Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol

Size: px
Start display at page:

Download "Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol"

Transcription

1 Internatonal Journal of Securt and Its pplcatons pp rptanalss and Improvement of a Password-ased uthentcated Three-Part e Echange Protocol oungsook Lee Department of ber Investgaton Polce Howon Unverst Gunsan Jeonrabukdo orea sooklee@howon.ac.kr bstract Protocols for password-based authentcated ke echange (PE) n the three-part settng must be desgned to be secure aganst dctonar attacks even n the presence of a malcous nsder. In ths work we revst the three-part PE protocol proposed b m and ho n 2009 and demonstrate that the protocol s vulnerable to an nsder offlne dctonar attack (whch allows an adversar to mpersonate a legtmate part and ntate transactons). We also show that due to the vulnerablt m and ho s protocol s rendered nsecure n the n dstngush ablt-based securt model of ellare Pontcheval and Rogawa (2000). We propose an mproved three-part PE protocol whch s resstant to all classes of dctonar attacks ncludng nsder offlne dctonar attacks and undetectable onlne dctonar attacks. ewords: uthentcated ke echange Password Three-part settng Dctonar attack Insder 1. Introducton Password-based authentcated ke echange (PE) protocols enable two or more partes who hold ther passwords as long-term secrets to establsh a shared crptographcall strong ke (commonl called a sesson ke) whle communcatng over a publc nsecure network [1-4]. Due to the persstent populart of passwords as an accessble authentcaton method n toda s computng envronment PE protocols have been among the most wdel emploed and fundamental prmtves n crptograph. ellovn and Merrtt [1] proposed the frst PE protocols known as Encrpted e Echange (or EE) n the two-part settng where each par of two partes wshng to establsh a sesson ke s assumed to hold the same password. lthough there are some password-based protocols publshed n advance of EE these earler protocols were desgned to work onl n a hbrd settng where partes are assumed to share publc kes n addton to passwords. Over the past 20 ears the EE protocol has been followed b a number of two-part PE protocols ncludng the recent protocol of atz and Vakuntanathan [3] whch runs n a sngle communcaton round and acheves provable securt n the standard model (.e. wthout random oracles). Whle PE protocols are cheap and effectve tools for securng publc communcatons ther desgn has been proven to be notorousl hard. ke challenge n desgnng PE protocols s to preserve password securt aganst dctonar attacks whereb an adversar ends up wth the correct password after ehaustvel testng all possble passwords aganst known password verfers. Ths s partcularl the case n the three-part settng whch we consder n ths work. Unlke the two-part settng the three-part settng supposes that the two partes (called clents) do not hold the same password but hold ther ndvdual password Onlne Verson Onl. ook made b ths fle s ILLEGL. ISSN: IJSI oprght c 2014 SERS

2 Internatonal Journal of Securt and Its pplcatons shared onl wth a trusted authentcaton server. Dctonar attacks pose a more subtle threat n the three-part settng as a malcous et legtmate clent can mount an nsder attack aganst ts partner clent. In fact there have been man three-part PE protocols broken b nsder onlne/offlne dctonar attack; see e.g. Refs. [5-8]. In ths work we revst the three-part PE protocol presented b m and ho n 2009 [9] whch was clamed to be secure aganst onlne/offlne dctonar attacks. m and ho s protocol was proposed as a f to the flaws the found on the protocol of Lu and ao (2007) [10]. ut as we demonstrated n Secton 3 m and ho s protocol s susceptble to an offlne dctonar attack n the presence of a malcous nsder. Due to ths vulnerablt m and ho s protocol s rendered nsecure n the n dstngush ablt-based securt model of ellare Pontcheval and Rogawa [11] - ths model s probabl one of the most wdel accepted models n the provable securt paradgm for protocol analss. We also present an mproved three-part PE protocol whch s secure aganst all classes of dctonar attacks ncludng nsder offlne dctonar attacks and undetectable onlne dctonar attacks. 2. Revew of m and ho s Protocol Here we revew the three-part PE protocol presented b m and ho [9] as an mproved verson of Lu and ao s three-part PE protocol [10]. Let and denote two clents who wsh to establsh a sesson ke and assume that the are regstered wth the same trusted server S who ests to provde ts regstered clents wth a central authentcaton servce. Let pw and pw be the passwords of and respectvel shared wth the server S va a secure channel. pw (resp. pw ) s used as the long-term secret ke of (resp. ) and S. efore the protocol s ever eecuted the server needs to determne and publcze the followng sstem parameters: cclc group G of prme order and a generator g of the group G. Two elements M and N of group G. Two crptographc hash functons G : 0 1 G and H : where s a securt parameter representng the length of sesson kes. Wth these publc parameters and the secret passwords establshed m and ho s protocol runs as follows: u 1. chooses two random numbers u Z and computes U g X g and pw. Then sends X ( U X ) M ID X to. 2. selects two random numbers v Z and computes pw. then sends (V ) N 3. Upon recevng Net S ID X ID to S. V v g ID X ID S frst recovers X and b computng: chooses a random / U ID ID / V ID ID ( / pw ) X X M U ( / N pw ) V z Z and computes g and Onlne Verson Onl. ook made b ths fle s ILLEGL. 152 oprght c 2014 SERS

