Energy Efficient Session Key Establishment in Wireless Sensor Networks

Size: px
Start display at page:

Download "Energy Efficient Session Key Establishment in Wireless Sensor Networks"

Transcription

1 Energy Effcent Sesson ey Estlshment n Wreless Sensor Networks Y Cheng nd Dhrm P. Agrwl OBR Center for Dstruted nd Mole Computng, Deprtment of ECECS Unversty of Cncnnt, Cncnnt, OH 45 {chengyg, dp}@ececs.uc.edu Astrct ey dstruton nd mngement s the foundton of ny secure servces of wreless sensor networks. Due to the resource constrnts, estlshng cryptogrphc keys etween communctng sensors n lrge-scle wreless sensor networks s g chllenge. Trdtonl symmetrc key cryptogrphy s not sutle for wreless sensor envronment ecuse of ts complexty. Bsed on the polynoml-key pre-dstruton scheme, n mproved sesson key estlshment method s proposed n ths pper. Compred wth exstng key dstruton schemes, our proposed scheme hs lower energy consumpton, less key storge nd lower communcton overheds s well s etter network reslence gnst node cpture ttcks. eywords: Communcton securty; Wreless sensor networks; ey estlshment.. Introducton Wth the recent technology mprovements n tny sensor devces, wreless sensor networks (WSNs) re expected to e pplcle n vrous pplctons n the ner future. A wreless sensor network s usully composed of lrge numer of smll, low-cost wreless devces clled sensor nodes. Ech sensor hs lmted dt processng cpcty, memory storge nd short rdo trnsmsson rnge. Dependng on the pplctons, sensor nodes cn e equpped wth vrety of sensors to mesure dfferent physcl chrcterstcs such s sound, temperture, pressure, etc. [][5][6]. Wreless sensors cn e orgnzed n clusters to trckng prtculr oect or montorng n re [][8]. In most cses, WSNs re deployed n hostle envronment nd workng on unttended mode, therefore, the crtcl dt redngs should e protected properly [4][][3][6][7]. As we known, n wreless envronment n dversry not only cn evesdrop the communcton trffc n network, ut lso cn mpersonte good nodes to spred msledng nformton ntentonlly. Furthermore, n mny pplctons such s ttlefeld survellnce, wreless sensors my e physclly destroyed or cptured y the dversry. To ensure sensor network work properly n such stutons, securty mechnsms must e dopted to cheve the nformton securty requrements. In trdtonl wred networks or nfrstructure-support wreless networks, nformton securty s provded y encryptng the communcton dt nd mutul uthentcton etween communctng prtes. Pulc-key cryptosystems nd trusted thrd-prty uthentcton protocols re used frequently to cheve the network securty requrements. Snce sensor nodes only hve lmted power, memory storge nd dt processng cpcty, pulc-key sed securty protocols re not sutle for lrge-scle sensor networks ecuse of ther complcted hrdwre requrement nd hgh energy consumpton. Lck of nfrstructure support s nother lmtton of WSNs, due to the unpredctle network topology, trusted nfrstructure sed protocols lso cn not e used for WSNs drectly. To cheve oth securty nd effcency, mny key dstruton nd mngement mechnsms hve een nvestgted [3][4][7][8][3][5][7][9][]. In whch, key pre-dstruton protocols re consdered to e prctcl mechnsm to solve the key dstruton nd mngement prolems n wreless sensor envronments [3]. The sc de of key pre-dstruton scheme s qute smple, ust pre-lodng set of symmetrc keys nto sensor nodes efore they re deployed. After deployment, ech sensor exchnges ts stored key nformton wth ts neghors. If two neghorng nodes hve common key, they cn use t to encrypt the communcton etween them. Bsed on the dstruted network rchtecture, severl key pre-dstruton schemes hve een proposed n lterture [3][4][3][9][], tred to cheve securty nd scllty for the lrge-scle WSNs. We rgue tht for lrge-scle pure dstruted network, t s extremely hrd for key pre-dstruton scheme to cheve oth securty nd scllty requrements when the sensor nodes re resource-constrned. [5][6] showed tht the herrchcl network rchtecture hs etter performnce nd scllty thn flt structure for lrge-scle WSNs, snce most dt re destned to the snk node (se stton), nd whch cn e reched n few hops n the herrchcl pproch. Reserch shows tht when usng the sme numer of sensors n gven coverge re, the

