International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.
|
|
- Kelly Lucas
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2, Sam Harar 3 SYSTEL, SUPCOM, Tunsa hamd@unv-tln.fr 2 SYSCOM, ENIT, Tunsa abdelhed manel@yahoo.fr, ammar.bouallegue@ent.rnu.tn 3 SIS, USTV, France harar@unv-tln.fr ABSTRACT We propose a method to recover the structure of a randomly permuted chaned code and how to cryptanalyse cryptographc schemes based on these knds of error codng. As applcaton of these methods s a cryptographc schema usng regular Low Densty Party Check (LDPC) Codes. Ths result prohbts the use of chaned code and partcularly regular LDPC codes on cryptography. KEYWORDS: Cryptography, Chaned Codes, LDPC Codes, Attack, Complexty.. INTRODUCTION RSA and McElece are the oldest publc key cryptosystems. They are based respectvely on ntractablty of factorzaton and syndrome decodng problems []. However, McElece [2] was not qute as successful as RSA, partallydue to ts large publc key and to the belef that could not be used n sgnature. In 2, Courtos, Fnasz and Sendrer [3] show a new method to buld practcal sgnature schemes wth the McElece publc key cryptosystem. Ths scheme has the drawback of a hgh sgnature cost. One dea to counter ths drawback conssts n replacng Goppa code by other codes whch have faster decodng algorthms lke chaned codes. In ths paper, we show an nvarant n the structure of chaned codes whch makes a weakness n cryptographc schemes based on chaned codes. Our approach s based on the fact that any gven chaned equvalent code can be transformed n a systematc code whch has a specal generator matrx representaton. Regular LDPC code s generally a chaned repetton code. We show that these codes are useless n cryptography. 57
2 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 2. CHAINED CODE A chaned code C s defned as a drect sum of elementary codes N = n and of dmenson = = k = K. C = C = = {( u u ); u C,..., u C },..., C. Ths code s of length To encode an nformaton m = ( m,..., m ), where m s generator matrx to obtan the codeword u = m. G = ( u,..., u ) wth u s the obtaned from m usng the elementary code dagonal s formed by elementary generator matrces k bts, we smply multply t by the n bts codeword C. So, G s a dagonal matrx n blocs and whose G of the code C. We assume that we have an effcent decodng algorthm for each elementary code u ( u,..., u ) decoded word s m ( m,..., ) =, we apply for each codeword m = dec u. C. To decode dec. The u ts correspondent decodng algorthm C ( ) = wth ( ) m We defne the support of a non zero word x ( x,..., x n ) zero postons. sup( ) { {,.., n}, x } = C =, denoted sup(x ), as the set of ts non x and the support of a set S { y,..., } U = as the unon of the supports of ts words sup( S) = sup( y ). So the support of a code C ( N, K) s the unon of ts k 2 codeword supports. y S Two words x and y are sad to be connected f ther supports are not dsjonts.e sup( x ) sup( y) = Θ and two sets I and J are sad to be dsjonts f there s no connecton subset between them. A non zero codeword x of C s sad to be mnmal support f there s no codeword sup( y) sup( x). y y C such that Two codes C ( N, K ) and '( N, K),.., N such as: C' = σ ( C) = { cσ ( ),.., cσ ( N ) }. In other words, C and C' are equvalents f there s a C are sad to be equvalents f there s a permutaton σ of { } permutaton matrx such as for any generator matrx G ofc, the matrx matrx of C '. G '= G. P s a generator 58
3 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 3. CHAINED CODES AND CRYPTOGRAPHY As we mentoned n the ntroducton, the drawback of the unque dgtal sgnature scheme based on error codng s the hgh sgnature complexty whch s due to Goppa decodng algorthm. One dea to counter ths drawback conssts n replacng Goppa code by chaned code whch have faster decodng algorthm. Generally, the secret key of a cryptographc scheme based on error codng s the code tself, for whch an effcent decodng algorthm s known, and the publc key s a transformaton of the generator or party check matrces. We consder a dgtal sgnature scheme based on chaned code, and then we develop an algorthm to dscover the prvate key from publc key. Ths attack s applcable for each cryptographc scheme snce t s a structural attack. Secret key: Publc key: Sgnature: Verfcaton: o S s a random ( K K ) non sngular matrx called the scramblng matrx. o G s a ( K N) generator matrx of a chaned code o P s a random ( N N ) permutaton matrx o G '= S. G. P s a randomly scrambled et permuted generator matrx. It s a generator matrx of an equvalent non structured code to the chaned code c s the completed correcton capactes calculated as [3]. o h( ) s