A Key Set Cipher for Wireless Sensor Networks

Size: px
Start display at page:

Download "A Key Set Cipher for Wireless Sensor Networks"

Transcription

1 A Key Set Cipher for Wireless Sensor etworks Subhsh Kk Abstrct This pper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks (WS) nd similr computing resource-constrined pplictions. Such system, with ech user ssigned bunch of privte key vectors with corresponding public identifiers to generte session keys, is hrder to brek thn where single key is used. The set of keys nd identifiers re generted by suitble mthemticl opertion by the trusted prty nd ssigned to users. A specific cryptogrphic system described in the pper is bsed on the use of fmily of self-inverting mtrices derived from the number theoretic Hilbert trnsform (HT) in conjunction with the Blom s scheme. In rndomized version of this scheme, the users chnge their published IDs t will but the prties cn still rech greement on the key by using their individul scling fctors. The rndom protocol increses the security of the system. Keywords: Key sets, number theoretic Hilbert trnsform, cryptogrphy, Blom s scheme, key distribution Introduction Wireless sensor networks (WSs) help to connect vriety of power-constrined devices to the Internet. To ensure security in the communictions with these devices vriety of key mngement schemes (KMS) re used of which the principl ones use key pooling, mthemticl lgorithms, or public key cryptogrphy. The fctors in deciding which scheme to use re bsed on memory requirements, communiction overhed, processing speed, network bootstrpping, connectivity, sclbility, extensibility, nd energy requirement []. Of the mthemticl lgorithms used, the mtrix-bsed Blom scheme hs found mny pplictions such s in Highbndwidth Digitl Content Protection (HDCPv). Ech HDCP-cpble device hs unique set of -bit keys. For ech set of vlues, specil -bit public key clled KSV (Key Selection Vector) is creted. During uthentiction, the prties exchnge their KSVs using Blom's scheme leding to shred -bit number, which is lso used to encrypt dt. The HDCP method is used in DVD, HD DVD, Blu-ry Disc plyers, computer video crds, TVs nd digitl projectors. In the bsic Blom s scheme [], the trusted uthority gives ech user secret key nd corresponding public identifier to enble ny two prticipnts to independently crete shred key for secure communiction. The Blom scheme is different from either key pooling or public key techniques in tht ny two users discover unique key between the two of them. In contrst, there cn be different wys two users cn communicte in network using key pooling, nd in public key cryptogrphy, the users cn chnge their privte nd public keys, if only in principle.

2 Therefore nother wy to distinguish between KMS schemes is whether they involve use of single keys or multiple keys between ny pir of users. The use of multiple keys is of specil dvntge in mking the tsk of the evesdropper more difficult. Such use cn lso be of vlue in forensics. The prdigm of multiple keys for ech user hs ntecedents tht go bck in history in socil systems (in the mny wys personhood is defined) [] nd there exist prllels in the biologicl relm. This ide is of philosophicl vlidity to problems tht go beyond sfegurding wireless sensor networks. In digitl networks, mny individuls mintin different identifiers rnging from two (one t work nd nother t home) to severl. Some of these identities re motivted by the need for nonymity. In this pper we look t wys of enhncing Blom s mtrix bsed scheme so tht it cn support key sets for the users. Such n enhncement poses greter chllenge to the evesdropper s compred to simply incresing the size of the key. The Blom scheme [] is bsed on two different non-squre mtrices X (n m) nd Y (m n) whose product mod p (p is suitbly lrge prime) is the symmetric mtrix K (n n). The mtrix X is used to generte the users keys nd the mtrix Y is used to generte the corresponding public identifiers. An obvious wy to hve lrge key set is to use set of indexed X nd Y mtrices. There exist vriety of wys to determine X nd Y []. We cn ssume tht these indexed mtrices re obtined by mens of suitble liner trnsformtions on n initil member. For this propose the use of HT-circulnt mtrices which re orthogonl in the sme Z p s Blom s mtrix. Given tht the key pirs re bsed on different mtrices, the tsk of breking the system hs been mde more difficult. Since the question of security of the Blom scheme is well nlyzed [],[],[], here we only describe the construction ssocited with the genertion of the key set nd the corresponding system identifiers. We lso present rndomized scheme in which ech user publishes subset of the identifiers nd chnges them with time. This requires scheme to normlize the keys generted by the use of different identifiers. Mtrix Bsed Keys In the Blom scheme, the row i of X represents the secret key of User i (X i, X i,, X im ) nd the column i of Y represents the public identifier of the User i (Y i, Y i,, Y mi ). Let Alice be User i nd Bob be User j. The size of the key nd the public identifier is m. Alice finds the key by multiplying her privte key vector with the identifier (public key) of Bob thus getting K ij. Likewise, Bob multiplies his privte key with the identifier of Alice thus getting K ji. Since the mtrix K is symmetric, Alice nd Bob obtin the sme number which cn be used s the rw key: K ij = X Y () α iα αj