2 herrchcl topology cn sgnfcntly ncrese the network throughput nd decrese the system dely [5][6]. To cheve securty nd network performnce smultneously, we proposed new sesson key estlshment mechnsm for lrge-scle WSNs n ths pper. Bsed on the herrchcl network rchtecture, n mproved polynoml-key dstruton nd mngement mechnsm s nvestgted to estlsh energy effcent sesson keys etween communctng prtes. Compred wth exstng schemes, our pproch hs etter network performnce, s well s the securty. The rest of ths pper s orgnzed s follows. Secton ntroduces some relted work. We present our proposed scheme n detl n Secton 3. Secton 4 gves the securty nlyss nd the performnce evluton of our scheme. Fnlly, we conclude our work n Secton 5.. Relted Work Due to the resource constrnts, the extremely lrge network sze nd the lck of the nfrstructure support, trdtonl pulc-key sed symmetrcl key dstruton protocols nd trusted nfrstructure uthentcton securty mechnsms re not sutle for WSNs. Pre-dstrutng secret keys nto sensor nodes efore they re deployed s pplcle soluton for key mngement n wreless sensor envronment [3]. Severl key pre-dstruton schemes hve een proposed n the lterture [3][4][3][9][]. Eschenuer et l. [3] proposed rndom key predstruton scheme n. In ther scheme, suset of keys from lrge sze key pool s rndomly selected nd pre-loded nto sensors. If two nodes cn fnd common key, they cn setup secure lnk y t. Otherwse, they need to estlsh pth-key etween them. Accordng to the rndom grph theory, f the prolty tht ny two nodes hve t lest one common key stsfes crtcl vlue, the network s connected wth hgh prolty. Bsed on [3], Chn et l. proposed q -composte scheme to mprove the network reslence gnst node cpture ttcks [4]. Network reslence here s defned s how mny secure lnks etween non-cptured nodes could e roken when numer of sensors re compromsed. [4] requres two sensors shre t lest q ( q ) common keys to estlsh secure lnk. Chn et l. showed tht when the numer of the compromsed nodes s less thn crtcl vlue, the network reslence cn e mproved. Both [3] nd [4] cn not gurntee the full network connectvty. To cheve hgh network connectvty, n ddtonl pth-key estlshment procedure s requred, whch not only degrdes the securty, ut lso produces ddtonl communcton overheds. In [3][4] prtculr key my e reused for dfferent prs of nodes, some node s cpture could compromse the communcton etween non-cptured nodes, whch s the node cpture ttck prolem n WSNs. Cheng et l. proposed n effcent prwse key estlshment nd mngement scheme (EPEM) n [8]. In ths scheme, two-dmensonl key mtrx s constructed to pre-dstrute symmetrc keys nto sensors. Ech sensor stores row nd column from the key mtrx. EPEM gurntees every two nodes shre t lest two common keys fter the deployment. Comned wth the denttes of the communctng prtes, EPEM cn estlsh dstnct prwse key for ech pr of sensors. Although Cheng et l. s scheme cn provde etter network reslence thn prevous schemes; t stll hs some lmttons when used for lrge-scle WSNs. The communcton overhed s stll hgh, sensors need to store too mny keys n the network ntlzton phse. All ove work re sed on the pure dstruted network rchtecture. [5][6] show tht the herrchcl network rchtecture hs the etter network performnce thn the flt network, more nvestgtons hve een focused on ths network rchtecture recently. Jolly et l. proposed low-energy key mngement protocol for herrchcl WSNs n [9]. In ths work, some gtewy nodes prtton sensor network nto severl dstnct clusters. Ech cluster hs cluster hed nd set of sensors, senor node only communctes wth ts cluster hed. Ech cluster hed s pre-loded set of symmetrc keys n ts memory, nd ech of these symmetrc keys s lso pre-loded nto prtculr sensor node. After deployment, ech sensor needs to exchnge ts key nformton wth ts cluster hed. If they shre common key drectly, they cn use t s ther prwse key. Otherwse, the cluster hed needs to requre the ntended keys from other cluster heds. Although [9] provdes etter network performnce thn prevous key pre-dstruton schemes, t s not secure for node cpture ttck. Ech cluster hed hs lots of keys stored. Any cluster hed s cpture could compromse lot of keys n network. [9] uses group key to encrypt the communcton mong cluster heds, whch s extremely dngerous for wreless sensor envronment. Once the group key s compromsed, the dversry cn trck ll the communctons mong the cluster heds. In ths cse, the whole network would e roken. To ddress the ove prolems n [9], we proposed n energy effcent sesson key estlshment mechnsm (EES) for lrge-scle herrchcl WSNs. Bsed on the sme network model n [9] nd the polynoml-key estlshment procedure, our scheme cn mprove the network securty gnst the node cpture ttck. 3. Energy Effcent Sesson ey Estlshment (EES) 3.. Network Model In ths pper, we use the sme network model n [][]. Illustrted y Fg., there re three knds of wreless devces re exsted n our model: snk node/se stton (), cluster hed nodes (), nd wreless sensor nodes (S). Sensor nodes (S): Sensor nodes re resource constrnts, ech sensor only hs lmted power, memory

3 storge nd short rdo trnsmsson rnge. Sensor nodes only communcte wth ther cluster hed drectly; no communcton etween sensor nodes exsts. Sensor nodes re sttc fter the deployment. Cluster hed nodes (): Compred wth sensor nodes, cluster heds hve consderly hgh energy resources. They re equpped wth hgh power CPUs, lrge memory storges nd rdo trnsmsson rnge. Cluster heds cn communcte wth ech other drectly, nd rely nformton etween sensor nodes nd snk node. Snk node/bse stton (): Snk node s the most powerful node n network. It hs vrtully unlmted computtonl nd communcton power, unlmted memory storge, nd very lrge rdo trnsmsson rnge to rech ll the sensors n the network. In our network model, lrge numer of sensors re rndomly dstruted n n re. Snk node s deployed n well-protected plce. As shown n Fg., s prtton the sensors nto dstnct clusters y some clusterng lgorthm, e.g., []. Ech cluster hs cluster hed nd set of sensors; cluster hed ggregtes the dt from sensors, performs msson-relted dt processng, nd sends the processed dt to the snk node. Snk Node Cluster Heds Sensor Nodes Fg.. A herrchcl wreless sensor network rchtecture 3.. Bckground of Polynoml ey Predstruton Scheme To mprove the network securty gnst the node cpture ttck, vrte polynoml-key pre-dstruton mechnsm [3] s dopted n our scheme. Consder vrte polynoml of degree t, defned s t = x y (), = ) where the coeffcents (, t re rndomly chosen from fnte feld GF (q). The vrte polynoml hs symmetrc property such tht = f ( y, x) () In the ntlzton phse, n offlne ey Dstruton Server (DS) frst ntlzes set of sensors y gvng ech node p the polynoml g p ( = f ( p,, whch s the polynoml otned y evlutng t x = p. After deployment, node p knows tht g = t = ( p) ( t) (3) where p s d of the node, g s coeffcent of y n the polynoml f ( p,. In order to estlsh sesson key etween nodes p nd q, p evlutes f ( p, t y = q, nd q evlutes f ( q, t y = p. Snce f ( p, q) = f ( q, p), nodes p nd q cn otn the sme vlue from the two dstnct evlutons. Ths vlue s only known y p nd q, nd cn e worked s ther prwse communcton key. 3.3 Our Proposed Approch Our proposed key dstruton scheme s symmetrckey mechnsm, whch ncludes two phses: key predstruton phse nd network ntlzton phse. The nottons used n ths pper re lsted n Tle. Tle : Nottons used n our scheme Notton Descrpton Snk node (Bse stton) Cluster hed node S Sensor node Set of cluster heds n the network S Set of sensor nodes n the network A-B Symmetrc key etween A nd B (A, B cn e snk, cluster hed or sensor node) E (dt) Encrypted messge y key t-degree vrte symmetrc f ( x, polynoml (used for key clculton etween cluster heds) t-degree vrte symmetrc polynoml (used for key clculton ( m) etween cluster hed nd sensors) A) ey Pre-dstruton Phse Due to the resource constrnts of wreless sensors, the est key dstruton method s pre-lodng symmetrc keys nto sensor nodes efore they re deployed [3][4][3][9][]. There re three knds of wreless nodes n our network model, ech knd of nodes hve dfferent keys stored nsde, we descre them seprtely n follows. For convenence, we ssume there re n sensor nodes nd m cluster heds n the network, nd ech cluster hs ( n / m ) memers n ts cluster. Snk node: In our model, snk node needs to store ( n + m ) keys nsde, ech key s shred wth prtculr sensor node or cluster hed node.

