Software Implementation of Elliptic Curve Encryption over Binary Field *

Size: px
Start display at page:

Download "Software Implementation of Elliptic Curve Encryption over Binary Field *"

Transcription

1 Dec. 3 Journal of Electronc Scence and Technolog of Chna Vol. No. Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld * ZHANG Xanfeng QIN Zhguang ZHOU Shje LIU Jnde (School of Coputer Scence and Engneerng, UESTC Chengdu 654 Chna) Abstract The atheatcal theor for ellptc curve encrpton based on optal noral bass (ONB) over F s ntroduced. Then an ellptc curve crptograph(ecc) based encrpton schee s analzed and desgned. The echans for ke exchange based on Dffe-Hellan s descrbed n detals for further applcatons. Based on these theoretc foundatons, the software based on ECC s developed and an applcaton s provded. The software s characterzed b excellent securt as well as hgh effcenc. Ke words network securt; ellptc curve crptograph(ecc); encrpton software; bnar feld Currentl, ellptc curve crptograph (ECC) s regarded as an attractve crptograph that can provde greater strength, hgher speed and saller kes than [~6] other crptograph sstes. A vast aount of research has been done on ts secure and effcent pleentaton. ECC has receved ncreased coercal acceptance and s adopted b accredted standards organzatons such as ANSI (Aercan Natonal Standards Insttute), IEEE (Insttute of Electrcal and Electroncs Engneers), ISO (Internatonal Standards Organzaton), and NIST (Natonal Insttute of Standards and Technolog). In the practcal applcatons based on ECC, ellptc curves groups are usuall ade up of ellptc curves over underlng felds of F p or F (where p s a pre). Generall, eleents over feld F p are denoted b polnoal bass representatons, and eleents over feld F can be denoted b noral bass representatons. Although the descrpton of the feld F s coplcated, the feld F s extreel useful because ts coputatons can be done effcentl n [7] hardware. For feld F, noral bass representatons have the coputatonal advantage that squarng an eleent can be done ver effcentl. Multplng dstnct eleents, on the other hand, can be cubersoe n general. For ths reason, t s coon to specalze a class of noral bases, called Gaussan noral bases, for whch ultplcaton s both spler and ore effcent. Gaussan noral bases for F exst whenever s not dvsble b 8. The nclude the optal noral bases (ONB), whch have the ost effcent ultplcaton possble n a [8,9] noral bass. In 999, Tatsuak Okaoto, Echro Fujsak and Hkaru Mortaan descrbed a provabl ellptc curve encrpton schee usng the ellptc curve ElGaal trapdoor functon, rando functon (hash functon) and [] a setrc-ke encrpton. In, a stud of the software pleentaton on workstatons of the NIST-recoended ellptc curves over bnar felds [] was presented. In, M. Brown, D. Hankerson and J. Lopez presented an extensve studof the software pleentaton on workstatons of the NIST-recoended ellptc curves over pre [] felds. In ths paper, we desgn and pleent coplete ellptc curve encrpton software based on ONB presentaton over F and Dffe-Hellan ke agreeent schee. It s desgned to be both seantcall secure and plantext-aware, n the presence of an adversar capable of launchng chosen-plantext and chosen-cphertext attacks. The eceved 3-3- * Supported b Natonal 863 lan roject (No. AA44)

2 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 55 test result proves that our encrpton software can be coparable wth those schees presented n efs. [~]. ONB resentaton and Feld Matheatc ules over Feld F. ONB presentaton Ever fnte feld F has a noral bass. But not all fnte felds have an ONB. Moreover, there are onl tpes of ONB for feld F f exst. If > s not dvsble b 8,the followng algorth tests for the exstence of an ONB for feld F [8] of gven tpe. Input: an nteger > not dvsble b 8; a postve nteger T= or. Output: f a tpe T ONB for feld F exsts, the essage True, otherwse False. Set p=t+; If p s not pre then output False and stop; k Copute k that satsfes (od p); Set h=t/k; Copute d:=gcd(h,), where GCD(h,) deno-tes the greatest coon dvsor of h and ; If d = then output True ; else output False. If feld F has a tpe ONB then set the feld polnoal pt ( ) = t + t + L + t + t + ;f F has a tpe ONB then copute pt ( ) = p () t usng the followng recursve forulae p ( t) = p ( t) = t + p+ () t = tp() t + p () t, L, At each stage, the coeffcents of the polnoals p () t are reduced odulo ; hence pt ( ) s a polnoal of degree wth coeffcents n F.. Coputng ules Based ONB for Fled F ^ Let ONB for feld F be {t,t,t, L, ^( ) t }(t F ), feld eleent a=(a a L a ), b=(bb L b ), then ONB s the presentaton of a ^ ^ = at and b= bt... Addton and Subtracton The addton of eleent a and b over F defned as: a+b=(c,c,l,c ), where c = (a +b ) od. The subtracton a b can be calculated b a+( b), s where ( b) s the addton reverse of b, and b =( b, b,, b ) od... Squarng and Square oot ^ For feld eleent a = at, squarng and the calculaton of square root are lnear operatons n F as follows: ^ (a ) =( ) ^( + ) at = at = ^ a(( ) od t (a ) ^ =( at ) L =( a a a a ) ^( ) = at = ^ a(( + ) od t =( a La a ) Hence squarng or the calculaton of square root of a fnte feld eleent s a sple rotaton of the vector representaton...3 Multplcaton and Dvson When eleents over F are presented based on ONB, the ultplcaton rule for two eleents s depcted n ef.[]. The dvson s the reverse calculaton of the ultplcaton. Thus, a/b can be coputed b a b, where b s the ultplcatve reverse of b that wll be coputed next...4 Multplcatve Inverse Because the feld eleents over F can be denoted b polnoals over F, the ultplcatve nverse of eleents can be calculated va the Extended Eucldean Algorth. Meanwhle, because the bt strng presentaton of a s equal to the bt strng (a a L a ) wth tes of crcular left shft operaton, or a=a, the ultplcatve reverse of a s coputed va a = a. Addtonall, because s equal to + + +, a can be calculated b a a a. So va ( ) tes of squarng and ultplcaton operaton, a, whch equals a, can be coputed. The Ellptc Curves and ont fffff.operatons. The Ellptc Curves over Feld F Accordng to standard specfcatons for ublc Ke Crprograph, an ellptc curve can be denoted b a septuplet: T=(, f(x),a,b,g,n,h), consstng of an

