Semi-quantum private comparison protocol under an. almost-dishonest third party

Size: px
Start display at page:

Download "Semi-quantum private comparison protocol under an. almost-dishonest third party"

Transcription

1 Sem-quntum prvte comprson protocol under n lmost-dshonest thrd prty Wen-Hn Chou Tzonelh Hwng nd Jun Gu Deprtment of Computer Scence nd nformton Engneerng Ntonl Cheng Kung Unversty No. Unversty Rd. Tnn Cty 700 Twn R.O.C @gml.com hwngtl@sml.cse.ncku.edu.tw sgujun@gml.com Responsle for correspondence: Tzonelh Hwng Dstngushed Professor Deprtment of Computer Scence nd nformton Engneerng Ntonl Cheng Kung Unversty No. Unversty Rd. Tnn Cty 700 Twn R.O.C. Eml: hwngtl@sml.cse.ncku.edu.tw TEL: ext. 654

2 Astrct Ths study presents the frst sem-quntum prvte comprson SQPC protocol under n lmost-dshonest thrd prty. The proposed protocol llows two clsscl prtcpnts to compre ther secret nformton wthout compromsng t s prvcy. The securty nlyses ndcte tht the protocol s free from severl well-known ttcks. Keywords: Sem-quntum prvte comprson; lmost-dshonest thrd-prty; outsder ttck; nsder ttck. ntroducton Snce the frst quntum key dstruton QKD protocol presented y ennett nd rssrd [] mny quntum cryptogrphc protocols such s teleportton [-7] quntum secret shrng QSS [8-6] quntum secure drect communcton QSDC [7-] nd so on hve een proposed to solve vrous securty prolems. Recently quntum prvte comprson QPC hs ecome nother populr topc for reserch. The gol of QPC protocol s to prvtely compre two prtcpnts undsclosed nformton for equlty. n prevous QPC protocols the prtcpnts need to e equpped wth dvnced quntum devces such s quntum memory quntum genertor or quntum untry opertons for comprson. However ths pper proposes the frst sem-quntum prvte comprson SQPC protocol for the prtcpnts who do not hve ny quntum cplty to compre ther secrets under n lmost-dshonest thrd-prty [ 3]. An lmost-dshonest TP my try to perform vrous possle ttcks for dsclosng the secret nformton of the prtcpnts ut he/she cnnot collude wth the prtcpnts.

3 n prevous oyer et l. [4 5] proposed two novel sem-quntum key dstruton SQKD protocols usng sngle photons. Accordng to ther defnton the term sem-quntum mples tht the sender Alce s powerful quntum communcnt wheres the recever o hs only clsscl cpltes. More precsely the sender Alce hs the lty to perform the followng opertons: prepre ny quntum stte such s sngle photons or ell sttes perform ny quntum mesurement such s ell mesurement or mult-qut jont mesurement nd 3 store quts n quntum memory. Conversely the clsscl o s restrcted to perform the followng opertons over the quntum chnnel: prepre new quts n the clsscl ss { 0 }.e. Z ss mesure quts n the clsscl ss 3 reorder the quts v dfferent dely lnes nd 4 send or reflect the quts wthout dsturnce. As the clsscl ss only consders the quts 0 nd the other quntum superpostons of sngle photons re not ssumed for the clsscl o. The clsscl o s opertons descred ove re equvlent to the trdtonl{0}computton. n ths pper we propose n SQPC protocol where the clsscl prtcpnts re lmted to perform the opertons nd 4. Tht s the prtcpnts do not hve ny quntum cpltes wheres the TP s the only one who hs the quntum cplty. A sem-quntum prvte comprson protocol cn reduce not only the computtonl urden of the communcnts ut lso the cost of the quntum hrdwre devces n prctcl mplementtons. Furthermore the proposed protocols re free from vrous well-known ttcks wth the ssumpton of only n lmost dshonest thrd prty. The rest of ths pper s orgnzed s follows: Secton proposes the sem-quntum prvte comprson SQPC protocol. Secton 3 presents securty 3

4 nlyse of the proposed SQPC protocol. Secton 4 summrzes our results. Proposed SQPC protocol Ths secton proposes new sem-quntum prvte comprson protocol under n lmost-dshonest thrd prty. Alce nd o re two prtcpnts who wnt to compre the equlty of ther secret nformton n the SQPC protocol. TP s ssumed to e n lmost-dshonest thrd prty who my try to derve nformton durng executng of the protocol. TP my modfy the procedure of the protocol to derve nformton ut he cnnot pulsh fke comprson result or collorte wth ny clent. The quntum chnnels re ssumed to e del.e. non-lossy nd noseless nd the pulc chnnels etween TP nd Alce TP nd o nd Alce nd o re lso ssumed to e uthentcted. sed on the three-prty scenro descred ove the process of the proposed protocol wll e descred n steps s follows.. Descrpton of the proposed SQPC protocol efore presentng the steps of the proposed protocol we refly descre some rules for mlcous ehvor detecton some symols nd entnglement swppng used n our protocol. n prtculr for ech receved qut the prtcpnt hs to set the vlues of nd for tht qut respectvely. =0/ denotes tht the prtcpnt selects the qut for mlcous ehvor detecton : =0 ndctes tht the qut s used to detect ttcks from ny mlcous users wheres = s used to detect ttcks from TP. ndctes the type of opertons performed on tht qut y the clent. =0 represents tht the prtcpnt performs the Z-ss mesurement nd = represents drect reflecton of the t to TP y the clent. The entnglement swppng llows one to mesure on ny two ndependent entngled photons the rest photons wll e entngled regrdless of the dstnce 4