4 Cluster heds: Ech cluster hed stores symmetrc key nd two polynomls g (, g (. g ( s otned y evlutng f ( x, t x =, g ( s the otned y evlutng t x =. Sensor nodes: Ech sensor node S s pre-loded two keys n ts memory, one s S, the other s S. These two keys re generted n dfferent wys to provde the requred securty. In our scheme, S s rndomly generted y DS, whch s the sesson key etween S nd the snk. S s generted complctedly to cheve hgh level securty. The procedure s llustrted s follows. ) DS rndomly selects l ( l ) polynomls from the m polynomls, ( m). Suppose l = nd polynomls nd re selected y the DS. ) DS evlutes t ( x =, ) y = S, t ( x =, ) y = S, respectvely. Suppose k = f (, S), k (, ) = f S fter the evlutons. 3) DS clcultes the correspondng secret key S y exclusve-or k nd k under Equton (4): S = k k (4) 4) S wll e pre-loded nto sensor S s memory, nd works s the sesson key etween S nd ts ntended cluster hed. S lso stores the two cluster heds d nd n ts memory. After key pre-dstruton phse, ech node n the network stores dfferent keys n ts memory. Those preloded keys wll e used to setup the eventul network fter the deployment. B) Network Intlzton Phse After the deployment, cluster heds prtton the entre network nto severl dstnct clusters nd network ntlzton phse s trggered. In network ntlzton phse, ech cluster hed needs to exchnge the hndshkng messges wth ts cluster memers nd setup secure lnk wth ech of ts memers. We stll use the prevous nstnce to llustrte ths procedure. Suppose sensor S s cluster memer of cluster hed fter the deployment. Frst, sensor S sends ts d nd stored cluster heds ds nd to ts physcl cluster hed. then sends S to nd to requre the correspondng key shres. Once receved the key shre requrement messge, nd evlute ts stored polynomls wth the correspondng sensor s d S nd reply the clculted vlues k nd k to. Once receved k nd k, t cn clculte the ntended sesson key S y Equton (4). The procedure s llustrted s follows: ) Frst, sensor S sends ts d nd cluster hed S to nd ) sends 3) nd respectvely to ts evlutes g ( = f (, t ( y = S), nd g ( = f (, t ( y = ) 4) Suppose k = g ( S ), ( ) = g. After clculton, sends ck E k ) to ( 5) decrypts E ( k ) y to get k, where = g ) f (, ) ( = 6) Smlrly, cn get k from wy 7) uses k nd Equton (4) Now, k to clculte n the sme y S cn communcte wth ts cluster memer S securely y the sesson key. Once ll the S cluster heds clculted ther sesson keys wth ts cluster memers, the network ntlzton phse s fnshed. After the network ntlzton phse, secure herrchcl wreless sensor network hs een estlshed. Ech sensor hs sesson keys wth ts cluster hed nd snk node. Ech cluster hed hs sesson keys wth ts cluster memers, other cluster heds nd the snk node. These sesson keys not only cn e used to encrypt the exchnged nformton, ut lso cn e used to mutully uthentcte the ntended communctng prtes. In ths cse, mlcous nodes cn not on n the network y mpersontng good node. All the communctons n the network s encrypted y certn sesson key shred etween the communctng prtes, therefore, the nformton uthentcty, confdentlty nd ntegrty cn e gurnteed n our proposed scheme.

5 4. Securty Anlyss nd Performnce Evluton In ths secton, we compre the performnce of our scheme wth the rndom key sed pre-dstruton schemes n [3][4], effcent prwre key estlshment nd mngement scheme (EPEM) n [8] nd low-energy key mngement protocol (LEM) n [9]. 4. Securty Anlyss Node cpture ttck s serous thret n WSNs, n dversry my physclly cpture sensor nodes to otn the secret nformton. In [3][4], sme prwse key my e used mong dfferent prs of sensors, hence some sensors cpture could compromse the communcton etween other noncptured nodes. In LEM [9] nd our proposed EES, no communcton etween sensor nodes exsts, ech sensor only needs to store two sesson key n ts memory, whch extremely reduce the key storge overhed for sensor nodes. Frcton of compromsed keys n noncompromsed sensor nodes rndom key pre-dstruton "q-compost" scheme (q=).3 "q-compost" scheme (q=3). EPEM LEM. EES Numer of compromsed sensor nodes Fg.. Frcton of compromsed keys n non-cptured sensor nodes vs. numer of compromsed sensor nodes After the network ntlzton phse, ny sensor s compromse does not ffect the secure communcton etween non-compromsed nodes. Fg. compres the reslence gnst sensor node cpture ttck for dfferent schemes. We cn see tht EPEM, LEM nd EES cn prevent the key compromse for non-cptured sensor nodes no mtter how mny sensors re cptured n network. In LEM [9], ll secret keys re pre-loded n cluster heds (s) on the network ntlzton phse, nd ech stores ( n / m ) keys n ts memory. Once s cptured n ths phse, ll ts stored keys could e compromsed. Furthermore, group key s used n LEM to secure the communcton mong s, whch lso could led to the sngle-pont flure ttck n WSNs. Any sngle s cpture could compromse ll the communcton etween non-compromsed s. If ths cse hppened n the ntlzton phse, mlcous node cn trck ll the exchnged key nformton etween s, nd rek the entre network ltely. In EES only polynoml shres re pre-loded n s. Any two s need to setup unque sesson key etween them efore they exchnge the senstve nformton. There s no group key exsts n EES, ny communcton etween s need to e encrypted y the ntended sesson key. Therefore, ny s compromse does not ffect the communcton etween noncompromsed s. Accordng to securty property of t - degree vrte polynoml, EES cn gurntee the network s securty when there s no more thn t s re compromsed. Furthermore, n our network model, the s hve consderly hgh energy nd memory storge. By settng t > m (where m s the numer of cluster hed nodes n network), we cn gurntee tht even ll the s re compromsed, the coeffcents of the polynoml re stll keep secret to the dversry. Numer of compromsed keys n sensor nodes LEM EES Numer of compromsed cluster heds Fg.3. Numer of compromsed sensor keys vs. numer of the compromsed cluster heds n the network ntlzton phse Fg.3 shows the reslence gnst cluster hed node cpture ttck n the network ntlzton phse. Suppose there re, sensor nodes nd s n network. In LEM, ech need store sensor s symmetrc key n ts memory, hence ech s compromse would compromse sensor nodes secret keys. The numer of compromsed key s lnerly ncresng wth the numer of compromsed ncreses. In our EES scheme, 8-degree vrte polynoml s used to clculte the sesson key etween cluster heds nd sensors. Snce there s no symmetrc-key used n EES, nd the degree of the polynoml s lrger thn the numer of cluster heds, even ll the cluster heds re compromsed, none of the keys of sensor nodes could e compromsed n the network ntlzton phse. 4. Performnce Evluton A. Mxmum Supported Network Sze Wreless sensor networks re usully composed of lrge numer of sensors, therefore, proposed key dstruton scheme should e sclle wth the sensor nodes ncreses. [3][4][8] re sed on the pure dstruted network rchtecture, when the network sze lnerly ncreses, the numer of keys stored n ech sensor node lso lnerly ncreses. Due the lmted memory storge n tny sensors, the mxmum supported