a hash functon. o The sgner, frst, calculates y = h( M ). P, where h(m ) s the N bt message, P s the nverse of P. Then he uses the completed decodng algorthm [3] for the orgnal chaned code C to obtan x = S. σ. Fnally, the recever obtans the sgnature by computng S σ =. x where S s the nverse of S. o The verfer calculates ρ ' = σ. G' and ρ = h(m ) o The sgnature s vald f d ( ρ, ρ' ) < c We have ntroduced a dgtal sgnature scheme and then we present the weakness of ths scheme. Ths weakness s due to the fact that chaned codes have an nvarant. Code equvalence means that one generator matrx s a permutaton of the other, because matrx S does not change the code but only performs a modfcaton on the bass of the lnear subspace. Canteaut showed that the 59
4 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 matrx S may be mportant to hde the systematc structure of the Goppa codes, therefore havng an mportant securty role [4]. However, Heman was the frst to study ths pont and states that the random matrx S used n the orgnal McElece scheme serves no securty purpose concernng the protecton [5]. We confrm ths argument and we show that the random matrx S has no securty role for cryptographc schemes based on lnear codes. We state also that dsjont elementary code supports s an nvarant by permutaton. To avod exhaustve attack, we used at least fve dfferent elementary codes and to avod attack by nformaton set, we used a chaned code wth length at least equal to 9 bts. The attack explores the characterstcs of the code transformaton n order to dentfy ts buldng blocks. Its nput s a generatng matrx G' of a randomly permuted chaned code of length N and dmenson K. Its output s a structured chaned code. The algorthm s steps are: o Apply a Gauss elmnaton to the rows of the matrx form G = ( I, d Z ). G' to obtan the systematc Sendrer shows that rows of any systematc generator matrx of a code C are mnmal support codewords of C and that any mnmal support codeword of C s a row of a systematc generator matrx of C [4]. The systematc chaned code support s formed by dsjont sets. Each set represents the support of an elementary code. The transformaton of any randomly permuted chaned code generator matrx nto a systematc matrx by lnear algebrac algorthms wll allow us to fnd these supports and thus elementary codes. o Search the dsjont sets of rows of the systematc matrx G. Each set forms the elementary code support. o Use elementary decodng algorthms to decode every message. As applcaton of these codes, regular LDPC codes whch represent chaned repetton codes. Next sectons represent the propretes of these codes. 4. LOW DENSITY PARITY CHECK CODES Low-densty party-check (LDPC) codes were frst dscovered by Gallager [6] n 962 and have recently been redscovered by Mackay and Neal [7], [8]. In fact, when LDPC codes have been nvented, ther decodng was too complcated for the technology, and so they have been forgotten. These codes delver very good performance when decoded wth the belef-propagaton (BP) algorthm [7]. Bnary LDPC codes, are lnear block codes defned by a sparse party check matrx H ( M N ), where N denotes the codeword length and M the number of party-check equatons. When the numbers of s n each column and row are constant the code s called a regular LDPC code. Otherwse, t s sad to be rregular. 4.. Regular LDPC codes In ths secton, we show that the party check matrx of an LDPC code has a partcular structure. The unqueness of the canoncal matrx provdes us to recover used codes of any equvalent code. 6
5 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 The support of systematc LDPC code s formed by dsjont sets. Each set represents the support of an elementary repetton code. The transformaton of any randomly permuted LDPC code party check matrx nto a systematc matrx by lnear algebrac algorthms wll allow us to fnd these supports and thus elementary codes. The regular LDPC party check matrx s constructed as follows: t s a concatenaton of permuted repetton code. H = 4.2. Party check matrx propertes We are nterested, n ths secton, on party check matrx propertes whch wll be used to analyse the regular LDPC code structure. The party check matrx H of a lnear code s not unque, any S.H s also a party check matrx. o If the systematc party check matrx exsts then t s unque [4]. o Rows of any systematc party check matrx of a code C are mnmal support codewords of C [4]. o Any mnmal support codeword of C s a row of a systematc party check matrx of C [4]. Consequently, the systematc LDPC code party check matrx rows are dvded n dsjont sets. Each set defnes the support of a repetton code C. Ths property s nvarant by permutaton. Based on ths property, we show that, a randomly permuted LDPC party check matrx H ' = SHP has a partcular structure. Ths structure permts to dscover easly the hdden matrx H '. 