoymty of recevers. I ths paper, we propose a ovel mult-recever ecrypto scheme whch ca provde the aoymty of recevers. Our
5 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July scheme s a smple tegrato of both the RSA ad CR. he proposed scheme s more effcet tha exstg schemes terms of computatoal cost ad cphertext sze. Each recever oly eeds to keep oe prvate key ad uses ths prvate key to decrypt the cphertext. Refereces [1] J. Baek, R. Safav-a, ad W. Suslo, Effcet mult-recever detty-based ecrypto ad ts applcato to broadcast ecrypto, Proceedg of Publc Key Cryptography PKC 05, LCS 3386, pp , Sprger-Verlag, Les ablerets, Swtzerlad, Ja [2] M. Bellare, A. Boldyreva, ad S. Mcal, Publc-key ecrypto a mult-user settg: securty proofs ad mprovemets, Proceedg of Advaces Cryptology Eurocrypt 2000, LCS 1807, pp , Sprger-Verlag, Bruges, Belgum, May [3] S. Berkovts, How to broadcast a secret, Proceedg of Advaces Cryptology Eurocrypt 91, LCS 547, pp , Sprger-Verlag, Brghto, UK, Apr [4]. Boeh ad M. Frakl, Idetty-based ecrypto from the Wel parg, Proceedg of Advaces Cryptology Crypto 01, LCS 2139, pp , Sprger-Verlag, Calfora, USA, Aug [5] Z. H., Che, S.., L, C. Z., Wag ad Y. P. She, wo costructos of multrecever ecrypto supportg costat keys, short cphertexts, ad detty prvacy, Iteratoal Joural of etwork Securty, vol. 14, o. 5, pp , Sep [6] H. Y. Che, Commets o a effcet I-based broadcast ecrypto scheme, IEEE rasatos Broadcast, vol. 53, o. 4, pp , ec [7] G. H. Chou ad W.. Che, Secure broadcastg usg the secure lock IEEE rasatos o Software Egeerg, vol. 15, o. 8, pp , Aug [8] H. Cohe, A Course Computatoal Algebrac umber heory, Sprger, 4th ed., pp , ew York, [9] J. P., avd, K. Kalach, ad. ttley, Hardware complexty of modular multplcato ad expoetato, IEEE rasatos o Computers, vol. 56, o. 10, pp , Oct [10] Y. ods ad. Fazo, Publc key broadcast ecrypto for stateless recevers, Proceedg of gtal Rghts Maagemet 2002, LCS 2696, pp , Sprger-Verlag, Washgto, C, USA, [11] X. u, Y. Wag, J. Ge, ad Y. M. Wag, A Ibased broadcast ecrypto scheme for key dstrbuto, IEEE rasatos Broadcast, vol. 51, o. 2, pp , Jue [12] C. I. Fa, L. Huag, ad P. Ho, Aoymous multrecever detty-based ecrypto, IEEE rasatos o Computers, vol. 59, o. 9, pp , Sep [13] A. Fat ad M. aor, Broadcast ecrypto, Proceedg of Advaces Cryptology Crypto, LCS 839, pp , Sprger-Verlag, Calfora, USA, Aug [14] H. Ghodos, J. Peprzyk, ad R. Safav-a, yamc threshold cryptosystems: a ew scheme group oreted cryptography, Proceedg of Pragocrypt 96: the 1 st Iteratoal Coferce o thw heory ad Applcatos of Crytology, pp , Prague, Czech Republc, Sep [15] J. Gordo, Strog RSA key, IE Electrocs Letters, vol. 20, o. 12, pp , Jue [16] J. Hastad, Solvg smultaeous modular equatos of low degree, SIAM Joural o Computg, vol. 17, o. 2, pp , Apr [17] IEEE Stadard Specfcatos for Publc-Key Cryptography, IEEE Stadard , [18] IEEE raft Stadard for Idetty-Based Cryptographc echques usg Pargs, IEEE P1363/6, [19] K. Kurosawa, Mult-recpet publc-key ecrypto wth shorteed cphertext, Proceedg of Publc Key Cryptography, LCS 2274, Sprger-Verlag, pp , Pars, Frace, February [20] J. H. Moore, Protocol falures cryptosystems, Proceedgs of the IEEE, vol. 76, o. 5, pp , May [21] R. Rvest, A. Shamr, ad L. Adlema, A method for obtag dgtal sgatures ad publc-key cryptosystems, Commucatos of the ACM, vol. 21, o. 2, pp , Feb [22] R. Saka ad J. Furukawa, Idetty-based broadcast ecrypto, Cryptology eprt Archve, Report 2007/217, [23] E. Sgurd, A mult-recever publc key cryptosystem, Proceedgs of orwega Symposum Iformato Securty (ISK), pp , rodhem, orway, ov [24] L. Wag ad C. K. Wu, Effcet detty-based multcast scheme from blear parg, IEE Proceedgs Commucatos, vol. 152, o. 6, pp , ec [25] H. Wag, Y. Zhag, H. Xog, ad B. Q, Cryptaalyss ad mprovemets of a aoymous mult-recever detty-based ecrypto scheme, IE Iformato Securty, vol. 6, o. 1, pp , Mar [26] R. W. Youglove, Publc key frastructure. How t works, Computg & Cotrol Egeerg Joural, vol. 12, o. 2, pp , Apr [27] J. Zhag ad Y. Cu, Commet a aoymous multrecever detty-based ecrypto scheme, Proceedg of 4th Iteratoal coferece o Itellget etworkg ad Collaboratve Systems ( ICoS), pp , Bucharest, Romaa, Sep