3 Definition. The vlue of K ii will be clled the scle of the key of User i. It will lso be represented by S. We will see lter tht the key scle plys criticl role in the determintion of the common key in the rndomized version of the lgorithm. Exmple. Let X= K= mod, nd Y= mod mod () If Alice is User nd Bob is User, then Alice s secret key: (,, ) Alice s public identifier: (,, ) () Bob s secret key: (,, ) Bob s public identifier: (,, ). () Their shred key is found by computing the inner product of the secret key nd public identifier vectors. The shred key: As computed by Alice: + + = mod = As computed by Bob: + + = mod = The key scles of Alice nd Bob re nd, respectively, nd they will be clled S Alice nd S Bob. Modified Scheme to Generte Key Sets The Trusted Authority cn generte lrge number of equivlent keys by using pproprite mtrix trnsformtions on known solution (Figure ). Given the constrint of fixed m (size of the key), the mtrix trnsformtion cn either be n outer trnsformtion (n n) or n inner trnsformtion (m m).

4 Key Key Key Key Key m Alice ID ID ID ID IDm ID ID ID ID IDm Bob Key Key Key Key Key m The keys of User i re defined s follows: Figure. A mtrix-bsed key-set scheme Tble. User i s Key nd Identifier Set User i: Index Secret Key X(row i) Public Identifier Y(column i) X() Y() X() Y() X() Y()... M X(m) Y(m) Outer trnsformtion: Form new X nd Y by the following trnsformtions: nd X new = UX nd Y new = YV () K new = UXYV = UKV () There re different wys to choose U nd V (ech of which will be n n mtrix) but one esy method would be to pick them s symmetric mtrices. Inner trnsformtion: Form new X nd Y by the following trnsformtions: X new = XR nd Y new = SY () so tht the product below remins symmetric mtrix: K new = XRSY () Specificlly, we will consider the following inner trnsformtions:

5 X new = XR where Y new = R T Y, nd RR T = wi mod p () This will chnge the scles of the keys by the fctor w. The mtrix R in () represents set whose trnspose is its inverse (up to constnt). It is relted to the number theoretic Hilbert trnsform (HT) [], which is derived from the stndrd discrete Hilbert trnsform []-[]. The HT is circulnt mtrix with lternting entries of ech row being zero nd non-zero numbers nd trnspose modulo prime is its inverse. The discrete Hilbert trnsform hs pplictions is vriety of res of signl processing such s spectrl nlysis in -D reconstruction []-[], multilyered computtions [],[], nd cryptogrphy []-[]. A circulnt mtrix is used in the mix columns of the Advnced Encryption Stndrd. Periodic sequences tht re orthogonl for ll shifts nd their potentil pplictions were recently presented [],[]. Some further properties of circulnt mtrices relevnt to our pper re given in []. Exmple Contd. For Alice s User i nd Bob s User j, let us ssume tht Alice decided to use Bob s th identifier. She sends this informtion to Bob in the pre-communiction hndshke so tht Bob will use the corresponding secret key. The key found by Alice nd Bob would now be: K = Alice (secret key ) Bob (identifier ) = Bob (secret key ) Alice (identifier ) If the set of mtrices R is so chosen tht w in eqution () equls, then the key obtined will be sme irrespective of wht row in Tble is chosen. The Mtrix R nd the Key Set Consider the relted mtrix R, which is identicl to HT mtrix with the exception tht its s hve been purged. R =..... mod p () The sequence,,,..., my be considered rndom sequence. For considertion s sequence, we ssume tht the genertor is periodic, i.e. + i = i. If we don t insist on normliztion, it will stisfy the following properties under the condition: i= i mod p = w ()