3 Internatonal Journal of Securt and Its pplcatons Onlne Verson Onl. ook made b ths fle s ILLEGL. Fgure 1. m and ho s Three-Part PE Protocol oprght c 2014 SERS 153

4 Internatonal Journal of Securt and Its pplcatons Then S sends 4. fter havng receved and sends 5. Upon recevng X to. to. X z X z pw p w G ( ID ID ID X ) S pw p w G ( ID ID ID ) S X X p w. p w X computes pw p w G ( ID ID ID ) computes S / X X p w X G ( ID ID ) pw p w G ( ID ID ID X ) S / p w and checks f s eual to ( ). If not aborts the protocol. Otherwse computes the sesson ke S H ( ID ID ) and sends the authentcator G ( ID ID ) to. 6. Verfes that s eual to ( ) G ID ID. borts the protocol f the verfcaton fals and otherwse computes the sesson ke S H ( ID ID ). The operaton of the protocol s depcted n Fgure 1. t the end of the protocol eecuton and wll compute the same sesson ke S H ( ID ID ) as can be seen from the euatons and z pw Onlne Verson Onl. ook made b ths fle s ILLEGL. g 154 oprght c 2014 SERS

5 Internatonal Journal of Securt and Its pplcatons X pw X g z. 3. Dctonar ttack and ts Formal nalss Ths secton demonstrates that m and ho s three-part PE protocol descrbed n the prevous secton s susceptble to an nsder offlne dctonar attack. s we have earler mentoned m and ho s protocol was proposed to elmnate the vulnerablt of Lu and ao s protocol [10] to an undetectable onlne dctonar attack. lthough m and ho s protocol ma be secure aganst undetectable onlne dctonar attacks we found that t s not secure aganst an offlne dctonar attack n the presence of a malcous clent. ssume that s a malcous clent who wshes to dscover the password of clent. Then can mount the followng offlne dctonar attack aganst. Phase 1. Frst gathers nformaton reured to verf password guesses b runnng the protocol wth the clent and the server S. Step 1. Proceeds as per the protocol specfcaton ecept that t nterferes wth the message echanges between and S as follows: eavesdrops on the message When S sends the message and sends the forged message X X X f t s from S. Step 2. Wthout notcng that as G ( ID ID ) where ID X ID sent b to S for future use. X to ntercepts the message computes X was replaced wth X pw ( X X ) g z X X pw g X p w X pw. X (nstead of X ) as X wll compute Onlne Verson Onl. ook made b ths fle s ILLEGL. fter the computaton of the protocol. Step 3. s soon as wll send the message to as specfed n s receved the malcous nsder sends a falure message falsfng that due to an unepected fatal error t has faled to compute ts sesson ke and thus has aborted the protocol. oprght c 2014 SERS 155