5 etween them. For exmple ssume tht there re two ndependent EPR prs nmely the pr - nd the pr 3-4. Then f we perform ell mesurement on the qut nd the qut 3 then the qut nd the qut 4 whch re orgnlly ndependent wll e entngled mmedtely. f the mesurement result of the qut nd the qut 3 s then the stte of the qut nd the qut 4 must e s well. We my encode the ell mesurement result n the clsscl ts s follows: nd. The entnglement swppng follows the mth formul M ellqq M ellq3q 4 = M ellqq 3 M ellqq4 [6 7] where s the exclusve-or operton. n our scheme TP wll set vlue of M ccordng to ths mth formul. M=0 represents the mesurement results nd the mth formul mtch wheres M= represents the mesurement results nd the mth formul do not mtch. sed on the coordnton of the vlues of nd M the proposed SQPC llows two mutully untrusted prtcpnts to compre the equlty of ther secrets under the lmost dshonest TP. The detl of the protocol s descred n steps s follows: Step. TP rndomly genertes two sequences of ell sttes S { S S S... S } S { S S S... S } 3 A A A A3 A n n wth the length of n where S A { } S { } for = n. The ntl stte of ech pr n S A S s denoted s S A S S A nd S { }. Then TP dvdes these two sequences S A nd S nto four ordered sequences A { } A { } { } nd { } for = n whch denote ll the frst nd the second prtcles of ell sttes n S A nd S respectvely. 5

6 Step. After the Step s preprton TP retns the sequences A nd nd sends prtcle n the sequences A to Alce nd prtcle n to o respectvely. Step3. When Alce o receves qut n A she he hs to set the vlues of nd for tht qut. f =0 Alce o wll send nd ck to TP wheres when = Alce o wll only send ck to TP nd keep n her hs hnd. TP wll perform three dfferent opertons ccordng to nd s shown n Tle. n our scheme f prtcpnt wnts to check Eve s ttck he/she wll set =0. f prtcpnt wnts to check the honesty of TP then he/she sets =. TP cn only e checked when oth prtcpnts wnt to do so.e. = should e set y oth clents for tht qut. f only one prtcpnt wnts to check TP then he/she wll e gnored. The protocol cn e descred n the followng three cses. Step4. Cse. f Alce o sets 0 nd =0 then she he frst sends the vlue of nd the mesured qut to TP. ecuse Alce o mght chnge the stte of the photon whch comes from TP we use to denote the photon whch Alce o sends ck to TP. After TP receves =0 nd he pulcly nnounces n cknowledgment. When Alce o receves the cknowledgment Alce o sends =0 nd the mesurement result MR MR to TP. When TP receves the 6

7 mesurement result MR MR nd =0 TP performs Z-ss mesurement on nd otns the mesurement result MR MR. Then TP compres the mesurement result MR MR wth the mesurement result MR MR to check the exstence of n evesdropper. f the mesurement results re not equl then TP wll termnte the protocol nd strt from the egnnng. f the mesurement results re equl then TP wll follow the Step to send out the next quts to the clents. Cse. f Alce o sets =0 nd = then Alce o frst sends the orgnl qut nd =0 to TP. After TP receves the qut nd =0 he pulcly nnounces n cknowledgment. After Alce o receves the cknowledgment she he sends = to TP. TP then performs ell mesurement on the qut nd compres the ell mesurement result wth the ntl stte of A S S to see whether they re equl or not. f the mesurement results re not equl then TP wll termnte the protocol nd strt from the egnnng. f the mesurement results re equl then TP wll follow the Step to send out the next quts to the clents. Cse3. f Alce nd o oth set = then they send the quts nd = to TP. When TP receves oth = from Alce nd o TP performs two ell mesurements on the quts nd whch re denoted s M ell nd M ell respectvely. Then TP sets vlue for the vrle M ccordng to the mth formul mentoned erler.e. S A S = M ell M ell. M= f SA S s not equl to M ell M ell wheres M=0 f 7

8 S A S s equl to M ell M ell. Then the protocol contnues to the next step. Tle. Alce o TP =0 =0 =0 =0 Z-ss mesurement =0 =0 =0 = Z-ss mesurement ell mesurement =0 =0 = =0 Z-ss mesurement gnore o =0 =0 = = Z-ss mesurement gnore o =0 = =0 =0 ell mesurement Z-ss mesurement =0 = =0 = ell mesurement ell mesurement =0 = = =0 ell mesurement gnore o =0 = = = ell mesurement gnore o = =0 =0 =0 gnore Alce Z-ss mesurement 8

9 = =0 =0 = gnore Alce ell mesurement = =0 = =0 ell mesurement ell mesurement = =0 = = ell mesurement ell mesurement = = =0 =0 gnore Alce Z-ss mesurement = = =0 = gnore Alce ell mesurement = = = =0 ell mesurement ell mesurement = = = = ell mesurement ell mesurement Step5. f M = 0 TP hs to send M nd the ell mesurement result on the quts.e or to Alce nd o. After Alce nd o receve these M nd the ell mesurement result they wll perform pulc dscusson sed on the vlues of. f Alce nd o oth set = 0 n Step3 then they hve to send the Z-ss mesurement result on tht qut.e. MR nd MR to ech other v n uthentcted chnnel. Then Alce nd o 9