6 network sze s lmted for ths knd of schemes. LEM nd our proposed EES re sed on the herrchcl network model, whch hs etter scllty thn flt network, snce ech cluster hed cn tke chrge of numer of sensor nodes n ts cluster. Theoretclly, our proposed scheme cn e sutle for ny sze of wreless sensor networks y the properly selected degree of polynoml shres. B. ey Storge Overhed In [3][4], to cheve the requred network connectvty, ech sensor needs to store certn numer of keys n ts memory efore t s deployed. Although [8] hs smller key rng sze thn [3][4] for the sme network sze, ts key storge overhed s stll su-lnerly wth the network sze. In our proposed EES scheme, ech sensor only needs to store two keys n ts memory no mtter how mny nodes n the network, whch s extremely memory effcent for the lrge-scle wreless sensor networks. C. Communcton Overhed In wreless sensor networks, rdo communctons consume much more energes thn the code executon or clcultons. To sve the energy consumpton, proposed securty schemes should hve low communcton overhed. Compred wth exstng schemes, our proposed scheme s more energy effcent due to the lower communcton overhed for sensor nodes. In WSNs, the communcton overhed mnly occurs n the network ntlzton phse, snce ech sensor needs to exchnge key nformton wth ts neghors. Unlke the prevous schemes, ech sensor only stores two keys n EES, whch mens the hndshkng messge n EES s much shorter thn prevous schemes. Hence the communcton overhed of EES s sgnfcntly lower thn prevous key pre-dstruton schemes. Addtonlly, n mny pplctons, fresh sensors my need to e dded nto n exstng network to replce the power exhusted nodes, whch s nother mn energyconsumng procedure n WSNs. In [3][4], fresh node needs to exchnge ts stored key nformton wth the exstng nodes when t s deployed n the network. Ths procedure s smlr s the network ntlzton phse, nd lots of communcton overheds re nvolved. In [9], complcted energy-consumng procedure lso needs to dd new sensors nto n exstng network. Snk node needs to re-ssgn symmetrc keys to the new sensors nd re-dstrute the new keys to prtculr cluster hed. Ths procedure produces ddtonl communcton overhed n the network, especlly for lrge-scle network. EES s sed on the polynoml shre clculton, no ddtonl key re-ssgnment nd re-dstruton opertons re needed when new sensors on nto n exstng network. By pre-lodng two keys nto the new sensor under the sme procedure n the key predstruton phse, fresh node cn e deployed n nywhere to on prtculr cluster. Snk node does not need to re-exchnge key nformton wth cluster heds, whch extremely reduces the communcton overhed n the network. Communcton overhed (ts) EPEM EES LEM rndom key pre-dstruton Numer of dded sensor nodes Fg.4. Communcton overhed vs. Sensor node ddton To compre the communcton overhed for dfferent schemes when fresh sensors re dded nto network, we ssume ll the ds re 6 ts, symmetrc-keys nd polynoml-shres re 8 ts. To compre wth exstng schemes, we ssume there re, sensors nd cluster heds n our evluton model, ech cluster hs memers nsde, the verge degree of sensor node s 6. Fg.4 shows tht tht EPEM hs the lowest communcton overhed snce the new nodes only need to exchnge key nformton wth ther one-hop neghors. Rndom key pre-dstruton schemes hve the hghest overhed, snce the new nodes hve to exchnge key nformton wth ll the neghors to estlsh secure lnk. LEM nd EES hve lower communcton overhed thn rndom key pre-dstruton schemes snce the new nodes only need to exchnge key nformton wth ther cluster heds. EES cn reduce 5% communcton overhed thn LEM snce there s no key re-rodcst procedure nvolved. 5. Concluson In ths pper, we present n energy effcent sesson key estlshment scheme for lrge-scle wreless sensor networks. Bsed on the herrchcl network structure nd polynoml-key pre-dstruton mechnsm, our scheme s more sutle for lrge-scle wreless senor networks wth ts etter scllty nd network performnce. Compred wth the exstng key pre-dstruton schemes, our scheme cn cheve etter network reslence gnst node cpture ttck, s well s etter network performnce n term of network sze, key storge overhed nd communcton overhed. Acknowledgement Ths work hs een supported y the Oho Bord of Regents Doctorl Enhncement Funds.