6 Internatonal Journal of Securt and Its pplcatons Phase 2. can now verf password guesses on pw usng the obtaned nformaton ID. ( ) Step 1. Frst computes Step 2. Net makes a guess pw S and p w G ( ID ID ID X ) z pw g. pw on the password / ( pw / ) V ID ID N V G ( ID ID ). pw and computes Step 3. Then verfes the correctness of pw b checkng that s eual to. If pw s the correct password (.e. p w p w ) then and must be eual. Step 4. Repeats Steps 2 and 3 (of ths verfcaton phase) untl a correct password s found. It s straghtforward to see that Lu and ao s three-part PE protocol [10] the predecessor of m and ho s protocol s also vulnerable to the same nsder dctonar attack as descrbed above. The vulnerablt above mples nsecurt n the wdel accepted n dstngush abltbased model of ellare Pontcheval and Rogawa [11] n whch the adversar s gven access to the varous oracles such as Send Eecute Reveal orrupt and Test. Let denote the -th nstance of clent and p d denote the partner dentfer of nstance. (Readers who are unfamlar wth formal securt models are referred to Ref. [11].) ssume that a uer of the form Send ( start: { S } ) prompts to ntate the protocol wth p d { S }. Then an adversar who breaks the n dstngush ablt-based securt of m and ho s protocol can be constructed as descrbed n Table 1. Table 1. onstructon of an dversar who breaks the n Dstngush bltbased Securt of m and ho s Protocol n the Formal Model of ellare Pontcheval and Rogawa [11] Step Descrpton 1 orrupton obtans s password pw b uerng orrupt ( ). 2 Dctonar attack runs a protocol sesson n the eact same wa as dd n the dctonar attack descrbed above. Note that can perfectl smulate s attack b usng the dsclosed password pw and b askng Send ueres appropratel. wll obtan s password pw as a result of the attack. 3 Impersonaton ntates a new protocol sesson b uerng Send( start: { S } ) where s an unused nstance of an uncorrupted clent. runs ths sesson as per the protocol specfcaton but smulatng b tself all the actons of (b usng Onlne Verson Onl. ook made b ths fle s ILLEGL. 156 oprght c 2014 SERS

7 Internatonal Journal of Securt and Its pplcatons pw ). t the end of the sesson the nstance wll accept wth ts sesson ke sk. 4 Test learl the nstance s fresh: (1) no Reveal uer has ever been made for an nstance and (2) no orrupt uer has been asked for an of p d { S }. Thus ma ask the uer Test( ). Snce can compute the same sesson ke as sk the probablt that guesses correctl the bt b chosen b the Test oracle s 1 and so s the advantage of n attackng m and ho s protocol. 4. n Improved Three-Part PE Protocol In ths secton we propose a new three-part PE protocol whch s secure aganst offlne dctonar attacks as well as undetectable onlne dctonar attacks. Our proposed protocol uses a smmetrc encrpton scheme = (Enc Dec) where Enc s the encrpton algorthm and Dec s the decrpton algorthm a message authentcaton code (M) scheme = (Mac Ver) where Mac and Ver are the M generaton and M verfcaton algorthms respectvel and a crptographc hash functon H : where represents the length of kes for the smmetrc encrpton scheme. Let G be a cclc group of prme order and g be a generator of the group G. The mproved protocol s shown n Fgure 2 and ts descrpton s as follows: Step 1. and S generate a common secret ke k from ther shared password pw whle and S generate a secret ke k from the password pw. More precsel k and k are generated as follows: chooses a random Z X p w k p w k computes g P W H ( S p w ) and PW X E n c ( X ) and sends X to S. t the same tme S chooses a random z computes Z S p w ) and E n c ( ) z Z g P W H ( Z Z and sends PW S Z to. Then and S decrpt Z and X respectvel and set z k g. chooses a random Z g P W H ( S p w ) PW computes and E n c ( ) and sends chooses a random z g z Z to S. S computes Z P W H ( S p w ) Z PW and E n c ( Z ) and sends S Z to. Onlne Verson Onl. ook made b ths fle s ILLEGL. Then and S decrpt Z and z respectvel and set k g. oprght c 2014 SERS 157

8 Internatonal Journal of Securt and Its pplcatons Step 2. hooses a random Fgure 2. Our Improved Three-Part PE Protocol u Z computes U u M a c and sends g and k ( U ) v Z U to S. Lkewse chooses a random and k ( V ) M a c and sends V to S. Step 3. S borts the protocol f ether ( U ) 1 k computes V e r or ( V ) 1 k V g V e r does not hold. Otherwse S computes M a c ( ) and M a c ( ) and k V k U sends S V and S U to and respectvel. Step 4. borts f V e r ( V ) 1 does not hold. Otherwse computes the sesson ke Onlne Verson Onl. ook made b ths fle s ILLEGL. S u k V. Meanwhle checks f ( U ) 1 check fals. Otherwse computes the sesson ke V e r s true and aborts f the k S v U. v 158 oprght c 2014 SERS