6 C( k) = i+ k i= i mod p = for ll k () Property mens tht the sequence A =,,,..., my be considered truly rndom sequence with utocorreltion function, C(k), tht is zero everywhere excepting t k=. It is lso cler tht w A would be nother rndom sequence for which the utocorreltion function t the origin will be w mod p nd its vlue everywhere else will be. The pek vlue of the utocorreltion is obtined from the sequence for which w mod p = p-. Let us go bck to Exmple. The mtrix required there is. The generl R mtrix for which b c RR T =wi my be tken to be c b, but since we wnt flexibility regrding w, this could be b c replced by R= b b b () This leds to the conditions: w = + + b mod p () nd + b + b = mod p () Eqution () my be esily solved. We hve b( + ) = mod p. This my be rewritten s p b = mod p () + Since our exmple ws concerning p =, we cn solve () for different choices of nd b s given in Tble below: Tble. Solutions to eqution () for the mtrix b w

7 Suppose we pick = nd b=. For this choice the vlue of w is nd therefore the new key will be the old key multiplied by. The new X nd Y mtrices would now be: X new = mod = () Likewise, the new Y mtrix will be: Y new =R T Y old () In other words, Y new = mod = () The new K mtrix is: K new = () Clerly K new = K s expected. It so turns out tht the choices for the R mtrix for this exmple (Tble ) belong to two groups: Group :

8 Group : In the modified scheme, the secret key nd public identifier will be indexed s follows: Alice s Secret Key nd Public Identifier Tble (User ): Tble. Alice s key, identifier vectors, nd scles Index(,b, c) Secret Key Public Identifier K =S Alice (originl),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, Bob s Secret Key nd Public Identifier Tble (User ): Tble. Bob s key nd identifier vectors Index(, b, c) Secret Key Public Identifier K =S Bob (originl),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, (,, ),,,, Mny vrints of this system my be proposed. This includes the cses where the size of the key itself cn vry mking the tsk of the evesdropper even more complex.

9 Use of Rndom Subset of the Key Set We now describe rndom vrint of the scheme outlined in the previous section where ech user rndomly publishes different subset of the public identifier set t different times. This is chieved by the user publishing the rndom subset nd lso nnouncing the time durtion for which it is effective. The chllenge is tht severl mtrices re in ply in the different public identifiers vilble to the users nd the two prties my not shre the sme identifier index. This necessittes the use of the scling fctors by the two prties nd prior greement tht the scling be done with respect to specific index. This greement cn be negotiting in the set-up nd it cretes n dditionl prmeter dding to the security. Here, in our exmple, it will be ssumed tht the scling will be done with respect to index. The key genertion will hve two steps: in the first one, ech user discovers rw key which my be different for different users; in the second, the rw key is chnged using the personl scling fctor by ech prty. In our running exmple, let Alice rndomly pick the identifiers nd, nd let Bob rndomly pick the identifier nd (Figure ). In other words, Alice publishes Index, Public ID,, Index, Public ID,, Bob publishes Index, Public ID,, Index, Public ID,, Alice ID ID ID ID Bob Figure. Rndomized key-set scheme (ech user publishes subset of the IDs) Alice computes her scle K for Bob s Index nd Index nd likewise Bob computes his scle K for Alice s Index nd Index. These scle vlues re: For Alice: Scles for Indices nd re: nd, respectively For Bob, Scles for Indices nd re: nd, respectively In order to initite the discovery of the common key, Alice picks, sy Index ID of Bob, with its sequence,,. Likewise, Bob picks one of the vilble IDs of Alice, sy Index, with the sequence,,.