5. RESULTS 5.. Attack complexty on chaned lnear codes The securty of cryptographc schemes based on error codng s hghly dependent on the class of used codes. Some class of codes reveal ther characterstcs even when they go through the permutaton used to construct the publc code. It s the case of chaned codes. The startng pont was the observaton that any systematc matrx s formed by small weght codeword and that chaned code contans so many mnmal support codewords. These two propertes lead to a structural attack of dgtal sgnature scheme based on chaned code. Fgure shows the complexty of the attack of some cryptosystems usng chaned codes. The complexty s always 45 less 2 even wth so long codes ( N = 3). Ths complexty prohbts usng chaned code n cryptography. 6
6 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 Fgure : Attack complexty on chaned lnear codes 5.2. Attack complexty on LDPC Codes The complexty s the number of bnary operatons to dscover a randomly permuted regular LDPC code structure. 2 o N. M / 2 bnary operatons for Gaussan elmnaton. o M. N bnary operatons to compute all lne weghts. Thus, the number of bnary operatons necessary for ths algorthm s equal to 2 N. M / 2 + N. M. Fgure 2: Complexty of the attack on cryptosystem usng regular LDPC 62
7 Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 Fgure 2 shows the complexty of the attack of some cryptosystems usng regular LDPC. The 45 complexty s always less 2 even wth so long codes ( N = 3). Ths complexty prohbts usng LDPC n cryptography. 6. CONCLUSION In ths paper, we dscussed the structure of a randomly permuted chaned code. We explored potental threats from systematc generator matrx that has partcular structure. Chaned code generator matrces have the propertes of dsconnected elementary code supports. Ths property s nvarant by permutaton, whch make ths knd of code useless n cryptography. Regular LDPC codes have ths property. REFERENCES [] E.R. Berlekamp, R.J. McElece, and H.C.A. van Tlborg, On the nherent ntractablty of certan codng problems IEEE Transactons on Informaton Theory, Vol.24, No.3,978, pp [2] R.J. McElece, A publc-key cryptosystem based on algebrac codng theory DSN Prog. Rep., Jet Propulson Laboratory, Calforna Inst. Technol., Pasadena, CA, pp. 4-6,January 978. [3] N. Courtos, M. Fnasz, and N. Sendrer, How to acheve a McElece-based dgtal sgnature scheme In C. Boyd, edtor, Asacrypt 2, volume 2248 of LNCS, pages Sprnger-Verlag, 2. [4] N.Sendrer, On the structure of a lnear code AAECC, Vol.9, n3, 998, pp [5] A. Canteaut, Attaques de cryptosystmes mots de pods fable et constructon de fonctons t-rslentes. PhD thess, Unverst Pars 6, October 996. [6] R. G. Gallager, Low-Densty Party-Check codes PhD thess, MIT, July 963. [7] D. J. C. MacKay, Good error-correctng codes based on very sparse matrces IEEE Transactons on Informaton Theory, vol. 45, pp , March 999. [8] D. J. C. Mackay, Near shannon lmt performance of low densty party check codes Electron. Lett., vol. 33, pp , Mars [9] J. Chen and M. P. C. Fossorer, Near optmum unversal belef propagaton based decodng of Low- Densty Party Check codes IEEE Transactons on Communcatons, vol. 5, pp , March
Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationUnderstanding the Spike Algorithm
Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst
More informationA thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment
Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree
More informationReview: Our Approach 2. CSC310 Information Theory
CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationSpace Time Equalization-space time codes System Model for STCM
Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationSide-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationAdaptive Modulation for Multiple Antenna Channels
Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,
More informationChinese Remainder. Discrete Mathematics Andrei Bulatov
Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationGraph Method for Solving Switched Capacitors Circuits
Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586
More informationError Probability of RS Code Over Wireless Channel
Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department
More informationAccelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module
Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationInverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationEMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.