6 Iteratoal Joural of etwork Securty, Vol.15, o.4, PP , July Le Har receved hs BS degree Electrcal Egeerg from the atoal awa Uversty I 1980, he receved hs MS degree Electrcal Egeerg from the State Uversty of ew York-Stoy Brook ad 1984 he receved hs Ph.. degree Electrcal Egeerg from the Uversty of Mesota. Curretly, he s a Full Professor at the epartmet of Computer Scece Electrcal Egeerg, Uversty of Mssour- Kasas Cty, USA. Hs research terests are cryptography, etwork securty ad wreless commucato securty. He has publshed umber of papers o dgtal sgature desg ad applcatos, wreless ad etwork securty. Ch-Che Chag receved hs Ph. computer egeerg 1982 from the atoal Chao ug Uversty, awa. He was the head of, ad a professor, the Isttute of Computer Scece ad Iformato Egeerg at the atoal Chug Cheg Uversty, Chay, awa. From August 1992 to July 1995, he was the dea of the College of Egeerg at the same uversty. From August 1995 to October 1997, he was the provost at the atoal Chug Cheg Uversty. From September 1996 to October 1997, r. Chag was the Actg Presdet at the atoal Chug Cheg Uversty. From July 1998 to Jue 2000, he was the drector of Advsory Offce of the Mstry of Educato of the R.O.C. Sce February 2005, he has bee a Char Professor of Feg Cha Uversty. He s curretly a Fellow of IEEE ad a Fellow of IEE, UK. He also publshed several hudred papers Iformato Sceces. I addto, he has served as a cosultat to several research sttutes ad govermet departmets. Hs curret research terests clude database desg, computer cryptography, mage compresso ad data structures. Hsao-Lg Wu was bor Kaohsug, awa, She receved the BS degree Appled Mathematcs from Feg Cha Uversty, achug, awa She s curretly pursug her Ph.. degree formato egeerg ad computer scece from Feg Cha Uversty, achug, awa. Her curret research terests clude electroc commerce, formato securty, cryptography, ad moble commucatos.
Infinite Series Forms of Double Integrals
Iteratoal Joural of Data Evelopmet Aalyss ad *Operatos Research*, 4, Vol., No., 6- Avalable ole at http://pubs.scepub.com/jdeaor/// Scece ad Educato Publshg DOI:.69/jdeaor--- Ifte Seres Forms of Double
More informationAn ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure
A ID-based Proxy Authetcato Protocol Supportg Publc Key Ifrastructure Shuh-Pyg Sheh, Shh-I Huag ad Fu-She Ho Departmet of Computer Scece ad Iformato Egeerg, ABSTRACT The advatage of the ID-based authetcato
More informationA New Mathematical Model for a Redundancy Allocation Problem with Mixing Components Redundant and Choice of Redundancy Strategies
Appled Mathematcal Sceces, Vol, 2007, o 45, 222-2230 A New Mathematcal Model for a Redudacy Allocato Problem wth Mxg Compoets Redudat ad Choce of Redudacy Strateges R Tavakkol-Moghaddam Departmet of Idustral
More informationPrivacy Protection among Drivers in Vehicle-to- Vehicle Communication Networks
Prvacy Protecto amog Drvers Vehcle-to- Vehcle Commucato Networks Nader. Rabad, ember, IEEE ad Syed. ahmud, ember, IEEE Electrcal ad Computer Egeerg Departmet Waye State Uversty Detrot, chga 48202, USA
More informationOn the Techniques for Constructing Even-order Magic Squares using Basic Latin Squares
Iteratoal Joural of Scetfc ad Research Publcatos, Volume, Issue 9, September 0 ISSN 50-353 O the Techques for Costructg Eve-order Magc Squares usg Basc Lat Squares Tomba I. Departmet of Mathematcs, Mapur
More informationModule 6. Channel Coding. Version 2 ECE IIT, Kharagpur
Module 6 Chael Codg Lesso 36 Coded Modulato Schemes After readg ths lesso, you wll lear about Trells Code Modulato; Set parttog TCM; Decodg TCM; The modulated waveform a covetoal ucoded carrer modulato
More informationK-Map 1. In contrast, Karnaugh map (K-map) method provides a straightforward procedure for simplifying Boolean functions.