10 oth compre MR nd MR sed on M ell. Tht s: f M ell then MR nd MR must e ether 0 0 or. f M ell then MR nd MR must e ether 0 or 0. f the mesurement results do not mtch then t mples TP does not honestly follow the procedure of the protocol. Hence Alce nd o wll termnte the protocol nd strt from the egnnng. f the mesurement results mtch the protocol wll go ck to the Step for the next qut. For the other cses.e. Alce nd o oth set = or one sets = nd the other sets = 0 then t mples ether TP honestly follow the procedure of the protocol or the clents do not hve enough nformton to check the honesty of TP. Hence the protocol wll go ck to the Step for the next qut. On the other hnd f M = then TP hs to send M to Alce nd o. Herefter Alce nd o wll perform pulc dscusson sed on the vlue of. f Alce nd o oth set = n Step3 then t mples TP does not honestly follow the procedure of the protocol. Hence they wll termnte the protocol nd strt from the egnnng. For the other cses.e. one clent sets = nd the other clent sets = 0 then t mples tht the clents do not hve enough nformton to check the honesty of TP. The protocol wll go ck to the Step for the next qut. Only when Alce nd o oth set =0 the protocol wll contnue to the next step. Step6. Up to ths step we know tht oth Alce nd o hve set = nd = 0 nd hve receved M= from TP. n ths step Alce nd o wll use ther mesurement results to compre ther secret messges. Let M nd A M e the th t of secret messges of Alce nd o respectvely. Alce nd o ndvdully 0

11 compute nd R MR M nd then send R MR M A A R A nd R to TP. Upon recevng R nd A R TP trnsforms the ell mesurement result nto clsscl t strng C T 0 0 nd clcultes the comprson results R R R C. f there s t n R then TP termntes A T the protocol nd pulshes ndctng tht Alce s nd o s nformton s dfferent. Otherwse TP repets the protocol from Step to Step 6 untl ll the secret messges re compred. f there re ll zeros n R then TP nnounces tht the two prtcpnts nformton re dentcl. 3 Securty nlyses To nlyze the securty of the proposed protocol ths secton s dvded nto two prts to focus on two dfferent ttcks the outsder ttck nd the nsder ttck. The proposed protocol contns three nsders.e. n lmost-dshonest thrd prty TP nd two prtcpnts: Alce nd o. Whle Secton 3. nvestgtes the outsde evesdropper s ttck Secton 3. nlyzes the posslty for n nsder.e. TP or prtcpnt to otn the other prtcpnt s secret nformton. 3. Outsder ttck A mlcous outsder Eve my try to perform some well-known ttcks such s the ntercept-nd resend ttck [8] y nterceptng the qut sequences A nd trnsmtted from TP to Alce nd o respectvely n Step nd then mesurng the quts n the sequences. However snce Eve does not know the vlue of =0/ f Eve mesures on the trnsmtted sequences she wll e detected wth prolty of 7 n n Step4 where n denotes the numer of quts n the sequences. f n s lrge 8

12 enough the prolty wll e close to one. Ths s ecuse: Alce o hs prolty to set =0 nd to get the dfferent result from prolty to set S A S. Hence Eve hs = nd TP hs 7 8 prolty prolty to pss the detecton for ech qut. Hence wth n quts Eve wll e detected wth prolty of 7 8 n n Step4. For exmple: ssume the ntl stte S A S Eve ntercepts nd mesures wth Z ss to get 0 nd sends 0 to Alce o. Alce o sets =0 nd = nd sends the qut to TP. After TP receves from Alce o Alce o sends to TP. ecuse =0 nd = TP performs ell mesurement on. TP hs prolty of to get the mesurement result. f TP gets the dfferent result from S A S he/she knows tht there s n evesdropper. n some cses Eve mght ntercept the qut sequences A nd trnsmtted from TP to Alce nd o respectvely n Step nd send the fke quts to Alce nd o. After Alce nd o receve the fke quts nd set the vlues of nd they send the fke quts to TP. Then Eve ntercepts the fke quts nd resends the prevous qut sequences A nd to TP. However snce Eve does not know the vlue of =0/ f Eve sends the fke quts to Alce nd o she wll e detected wth prolty of 7 n n Step4 where n denotes the numer of quts n the 8 sequences. Snce Alce o hs prolty to set =0 nd prolty to set =0 nd TP hs prolty to get the dfferent result from M z M z

13 nd the mesurement result whch Alce o sends Eve hs 7 8 prolty to pss the detecton for ech qut. Hence wth n quts Eve wll e detected wth prolty of 7 8 n n Step4. For exmple: ssume tht the ntl stte S A S. Eve ntercepts nd sends fke qut 0 to Alce o. f Alce o sets =0 nd =0 then Alce o performs Z-ss mesurement on Eve s qut nd sends to TP. Eve ntercepts nd resends to TP. After TP receves from Eve Alce o sends nd the mesurement result of Eve s qut to TP. ecuse =0 nd =0 TP performs Z-ss mesurement on. Then TP hs prolty of to get the mesurement result. f M M s dfferent from the mesurement z z result whch Alce o sends then TP wll detect the exstence of n evesdropper. Consequently the outsde ttcker cnnot get ny useful nformton from the prtcpnts wthout eng detected. 3. nsder ttck n ths su-secton two cses of nsder ttcks re consdered. The frst cse dscusses the posslty for prtcpnt to otn the other prtcpnt s secret nformton. The second cse dscusses the posslty for TP to retreve the two prtcpnts secret nformton. Cse Prtcpnt ttck Suppose Alce s mlcous prtcpnt who tres to revel the other prtcpnt s o secret nformton. f Alce tres to ntercept the trnsmtted photons from TP to o she wll e cught s n outsde ttcker s descred n 3