student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete
More informationc 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
c 2009 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal
More informationAN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS
AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS * Mahd Nangr Department of Electrcal Engneerng, Khaje Nasr Unversty of Technology, Tehran, Iran *Author for Correspondence ABSTRACT
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationControl Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart
Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationHigh Speed ADC Sampling Transients
Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.
More informationLatency Insertion Method (LIM) for IR Drop Analysis in Power Grid
Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,
More informationJoint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding
Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent
More informationA General Framework for Codes Involving Redundancy Minimization
IEEE TRANSACTIONS ON INFORMATION THEORY A General Framework for Codes Involvng Redundancy Mnmzaton Mchael Baer, Member, IEEE Abstract A framework wth two scalar parameters s ntroduced for varous problems
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationLow-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods
Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA
More informationSIMULATED PERFORMANCE A MATLAB IMPLEMENTATION OF LOW-DENSITY PARITY- CHECK CODES. By: Dan Dechene Kevin Peets. Supervised by: Dr.
SIMULATED PERFORMANCE OF LOW-DENSITY PARITY- CHECK CODES A MATLAB IMPLEMENTATION LAKEHEAD UNIVERSITY FACULTY OF ENGINEERING 2006 By: Dan Dechene Kevn Peets Supervsed by: Dr. Julan Cheng TABLE OF CONTENTS
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationKing s Research Portal
Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,
More informationEquivalent Circuit Model of Electromagnetic Behaviour of Wire Objects by the Matrix Pencil Method
ERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No., May 008, -0 Equvalent Crcut Model of Electromagnetc Behavour of Wre Objects by the Matrx Pencl Method Vesna Arnautovsk-Toseva, Khall El Khamlch Drss,
More informationA High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree
World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee
More informationALICE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE
#A72 INTEGERS 6 (26) ALIE AND BOB GO TO DINNER: A VARIATION ON MÉNAGE Vladmr Shevelev Department of Mathematcs, Ben-Guron Unversty of the Negev, Beer-Sheva, Israel shevelev@bgu.ac.l Peter J.. Moses Moparmatc
More informationPerformance Comparison of Product Codes and Cubic Product Codes using FRBS for Robust Watermarking
Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 250-7988 Volume 8 (206) pp. 057-066 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance Comparson of Product
More informationHierarchical Generalized Cantor Set Modulation
8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton
More information29. Network Functions for Circuits Containing Op Amps
9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can
More informationLOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION
LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd
More informationSpread Spectrum based M-ary Modulated Robust Image Watermarking
54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of
More informationLow Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery
017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang
More informationFall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes
5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs
More informationSteganography in JPEG2000 Compressed Images
824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationOptimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples
Optmzng Transmsson Lengths for Lmted Feedbac wth on-bnary LDPC Examples Kasra Valna, Sudarsan V. S. Ranganathan, Darush Dvsalar*, and Rchard D. Wesel Department of Electrcal Engneerng, Unversty of Calforna,
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationEE 508 Lecture 6. Degrees of Freedom The Approximation Problem
EE 508 Lecture 6 Degrees of Freedom The Approxmaton Problem Revew from Last Tme Desgn Strategy Theorem: A crcut wth transfer functon T(s) can be obtaned from a crcut wth normalzed transfer functon T n
More informationDiscussion on How to Express a Regional GPS Solution in the ITRF
162 Dscusson on How to Express a Regonal GPS Soluton n the ITRF Z. ALTAMIMI 1 Abstract The usefulness of the densfcaton of the Internatonal Terrestral Reference Frame (ITRF) s to facltate ts access as
More informationMulti-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks
Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1
Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,
More informationOptimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables
S. Aucharyamet and S. Srsumrannukul / GMSARN Internatonal Journal 4 (2010) 57-66 Optmal Allocaton of Statc VAr Compensator for Actve Power oss Reducton by Dfferent Decson Varables S. Aucharyamet and S.