7 References [] D. P. Agrwl nd Q-A Zeng, Introducton to Wreless nd Mole Systems, Brooks/Cole Pulshng, Aug. 3. [] Neh Jn nd D. P. Agrwl, Current trends n wreless sensor network desgn, Interntonl Journl of Dstruted Sensor Networks, Vol., No., pp.-, 5. [3] L. Eschenuer nd V. D. Glgor, A key-mngement scheme for dstruted sensor networks, In Proceedngs of the 9th ACM conference on Computer nd communctons securty, Novemer. [4] H. Chn, A. Perrg, nd D. Song, Rndom key predstruton schemes for sensor networks, In IEEE Symposum on Securty nd Prvcy, pges 97 3, Berkeley, Clforn, My [5] P. Gupt nd P. umr, Internets n the sky: the cpcty of three dmensonl wreless networks, Communctons n Informton Systems, vol., no., pp. 33 5,. [6] S. Zho,. Tepe, I. Seskr, nd D. Rychudhur, Routng protocols for self-orgnzng herrchcl d-hoc wreless networks, n IEEE Srnoff 3 Symposum. [7] R. Blom, An optml clss of symmetrc key generton systems, Advnces n Cryptology: Proceedngs of EUROCRYPT 84 (Thoms Beth, Norert Cot, nd Ingemr Ingemrsson, eds.), Lecture Notes n Computer Scence, Sprnger-Verlg, 9: , 985. [8] Y. Cheng nd D. P. Agrwl, Effcent Prwse ey Estlshment nd Mngement n Sttc Wreless Sensor Networks, n Proceedngs of the nd IEEE Interntonl Conference on Mole Ad-Hoc nd Sensor Systems, Wshngton, DC, Nov. 7-, 5. [9] G. Jolly, M. C. uscu, P. okte, M. Youns, A lowenergy mngement protocol for wreless sensor networks, In Proceedng of the Eghth IEEE Interntonl Symposum on Computers nd Communcton (ISCC 3), EMER - ANTALYA, TUREY. June 3 - July 3 3. [] M. Youns, M. Youssef, nd. Arsh, Energy-Awre Routng n Cluster-Bsed Sensor Networks, n Proceedngs of the th IEEE/ACM Interntonl Symposum on Modelng, Anlyss nd Smulton of Computer ndtelecommuncton Systems (MASCOTS), (Forth Worth, TX), Octoer. []. Arsh, M. Youssef, nd M. Youns, Energy-Awre TDMA-Bsed MAC for Sensor Networks, n Proceedngs of the IEEE Workshop on Integrted Mngement of Power Awre Communctons, Computng nd Networkng (IMPACCT ), My. [] G. Gupt, M. Youns, "Performnce Evluton of Lod- Blnced Clusterng of Wreless Sensor Networks," n Proceedngs of the th Interntonl Conference on Telecommunctons (ICT'3), Tht, Ppeete French Polynes, Ferury 3. [3] C. Blundo, A. D. Snts, A. Herzerg, S. utten, U. Vccro, nd M. Yung, Perfectly-secure key dstruton for dynmc conferences, Lecture Notes n Computer Scence, 74:47 486, 993. [4] Dvd W. Crmn, Peter S. ruus, nd Brn J. Mtt, Constrnts nd pproches for dstruted sensor network securty. NAI Ls Techncl Report #-, Septemer. [5] Sencun Zhu, Sneev Set, nd Sushl Jod, LEAP: Effcent securty mechnsms for lrge-scle dstruted sensor networks, In ACM CCS 3, pges 6 7, Octoer 3. [6] J. M. hn, R. H. tz, nd. S. J. Pster, Next century chllenges: Mole networkng for smrt dust, In Proceedngs of the 5th Annul ACM/IEEE Interntonl Conference on Mole Computng nd Networkng (MoCom), pges , 999. [7] C. rlof nd D. Wgner, Secure routng n wreless sensor networks: Attcks nd countermesures, In Frst IEEE Int l Workshop on Sensor Network Protocols nd Applctons, My 3. [8] Akyldz, W. Su, Y. Snkrsurmnm, nd E. Cyrc, A survey on sensor networks, IEEE Communcton Mgzne, vol. 4, no. 8, pp. 6, Aug.. [9] Donggng Lu nd Peng Nng Locton-Bsed Prwse ey Estlshments for Reltvely Sttc Sensor Networks, 3 ACM Workshop on Securty of Ad Hoc nd Sensor Networks (SASN 3), Octoer 3, 3 George W. Johnson Center t George Mson Unversty, Frfx, VA, USA. [] W. Du, J. Deng, Y. S. Hn, nd P.. Vrshney, A prwse key pre-dstruton scheme for wreless sensor networks, n Proceedngs of the th ACM Conference on Computer nd Communctons Securty (CCS), Wshngton DC, USA, Octoer 7-3 3, pp. 4 5.

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

An Optimal Method for Using Multiple Gateways in Cellular IP Networks

An Optimal Method for Using Multiple Gateways in Cellular IP Networks Bond Unversty epublctons@bond Informton Technology ppers Bond Busness School Aprl 2004 An Optml Method for Usng Multple Gtewys n ellulr IP Networks Zheng d Wu Bond Unversty, Zheng_D_Wu@bond.edu.u Follow

More information

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors The Interntonl Arb Journl of Informton Technology, Vol., No., Mrch 04 Smplfed Algorthm nd Hrdwre Implementton for the (4,, 8 Extended Goly Soft Decoder Up to 4 Errors Dongfu Xe College of Mechncl nd Electrcl

More information

Semi-quantum private comparison protocol under an. almost-dishonest third party

Semi-quantum private comparison protocol under an. almost-dishonest third party Sem-quntum prvte comprson protocol under n lmost-dshonest thrd prty Wen-Hn Chou Tzonelh Hwng nd Jun Gu Deprtment of Computer Scence nd nformton Engneerng Ntonl Cheng Kung Unversty No. Unversty Rd. Tnn

More information

Performance Evaluation of Survivable Multifiber WDM Networks

Performance Evaluation of Survivable Multifiber WDM Networks erformnce Evluton of Survvble ultfber WD Networks Yunqu Luo nd Nrwn Ansr Advnced Networkng Lbortory Deprtment of Electrcl nd Computer Engneerng New Jersey Intute of Technology Unvery Heghts, Newrk, NJ

More information

COVERAGE HOLES RECOVERY ALGORITHM BASED ON NODES BALANCE DISTANCE OF UNDERWATER WIRELESS SENSOR NETWORK

COVERAGE HOLES RECOVERY ALGORITHM BASED ON NODES BALANCE DISTANCE OF UNDERWATER WIRELESS SENSOR NETWORK INTENATIONAL JOUNAL ON SMAT SENSING AND INTELLIGENT SYSTEMS VOL. 7, NO. 4, DECEMBE 2014 COVEAGE HOLES ECOVEY ALGOITHM BASED ON NODES BALANCE DISTANCE OF UNDEWATE WIELESS SENSO NETWOK Hengchng Jng College