14 Sect. 3.. ecuse when o sets =0 Alce cnnot nvolve n the dscusson of TP nd o. So f Alce wnts to revel o s nformton M she wll e detected y TP lke n Eve nd the detecton rte s the sme s descred n Sect. 3.. Smlrly f o tres to perform n ttck on the protocol he wll e detected too. Cse TP ttck ecuse TP s n lmost-dshonest thrd prty he mght not fthfully execute the procedure of the protocol nd try to revel prtcpnt s nformton. When =0 we detect ether Eve s ttck or prtcpnt s ttck wth TP s help. On the contrry we detect TP s ttck when Alce nd o oth set =. f TP wnts to revel prtcpnt s secret nformton he/she cn generte fke ntl sttes lke Z-ss sngle photons nsted of ell stte. When Alce nd o mesure the qut wth Z-ss nd pulsh R A nd R TP cn drectly lern Alce s nd o s secret nformton. However n our proposed protocol Alce nd o hve to dscuss the entnglement of M ell nd M ell n Step5. f TP genertes Z-ss sngle photons he does not know the entnglement of M ell nd M ell. Hence he does not know how to set the vlue of M. TP wll e detected n Step5 when prtcpnts oth set = nd = nd the detecton rte s out - 5 n. f n s 6 lrge enough the prolty wll e close to one. Ths s ecuse: Alce nd o oth hve prolty to set = nd prolty to set =. Hence TP hs prolty of 5 6 e detected wth prolty of to pss the detecton for ech qut. Hence wth n quts Eve wll 5 n n Step5. 6 TP could generte two ell sttes nd performs ell mesurement on 4

15 nsted on. Then TP compres the ell mesurement result wth S. f the two results re dfferent then t mples o sets = nd =0 TP wll perform Z-ss mesurement on to revel Alce s secret nformton nd set M=. f the two results re the sme TP wll set M=0. n ths ttck however f TP sets M=0 then TP does not know the ell mesurement result of. TP wll e detected n Step5 when prtcpnts oth set = nd =0 nd the detecton rte s out n. f n s lrge enough the prolty wll e close to one. Ths s ecuse: Alce nd o oth hve TP hs prolty to set 5 = nd prolty to send wrong ell mesurement result of o. Hence TP hs prolty of 3 3 wth n quts Eve wll e detected wth prolty of prolty to set =0 nd to Alce nd to pss the detecton for ech qut. Hence 3 n n Step5. 3 n our protocol only TP hs the nformton out the ntl stte. Therefore he cn revel the comprson result of oth prtcpnts ut TP cnnot know the prtcpnts secret nformton. 4 Conclusons Ths pper presents the frst sem-quntum prvte comprson SQPC protocol under n lmost-dshonest thrd-prty. A sem-quntum prvte comprson protocol cn reduce not only the computtonl urden of the communcnts ut lso the cost of the quntum hrdwre devces n prctcl mplementtons. The securty nlyss shows tht the proposed protocols re free from the outsder ttck nd the nsder ttck. t should lso e noted tht lke the other sem-quntum schemes the proposed protocol lso suffers from the Trojn-horse ttcks [9-3]. To prevent ths

16 knd of ttcks the photon numer spltter devce nd wvelength flter devce could e dopted [3 33]. Throughout ths pper we hve ssumed n lmost dshonest TP. n the future t could e very chllengng to further reduce the trustworthy news of the TP to n ndvdully dshonest s defned n [34] where TP cnnot even pulsh fke comprson result. Acknowledgment We would lke to thnk the Mnstry of Scence nd Technology of Repulc of Chn for fnncl support of ths reserch under Contrct No. MOST 04--E References [] H. ennett Ch nd G. rssrd "Quntum cryptogrphy: pulc key dstruton nd con tossng nt" n Conf. on Computers Systems nd Sgnl Processng nglore nd Dec pp [] C. H. ennett G. rssrd C. Crépeu R. Jozs A. Peres nd W. K. Wootters "Teleportng n unknown quntum stte v dul clsscl nd Ensten-Podolsky-Rosen chnnels" Physcl revew letters vol. 70 p [3] A. Furusw J. L. Sørensen S. L. runsten C. A. Fuchs H. J. Kmle nd E. S. Polzk "Uncondtonl quntum teleportton" Scence vol. 8 pp [4] Z.-J. Zhng nd Z.-X. Mn "Mny-gent controlled teleportton of mult-qut quntum nformton" Physcs Letters A vol. 34 pp [5] Z. Wen L. Y-Mn L. Jun nd Z. Zhn-Jun "Teleportton of rtrry unknown two-tom stte wth cluster stte v therml cvty" Chnese Physcs vol. 7 p [6] Z. Z-Yun L. Y-Mn Z. Xue-Qn Z. Wen nd Z. Zhn-Jun "Trnsformton opertor nd crteron for perfectly teleportng rtrry three-qut stte wth 6