10 Genertion of Rw Key Alice computes the product (Alice Secret Key Bob s Identifier ) = (,, ) (,, ) = mod. This is Alice s rw key. Bob computes the product (Bob s Secret Key Alice s Identifier ) = (,, ) (,, ) = mod. This Bob s rw key. Genertion of Finl Key The finl key is computed by normlizing the rw key with respect to the common greed identifier index vlue for the communicting prties tht hs been tken to be. Alice s finl key = Alice s rw key S S Alice ( CommonIndex) ( CurrentIndex) Alice () Bob s finl key = Bob s rw key S Bob ( CommonIndex) () S ( CurrentIndex) Bob From Tble, S Alice (CommonIndex=) = nd S Alice (CurrentIndex=)=, nd from Tble, S Bob (CommonIndex=) = nd S Bob (CurrentIndex=) =. Therefore, Alice s finl key= / mod = Bob s finl key = / mod = = mod = () Suppose the common index chosen ws, then the vlues of S Alice (CommonIndex=) = nd S Bob (CommonIndex=) = (both from Tble ), nd plugging these in, the finl key for both the prties turns out to be. The security of the rndom protocol would depend not only on the size of the key nd p, but lso on the number of keys in the key set nd the mnner in which the subsets re chosen nd chnged in the rndom version of the scheme. Conclusions The dvntge of the proposed enhncement (both the complete nd the rndomized versions) to the Blom s scheme is tht it increses the cost of breking the cipher for the evesdropper. The correct common key cn be generted only upon the use of the scling keys s in equtions () nd () nd these re not vilble to the evesdropper. The common index used for the normliztion of the scling need not be published by ny of the prties nd this resides s secret fctor within the node. A description of the use of the cipher

11 proposed in this pper s forml protocol would require severl choices relted to the detils of the system tht will depend on the ppliction in hnd. The Blom-scheme bsed HDCPv ws hcked lthough its use hs continued bsed on legl protections [] nd HDCPv is bsed on different scheme []. The strengthening of the mtrix-bsed Blom s scheme is importnt nd the methods presented in this pper cn be n ttrctive option for resource-limited nodes of sensor network nd in specilized highbndwidth digitl content security. The Blom scheme is relted to threshold secret shring schemes [],[] in the sense tht the system is secure unless certin number of users hve been compromised. It will be interesting to explore nlogs of spce-efficient secret shring schemes [],[] for mtrix-bsed WS key distribution. References. C. Alcrz, J. Lopez, R. Romn, nd H. - H. Chen, Selecting key mngement schemes for WS pplictions. Computers & Security : - (). R. Blom, An optiml clss of symmetric key genertion systems, Advnces in Cryptology: Eurocrypt (T. Beth,. Cot nd I. Ingemrsson, eds.) LCS, - (). S. Kk, Ritul, msks, nd scrifice. Studies in Humnities nd Socil Sciences, Indin Institute of Advnced Study, Shiml (). A. Prkh nd S. Kk, Mtrix bsed key greement lgorithms for sensor networks. Proceedings of IEEE Advnced etworks nd Telecommunictions Conference (ATS ), Bnglore ( ). H. Chn, A. Perrig nd D. Song, Rndom key predistribution schemes for sensor networks, IEEE Sumposium on Reserch in Security nd Privcy, - (). C. J. Colbourn nd J.H. Dinitz, The CRC Hndbook of Combintoril Designs, CRC Press, ). W. Du, J. Deng, Y. S. Hn nd P. K. Vrshney, A pirwise key pre-distribution scheme for wireless sensor networks, Proc. of the th ACM conf. on Computer nd communictions Security, - (). S. Kk, The number theoretic Hilbert trnsform. rxiv:.. S. Kk, The discrete Hilbert trnsform. Proc. IEEE, - (). S. Kk, Hilbert trnsformtion for discrete dt. Interntionl Journl of Electronics, - (). S. Kk, The discrete finite Hilbert trnsform. Indin Journl Pure nd Applied Mthemtics, - (). S.K. Pdl nd K.M.M. Prbhu, Systolic rrys for the discrete Hilbert trnsform. Circuits, Devices nd Systems, IEE Proceedings, - (). F. W. King, Hilbert Trnsforms. Cmbridge University Press (). I.G. Roy, On robust estimtion of discrete Hilbert trnsform of noisy dt. Geophysics, (). S. Kk nd.s. Jynt, Speech encryption using wveform scrmbling. Bell System Technicl Journl, - ()