K-Map Lesso Objectves: Eve though Boolea expressos ca be smplfed by algebrac mapulato, such a approach lacks clear regular rules for each succeedg step ad t s dffcult to determe whether the smplest expresso
More informationA Random-Walk Based Privacy-Preserving Access Control for Online Social Networks
(IJASA) Iteratoal Joural of Advaced omputer Scece ad Applcatos, Vol 7, o, 6 A Radom-Walk Based Prvacy-Preservg Access otrol for Ole Socal etworks You-sheg Zhou ollege of omputer Scece ad Techology, hogqg
More informationLecture6: Lossless Compression Techniques. Conditional Human Codes
ecture6: ossless Compresso Techques Codtoal uma Codes -Cosder statoary dscrete arov process, = { s, s, s } wth codtoal pmfs P P s s wth,, tates o Ps/so.9.5.5 Ps/s.5.8.5 Ps/s.5.5.6 -The margal probabltes
More informationAn Improved DV-Hop Localization Algorithm Based on the Node Deployment in Wireless Sensor Networks
Iteratoal Joural of Smart Home Vol. 9, No. 0, (05), pp. 97-04 http://dx.do.org/0.457/jsh.05.9.0. A Improved DV-Hop Localzato Algorthm Based o the Node Deploymet Wreless Sesor Networks Jam Zhag, Ng Guo
More informationThe optimization of emergency resource-mobilization based on harmony search algorithm
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(7):483-487 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 The optmzato of emergecy resource-moblzato based o harmoy search
More informationLong Number Bit-Serial Squarers
Log Number Bt-Seral Squarers E. Chaotaks, P. Kalvas ad K. Z. Pekmestz are th the Natoal Techcal Uversty of Athes, 7 73 Zographou, Athes, Greece. E-mal: lchaot, paraskevas, pekmes@mcrolab.tua.gr Abstract
More informationVoltage Contingency Ranking for IEEE 39-Bus System using Newton- Raphson Method
WSEAS TRANSACTIONS o OWER SSTEMS Haer m, Asma Meddeb, Souad Chebb oltage Cotgecy Rag for IEEE 39-Bus System usg Newto- Raphso Method HAER MII, ASMA MEDDEB ad SOUAD CHEBBI Natoal Hgh School of Egeers of
More informationShort Note: Merging Secondary Variables for Geophysical Data Integration
Short Note: Mergg Secodary Varables for Geophyscal Data Itegrato Steve Lyster ad Clayto V. Deutsch Departmet of Cvl & Evrometal Egeerg Uversty of Alberta Abstract Multple secodary data from geophyscal
More informationEvolutionary Algorithm With Experimental Design Technique
Evolutoary Algorthm Wth Expermetal Desg Techque Qgfu Zhag Departmet of Computer Scece Uversty of Essex Wvehoe Park Colchester, CO4 3SQ Uted Kgdom Abstract: - Major steps evolutoary algorthms volve samplg
More informationDYNAMIC BROADCAST SCHEDULING IN ASYMMETRIC COMMUNICATION SYSTEMS: PUSH AND PULL DATA BASED ON SCHEDULING INDEX AND OPTIMAL CUT-OFF POINT YUFEI GUO
DYNAMIC BROADCAST SCHEDULING IN ASYMMETRIC COMMUNICATION SYSTEMS: PUSH AND PULL DATA BASED ON SCHEDULING INDEX AND OPTIMAL CUT-OFF POINT by YUFEI GUO Preseted to the Faculty of the Graduate School of The
More informationAssignment#4 Due: 5pm on the date stated in the course outline. Hand in to the assignment box on the 3 rd floor of CAB.
MATH Assgmet#4 Due: 5pm o the date stated the course outle. Had to the assgmet box o the 3 rd floor of CAB.. Let deote the umber of teror regos of a covex polygo wth sdes, dvded by all ts dagoals, f o
More informationA New Aggregation Policy for RSS Services
A New Aggregato Polcy for RSS Servces Youg Geu Ha Sag Ho Lee Jae Hw Km Yaggo Km 2 School of Computg, Soogsl Uversty Seoul, Korea {youggeu,shlee99,oassdle}@gmal.com 2 Dept. of Computer ad Iformato Sceces,
More informationEfficient Utilization of FlexRay Network Using Parameter Optimization Method
Iteratoal Joural of Egeerg ad Techology, Vol. 8, No. 6, December 2016 Effcet Utlzato of FlexRay Network Usg Parameter Optmzato Method Y. X. Wag, Y. H. Xu, ad Y. N. Xu Abstract FlexRay s a hgh rate of bus
More informationA Novel Bandwidth Optimization Manager for Vehicle Controller Area Network, CAN, System
A Novel Badwdth Optmzato Maager for Vehcle Cotroller Area Network, CAN, System Y WANG, Z-y YOU, L-hu HUI Guzhou Normal Uversty, Guyag, Guzhou 550001, Cha Abstract Ths paper cosders the badwdth lmtato of
More informationGeometric Distribution as a Randomization Device: Implemented to the Kuk s Model
It. J. Cotem. Math. Sceces, Vol. 8, 03, o. 5, 43-48 HIKARI Ltd, www.m-hkar.com Geometrc Dstrbuto as a Radomzato Devce: Imlemeted to the Kuk s Model Sarjder Sgh Deartmet of Mathematcs Texas A&M Uversty-Kgsvlle
More informationEfficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Electrocs ad Commucato Egeerg Vol:3, No:4, 9 Effcet Large Numbers Karatsuba-Ofma Multpler Desgs for Embedded Systems M.Machhout, M.Zeghd,
More informationA Secure RSU-Aided Aggregation and Batch- Verification Scheme for Vehicular Networks
Iteratoal Coferece o Soft Computg ad ts ApplcatosICSCA'202 August 25-26 202 Kuala Lumpur Malaysa A Secure RSU-Aded Aggregato ad Batch- Verfcato Scheme for Vehcular Networs Sagara Mohaty Debassh Jea ad
More informationZigbee wireless sensor network localization evaluation scheme with weighted centroid method
Zgbee wreless sesor etwork localzato evaluato scheme wth weghted cetrod method Loesy Thammavog 1, Khamphog Khogsomboo 1, Thaadol Tegthog 2 ad Sathapor Promwog 2,* 1 Departmet of Electrocs ad Telecommucato
More informationMultiset Permutations in Lexicographic Order
Webste: www.jetae.com ISSN 2250-2459, ISO 9001:2008 Certfed Joural, Volume 4, Issue 1, Jauary 2014 Multset Permutatos Lexcographc Order Tg Kuo Departmet of Marketg Maagemet, Takmg Uversty of Scece ad Techology,