17 sx-qut chnnel nd ell-stte mesurement" Chnese Physcs Letters vol. 6 p [7] C.-W. Ts nd T. Hwng "Teleportton of pure EPR stte v GHZ-lke stte" nterntonl Journl of Theoretcl Physcs vol. 49 pp [8] M. Hllery V. užek nd A. erthume "Quntum secret shrng" Physcl Revew A vol. 59 p [9] L. Xo G. L. Long F. G. Deng nd J. W. Pn "Effcent multprty quntum-secret-shrng schemes" Physcl Revew A vol. 69 My 004. [0] Z. J. Zhng nd Z. X. Mn "Multprty quntum secret shrng of clsscl messges sed on entnglement swppng" Physcl Revew A vol. 7 Aug 005. [] F. G. Deng G. L. Long nd H. Y. Zhou "An effcent quntum secret shrng scheme wth Ensten-Podolsky-Rosen prs" Physcs Letters A vol. 340 pp Jun [] F. G. Deng H. Y. Zhou nd G. L. Long "Crculr quntum secret shrng" Journl of Physcs -Mthemtcl nd Generl vol. 39 pp Nov [3] L. F. Hn Y. M. Lu J. Lu nd Z. J. Zhng "Multprty quntum secret shrng of secure drect communcton usng sngle photons" Optcs Communctons vol. 8 pp My 008. [4] F. G. Deng X. H. L nd H. Y. Zhou "Effcent hgh-cpcty quntum secret shrng wth two-photon entnglement" Physcs Letters A vol. 37 pp Mr [5] Y. Sun Q. Y. Wen F. Go X.. Chen nd F. C. Zhu "Multprty quntum secret shrng sed on ell mesurement" Optcs Communctons vol. 8 pp Sep 009. [6] R.-h. Sh L.-s. Hung W. Yng nd H. Zhong "Multprty quntum secret shrng wth ell sttes nd ell mesurements" Optcs Communctons vol. 83 pp [7] K. ostrom nd T. Felnger "Determnstc secure drect communcton usng entnglement" Physcl Revew Letters vol. 89 Oct [8] F.-G. Deng G. L. Long nd X.-S. Lu "Two-step quntum drect communcton protocol usng the Ensten-Podolsky-Rosen pr lock" Physcl Revew A vol. 68 p [9] Z. X. Mn Z. J. Zhng nd Y. L "Determnstc secure drect communcton y usng swppng quntum entnglement nd locl untry opertons" Chnese Physcs Letters vol. pp. 8- Jn

18 [0] Y.-. Zhn L.-L. Zhng nd Q.-Y. Zhng "Quntum secure drect communcton y entngled qutrts nd entnglement swppng" Optcs Communctons vol. 8 pp [] C. TSA nd T. HWANG "Fult tolernt two-step quntum secure drect communcton protocol gnst collectve noses" Scence Chn Physcs Mechncs & Astronomy 0. [] S.-L. Hung T. Hwng nd P. Gope "Mult-prty quntum prvte comprson wth n lmost-dshonest thrd prty" Quntum nformton Processng vol. 4 pp [3] W.-W. Zhng nd K.-J. Zhng "Cryptnlyss nd mprovement of the quntum prvte comprson protocol wth sem-honest thrd prty" Quntum nformton processng vol. pp [4] M. oyer D. Kengserg nd T. Mor "Quntum key dstruton wth clsscl o" n Quntum Nno nd Mcro Technologes 007. CQNM'07. Frst nterntonl Conference on 007 pp [5] M. oyer R. Gelles D. Kengserg nd T. Mor "Semquntum key dstruton" Physcl Revew A vol. 79 p [6] J.-W. Pn D. ouwmeester H. Wenfurter nd A. Zelnger "Expermentl entnglement swppng: Entnglng photons tht never ntercted" Physcl Revew Letters vol. 80 p [7] M. Zukowsk A. Zelnger M. Horne nd A. Ekert "" Event-redy-detectors" ell experment v entnglement swppng" Physcl Revew Letters vol. 7 pp [8] F. Go F.-Z. Guo Q.-Y. Wen nd F.-C. Zhu "Comment on Expermentl demonstrton of quntum protocol for yzntne greement nd lr detecton " Physcl revew letters vol. 0 p [9] C.-W. Yng T. Hwng nd Y.-P. Luo "Enhncement on quntum lnd sgnture sed on two-stte vector formlsm " Quntum nformton processng vol. pp [30] F.-G. Deng P. Zhou X.-H. L C.-Y. L nd H.-Y. Zhou "Roustness of two-wy quntum communcton protocols gnst Trojn horse ttck" rxv preprnt qunt-ph/ [3] Q.-Y. C "Evesdroppng on the two-wy quntum communcton protocols wth nvsle photons" Physcs Letters A vol. 35 pp [3] F.-G. Deng X.-H. L H.-Y. Zhou nd Z.-j. Zhng "mprovng the securty of multprty quntum secret shrng gnst Trojn horse ttck" Physcl Revew A vol. 7 p [33] X.-H. L F.-G. Deng nd H.-Y. Zhou "mprovng the securty of secure drect 8

19 communcton sed on the secret trnsmttng order of prtcles" Physcl Revew A vol. 74 p [34] Shh-Mn Hung nd Tzonelh Hwng Multprty Quntum Prvte Comprson wth ndvdully dshonest Thrd Prtes for strngers rxv:

Sinusoidal Steady State Analysis

Sinusoidal Steady State Analysis CHAPTER 8 Snusodl Stedy Stte Anlyss 8.1. Generl Approch In the prevous chpter, we hve lerned tht the stedy-stte response of crcut to snusodl nputs cn e otned y usng phsors. In ths chpter, we present mny

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Energy Efficient Session Key Establishment in Wireless Sensor Networks

Energy Efficient Session Key Establishment in Wireless Sensor Networks Energy Effcent Sesson ey Estlshment n Wreless Sensor Networks Y Cheng nd Dhrm P. Agrwl OBR Center for Dstruted nd Mole Computng, Deprtment of ECECS Unversty of Cncnnt, Cncnnt, OH 45 {chengyg, dp}@ececs.uc.edu

More information

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors

Simplified Algorithm and Hardware Implementation for the (24, 12, 8) Extended Golay Soft Decoder Up to 4 Errors The Interntonl Arb Journl of Informton Technology, Vol., No., Mrch 04 Smplfed Algorthm nd Hrdwre Implementton for the (4,, 8 Extended Goly Soft Decoder Up to 4 Errors Dongfu Xe College of Mechncl nd Electrcl

More information

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare

Web-based Remote Human Pulse Monitoring System with Intelligent Data Analysis for Home Healthcare We-sed Remote Humn Pulse Montorng System wth Intellgent Dt Anlyss for Home Helthcre Chh-Mng Chen Grdute Insttute of Lrry, Informton nd Archvl Studes, Ntonl Chengch Unversty, Tpe 6, Twn, R.O.C. chencm@nccu.edu.tw