9 Internatonal Journal of Securt and Its pplcatons The sesson-ke computaton n the protocol s the same as n the Dffe-Hellman ke echange protocol. Hence t s straghtforward to verf the correctness of the protocol. The nsder offlne dctonar attack mounted aganst m and ho s protocol s no longer vald aganst our mproved protocol snce the algebrac propert used b the attack does not est n our protocol. Furthermore our protocol provdes mutual authentcaton between the server and the clents va the M values echanged n Steps 2 and 3 and therefore s secure aganst undetectable onlne dctonar attacks. 5. oncluson Ths work dentfed that the three-part PE protocol due to m and ho s not secure aganst an offlne dctonar attack n the presence of a malcous nsder. Our attack hghlghts agan the dffcult of desgnng a secure et effcent PE protocol n the password-onl three-part protocol. Ths work also demonstrated that the estence of our dctonar attack mples nsecurt of m and ho s protocol n the n dstngush abltbased securt model of ellare Pontcheval and Rogawa. Fnall ths work presented an mproved three-part PE protocol whch s secure aganst nsder offlne dctonar attacks as well as undetectable onlne dctonar attacks. We hope that smlar securt vulnerabltes as dentfed n ths work can be avoded n the future desgn of three-part PE protocols. cknowledgements Ths work was supported b Howon Unverst n References [1] S. ellovn and M. Merrtt Encrpted ke echange: password-based protocols secure aganst dctonar attacks IEEE Smposum on Securt and Prvac (1992) Ma 4-6 pp [2] J. Nam J. Pak and D. Won securt weakness n bdalla et al. Generc constructon of a group ke echange protocol Informaton Scences vol. 181 no. 1 (2011) pp [3] J. atz and V. Vakuntanathan Round-optmal password-based authentcated ke echange Journal of rptolog vol. 26 no. 4 (2013) pp [4] H. Tsa and. hang Provabl secure three part encrpted ke echange scheme wth eplct authentcaton Informaton Scences vol. 238 (2013) pp [5] W. Wang and L. Hu Effcent and provabl secure generc constructon of three-part password-based authentcated ke echange protocols Progress n rptolog - INDORPT 2006 LNS vol (2006) December pp [6] J. Nam J. Pak H. ang U. m and D. Won n off-lne dctonar attack on a smple three-part ke echange protocol IEEE ommuncatons Letters vol. 13 no. 3 (2009) pp [7] S. Wu Q. Pu S. Wang and D. He rptanalss of a communcaton-effcent three-part password authentcated ke echange protocol Informaton Scences vol. 215 (2012) pp [8] J. Nam R. hoo M. m J. Pak and D. Won Dctonar attacks aganst password-based authentcated three-part ke echange protocols SII Transactons on Internet and Informaton Sstems vol. 7 no. 12 (2013) pp [9] H. m and J. ho Enhanced password-based smple three-part ke echange protocol omputers and Electrcal Engneerng vol. 35 no. 1 (2009) pp [10] R. Lu and Z. ao Smple three-part ke echange protocol omputers & Securt vol. 26 no. 1 (2007) pp [11] M. ellare D. Pontcheval and P. Rogawa uthentcated ke echange secure aganst dctonar attacks dvances n rptolog - EURORPT 2000 LNS vol (2000) Ma pp Onlne Verson Onl. ook made b ths fle s ILLEGL. oprght c 2014 SERS 159

10 Internatonal Journal of Securt and Its pplcatons uthor oungsook Leefr3he receved the.e. and the M.S. degrees n Informaton Engneerng and Informaton Securt from Sungkunkwan Unverst orea n 1987 and n She receved the PH. D degree n omputer Engneerng from Sungkunkwan Unverst orea n She s now an assocate professor n Howon Unverst. Her current research nterests nclude crptograph and dgtal forensc. Onlne Verson Onl. ook made b ths fle s ILLEGL. 160 oprght c 2014 SERS