More informationISSN (Print), ISSN (Online) Volume 5, Issue 1, January (2014), IAEME AND TECHNOLOGY (IJARET)
Iteratoal INTERNATIONAL Joural JOURNAL of Advaced OF Research ADANED Egeerg RESEARH ad Techology IN ENGINEERING (IJARET), ISSN 976 648(Prt), ISSN 976 6499(Ole) olume 5, Issue, Jauary (4), IAEME AND TEHNOLOGY
More informationThermometer-to-binary Encoder with Bubble Error Correction (BEC) Circuit for Flash Analog-to-Digital Converter (FADC)
Thermometer-to-bary Ecoder wth Bubble Error Correcto (BEC) Crcut for Flash Aalog-to-Dgtal Coverter (FADC) Bu Va Heu, Seughyu Beak, Seughwa Cho +, Jogkook Seo ±, Takyeog Ted. Jeog,* Dept. of Electroc Egeerg,
More informationK-sorted Permutations with Weakly Restricted Displacements
K-sorted Permutatos wth Weakly Restrcted Dsplacemets Tg Kuo Departmet of Marketg Maagemet, Takmg Uversty of Scece ad Techology Tape 5, Tawa, ROC tkuo@takmg.edu.tw Receved February 0; Revsed 5 Aprl 0 ;
More informationPerformance Comparison of Two Inner Coding Structures in Concatenated Codes for Frequency-Hopping Spread Spectrum Multiple-Access Communications
Iteratoal Joural o Recet ad Iovato Treds Computg ad Commucato IN: 31-8169 Volume: 3 Issue: 741-745 erformace Comparso of Two Ier Codg tructures Cocateated Codes for Frequecy-Hoppg pread pectrum Multple-Access
More informationSAIDI MINIMIZATION OF A REMOTE DISTRIBUTION FEEDER. Kai Zou, W. W. L. Keerthipala and S. Perera
SAIDI INIIZATIN F A RETE DISTRIBUTIN FEEDER Ka Zou, W. W.. Keerthpala ad S. Perera Uversty of Wollogog School of Electrcal ad Computer Telecommucato Egeerg Wollogog, NSW 2522, Australa Abstract Dstrbuto
More informationA CONTROL CHART FOR HEAVY TAILED DISTRIBUTIONS. K. Thaga. Department of Statistics University of Botswana, Botswana
A CONTROL CHART FOR HEAVY TAILED DISTRIBUTIONS K. Thaga Departmet of Statstcs Uversty of Botswaa, Botswaa thagak@mopp.ub.bw ABSTRACT Stadard cotrol charts wth cotrol lmts determed by the mea ad stadard
More informationDeterministic Random Number Generator Algorithm for Cryptosystem Keys
Iteratoal Joural of Computer ad Iformato Egeerg Determstc Radom Number Geerator Algorthm for Cryptosystem Keys Ad A. Maata, Hamza A. A. Al_Sewad Abstract Oe of the crucal parameters of dgtal cryptographc
More informationA Spectrally Efficient Frequency Division Multiplexing Based Communications System M. R. D. Rodrigues and I. Darwazeh
IOWo'03, 8th Iteratoal OFDM-Workshop, Proceedgs, Hamburg, DE, Sep 24-25, 2003 (Prepublcato draft) A Spectrally Effcet Frequecy Dvso Multplexg Based Commucatos System M. R. D. Rodrgues ad I. Darwazeh Laboratory
More informationFrequency Assignment for IEEE Wireless Networks
Frequecy Assgmet for IEEE 8 Wreless Networks K K Leug Bell Labs, Lucet Techologes Murray Hll, NJ 7974 k@bell-labscom Byoug-Jo J Km AT&T Labs Research Mddletow, NJ 7748 macsbug@researchattcom Abstract The
More informationSimulation of rainfall-runoff process by artificial neural networks and HEC-HMS model (case study Zard river basin)
Proceedgs of The Fourth Iteratoal Ira & Russa Coferece 43 Smulato of rafall-ruoff process by artfcal eural etworks ad HEC-HMS model (case study Zard rver bas Mehrdad Akbarpour MSc. Graguate, Water Structures
More informationSVD-based Collaborative Filtering with Privacy
SVD-based Collaboratve Flterg wth Prvacy Husey Polat Departmet of Electrcal Egeerg ad Computer Scece Syracuse Uversty, 121 L Hall Syracuse, NY 13244-1240, USA Phoe: +1 315 443 4124 hpolat@ecs.syr.edu Welag
More informationDistributed Online Matching Algorithm For Multi-Path Planning of Mobile Robots
Proect Paper for 6.854 embers: Seugkook Yu (yusk@mt.edu) Sooho Park (dreameo@mt.edu) Dstrbuted Ole atchg Algorthm For ult-path Plag of oble Robots 1. Itroducto Curretly, we are workg o moble robots whch
More informationSIMPLE RANDOM SAMPLING
UIT IMPL RADOM AMPLIG mple Radom amplg tructure. Itroducto Obectves. Methods of electo of a ample Lottery Method Radom umber Method Computer Radom umber Geerato Method.3 Propertes of mple Radom amplg Merts
More informationAn Enhanced Posterior Probability Anti-Collision Algorithm Based on Dynamic Frame Slotted ALOHA for EPCglobal Class1 Gen2
Joural of Commucatos Vol. 9,. 0, October 204 A Ehaced Posteror Probablty At-Collso Algorthm Based o Dyamc Frame Slotted ALOHA for EPCglobal Class Ge2 Lta Dua,Wewe Pag 2, ad Fu Dua 2 College of Iformato
More informationSwitching Angle Design for Pulse Width Modulation AC Voltage Controller Using Genetic Algorithm and Distributed Artificial Neural Network
Swtchg Agle Desg for Pulse Wdth Modulato AC Voltage Cotroller Usg Geetc Algorthm ad Dstrbuted Artfcal Neural Network Pattarapor Jtta, Somyot Katwadvla ad Atthapol Ngaoptakkul Abstract. Ths paper proposes
More informationInformation Theory and Coding
Iformato heory ad Codg Itroducto What s t all aout? Refereces: C..hao, A Mathematcal heory of Commucato, he Bell ystem echcal Joural, Vol. 7, pp. 379 43, 63 656, July, Octoer, 948. C..hao Commucato the
More informationThe Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic
Sesors 205, 5, 954-9559; do:0.3390/s508954 Artcle OPEN ACCESS sesors ISSN 424-8220 www.mdp.com/joural/sesors The Balaced Cross-Layer Desg Routg Algorthm Wreless Sesor Networks Usg Fuzzy Logc Ng L *, José-Ferá
More informationA Two Objective Model for Location-Allocation in a Supply Chain
AmrHosse Nobl, Abolfazl Kazem,Alreza Alejad/ TJMCS Vol. 4 No. 3 (22) 392 4 The Joural of Mathematcs ad Computer Scece Avalable ole at http://www.tjmcs.com The Joural of Mathematcs ad Computer Scece Vol.