More information

QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE

QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Europen Journl of Mthemtis nd Computer Siene Vol. No., 7 ISSN 59-995 QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Pn-ru Zho, Yun-jing Zhou, Jin-wei Zho, Ling-shn Xu, Yun-hong To

More information

Superposition, Thevenin and Norton. Superposition

Superposition, Thevenin and Norton. Superposition Superposton, Thevenn nd Norton OUTINE Superposton Thevenn Equvlent Crcut Norton Equvlent Crcut Mxmum Power Theorem ecture 6, 9/1/05 Redng Chpter.6-.8 ecture 6, Slde 1 Superposton A lner crcut s one constructed

More information

BnB-ADOPT + with Several Soft Arc Consistency Levels

BnB-ADOPT + with Several Soft Arc Consistency Levels BnB-ADOPT + wth Severl Soft Arc Consstency Levels Ptrc Guterrez nd Pedro Meseguer Astrct. Dstruted constrnt optmzton prolems cn e solved y BnB-ADOPT +, dstruted synchronous serch lgorthm. In the centrlzed

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Student Book SERIES. Patterns and Algebra. Name

Student Book SERIES. Patterns and Algebra. Name E Student Book 3 + 7 5 + 5 Nme Contents Series E Topic Ptterns nd functions (pp. ) identifying nd creting ptterns skip counting completing nd descriing ptterns predicting repeting ptterns predicting growing

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

Security Issues in Smart Card Authentication Scheme

Security Issues in Smart Card Authentication Scheme Interntonl Journl o Computer Theory nd Engneerng Vol. 4, No., Aprl 0 ecurty Issues n mrt Crd Authentcton cheme Rv ngh Pppl, Jdhr C. D., nd hshkl Tpsw Abstrct To secure normton rom unuthorzed ccess, vrous

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Knowledge Unit Relation Recognition Based on Markov Logic Networks

Knowledge Unit Relation Recognition Based on Markov Logic Networks JOURNAL OF NETWORKS, VOL. 9, NO. 9, SEPTEMBER 2014 2417 Knowledge Unt Relton Recognton Bsed on Mrkov Logc Networks We Wng 1, 2, We We 2, Je Hu 2, Juntng Ye 1, nd Qnghu Zheng 1 1. School of Electronc nd

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

Student Book SERIES. Fractions. Name

Student Book SERIES. Fractions. Name D Student Book Nme Series D Contents Topic Introducing frctions (pp. ) modelling frctions frctions of collection compring nd ordering frctions frction ingo pply Dte completed / / / / / / / / Topic Types

More information

SOLVING TRIANGLES USING THE SINE AND COSINE RULES

SOLVING TRIANGLES USING THE SINE AND COSINE RULES Mthemtics Revision Guides - Solving Generl Tringles - Sine nd Cosine Rules Pge 1 of 17 M.K. HOME TUITION Mthemtics Revision Guides Level: GCSE Higher Tier SOLVING TRIANGLES USING THE SINE AND COSINE RULES

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Regular languages can be expressed as regular expressions.

Regular languages can be expressed as regular expressions. Regulr lnguges cn e expressed s regulr expressions. A generl nondeterministic finite utomton (GNFA) is kind of NFA such tht: There is unique strt stte nd is unique ccept stte. Every pir of nodes re connected

More information

UE Centric Coordinated Beamforming in Multi-cell MU-MIMO Systems

UE Centric Coordinated Beamforming in Multi-cell MU-MIMO Systems UE Centrc Coordnted Bemformng n Mult-cell MU-MIMO Systems Jlng L Yngxue L InterDgtl Communctons LLC Melvlle NY 11747 USA e-ml: jlng.l@nterdgtl.com yngxue.l@nterdgtl.com Astrct User Equpment (UE) centrc

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE

A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE A COMPARISON OF CIRCUIT IMPLEMENTATIONS FROM A SECURITY PERSPECTIVE Mster Thesis Division of Electronic Devices Deprtment of Electricl Engineering Linköping University y Timmy Sundström LITH-ISY-EX--05/3698--SE

More information

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram

Design and implementation of a high-speed bit-serial SFQ adder based on the binary decision diagram INSTITUTE OFPHYSICS PUBLISHING Supercond. Sci. Technol. 16 (23) 1497 152 SUPERCONDUCTORSCIENCE AND TECHNOLOGY PII: S953-248(3)67111-3 Design nd implementtion of high-speed it-seril SFQ dder sed on the

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

2-7 Calibration of SAR Probe

2-7 Calibration of SAR Probe Reserch nd Development of Clrton Technology -7 Clrton of SAR Proe Lr HAMADA nd Soch WATANABE The clrton of spefc sorpton rte proe s nmely clrton of the electrc feld mesurement sensor n the phntom lqud

More information

Content Based Color Image Retrieval via Wavelet Transforms

Content Based Color Image Retrieval via Wavelet Transforms 8 IJCSNS Interntonl Journl of Computer Scence nd Network Securty, VOL.7 No., December 7 Content Bsed Color Imge Retrevl v Wvelet Trnsforms Mrs.Y. M. Lth Dr.B.C.Jng V.S.K.Reddy, GNITS,JNTU,Ind Rector,JNTU,Ind

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

Patterns and Algebra

Patterns and Algebra Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing

More information

Domination and Independence on Square Chessboard

Domination and Independence on Square Chessboard Engineering nd Technology Journl Vol. 5, Prt, No. 1, 017 A.A. Omrn Deprtment of Mthemtics, College of Eduction for Pure Science, University of bylon, bylon, Irq pure.hmed.omrn@uobby lon.edu.iq Domintion