12 ..S. Jynt nd S. Kk, Uniform permuttion privcy system, US Ptent o.,,, July (). S. Kk, Multilyered rry computing. Informtion Sciences, - (). S. Kk, A two-lyered mesh rry for mtrix multipliction. Prllel Computing, - (). R. Kndregul, The bsic discrete Hilbert trnsform with n informtion hiding ppliction.. rxiv:.. V.K. Kotgiri, The -point nd -point number theoretic Hilbert trnsform. rxiv:.. V.K. Kotgiri, ew results on the number theoretic Hilbert trnsform. rxiv:.. S. Kk, A clss of orthogonl sequences. rxiv:.. V.K. Kotgiri, Rndom residue sequences nd the number theoretic Hilbert trnsform. rxiv:.. S. Kk, Properties of HT-circulnt mtrices. D. Krvets, Intel thretens to sue nyone who uses HDCP crck. Wired (). J. Zho, D. Gu, Y. Li, W. Cheng, On weknesses of the HDCP uthentiction nd key exchnge protocol nd its repir. Mthemticl nd Computer Modelling : - (). G.R. Blkley, Sfegurding cryptogrphic keys. Proceedings of the tionl Computer Conference : (). A. Shmir, How to shre secret". Communictions of the ACM (): (). A. Prkh nd S. Kk, Online dt storge using implicit security. Informtion Sciences : - (). A. Prkh nd S. Kk, Spce efficient secret shring for implicit dt security. Informtion Sciences : - ()

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow

Convolutional Networks. Lecture slides for Chapter 9 of Deep Learning Ian Goodfellow Convolutionl Networks Lecture slides for Chpter 9 of Deep Lerning In Goodfellow 2016-09-12 Convolutionl Networks Scle up neurl networks to process very lrge imges / video sequences Sprse connections Prmeter

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties

On the Effectivity of Different Pseudo-Noise and Orthogonal Sequences for Speech Encryption from Correlation Properties On the Effectivity of Different Pseudo-Noise nd Orthogonl Sequences for Speech Encryption from Correltion Properties V. Anil Kumr, Ahijit Mitr nd S. R. Mhdev Prsnn Astrct We nlyze the effectivity of different

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

Application of Wavelet De-noising in Vibration Torque Measurement

Application of Wavelet De-noising in Vibration Torque Measurement IJCSI Interntionl Journl of Computer Science Issues, Vol. 9, Issue 5, No 3, September 01 www.ijcsi.org 9 Appliction of Wvelet De-noising in Vibrtion orque Mesurement Ho Zho 1 1 Jixing University, Jixing,

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design

ECE 274 Digital Logic. Digital Design. Datapath Components Shifters, Comparators, Counters, Multipliers Digital Design ECE 27 Digitl Logic Shifters, Comprtors, Counters, Multipliers Digitl Design..7 Digitl Design Chpter : Slides to ccompny the textbook Digitl Design, First Edition, by Frnk Vhid, John Wiley nd Sons Publishers,

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

Development and application of a patent-based design around. process

Development and application of a patent-based design around. process Authors: Yeh-Ling Hsu, Po-Er Hsu, Yung-Chieh Hung, Y-Dn Xio (--4); recommended: Yeh-Ling Hsu (-6-9). Note: his pper is presented t the st Interntionl Conference on Systemtic Innovtion, Hsinchu, iwn, Jnury.