More informationOPTIMAL BUS DISPATCHING POLICY UNDER VARIABLE DEMAND OVER TIME AND ROUTE LENGTH
OPTIMAL BUS DISPATCHING POLICY UNDER VARIABLE DEMAND OVER TIME AND ROUTE LENGTH Amal S. Kumarage, Professor of Cvl Egeerg, Uversty of Moratuwa, Sr Laka H.A.C. Perera, Cetral Egeerg Cosultacy Bureau, Sr
More informationCHAPTER-4 WIDE BAND PASS FILTER DESIGN 4.1 INTRODUCTION
CHAPTER-4 WIDE BAND PASS FILTER DESIGN 4. INTRODUCTION The bad pass flters suested last chapter are hav the FBW less tha the 2%. I cotrast of that ths chapter deals wth the des of wde bad pass flter whch
More informationOptimal Packetization Interval for VoIP Applications Over IEEE Networks
145 Afrca Joural of Iformato ad Commucato Techology, Vol. 2, No. 4, December 2006 Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Departmet of Electrcal & Computer Egeerg
More informationEnhancing Topology Control Algorithms in Wireless Sensor Network using Non-Isotropic Radio Models
IJCSNS Iteratoal Joural of Computer Scece ad Network Securty, VOL.6 No.8B, August 6 5 Ehacg Topology Cotrol Algorthms Wreless Sesor Network usg No-Isotropc Rado Models Ma.Vctora Que ad Wo-Joo Hwag Departmet
More informationSixth Edition. Chapter 7 Point Estimation of Parameters and Sampling Distributions Mean Squared Error of an 7-2 Sampling Distributions and
3//06 Appled Statstcs ad Probablty for Egeers Sth Edto Douglas C. Motgomery George C. Ruger Chapter 7 Pot Estmato of Parameters ad Samplg Dstrbutos Copyrght 04 Joh Wley & Sos, Ic. All rghts reserved. 7
More informationBlock-based Feature-level Multi-focus Image Fusion
Block-based Feature-level Mult-focus Image Fuso Abdul Bast Sddqu, M. Arfa Jaffar Natoal Uversty of Computer ad Emergg Sceces Islamabad, Paksta {bast.sddqu,arfa.affar}@u.edu.pk Ayyaz Hussa, Awar M. Mrza
More informationColor Image Enhancement using Modify Retinex and Histogram Equalization Algorithms Depending on a Bright Channel Prior
Iteratoal Joural of Applcato or Iovato Egeerg & Maagemet (IJAIEM) Web Ste: www.jaem.org Emal: edtor@jaem.org Color Image Ehacemet usg Modfy Retex ad Hstogram Equalzato Algorthms Depedg o a Brght Chael
More informationOPTIMAL DG PLACEMENT FOR MAXIMUM LOSS REDUCTION IN RADIAL DISTRIBUTION SYSTEM USING ABC ALGORITHM
teratoal Joural of Revews Computg 009-00 JRC & LLS. All rghts reserved. JRC SSN: 076-338 www.jrc.org E-SSN: 076-3336 OPTMAL PLACEMENT FOR MAXMUM LOSS REDUCTON N RADAL DSTRBUTON SYSTEM USNG ABC ALGORTHM
More informationA Novel Phase Detection System for Linear All- Digital Phase Locked Loop
A Novel Phase Detecto System for Lear All- Dgtal Phase Locked Loop Abhshek Das, Suraj Dash, B.Chtt Babu, Member, IEEE, ad Ajt Kumar Sahoo, Member, IEEE. Abstract-- I ths paper, a ovel fast phase detecto
More informationComparison of Measurement and Prediction of ITU-R Recommendation P.1546
Comparso of Measuremet ad Predcto of ITU-R Recommedato P.546 Chag-Hoo Lee *, Nam-Ryul Jeo *, Seog-Cheol Km *, Jug-m Lm * Isttute of New Meda ad Commucatos, Seoul Natoal Uversty, Cosoldated Mateace Depot,
More informationChaotic Maps: A Tool to Enhance the Performance of OFDM Systems
Chaotc Maps: A Tool to Ehace the Performace of OFDM Systems E. M. El-Bakary, O. Zahra, S. A. El-Doll, ad F. E. Abd El-Same Departmet of Electrocs ad Electrcal Commucatos Egeerg, Faculty of Electroc Egeerg,
More informationResearch on System-level Calibration of Automated Test Equipment based. Least Square Method