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou,

Xiuqing Chen 1 *, Tianjie Cao 1 *, Jingxuan Zhai 1, Yu Guo 2 1 School of Computer, China University of Mining and Technology, Xuzhou, [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 0 Issue 9 BoTechnology 04 An Indan Journal FULL PAPE BTAIJ, 0(9, 04 [3908-397] Securty lghtweght FID protocol for U- healthcare system Xuqng

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

NFC Communications-based Mutual Authentication Scheme for the Internet of Things

NFC Communications-based Mutual Authentication Scheme for the Internet of Things Internatonal Journal of Network Securty, Vol.19, No.4, PP.631-638, July 2017 (DOI: 10.6633/IJNS.201707.19(4).17) 631 NFC Communcatons-based Mutual uthentcaton Scheme for the Internet of Thngs Yanna Ma

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( ) Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services

Graphical User-ID with Partial Match Scheme and Application for Mobile Web-Services Journal of Advances n Informaton Technology Vol. 7, No. 3, August 2016 Graphcal User-ID wth Partal Match Scheme and Applcaton for Moble Web-Servces Yusue Matsuno, Kyoj Kawagoe, and Kenta Ou Rtsumean Unversty,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School

DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS NADER MAZEN RABADI DISSERTATION. Submitted to the Graduate School DRIVERS ANONYMITY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS by NADER MAZEN RABADI DISSERTATION Submtted to the Graduate School of Wayne State Unversty, Detrot, Mchgan n partal fulfllment of the requrements

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

aperture David Makovoz, 30/01/2006 Version 1.0 Table of Contents

aperture David Makovoz, 30/01/2006 Version 1.0 Table of Contents aperture 1 aperture Davd Makovoz, 30/01/2006 Verson 1.0 Table of Contents aperture... 1 1 Overvew... 2 1.1 Input Image Requrements... 2 2 aperture... 2 2.1 Input... 2 2.2 Processng... 4 2.3 Output Table...

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks Mult-hop Coordnaton n Gosspng-based Wreless Sensor Networks Zhlang Chen, Alexander Kuehne, and Anja Klen Communcatons Engneerng Lab, Technsche Unverstät Darmstadt, Germany Emal: {z.chen,a.kuehne,a.klen}@nt.tu-darmstadt.de

More information

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code

Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar. 2016 12 Defense Aganst Selfsh PUEA n Cogntve Rado Networks Based on Hash Message Authentcaton Code Wald Ramadan

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse

Chapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing EPDA: Enhancng Prvacy-Preservng Data Authentcaton for Moble Crowd Sensng arxv:8.375v [cs.cr] 9 Nov 8 Jngwe Lu, Fanghu Ca, Longfe Wu, Rong Sun, Lehuang Zhu and Xaojang Du State Key Lab of ISN, Xdan Unversty,

More information

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables

Optimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables S. Aucharyamet and S. Srsumrannukul / GMSARN Internatonal Journal 4 (2010) 57-66 Optmal Allocaton of Statc VAr Compensator for Actve Power oss Reducton by Dfferent Decson Varables S. Aucharyamet and S.

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication

EPAS: Efficient Privacy-preserving Authentication Scheme for VANETs-based Emergency Communication 94 JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 03 EPAS: Effcent Prvacy-preservng Authentcaton Scheme for VANETs-based Emergency Communcaton Xuedan Ja School of Computer Scence and Telecommuncaton Engneerng,

More information

Online Reporting. Online Reporting. A step-by-step guide. Important information for churches, schools and organisations

Online Reporting. Online Reporting. A step-by-step guide.   Important information for churches, schools and organisations Onlne Reportng Onlne Reportng A step-by-step gude www.olr.ccl.com Important nformaton for churches, schools and organsatons May 2016 Reportng s a vtal part of beng a lcence holder... Reportng s a requrement

More information

AFV-P 2U/4U. AC + DC Power Solutions. series. Transient Generation for Disturbance Tests. only. High Performance Programmable AC Power Source

AFV-P 2U/4U. AC + DC Power Solutions. series. Transient Generation for Disturbance Tests. only. High Performance Programmable AC Power Source AFV-P seres Hgh Performance Programmable AC Power Source only 2U/4U Intutve Touch Screen HMI Output Frequency up to 15-1000Hz Power Lne Smulatons: Step & Ramp Features Fast Response Tme: 300μs AC Source