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material.

Rek Molva, Alain Pannetrat. Institut Eurecom, Sophia-Antipolis, France. cryptographic keying material. clble Multicst ecurity in Dynmic Groups. Rek Molv, Alin Pnnetrt Institut Eurecom, ophi-antipolis, Frnce. fmolv,pnnetrg@eurecom.fr Abstrct In this pper we propose new frmework for multicst security bsed

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

EQ: What are the similarities and differences between matrices and real numbers?

EQ: What are the similarities and differences between matrices and real numbers? Unit 4 Lesson 1 Essentil Question Stndrds Objectives Vocbulry Mtrices Mtrix Opertions Wht re the similrities nd differences between mtrices nd rel numbers? M.ALGII.2.4 Unit 4: Lesson 1 Describe how you

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3

More information

Student Book SERIES. Patterns and Algebra. Name

Student Book SERIES. Patterns and Algebra. Name E Student Book 3 + 7 5 + 5 Nme Contents Series E Topic Ptterns nd functions (pp. ) identifying nd creting ptterns skip counting completing nd descriing ptterns predicting repeting ptterns predicting growing

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR Electricity Electronics Bipolr Trnsistors MEASURE THE HARATERISTI URVES RELEVANT TO AN NPN TRANSISTOR Mesure the input chrcteristic, i.e. the bse current IB s function of the bse emitter voltge UBE. Mesure

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

Address for Correspondence

Address for Correspondence Mrndn et l., Interntionl Journl of Advnced Engineering Technology E-ISSN 0976-3945 Reserch Pper A LATTICE REDUCTION-AIDED INFORMATION PRECODER FOR MULTIUSER COMMUNICATION SYSTEM S. Mrndn, N. Venteswrn

More information

Design And Implementation Of Luo Converter For Electric Vehicle Applications

Design And Implementation Of Luo Converter For Electric Vehicle Applications Design And Implementtion Of Luo Converter For Electric Vehicle Applictions A.Mnikndn #1, N.Vdivel #2 ME (Power Electronics nd Drives) Deprtment of Electricl nd Electronics Engineering Sri Shkthi Institute

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Application Note. Differential Amplifier

Application Note. Differential Amplifier Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble

More information

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17. Section 7.: Line Integrls Objectives. ompute line integrls in IR nd IR 3. Assignments. Red Section 7.. Problems:,5,9,,3,7,,4 3. hllenge: 6,3,37 4. Red Section 7.3 3 Mple ommnds Mple cn ctully evlute line

More information

Application of AHP in the Analysis of Flexible Manufacturing System

Application of AHP in the Analysis of Flexible Manufacturing System Journl of Industril nd Intelligent Informtion Vol., No., Jnury 0 Appliction of AHP in the Anlysis of Flexible Mnufcturing System Rjveer Singh, Prveen Shrm, nd Sndeep Singhl Ntionl Institute of Technology/Mechnicl

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Make Your Math Super Powered

Make Your Math Super Powered Mke Your Mth Super Powered: Use Gmes, Chllenges, nd Puzzles Where s the fun? Lern Mth Workshop model by prticipting in one nd explore fun nocost/low-cost gmes nd puzzles tht you cn esily bring into your

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor ThreePhse NPC Inverter Using ThreePhse Coupled Inductor Romeu Husmnn 1, Rodrigo d Silv 2 nd Ivo Brbi 2 1 Deprtment of Electricl nd Telecommuniction Engineering, University of Blumenu FURB Blumenu SC Brzil,

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-236 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Abacaba-Dabacaba! by Michael Naylor Western Washington University