More information

Pre-distortion Linearization for 64-QAM Modulation in Ka-Band Satellite Link

Pre-distortion Linearization for 64-QAM Modulation in Ka-Band Satellite Link IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.8 No.8, August 008 47 Pre-dstorton Lnerzton for 64-QAM Modulton n K-Bnd Stellte Lnk P. Sojood Srdrood,, G.R. solt nd P. Prvnd Summry

More information

CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS

CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS CONSTRUCTING MINIMAL ADJACENT DOMINATING SETS IN SEMIGRAPHS FOR CLUSTERING IN WIRELESS NETWORKS S. Srvnn 1, R. Poovzhk 2 nd N. R. Shnker 3 1 Deprtment of Mthemtcs, R.M.D. Engneerng College, Kvrpett, Tml

More information

Sinusoidal Steady State Analysis

Sinusoidal Steady State Analysis CHAPTER 8 Snusodl Stedy Stte Anlyss 8.1. Generl Approch In the prevous chpter, we hve lerned tht the stedy-stte response of crcut to snusodl nputs cn e otned y usng phsors. In ths chpter, we present mny

More information

BnB-ADOPT + with Several Soft Arc Consistency Levels

BnB-ADOPT + with Several Soft Arc Consistency Levels BnB-ADOPT + wth Severl Soft Arc Consstency Levels Ptrc Guterrez nd Pedro Meseguer Astrct. Dstruted constrnt optmzton prolems cn e solved y BnB-ADOPT +, dstruted synchronous serch lgorthm. In the centrlzed

More information

Security Issues in Smart Card Authentication Scheme

Security Issues in Smart Card Authentication Scheme Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ecurty Issues n mrt Crd Authentcton cheme Rv ngh Pppl, Jdhr C. D., nd hshkl Tpsw Abstrct To secure normton rom unuthorzed ccess, vrous

More information

Student Book SERIES. Fractions. Name

Student Book SERIES. Fractions. Name D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types

More information

Data Attribute Reduction using Binary Conversion

Data Attribute Reduction using Binary Conversion Fengmng M. Chng Dt Attrute Reducton usng Bnry Converson FENGMING M. CHANG Deprtment of Informton Scence nd Applctons As Unversty Wufeng, Tchung 4354 Twn pperss@gml.com Astrct: - Whle lernng wth dt hvng

More information

Performance Evaluation of an Optical Packet Scheduling Switch

Performance Evaluation of an Optical Packet Scheduling Switch Performnce Evluton of n Optcl Pcket Schedulng Swtch Kyrkos Vlchos, memer IEEE, Kyrk Seklou nd Emmnuel Vrvrgos Reserch Acdemc Computer echnology Insttute, RA-CI, Unversty of Ptrs, GR-26500, RIO, Ptrs, Greece,

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks

Cross-layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks Ths full text pper ws peer revewed t the drecton of IEEE Communctons Socety subject mtter experts for publcton n the IEEE INFOCOM 28 proceedngs. Cross-lyer Qulty of Servce Support for UWB Wreless Multmed

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION

A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION SRINIVAS VUTUKURY vutuury@cse.ucsc.eu Computer Scences Deprtment Unversty of Clforn Snt Cruz, CA 95064 J.J. GARCIA-LUNA-ACEVES jj@cse.ucsc.eu Computer

More information

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare We-sed Remote Humn Pulse Montorng System wth Intellgent Dt Anlyss for Home Helthcre Chh-Mng Chen Grdute Insttute of Lrry, Informton nd Archvl Studes, Ntonl Chengch Unversty, Tpe 6, Twn, R.O.C. chencm@nccu.edu.tw

More information

UE Centric Coordinated Beamforming in Multi-cell MU-MIMO Systems

UE Centric Coordinated Beamforming in Multi-cell MU-MIMO Systems UE Centrc Coordnted Bemformng n Mult-cell MU-MIMO Systems Jlng L Yngxue L InterDgtl Communctons LLC Melvlle NY 11747 USA e-ml: jlng.l@nterdgtl.com yngxue.l@nterdgtl.com Astrct User Equpment (UE) centrc

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

Reinforcement Learning for Fuzzy Control with Linguistic States

Reinforcement Learning for Fuzzy Control with Linguistic States 54545454543 Journl of Uncertn Systems ol., No., pp.54-66, 8 Onlne t: www.jus.org.uk Renforcement Lernng for Fuzzy Control wth Lngustc Sttes Mohmmd Hossen Fzel Zrnd,*, Jvd Jouzdn, Mrym Fzel Zrnd Deprtment

More information

A New Medium Access Control Protocol for TDD Mode Wideband CDMA Wireless Local Area Networks

A New Medium Access Control Protocol for TDD Mode Wideband CDMA Wireless Local Area Networks A New Medum Access ontrol Protocol for TDD Mode Wdebnd DMA Wreless Locl Are Networks In F. Akyldz nd Xudong Wng Brodbnd nd Wreless Networkng Lb, School of Electrcl nd omuter Engneerng Georg Insttute of

More information

Knowledge Unit Relation Recognition Based on Markov Logic Networks

Knowledge Unit Relation Recognition Based on Markov Logic Networks JOURNAL OF NETWORKS, VOL. 9, NO. 9, SEPTEMBER 2014 2417 Knowledge Unt Relton Recognton Bsed on Mrkov Logc Networks We Wng 1, 2, We We 2, Je Hu 2, Juntng Ye 1, nd Qnghu Zheng 1 1. School of Electronc nd

More information

i S1 V IN i C1 i N i C2 i S2

i S1 V IN i C1 i N i C2 i S2 ENGINEERING FOR RURAL DEVELOPMENT Jelgv, 0.-.05.05. VOLTAGE BALANCE CONTROL OF TWO-LEVEL DC-DC CONVERTER Ksprs Krocs, Ugs Srmels, Vesturs Brzs Insttute of Physcl Energetcs; Rg Techncl Unversty kselt@nbox.lv