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

COVERAGE HOLES RECOVERY ALGORITHM BASED ON NODES BALANCE DISTANCE OF UNDERWATER WIRELESS SENSOR NETWORK

COVERAGE HOLES RECOVERY ALGORITHM BASED ON NODES BALANCE DISTANCE OF UNDERWATER WIRELESS SENSOR NETWORK INTENATIONAL JOUNAL ON SMAT SENSING AND INTELLIGENT SYSTEMS VOL. 7, NO. 4, DECEMBE 2014 COVEAGE HOLES ECOVEY ALGOITHM BASED ON NODES BALANCE DISTANCE OF UNDEWATE WIELESS SENSO NETWOK Hengchng Jng College

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

PRO LIGNO Vol. 11 N pp

PRO LIGNO Vol. 11 N pp THE INFLUENCE OF THE TOOL POINT ANGLE AND FEED RATE ON THE DELAMINATION AT DRILLING OF PRE-LAMINATED PARTICLEBOARD Mihi ISPAS Prof.dr.eng. Trnsilvni University of Brsov Fculty of Wood Engineering Address:

More information

Performance Evaluation of an Optical Packet Scheduling Switch

Performance Evaluation of an Optical Packet Scheduling Switch Performnce Evluton of n Optcl Pcket Schedulng Swtch Kyrkos Vlchos, memer IEEE, Kyrk Seklou nd Emmnuel Vrvrgos Reserch Acdemc Computer echnology Insttute, RA-CI, Unversty of Ptrs, GR-26500, RIO, Ptrs, Greece,

More information

(1) Non-linear system

(1) Non-linear system Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

Aquauno Select MINUTES. (duration) FREQUENCY LED. OFF 8h AQUAUNO SELECT 5 MIN FREQUENCY. the timer is being programmed;

Aquauno Select MINUTES. (duration) FREQUENCY LED. OFF 8h AQUAUNO SELECT 5 MIN FREQUENCY. the timer is being programmed; Aquuno Select Pg. INSTALLATION. Attch the timer to cold wter tp, following these simple instructions. Do not instll the timer in pit or vlve ox, elow ground level or indoors. Do not use the timer with

More information

Performance Evaluation of Survivable Multifiber WDM Networks

Performance Evaluation of Survivable Multifiber WDM Networks erformnce Evluton of Survvble ultfber WD Networks Yunqu Luo nd Nrwn Ansr Advnced Networkng Lbortory Deprtment of Electrcl nd Computer Engneerng New Jersey Intute of Technology Unvery Heghts, Newrk, NJ

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier

Area-Time Efficient Digit-Serial-Serial Two s Complement Multiplier Are-Time Efficient Digit-Seril-Seril Two s Complement Multiplier Essm Elsyed nd Htem M. El-Boghddi Computer Engineering Deprtment, Ciro University, Egypt Astrct - Multipliction is n importnt primitive

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

i S1 V IN i C1 i N i C2 i S2

i S1 V IN i C1 i N i C2 i S2 ENGINEERING FOR RURAL DEVELOPMENT Jelgv, 0.-.05.05. VOLTAGE BALANCE CONTROL OF TWO-LEVEL DC-DC CONVERTER Ksprs Krocs, Ugs Srmels, Vesturs Brzs Insttute of Physcl Energetcs; Rg Techncl Unversty kselt@nbox.lv

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Fixation-Image Charts

Fixation-Image Charts Fxton-Imge Chrts Kuno Kurzhls, Mrcel Hlwtsch, Mchel Burch, Dnel Weskopf Unversty of Stuttgrt P rc p nt1 2 1 P rc p nt2 3 P rc p nt3 P rc p nt4 c F x ons equenc e Col orl eg end c 1 2 3 4 4 c Fgure 1: Fxton-mge

More information

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions

A Novel Control Method for Input Output Harmonic Elimination of the PWM Boost Type Rectifier Under Unbalanced Operating Conditions A Novel Control Method for nput Output Hrmonc Elmnton of the PWM Boost Type Rectfer Under Unblnced Opertng Condtons A. V. Stnkovc T. A. Lpo Electrcl nd Computer Engneerng Clevelnd Stte Unversty Deprtment

More information

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 458 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 Generlzed Cross-Lyer Desgns for Generc Hlf-Duplex Multcrrer Wreless Networks Wth Frequency-Reuse Rozt Rshtch, Student Member,

More information

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005

CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 CS2204 DIGITAL LOGIC & STATE MACHINE DESIGN SPRING 2005 EXPERIMENT 1 FUNDAMENTALS 1. GOALS : Lern how to develop cr lrm digitl circuit during which the following re introduced : CS2204 l fundmentls, nd

More information

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week

Homework #1 due Monday at 6pm. White drop box in Student Lounge on the second floor of Cory. Tuesday labs cancelled next week Announcements Homework #1 due Mondy t 6pm White drop ox in Student Lounge on the second floor of Cory Tuesdy ls cncelled next week Attend your other l slot Books on reserve in Bechtel Hmley, 2 nd nd 3

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators

A Multi-Agent Solution to Distribution System Management by Considering Distributed Generators Pge of 0 IEEE PES Trnsctons on Power Systems 0 0 0 0 0 0 A Mult-Agent Soluton to Dstrbuton System Mngement by Consderng Dstrbuted Genertors Abstrct A trdtonl dstrbuton networ crres electrcty from centrl

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ

(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Digital Design. Sequential Logic Design -- Controllers. Copyright 2007 Frank Vahid

Digital Design. Sequential Logic Design -- Controllers. Copyright 2007 Frank Vahid Digitl Design Sequentil Logic Design -- Controllers Slides to ccompny the tetook Digitl Design, First Edition, y, John Wiley nd Sons Pulishers, 27. http://www.ddvhid.com Copyright 27 Instructors of courses