More informationLOW-density parity-check (LDPC) codes first discovered
Desgn of LDPC Codes Robust to Nosy Message-Passng Decodng Alla Targhat, Student Member, IEEE, Hamed Farhad, Member, IEEE and Farshad Lahout, Senor Member, IEEE arxv:50.0483v3 [cs.it] Jun 05 Abstract We
More information08/20/99 1 T1E1.4/99-333R1. Title: Soft Cancellation via Iterative Decoding to Mitigate the effect of Home-LANs on VDSL (333R1)
08/0/99 TE.4/99-333R Project: TE.4: VDSL Ttle: Soft Cancellaton va Iteratve Decodng to Mtgate the effect of Home-LANs on VDSL (333R) Contact: Date: Dst'n: K. Cheong, J. Cho, J. Fan, R. Neg, N.Wu and J.
More informationA Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute
More informationPerformance of Modified Iterative Decoding Algorithm for Multilevel Codes in Adaptive OFDM System
Internatonal Journal of Computer Informaton Systems and Industral Management Applcatons. ISSN 50-7988 Volume 6 (04) pp. - 0 MIR Labs, www.mrlabs.net/jcsm/ndex.html Performance of Modfed Iteratve Decodng
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationPOLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources
POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three
More informationPERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala.
PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER 1 H. RAGHUNATHA RAO, T. ASHOK KUMAR & 3 N.SURESH BABU 1,&3 Department of Electroncs and Communcaton Engneerng, Chrala Engneerng College,
More informationSTATISTICS. is given by. i i. = total frequency, d i. = x i a ANIL TUTORIALS. = total frequency and d i. = total frequency, h = class-size
STATISTICS ImPORTANT TERmS, DEFINITIONS AND RESULTS l The mean x of n values x 1, x 2, x 3,... x n s gven by x1+ x2 + x3 +... + xn x = n l mean of grouped data (wthout class-ntervals) () Drect method :
More informationThe Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game
8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang
More informationNumerical simulations for long range guided waves Nondestructive Testing by a wavelet based two port equivalent.
Numercal smulatons for long range guded waves Nondestructve Testng by a wavelet based two port equvalent. F. BERTONCINI, A. MUSOLINO, M. RAUGI, F. TURCU Department of Electrc Systems and Automaton Unversty
More informationTHE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM
THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of
More informationSecure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper,
More informationNOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION
NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona
More informationIN wireless networks, it has always been a challenge to satisfy
1668 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 3, MARCH 14 Desgn of Low-Densty Party-Check Codes for Half-Duplex Three-Phase Two-Way Relay Channels Xnsheng Zhou, Lang-Lang Xe, Senor Member,
More informationcommunications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.
Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal
More informationImplementation Complexity of Bit Permutation Instructions
Implementaton Complexty of Bt Permutaton Instructons Zhje Jerry Sh and Ruby B. Lee Department of Electrcal Engneerng, Prnceton Unversty, Prnceton, NJ 085 USA {zsh, rblee}@ee.prnceton.edu Abstract- Several
More informationChapter 2 Basics of Efficient Secure Function Evaluation
Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationDouble-lock for image encryption with virtual optical wavelength
Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca
More informationMulti-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments
Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton
More informationarxiv: v1 [cs.it] 30 Sep 2008
A CODED BIT-LOADING LINEAR PRECODED DISCRETE MULTITONE SOLUTION FOR POWER LINE COMMUNICATION Fahad Syed Muhammmad*, Jean-Yves Baudas, Jean-Franços Hélard, and Mattheu Crussère Insttute of Electroncs and
More informationDESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER
DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy
More informationSensors for Motion and Position Measurement
Sensors for Moton and Poston Measurement Introducton An ntegrated manufacturng envronment conssts of 5 elements:- - Machne tools - Inspecton devces - Materal handlng devces - Packagng machnes - Area where
More informationReduced Cluster Search ML Decoding for QO-STBC Systems
Reduced Cluster Search ML Decodng for QO-STBC Systems Isaque Suzuk, Taufk Abrão Dept. of Electrcal Engneerng State Unversty of Londrna 8605-990, PR, Brazl taufk@uel.br Bruno A. Angélco, Fernando Craco
More informationFuzzy Authentication Algorithm with Applications to Error Localization and Correction of Images
Obad Ur-Rehman, Natasa Zvc Fuzzy Authentcaton Algorthm wth Applcatons to Error Localzaton and Correcton of Images OBAID UR-REHMAN and NATASA ZIVIC Char for Data Communcatons Systems Unversty of Segen Hoelderlnstrasse
More informationChapter 2 Two-Degree-of-Freedom PID Controllers Structures
Chapter 2 Two-Degree-of-Freedom PID Controllers Structures As n most of the exstng ndustral process control applcatons, the desred value of the controlled varable, or set-pont, normally remans constant
More informationA Novel Reference Current Generation Algorithm for Harmonic and Reactive Power Compensation in Non Ideal Three-phase Systems
Internatonal Journal of Electrcal Engneerng. ISSN 0974-2158 Volume 5, Number 2 (2012), pp. 153-166 Internatonal Research Publcaton House http://www.rphouse.com A Novel Reference Current Generaton Algorthm
More informationA MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS
A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr
More informationOn the Feasibility of Receive Collaboration in Wireless Sensor Networks
On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,
More informationMulticarrier Modulation
Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels
More informationChapter 1. On-line Choice of On-line Algorithms. Yossi Azar Andrei Z. Broder Mark S. Manasse
Chapter On-lne Choce of On-lne Algorthms Yoss Azar Andre Z. Broder Mark S. Manasse Abstract Let fa ; A 2; ; Amg be a set of on-lne algorthms for a problem P wth nput set I. We assume that P can be represented
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationGeneralized Incomplete Trojan-Type Designs with Unequal Cell Sizes
Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,
More informationA Novel UWB Imaging System Setup for Computer- Aided Breast Cancer Diagnosis
A Novel UWB Imagng System Setup for Computer- Aded Breast Cancer Dagnoss Xang He, Ja L, Chenxng Wu Electrcal and Computer Engneerng Oakland Unversty, OU Rochester, I 48309, U.S.A xhe2@oakland.edu, l4@oakland.edu,
More informationSolving switched capacitors circuits by full graph methods
INRNINL JURNL F IRUI, Y ND IGNL PRING olvng swtched capactors crcuts by full graph methods Bohuml Brtnk bstract rcuts wth swtched capactors are descrbed by a capactance matrx and seekng voltage transfers
More informationDESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER
7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of
More informationBeam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods
Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs
More information