More information

Rough Set Approach for Categorical Data Clustering 1

Rough Set Approach for Categorical Data Clustering 1 Interntonl Journl of Dtbse Theory nd Applcton Vol., No., Mrch, Rough Set Approch for Ctegorcl Dt Clusterng Tutut Herwn*, Rozd Ghzl, Iwn Tr Ryd Ynto, nd Mustf Mt Ders Deprtment of Mthemtcs Educton nversts

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 Generlzed Cross-Lyer Desgns for Generc Hlf-Duplex Multcrrer Wreless Networks Wth Frequency-Reuse Rozt Rshtch, Student Member,

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Superposition, Thevenin and Norton. Superposition

Superposition, Thevenin and Norton. Superposition Superposton, Thevenn nd Norton OUTINE Superposton Thevenn Equvlent Crcut Norton Equvlent Crcut Mxmum Power Theorem ecture 6, 9/1/05 Redng Chpter.6-.8 ecture 6, Slde 1 Superposton A lner crcut s one constructed

More information

IMPACT OF AIRPORT NOISE REGULATIONS ON NETWORK TOPOLOGY AND DIRECT OPERATING COSTS OF AIRLINES

IMPACT OF AIRPORT NOISE REGULATIONS ON NETWORK TOPOLOGY AND DIRECT OPERATING COSTS OF AIRLINES 27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES IMPACT OF AIRPORT NOISE REGULATIONS ON NETWORK TOPOLOGY AND DIRECT OPERATING COSTS OF AIRLINES Prksh N. Dksht*, Dnel A. DeLurents*, nd Wllm A.

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright

Probability and Statistics P(A) Mathletics Instant Workbooks. Copyright Proility nd Sttistis Student Book - Series K- P(A) Mthletis Instnt Workooks Copyright Student Book - Series K Contents Topis Topi - Review of simple proility Topi - Tree digrms Topi - Proility trees Topi

More information

Content Based Color Image Retrieval via Wavelet Transforms

Content Based Color Image Retrieval via Wavelet Transforms 8 IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.7 No., December 7 Content Bsed Color Imge Retrevl v Wvelet Trnsforms Mrs.Y. M. Lth Dr.B.C.Jng V.S.K.Reddy, GNITS,JNTU,Ind Rector,JNTU,Ind

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators Pge of 0 IEEE PES Trnsctons on Power Systems 0 0 0 0 0 0 A Mult-Agent Soluton to Dstrbuton System Mngement by Consderng Dstrbuted Genertors Abstrct A trdtonl dstrbuton networ crres electrcty from centrl

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

1 tray of toffee 1 bar of toffee. 10 In the decimal number, 0 7, the 7 refers to 7 tenths or

1 tray of toffee 1 bar of toffee. 10 In the decimal number, 0 7, the 7 refers to 7 tenths or Chpter 3 Deciml Numers Do you know wht DECIMAL is? In chpter, we delt with units, s, 0 s nd 00 s. When you tke single unit nd divide it into (or 0 or 00) its, wht we then hve re deciml frctions of whole

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

CONTAINER BERTH SCHEDULING POLICY WITH VARIABLE COST FUNCTION

CONTAINER BERTH SCHEDULING POLICY WITH VARIABLE COST FUNCTION Contner berth schedulng polcy wth vrble cost functon CONTAINER BERTH SCHEDULING POLICY WITH VARIABLE COST FUNCTION Gols M.M. (correspondng uthor) Assstnt Professor, Deprtment of Cvl Engneerng, Unversty

More information

An iterative approach to an integrated land use and transportation planning tool for small urban areas

An iterative approach to an integrated land use and transportation planning tool for small urban areas Journl of Modern Trnsportton Volume 20, Number 3, September 2012, Pge 160-167 Journl homepge: mt.swtu.edu.cn DOI: 10.1007/BF03325794 1 An tertve pproch to n ntegrted lnd use nd trnsportton plnnng tool

More information

5 October 2015 Stereo Cross-feed Network for Headphones 1 of 12 Copyright 2015 Peter H. Lehmann. All Rights Reserved.

5 October 2015 Stereo Cross-feed Network for Headphones 1 of 12 Copyright 2015 Peter H. Lehmann. All Rights Reserved. 5 Octoer 05 Stereo Cross-feed Network for Hedphones of Copyrght 05 Peter H. ehmnn. All ghts eserved. The Dlemm The vst mjorty of stereo recordngs re engneered for reproducton wth pr of left nd rght chnnel

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Fixation-Image Charts

Fixation-Image Charts Fxton-Imge Chrts Kuno Kurzhls, Mrcel Hlwtsch, Mchel Burch, Dnel Weskopf Unversty of Stuttgrt P rc p nt1 2 1 P rc p nt2 3 P rc p nt3 P rc p nt4 c F x ons equenc e Col orl eg end c 1 2 3 4 4 c Fgure 1: Fxton-mge

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information

Software Pipelining for the Pegasus IR

Software Pipelining for the Pegasus IR Softwre Ppelnng for the Pegsus IR Cod Hrtwg chrtwg@cs.cmu.edu Ele Krevt ekrevt@cs.cmu.edu Abstrct Modern processors, especll VLIW processors, often hve the blt to eecute multple nstructons smultneousl.

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

GLONASS Inter-frequency Biases and Their Effects on RTK and PPP Carrier-phase Ambiguity Resolution

GLONASS Inter-frequency Biases and Their Effects on RTK and PPP Carrier-phase Ambiguity Resolution GLONASS Inter-frequency Bses nd Ther Effects on RTK nd PPP Crrer-phse Ambguty Resoluton Nco Reussner, Lmbert Wnnnger Geodetc Insttute, Technsche Unverstät Dresden (TU Dresden), Germny BIOGRAPHIES Nco Reussner

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Mitigation of Harmonics by Shunt Active Power Filter using Synchronous Detection Method

Mitigation of Harmonics by Shunt Active Power Filter using Synchronous Detection Method Interntonl Journl of Engneerng Trends nd Technology (IJETT Volume 4 Issue 6- June 013 Mtgton of Hrmoncs y Shunt Acte Power Flter usng Synchronous Detecton Method A.Surmny S #1, M.Bhn * # Electrcl nd Electroncs

More information

2-7 Calibration of SAR Probe

2-7 Calibration of SAR Probe Reserch nd Development of Clrton Technology -7 Clrton of SAR Proe Lr HAMADA nd Soch WATANABE The clrton of spefc sorpton rte proe s nmely clrton of the electrc feld mesurement sensor n the phntom lqud