Research o System-level Calbrato of Automated Test Equpmet based Least Square Method Wag Yog*,,, Zhag Juwe,, Qu Laku,, Zhag Lwe, ad Su Shbao 3 College of Electrcal Egeerg, Hea Uversty of Scece ad Techology,
More informationDISTRIBUTION VOLTAGE MONITORING AND CONTROL UTILIZING SMART METERS
4 th Iteratoal Coferece o Electrcty Dstrbuto Glasgow, -5 Jue 07 DISTRIBUTION VOLTAGE MONITORING AND CONTROL UTILIZING SMART METERS Yoshhto. KINOSHITA Kazuor. IWABUCHI Yasuyuk. MIYAZAKI Toshba Japa Toshba
More informationQUANTUM QUERY COMPLEXITY TO DETERMINE CENTER OF A GRAPH
www.jrcar.com Vol. Issue 8, Pg.: 1-7 August 014 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 30-7345 QUANTUM QUERY COMPLEXITY TO DETERMINE CENTER OF A GRAPH Majula Gadh
More informationTHE FOURIER SERIES USED IN ANALYSE OF THE CAM MECHANISMS FOR THE SHOEMAKING MACHINES (PART I)
ANNALS OF HE UNIVERSIY OF ORADEA FASCICLE OF EXILES, LEAHERWORK HE FOURIER SERIES USED IN ANALYSE OF HE CAM MECHANISMS FOR HE SHOEMAKING MACHINES (PAR I) IOVAN-DRAGOMIR Ala, DRIȘCU Maraa, Gheorghe Asach
More informationDevelopment and Studies of Instant Messaging System Based on Android Platform
Revsta de la Facultad de Igeería U.C.V., Vol. 3, N 4, pp. 48-54, 07 Abstract Developmet ad Studes of Istat Messagg System Based o Adrod Platform Zhpg Zhou, Hogya Zhag Software Departmet, Hebe Software
More informationBER ANALYSIS OF V-BLAST MIMO SYSTEMS UNDER VARIOUS CHANNEL MODULATION TECHNIQUES IN MOBILE RADIO CHANNELS
202 Iteratoal Coferece o Computer Techology ad Scece (ICCTS 202) IPCSIT vol. 47 (202) (202) IACSIT Press, Sgapore DOI: 0.7763/IPCSIT.202.V47.24 BER ANALYSIS OF V-BLAST MIMO SYSTEMS UNDER VARIOUS CANNEL
More informationUCAIPM: Ubiquitous Computing Agile Information Protection Mechanism
CAIPM: bqutous Computg Agle Iformato Protecto Mechasm Daoqg Su, ad Qyg Cao Abstract I order to mprove the securty of ubqutous computg system, CAIPM, a ew ovel ubqutous computg agle formato protecto mechasm
More informationZigBee-based positioning system for coal miners
Avalable ole at www.scecedrect.com Proceda Egeerg 26 (2011 ) 2406 2414 Frst Iteratoal Symposum o Me Safety Scece ad Egeerg ZgBee-based postog system for coal mers WANG Logkag a, NIE Basheg a, ZHANG Rumg
More informationTime-Frequency Entropy Analysis of Arc Signal in Non-Stationary Submerged Arc Welding
Egeerg, 211, 3, 15-19 do:1.4236/eg.211.3213 Publshed Ole February 211 (http://www.scrp.org/joural/eg) Tme-Frequecy Etropy Aalyss of Arc Sgal o-statoary Submerged Arc Weldg Abstract Kuafag He 1, Swe Xao
More informationLow Complexity LMMSE Channel Estimation on GPP
0 7th Iteratoal ICT Coferece o Commucatos ad etworkg Cha (CIACOM) Low Complexty LMME Chael Estmato o GPP We h, Tao Peg, Rogrog Qa Key Lab. Of Uversal Wreless Commucato, Mstry of Educato, BUPT Bejg 00876,
More informationSpeculative Completion for the Design of High-Performance Asynchronous Dynamic Adders
I: 1997 IEEE Iteratoal Symposum o Advaced Research Asychroous Crcuts ad Systems ( Asyc97 Symposum), Edhove, The Netherlads Speculatve Completo for the Desg of Hgh-Performace Asychroous Dyamc Adders Steve
More informationA Two Stage Methodology for Siting and Sizing of DG for Minimum Loss in Radial Distribution System using RCGA
teratoal Joural of Computer Applcatos (0975 8887) Volume 5 No., July 0 A Two Stage Methodology for Stg ad Szg of for Mmum Loss adal Dstrbuto System usg CGA Dr.M.adma ltha EEE Member rofessor & HOD Dept.