Abacaba-Dabacaba! by Michael Naylor Western Washington University Abcb-Dbcb! by Michel Nylor Western Wshington University The Abcb structure shows up in n mzing vriety of plces. This rticle explores 10 surprising ides which ll shre this pttern, pth tht will tke us through

More information

Congruences for Stirling Numbers of the Second Kind Modulo 5

Congruences for Stirling Numbers of the Second Kind Modulo 5 Southest Asin Bulletin of Mthemtics (2013 37: 795 800 Southest Asin Bulletin of Mthemtics c SEAMS. 2013 Congruences for Stirling Numbers of the Second Kind Modulo 5 Jinrong Zho School of Economic Mthemtics,

More information

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING April 9, 2000 DIS chpter 0 CHAPTE 3 : INTEGATED POCESSO-LEVEL ACHITECTUES FO EAL-TIME DIGITAL SIGNAL POCESSING April 9, 2000 DIS chpter 3.. INTODUCTION The purpose of this chpter is twofold. Firstly, bsic

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

Spiral Tilings with C-curves

Spiral Tilings with C-curves Spirl Tilings with -curves Using ombintorics to Augment Trdition hris K. Plmer 19 North Albny Avenue hicgo, Illinois, 0 chris@shdowfolds.com www.shdowfolds.com Abstrct Spirl tilings used by rtisns through

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office . TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding

More information

A Simple Approach to Control the Time-constant of Microwave Integrators

A Simple Approach to Control the Time-constant of Microwave Integrators 5 VOL., NO.3, MA, A Simple Approch to Control the Time-constnt of Microwve Integrtors Dhrmendr K. Updhyy* nd Rkesh K. Singh NSIT, Division of Electronics & Communiction Engineering New Delhi-78, In Tel:

More information

Robustness Analysis of Pulse Width Modulation Control of Motor Speed

Robustness Analysis of Pulse Width Modulation Control of Motor Speed Proceedings of the World Congress on Engineering nd Computer Science 2007 WCECS 2007, October 24-26, 2007, Sn Frncisco, USA obustness Anlysis of Pulse Width Modultion Control of Motor Speed Wei Zhn Abstrct

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine EE 438 Automtic Control Systems echnology bortory 5 Control of Seprtely Excited DC Mchine Objective: Apply proportionl controller to n electromechnicl system nd observe the effects tht feedbck control

More information

ECE 274 Digital Logic

ECE 274 Digital Logic ECE - Digitl Logic (Textbook - Required) ECE Digitl Logic Instructor: Romn Lysecky, rlysecky@ece.rizon.edu Office Hours: TBA, ECE F Lecture: MWF :-: PM, ILC Course Website: http://www.ece.rizon.edu/~ece/

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type)

Discontinued AN6262N, AN6263N. (planed maintenance type, maintenance type, planed discontinued typed, discontinued type) ICs for Cssette, Cssette Deck ANN, ANN Puse Detection s of Rdio Cssette, Cssette Deck Overview The ANN nd the ANN re the puse detection integrted circuits which select the progrm on the cssette tpe. In

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

NUMBER THEORY Amin Witno

NUMBER THEORY Amin Witno WON Series in Discrete Mthemtics nd Modern Algebr Volume 2 NUMBER THEORY Amin Witno Prefce Written t Phildelphi University, Jordn for Mth 313, these notes 1 were used first time in the Fll 2005 semester.

More information

Design of FPGA-Based Rapid Prototype Spectral Subtraction for Hands-free Speech Applications

Design of FPGA-Based Rapid Prototype Spectral Subtraction for Hands-free Speech Applications Design of FPGA-Bsed Rpid Prototype Spectrl Subtrction for Hnds-free Speech Applictions Sryut Amornwongpeeti *, Nobutk Ono *, nd Mongkol Ekpnypong * Principles of Informtics Reserch Division, Ntionl Institute

More information

Polar Coordinates. July 30, 2014

Polar Coordinates. July 30, 2014 Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Kyushu Institute of Technology

Kyushu Institute of Technology Title: Integrted Rescue Service Stellite (IRS-St) Primry Point of Contct (POC): Mohmed Ibrhim Co-uthors: Btsuren Amglnbt, Puline Fure, Kevin Chou Orgniztion:, 1-1 Sensui, Tobt, Kitkyushu 804-8550, Jpn

More information

Compared to generators DC MOTORS. Back e.m.f. Back e.m.f. Example. Example. The construction of a d.c. motor is the same as a d.c. generator.