More information

Scalability Analysis of a Model for GSM Mobile Network Design

Scalability Analysis of a Model for GSM Mobile Network Design Sclblty Anlyss of Model for GSM Moble Network Desgn Rebecc F. Pnhero, Alee rbos de Agur, Plácdo Rogéro Pnhero, Álvro de Menezes S. Neto, Ruddy P. P. Cunh, Domngos Neto Grdute Progrm n Appled Informtcs,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

VI.C CIRCUIT BREAKERS

VI.C CIRCUIT BREAKERS VI.C CIRCUIT BREAKERS DMS #84474 Pge of 28 Revsed : GUIDE FOR DETERMINATION OF CIRCUIT BREAKER LOAD CURRENT CAPABILITY RATINGS PENNSYLVANIA-NEW JERSEY-MARYLAND INTERCONNECTION PLANNING AND ENGINEERING

More information

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions A Novel Control Method for nput Output Hrmonc Elmnton of the PWM Boost Type Rectfer Under Unblnced Opertng Condtons A. V. Stnkovc T. A. Lpo Electrcl nd Computer Engneerng Clevelnd Stte Unversty Deprtment

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Modified Venturini Modulation Method for Matrix Converter Under Unbalanced Input Voltage Conditions

Modified Venturini Modulation Method for Matrix Converter Under Unbalanced Input Voltage Conditions Preprnts (www.preprnts.org) NOT PEER-REVIEWED Posted: 22 y 28 do:.2944/preprnts285.28.v 2 4 5 6 7 8 9 2 4 5 6 7 8 9 2 2 22 2 24 25 26 27 28 29 2 4 5 6 7 8 9 4 4 42 Artcle odfed Venturn odulton ethod for

More information

On The Study of Establishing a Responsive Infrastructure for a Massively Multiplayer On-Line Game

On The Study of Establishing a Responsive Infrastructure for a Massively Multiplayer On-Line Game Assocton for Informton Systems AIS Electronc Lbrry (AISeL) AMCIS 2009 Proceedngs Amercs Conference on Informton Systems (AMCIS) 2009 On The Study of Estblshng Responsve Infrstructure for Mssvely Multplyer

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs

LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs LOKS: Low-Overhead Forward and Backward Key Seecy n WSNs Malvka Ashok CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 Roht Vad CSE Department M. M. Engneerng College

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

IMPROVEMENT OF THE QUALITY OF ELECTRICAL POWER BY A PHOTOVOLTAIC GENERATOR CONNECTED TO THE GRID

IMPROVEMENT OF THE QUALITY OF ELECTRICAL POWER BY A PHOTOVOLTAIC GENERATOR CONNECTED TO THE GRID Rev. Roum. Sc. Techn. Électrotechn. et Énerg. Vol. 61, 1, pp. 7 41, ucrest, 216 IMPROVEMENT OF THE QULITY OF ELECTRICL POWER Y PHOTOVOLTIC GENERTOR CONNECTED TO THE GRID SID HMED TDJER 1, IDIR HI Key words:

More information

SOLVING TRIANGLES USING THE SINE AND COSINE RULES

SOLVING TRIANGLES USING THE SINE AND COSINE RULES Mthemtics Revision Guides - Solving Generl Tringles - Sine nd Cosine Rules Pge 1 of 17 M.K. HOME TUITION Mthemtics Revision Guides Level: GCSE Higher Tier SOLVING TRIANGLES USING THE SINE AND COSINE RULES

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN

International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 48(Prnt), ISSN 97 499(Onlne) Volume 4, Issue 5, July August (2), IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 97-48 (Prnt) ISSN 97-499 (Onlne) Volume 4,

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

A Practical DPA Countermeasure with BDD Architecture

A Practical DPA Countermeasure with BDD Architecture A Prcticl DPA Countermesure with BDD Architecture Toru Akishit, Msnou Ktgi, Yoshikzu Miyto, Asmi Mizuno, nd Kyoji Shiutni System Technologies Lortories, Sony Corportion, -7- Konn, Minto-ku, Tokyo 8-75,

More information

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5

ISSCC 2006 / SESSION 21 / ADVANCED CLOCKING, LOGIC AND SIGNALING TECHNIQUES / 21.5 21.5 A 1.1GHz Chrge-Recovery Logic Visvesh Sthe, Jung-Ying Chueh, Mrios Ppefthymiou University of Michign, Ann Aror, MI Boost Logic is chrge-recovery circuit fmily cple of operting t GHz-clss frequencies

More information

A Key Set Cipher for Wireless Sensor Networks

A Key Set Cipher for Wireless Sensor Networks A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

S1 Only VEOG HEOG. S2 Only. S1 and S2. Computer. Subject. Computer

S1 Only VEOG HEOG. S2 Only. S1 and S2. Computer. Subject. Computer The Eects of Eye Trcking in VR Helmet on EEG Recordings Jessic D. Byliss nd Dn H. Bllrd The University of Rochester Computer Science Deprtment Rochester, New York 14627 Technicl Report 685 My 1998 Astrct

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Departure Scheduling in a Multi-airport System

Departure Scheduling in a Multi-airport System Eghth USA/Europe Ar Trffc Mngement Reserch nd Development Semnr (ATM2009) Deprture Schedulng n Mult-rport System Ynun Wng, Mnghu Hu, Dong Su, Yong Tn Insttute of Ar Trffc Flow Mngement Nnng Unversty of

More information

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC

THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS. Matej BEZNÁK, Vladimír HANZEN, Ján VRABEC THE STUDY OF INFLUENCE CORE MATERIALS ON TECHNOLOGICAL PROPERTIES OF UNIVERSAL BENTONITE MOULDING MATERIALS Mtej BEZNÁK, Vldimír HANZEN, Ján VRABEC Authors: Mtej Beznák, Assoc. Prof. PhD., Vldimír Hnzen,

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links

Topology Design in Time-Evolving Delay-Tolerant Networks with Unreliable Links Topology Design in Time-Eoling Dely-Tolernt Networks with Unrelile Links Minsu Hung Siyun Chen Fn Li Yu Wng Deprtment of Computer Science, Uniersity of North Crolin t Chrlotte, Chrlotte, NC 83, USA. School

More information