More information

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint Dynamc Lghtpath Protecton n WDM Mesh etworks under Wavelength Contnuty Constrant Shengl Yuan* and Jason P. Jue *Department of Computer and Mathematcal Scences, Unversty of Houston Downtown One Man Street,

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE46, Power Electroncs, DC-DC Boost Converter Verson Oct. 3, 11 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks An Actvty Based Moblty Predcton Strategy Usng Markov Modelng for Wreless Networks R.V. Mathvarun and V.Vadeh Abstract: The foremost objectve of a wreless network s to facltate the communcaton of moble

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

PRO- CRIMPER* III Hand Crimping

PRO- CRIMPER* III Hand Crimping PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 91338-1 408-8377 wth De Assembly 91338-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

arxiv: v2 [cs.dc] 31 Jul 2017

arxiv: v2 [cs.dc] 31 Jul 2017 Usng Blockchan for Peer-to-Peer Proof-of-Locaton Gacomo Bramblla, Mchele Amorett, and Francesco Zanchell Dept. of Engneerng and Archtecture, Unversty of Parma, Italy Contact: mchele.amorett@unpr.t arxv:1607.00174v2

More information

Distributed Fault Detection of Wireless Sensor Networks

Distributed Fault Detection of Wireless Sensor Networks Dstrbuted Fault Detecton of Wreless Sensor Networs Jnran Chen, Shubha Kher, and Arun Soman Dependable Computng and Networng Lab Iowa State Unversty Ames, Iowa 50010 {jrchen, shubha, arun}@astate.edu ABSTRACT

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem

EE 508 Lecture 6. Degrees of Freedom The Approximation Problem EE 508 Lecture 6 Degrees of Freedom The Approxmaton Problem Revew from Last Tme Desgn Strategy Theorem: A crcut wth transfer functon T(s) can be obtaned from a crcut wth normalzed transfer functon T n

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

An Effective QoS Integrated Weighted Cost Model for LEO/MEO Satellite IP Networks

An Effective QoS Integrated Weighted Cost Model for LEO/MEO Satellite IP Networks 2706 JOURNA OF NETWORKS, VO 8, NO 11, NOVEBER 2013 An Effectve QoS Integrated Weghted Cost odel for EO/EO Satellte IP Networks Tengue ao College of Computer Scence, South-Central Unverst for Natonaltes,

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

Optimal Phase Arrangement of Distribution Feeders Using Immune Algorithm

Optimal Phase Arrangement of Distribution Feeders Using Immune Algorithm The 4th Internatonal Conference on Intellgent System Applcatons to Power Systems, ISAP 2007 Optmal Phase Arrangement of Dstrbuton Feeders Usng Immune Algorthm C.H. Ln, C.S. Chen, M.Y. Huang, H.J. Chuang,

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Optimum Allocation of Distributed Generations Based on Evolutionary Programming for Loss Reduction and Voltage Profile Correction

Optimum Allocation of Distributed Generations Based on Evolutionary Programming for Loss Reduction and Voltage Profile Correction ISSN : 0976-8491(Onlne) ISSN : 2229-4333(rnt) Optmum Allocaton of Dstrbuted Generatons Based on Evolutonary rogrammng for Reducton and Voltage rofle Correcton 1 Mohammad Saleh Male, 2 Soodabeh Soleyman

More information

A SVD-Based Optical MIMO Precoding Scheme in Indoor Visible Light Communication

A SVD-Based Optical MIMO Precoding Scheme in Indoor Visible Light Communication Internatonal Journal of Future Computer and Communcaton, Vol. 3, No. 6, December 0 A SVD-Based Optcal MIMO Precodng Scheme n Indoor Vsble Lght Communcaton Qng-Feng Lu, Shua-Fang Xao, Ka-Zh uang, and Zhou

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2)

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2) PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58495-1 408-9819 Wth De Assembly 58495-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

onlinecomponents.com

onlinecomponents.com PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58535-1 wth 408-4021 De Assembly 58535-2 29 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