More informationDescriptive Statistics
Math 3 Lecture I Descrptve tatstcs Descrptve statstcs are graphcal or umercal methods utlsed to summarze data such a way that mportat features of the sample ca be depcted. tatstcs: tatstcs s cocered wth
More informationOn LDPC Code Based Massive Random-Access Scheme for the Gaussian Multiple Access Channel
O LDPC Code Based Massve Radom-Access Scheme for the Gaussa Multple Access Chael Luza Medova, Ato Glebov, Pavel Ryb, ad Alexey Frolov Ist. for Iformato Trasmsso Problems, Moscow, Russa, pryb@tp.ru Moscow
More informationEconomic Load Dispatch Based on a Hybrid Particle Swarm Optimization
Ecoomc Load Dspatch Based o a Hybrd artcle Swarm Optmzato Jog-Bae ar, K-Sog Lee, Joog-R Sh, Gyu-Ha Choe, Kwag Y. Lee Abstract Ths paper presets a ew approach to ecoomc load dspatch (ELD) problems usg a
More informationEnergy-aware Routing Algorithm Based on Combinatorial Optimization Theory
Eergy-aware Routg Algorthm Based o Combatoral Optmzato Theory L Qao 1, Hu-l Jag 1, Y-de Fu 2 1 School of Computer ad Iformato Techology Shagqu Normal College Shagqu, 476000, Cha 2 School of Computer Scece
More informationProposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, ol. 9, No. 2, 218 Proposed a Adaptve Btrate Algorthm based o Measurg Badwdth ad deo Buffer Occupacy for Provdg Smoothly deo Streamg Saba
More informationA HIGH ACCURACY HIGH THROUGHPUT JITTER TEST SOLUTION ON ATE FOR 3GBPS AND 6GBPS SERIAL-ATA
A HIGH ACCURACY HIGH THROUGHPUT JITTER TEST SOLUTION ON ATE FOR 3GBPS AND 6GBPS SERIAL-ATA Yogqua Fa, Y Ca ad Zeljko Zlc LSI Corporato 0 Amerca Parkway NE, Alletow, Pesylvaa 809 Emal: y.ca@ls.com Departmet
More informationAn innovative transmission mechanism applicable to variable speed wind turbines
Europea ssocato for the Developmet of Reewable Eerges, Evromet ad Power Qualty (E4EPQ) Iteratoal Coferece o Reewable Eerges ad Power Qualty (ICREPQ 1) Graada (S), 23th to 25th March, 21 ovatve trasmsso
More informationChinese Remainder. Discrete Mathematics Andrei Bulatov
Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators
More information5. Random Processes. 5-3 Deterministic and Nondeterministic Random Processes
5. Radom Processes 5- Itroducto 5- Cotuous ad Dscrete Radom Processes 5-3 Determstc ad Nodetermstc Radom Processes 5-4 Statoary ad Nostatoary Radom Processes 5-5 rgodc ad Noergodc Radom Processes 5-6 Measuremet
More informationVehicle Identification using Discrete Spectrums in Wireless Sensor Networks
JOURNAL OF NETWORKS, VOL. 3, NO. 4, APRIL 2008 51 Vehcle Idetfcato usg Dscrete Spectrums Wreless Sesor Networs Seug S. Yag Vrga State Uersty/Departmet of Computer Iformato Systems, Petersburg, U.S.A. Emal:
More informationA Non-Blind Watermarking Scheme for Gray Scale Images in Discrete Wavelet Transform Domain using Two Subbands
IJCSI Iteratoal Joural of Computer Scece Issues, Vol. 9, Issue 5, No, September 0 ISSN (Ole): 694-084 www.ijcsi.org 0 A No-Bld Watermarkg Scheme for Gray Scale Images Dscrete Wavelet Trasform Doma usg
More informationForecasting the Exchange Rate of US Dollar-China Renminbi Using Hybrid Techniques of Statistical and Soft Computing Approaches
Joural of Idustral ad Itellget Iformato Vol. 4, o. 4, July 206 Forecastg the Exchage Rate of US Dollar-Cha Remb Usg Hybrd Techques of Statstcal ad Soft Computg Approaches Yuehje E. Shao, Che-Ch L, ad Po-Yu
More informationRobust Location Tag Generation from Noisy Location Data for Security Applications
Robust Locato Tag Geerato from Nosy Locato Data for Securty Applcatos D Qu, Da Boeh, Sherma Lo, Per Ege, Staford Uversty BIOGRAPHY D Qu s a Ph.D. caddate Aeroautcs ad Astroautcs workg the Global Postog
More informationProvded by the author(s) ad Uversty College Dubl Lbrary accordace wth publsher polces. Please cte the publshed verso whe avalable. Ttle Gaussa Pulse-Based Two-Threshold Parallel Scalg Toe Reservato for
More informationWeighted Centroid Correction Localization in Cellular Systems
Amerca J. of Egeerg ad Appled Sceces 4 (): 37-4, 20 ISSN 94-7020 200 Scece Publcatos Weghted Cetrod Correcto Localzato Cellular Systems Rog-Zheg L, X-Log Luo ad Ja-Ru L Key Laboratory of Uversal Wreless
More informationAnomaly Detection Based on a Multi-class CUSUM Algorithm for WSN
6 JOURNAL OF COMPUTERS, VOL., NO. 2, FEBRUARY Aomaly Detecto Based o a Mult-class Algorthm for WSN Xao heghog School of Iformato Scece ad Egeerg, Cetral South Uersty, Chagsha (483), Cha School of Computer
More informationA Signal Driven Adaptive Resolution Short-Time Fourier Transform
Iteratoal Joural of Iformato ad Commucato Egeerg 5:3 009 A Sgal Drve Adaptve Resoluto Short-Tme Fourer Trasform Saeed Ma Qasar, Lauret Fesquet ad Marc Reaud Abstract The frequecy cotets of the o-statoary
More informationStudy of algorithms to optimize frequency assignment for autonomous IEEE access points