Compared to generators DC MOTORS. Back e.m.f. Back e.m.f. Example. Example. The construction of a d.c. motor is the same as a d.c. generator. Compred to genertors DC MOTORS Prepred by Engr. JP Timol Reference: Electricl nd Electronic Principles nd Technology The construction of d.c. motor is the sme s d.c. genertor. the generted e.m.f. is less

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

Modeling of Inverter Fed Five Phase Induction Motor using V/f Control Technique

Modeling of Inverter Fed Five Phase Induction Motor using V/f Control Technique Interntionl Journl of Current Engineering nd Technology E-ISSN 2277 4106, P-ISSN 2347 161 201INPRESSCO, All Rights Reserved Avilble t http://inpressco.com/ctegory/ijcet Reserch Article Modeling of Inverter

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Outcome Matrix based Phrase Selection

Outcome Matrix based Phrase Selection Outcome Mtrix bsed Phrse Selection Aln R Wgner Georgi Tech Reserch Institute 50 4 th Street NW, Atlnt GA 0-08 Abstrct This rticle presents method for using outcome mtrices for socil phrse selection. An

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces Americn Journl of Applied Sciences 6 (8): 1539-1547, 2009 ISSN 1546-9239 2009 Science Publictions Exponentil-Hyperbolic Model for Actul Operting Conditions of Three Phse Arc Furnces 1 Mhdi Bnejd, 2 Rhmt-Allh

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations 54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show

More information

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers Electriclly Lrge Zero-Phse-Shift Metmteril-bsed Grid Arry Antenn for UHF Ner-Field RFID Reders Jin Shi, Xinming Qing, member IEEE, Zhi Ning Chen, Fellow, IEEE Abstrct A grid rry ntenn using zero-phse-shift

More information

Keywords Semi-Fragile, Digital watermarking, Toeplitz matrix, Image Authentication, Content based watermarking.

Keywords Semi-Fragile, Digital watermarking, Toeplitz matrix, Image Authentication, Content based watermarking. Volume 5, Issue 1, Jnury 2015 ISSN: 2277 128X Interntionl Journl of Advnced Reserch in Computer Science nd Softwre Engineering Reserch Pper Avilble online t: www.ijrcsse.com Exploittion of Toeplitz Mtrix

More information

Theme: Don t get mad. Learn mod.

Theme: Don t get mad. Learn mod. FERURY When 1 is divided by 5, the reminder is. nother wy to sy this is opyright 015 The Ntionl ouncil of Techers of Mthemtics, Inc. www.nctm.org. ll rights reserved. This mteril my not be copied or distributed

More information

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009

University of North Carolina-Charlotte Department of Electrical and Computer Engineering ECGR 4143/5195 Electrical Machinery Fall 2009 Problem 1: Using DC Mchine University o North Crolin-Chrlotte Deprtment o Electricl nd Computer Engineering ECGR 4143/5195 Electricl Mchinery Fll 2009 Problem Set 4 Due: Thursdy October 8 Suggested Reding:

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

Analog computation of wavelet transform coefficients in real-time Moreira-Tamayo, O.; Pineda de Gyvez, J.

Analog computation of wavelet transform coefficients in real-time Moreira-Tamayo, O.; Pineda de Gyvez, J. Anlog computtion of wvelet trnsform coefficients in rel-time Moreir-Tmyo, O.; Pined de Gyvez, J. Published in: IEEE Trnsctions on Circuits nd Systems. I, Fundmentl Theory nd Applictions DOI: 0.09/8.558443

More information