The Byzantine Generals Problem

The Byzantine Generals Problem The Byzantne Generals Problem A paper by: Lesle Lamport, Robert Shostak, and Marshall Pease. Summary by: Roman Kaplan. Every computer system must cope wth computer malfunctons, whereas a malfuncton does

More information

Order-4 Quasi-Orthogonal Cooperative Communication in STFC MB-OFDM UWB

Order-4 Quasi-Orthogonal Cooperative Communication in STFC MB-OFDM UWB Unversty of Wollongong Research Onlne aculty of Engneerng and Informaton Scences - Papers: Part aculty of Engneerng and Informaton Scences 202 Order-4 Quas-Orthogonal Cooperatve Communcaton n STC MB-ODM

More information

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Ultimate X Bonus Streak Analysis

Ultimate X Bonus Streak Analysis Ultmate X Bonus Streak Analyss Gary J. Koehler John B. Hgdon Emnent Scholar, Emertus Department of Informaton Systems and Operatons Management, 35 BUS, The Warrngton College of Busness, Unversty of Florda,

More information

Double-oracle Algorithm for Computing an Exact Nash Equilibrium in Zero-sum Extensive-form Games

Double-oracle Algorithm for Computing an Exact Nash Equilibrium in Zero-sum Extensive-form Games Double-oracle Algorthm for Computng an Exact Nash Equlbrum n Zero-sum Extensve-form Games Branslav Bošanský 1, Chrstopher Kekntveld 2, Vlam Lsý 1, Jří Čermák 1, Mchal Pěchouček 1 1 Agent Technology Center,

More information

Section 5. Signal Conditioning and Data Analysis

Section 5. Signal Conditioning and Data Analysis Secton 5 Sgnal Condtonng and Data Analyss 6/27/2017 Engneerng Measurements 5 1 Common Input Sgnals 6/27/2017 Engneerng Measurements 5 2 1 Analog vs. Dgtal Sgnals 6/27/2017 Engneerng Measurements 5 3 Current

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Chapter 2 Basics of Efficient Secure Function Evaluation

Chapter 2 Basics of Efficient Secure Function Evaluation Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.

More information

D-STATCOM Optimal Allocation Based On Investment Decision Theory

D-STATCOM Optimal Allocation Based On Investment Decision Theory Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 2016) D-STATCOM Optmal Allocaton Based On Investment Decson Theory Yongjun Zhang1, a, Yfu Mo1, b and Huazhen

More information

Journal of Applied Science and Agriculture. A Novel Multi-Mode quadrature Oscillator with Simple Structure and High Oscillation Frequency Using CCII

Journal of Applied Science and Agriculture. A Novel Multi-Mode quadrature Oscillator with Simple Structure and High Oscillation Frequency Using CCII Journal of Appled Scence and Agrculture, 9(3) March 4, Pages: 98-96 AENSI Journals Journal of Appled Scence and Agrculture ISSN 86-9 Journal home page: www.aensweb.com/jasa/nde.html A Novel Mult-Mode uadrature

More information

Cooperative perimeter surveillance with a team of mobile robots under communication constraints

Cooperative perimeter surveillance with a team of mobile robots under communication constraints 213 IEEE/RSJ Internatonal Conference on Intellgent Robots and Systems (IROS) November 3-7, 213. Toyo, Japan Cooperatve permeter survellance wth a team of moble robots under communcaton constrants J.J.

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

PRO- CRIMPER* III Hand Crimping

PRO- CRIMPER* III Hand Crimping PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58641-1 wth 408-4379 De Assembly 58641-2 18 JUN 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

A RF Source Localization and Tracking System

A RF Source Localization and Tracking System The 010 Mltary Communcatons Conference - Unclassfed Program - Waveforms and Sgnal Processng Track A RF Source Localzaton and Trackng System Wll Tdd, Raymond J. Weber, Ykun Huang Department of Electrcal

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Achieving Transparent Coexistence in a Multi-hop Secondary Network Through Distributed Computation

Achieving Transparent Coexistence in a Multi-hop Secondary Network Through Distributed Computation Achevng Transparent Coexstence n a Mult-hop econdary Network Through Dstrbuted Computaton Xu Yuan Y h Y. Thomas Hou Wenng Lou cott F. Mdkff astry Kompella Vrgna olytechnc Insttute and tate Unversty, UA

More information