IJCSI Iteratoal Joural of Computer Scece Issues, Vol. 7, Issue 5, September 1 ISSN (Ole): 1694-814 64 Study of algorthms to optmze frequecy assgmet for autoomous IEEE 8.11 access pots Mchael Fsterbusch
More informationFace Recognition Algorithm Using Muti-direction Markov Stationary Features and Adjacent Pixel Intensity Difference Quantization Histogram
ICSNC 2012 : The Seveth Iteratoal Coferece o Systems ad Networks Commucatos Face Recogto Algorthm Usg Mut-drecto Markov Statoary Features ad Adjacet xel Itesty Dfferece Quatzato Hstogram Fefe Lee, Koj
More informationFairness of High-Speed TCP Protocols with Different Flow Capacities
JOURNAL OF NETWORKS, VOL. 4, NO. 3, MAY 9 63 Faress of Hgh-Speed TP Protocols wth Dfferet Flow apactes Rachd Mbarek, Mohamed Tahar Be Othma*, Salem Nasr *Seor Member, IEEE ollege of omputer, Qassm Uversty,
More information2008 Machine Intelligence Research Laboratories (MIR Labs)
X. Wag, X. Z. Gao, ad S. J. Ovaska. 8. A ovel partcle swarm based method for olear fucto optmzato. Iteratoal Joural of Computatoal Itellgece Research, volume 4, umber 3, pages 8 89. 8 Mache Itellgece Research
More informationDual-Module Data Fusion of Infrared and Radar for Track before Detect
JOURAL OF COMPUTERS, VOL. 7, O. 2, DECEMBER 22 286 Dual-Module Data Fuso of Ifrared ad Radar for Trac before Detect Afu ZHU orth Cha Uversty of Water Resources ad Electrc Power Uversty,Zhegzhou, P.R.Cha
More informationAutomatic Construction of Semantic Dictionary for Question Categorization
Automatc Costructo of Sematc Dctoary for Questo Categorzato Tayog HAO Departmet of Computer Scece, Cty Uversty of Hog Kog Hog Kog, Cha Xglag NI Departmet of Computer Scece ad Techology, Uversty of Scece
More informationProject Scheduling with Two Constrained Resources
Proect Schedulg wth Two Costraed Resources Rog-Hwa Huag, Hsag-L Hsao, Szu-ha Hu, Shh-Tg Syu, ug-a Ho, Rou-We Hsu, Yu-Y Lu Departmet of Busess Admstrato Fu e Catholc Uversty No.50, Chug-Cheg Rd., Hschuag
More informationAn ANOVA-Based GPS Multipath Detection Algorithm Using Multi-Channel Software Receivers
A ANOVA-Based GPS Multpath Detecto Algorthm Usg Mult-Chael Software Recevers M.T. Breema, Y.T. Morto, ad Q. Zhou Dept. of Electrcal ad Computer Egeerg Mam Uversty Oxford, OH 4556 Abstract: We preset a
More informationInstallation and Dispatch of the Traffic Patrol Service Platform
Iteratoal Joural of Statstcs ad Probablty; Vol. 6, No. 1; Jauary 2017 ISSN 1927-7032 E-ISSN 1927-7040 Publshed by Caada Ceter of Scece ad Educato Istallato ad Dspatch of the Traffc Patrol Servce Platform
More informationFault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks
1 Fault-Tolerat Small Cells Locatos Plag G/G Heterogeeous Wreless Networks Tamer Omar 1, Zakha Abchar, Ahmed E. Kamal 3, J. Morrs Chag ad Mohammad Aluem 1 Departmet of Techology Systems, East Carola Uversty,
More informationCharacterization and Construction of Permutation Graphs
Ope Joural of Dscrete Mathematcs, 03, 3, 33-38 http://dxdoorg/036/odm033007 Publshed Ole Jauary 03 (http://wwwscrporg/oural/odm) Characterzato ad Costructo of Permutato Graphs Seero V Geraco, Teofa A Rapaut,
More informationAn Evolutionary Stochastic Approach for Efficient Image Retrieval using Modified Particle Swarm Optimization
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, A Evolutoary Stochastc Approach for Effcet Image Retreval usg Modfed Partcle Swarm Optmzato Hads Hedar Departmet of Computer Egeerg Raz
More informationExam. Real-time systems, basic course, CDT315. Grading: Swedish grades: ECTS grades:
6 Exam eal-tme systems, basc course, 35 eacher: amr Isovc Phoe: 0 3 73 Exam durato: 08:30 3:30 Help alloed: Pots: calculator ad a laguage dctoary 48 p Gradg: Sedsh grades: ES grades: Importat formato:
More informationCS519K: M ULTIMEDIA SYSTEMS STUDENT PROJECTS DATE ANNOUNCED: OCTOBER 25, 2002 DUE DATE:
CS519K: M ULTIMEDIA SYSTEMS STUDENT PROJECTS DATE ANNOUNCED: OCTOBER 25, 2002 DUE DATE: DECEMBER 5, 2002, 11:59PM Basc gropg: Groups of 2 studets each; (or dvdual 1-member groups) There are 6 projects.
More informationFault-Tolerant Small Cells Locations Planning in 4G/5G Heterogeneous Wireless Networks
Ths artcle has bee accepted for publcato a future ssue of ths joural, but has ot bee fully edted. Cotet may chage pror to fal publcato. Ctato formato: DOI 10.1109/TVT.016.613, IEEE Trasactos o Vehcular
More informationLECTURE 4 QUANTITATIVE MODELS FOR FACILITY LOCATION: SERVICE FACILITY ON A LINE OR ON A PLANE
LECTUE 4 QUANTITATIVE MODELS FO FACILITY LOCATION: SEVICE FACILITY ON A LINE O ON A PLANE Learg objectve 1. To demostrate the quattatve approach to locate faclt o a le ad o a plae 6.10 Locatg Faclt o a
More informationRobot Path Planning Based on Random Coding Particle Swarm Optimization
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, Vol. 6, No. 4, 5 Robot Path Pla Based o Radom Cod Partcle Swarm Optmzato Ku Su Collee of Electroc ad Electrcal Eeer Shaha Uversty of Eeer
More information