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

VI.C CIRCUIT BREAKERS

VI.C CIRCUIT BREAKERS VI.C CIRCUIT BREAKERS DMS #84474 Pge of 28 Revsed : GUIDE FOR DETERMINATION OF CIRCUIT BREAKER LOAD CURRENT CAPABILITY RATINGS PENNSYLVANIA-NEW JERSEY-MARYLAND INTERCONNECTION PLANNING AND ENGINEERING

More information

Secret Key Generation and Agreement in UWB Communication Channels

Secret Key Generation and Agreement in UWB Communication Channels Secret Key Genertion nd greement in UW Communiction Chnnels Msoud Ghoreishi Mdiseh, Michel L. McGuire, Stephen S. Neville, Lin Ci, Michel Horie Deprtment of Electricl nd Computer Engineering University

More information

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17. Section 7.: Line Integrls Objectives. ompute line integrls in IR nd IR 3. Assignments. Red Section 7.. Problems:,5,9,,3,7,,4 3. hllenge: 6,3,37 4. Red Section 7.3 3 Mple ommnds Mple cn ctully evlute line

More information

Data Attribute Reduction using Binary Conversion

Data Attribute Reduction using Binary Conversion Fengmng M. Chng Dt Attrute Reducton usng Bnry Converson FENGMING M. CHANG Deprtment of Informton Scence nd Applctons As Unversty Wufeng, Tchung 4354 Twn pperss@gml.com Astrct: - Whle lernng wth dt hvng

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Triangles and parallelograms of equal area in an ellipse

Triangles and parallelograms of equal area in an ellipse 1 Tringles nd prllelogrms of equl re in n ellipse Roert Buonpstore nd Thoms J Osler Mthemtics Deprtment RownUniversity Glssoro, NJ 0808 USA uonp0@studentsrownedu osler@rownedu Introduction In the pper

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

& Y Connected resistors, Light emitting diode.

& Y Connected resistors, Light emitting diode. & Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd

More information

Reinforcement Learning for Fuzzy Control with Linguistic States

Reinforcement Learning for Fuzzy Control with Linguistic States 54545454543 Journl of Uncertn Systems ol., No., pp.54-66, 8 Onlne t: www.jus.org.uk Renforcement Lernng for Fuzzy Control wth Lngustc Sttes Mohmmd Hossen Fzel Zrnd,*, Jvd Jouzdn, Mrym Fzel Zrnd Deprtment

More information

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY

LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY LECTURE 9: QUADRATIC RESIDUES AND THE LAW OF QUADRATIC RECIPROCITY 1. Bsic roerties of qudrtic residues We now investigte residues with secil roerties of lgebric tye. Definition 1.1. (i) When (, m) 1 nd

More information

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder

Implementation of Different Architectures of Forward 4x4 Integer DCT For H.264/AVC Encoder Implementtion of Different Architectures of Forwrd 4x4 Integer DCT For H.64/AVC Encoder Bunji Antoinette Ringnyu, Ali Tngel, Emre Krulut 3 Koceli University, Institute of Science nd Technology, Koceli,

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION

A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION A DISTRIBUTED ALGORITHM FOR MULTIPATH COMPUTATION SRINIVAS VUTUKURY vutuury@cse.ucsc.eu Computer Scences Deprtment Unversty of Clforn Snt Cruz, CA 95064 J.J. GARCIA-LUNA-ACEVES jj@cse.ucsc.eu Computer

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Rough Set Approach for Categorical Data Clustering 1

Rough Set Approach for Categorical Data Clustering 1 Interntonl Journl of Dtbse Theory nd Applcton Vol., No., Mrch, Rough Set Approch for Ctegorcl Dt Clusterng Tutut Herwn*, Rozd Ghzl, Iwn Tr Ryd Ynto, nd Mustf Mt Ders Deprtment of Mthemtcs Educton nversts

More information

Section 16.3 Double Integrals over General Regions

Section 16.3 Double Integrals over General Regions Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is

More information

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University) -4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.

More information

ECE315 / ECE515 Lecture 5 Date:

ECE315 / ECE515 Lecture 5 Date: Lecture 5 Date: 18.08.2016 Common Source Amplfer MOSFET Amplfer Dstorton Example 1 One Realstc CS Amplfer Crcut: C c1 : Couplng Capactor serves as perfect short crcut at all sgnal frequences whle blockng

More information

Direct Current Circuits. Chapter Outline Electromotive Force 28.2 Resistors in Series and in Parallel 28.3 Kirchhoff s Rules 28.

Direct Current Circuits. Chapter Outline Electromotive Force 28.2 Resistors in Series and in Parallel 28.3 Kirchhoff s Rules 28. P U Z Z L E R If ll these pplinces were operting t one time, circuit reker would proly e tripped, preventing potentilly dngerous sitution. Wht cuses circuit reker to trip when too mny electricl devices

More information

Insertion/Extraction Tool and Replacement Tip Kits [ ]

Insertion/Extraction Tool and Replacement Tip Kits [ ] Inserton/Extracton Tool 91285-1 and Replacement Tp Kts 543382-[ ] Instructon Sheet 408-9404 19 JUN 12 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually powered

More information

CONTENTS. 2 Mastering Ukulele

CONTENTS. 2 Mastering Ukulele ONENS bout the uthors... 4 INRODUION... 5 hpter he World hordng to Uke 6 Lesson : he Hrmonzed Mjor Scle...6 Lesson : our ypes of 7th hord Inversons...7 Lesson : Mjor nd Mnor 6th Inversons...8 Lesson 4:

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information