3 56 Journal of Electronc Scence and Technolog of Chna Vol. nteger specfng the fnte feld F, an rreducble bnar polnoal f( x ) of degree specfng the representaton of F, two eleents a, b F specfng the ellptc curve E(F ) defned b the equaton: + x = x 3 + ax + b n F, a base pont G=(x G, G ) on E(F ), a pre n whch s the order of G, and an nteger h whch s the cofactor h =# E(F )/ n (where # E(F )s the nuber of ponts on E(F )). Ellptc curve E(F ) conssts of the set of ponts =( x, ) ( x, F ). All ponts n together wth the pont at nfnt, denoted b O, for an Abel group (ellptc curve group). All ponts on an ellptc curve can be deterned b an rreducble non-zero feld or noral polnoal of degree. The desred securt level s controlled b. In practce, requreents on securt and effcenc deterne the selecton of. Usuall s selected fro the nteger set {3, 3, 63, 93, 33, 39, 83, [8] 49, 57}.. ont Operatons n F.. ont Addton and Subtracton Set pont =( x, ) E(F ), then the pont =( x, x + ) s the reverse of. For ever pont E(F ), +( )= O, + O = O+ =. Set pont Q =( xq, Q ) E(F ), where Q, and let + Q = =( x, ), then If = Q (self-addton), then b x = x + x = x + ( x + ) x + x x If Q (addton), then + Q + Q x = ( ) + ( ) + x + xq +a x + x x + x Q + Q = ( ) x + x Q Q ( x + x ) + x + The subtracton of and coputed va Q = +( Q ). Q over F s.. Scalar Multplcaton Set a pont over E(F ) wth an order n(n =O), the scalar ultplcaton of can be denoted b Q= k, where Q E(F ), k n. B the defnton of the pont addton, k can be calculated b addng to tself k tes. Because h k F, k can be denoted b k = k,where h and are ntegers, h and k {,}. Thus h k can be coputed as k = k = ( k+ ( k+ ( +( + ) kh 3 kh kh ) + k.ths approach requres h self-addtons and (w k ) addtons, where s the nuber of ones of the bnar w k representaton of k...3 Fndng a ont on An Ellptc Curve The base pont and publc kes accordng to ECC are all ponts on E(F ). The x -coordnate and -coordnate are all eleents over fled F. To generate these ponts, a coon approach s to appont a feld eleent ( x -coordnate) frst, then the correspondng -coordnate can be calculated b the equaton of E(F ). Set E(F ): +x = x 3 + ax + a6, the correspondng -coordnate can be coputed [5] b the followng steps. ) Appont x ( F ), copute the value of 3 3 polnoal x + ax + a6, set b = x + ax + a6. ) Copute the equaton + x = b, ths s equvalent to copute the equaton + x +b =. 3) Set = x z, then + x + b = s transfored to z +z + b / x =. In F, z + z + b / x = s equvalent to z = z +b / x, that s z = / / ( z ) +(( b / x )) ).For two eleents u and v over F, equaton (u + v ) = u + v holds. / / So the equaton z =( z ) +(( b / x ) ) s / / / equvalent to z = z +( b / x ). Hence z = / z +( b / x ). 4) Assue z =( z z z ) and k =( b / / / x ) =( k k k ), equaton z = z +( b / / x ) s equvalent to ( z z z z )=( z z z )+( k k k k ). Therefore, when one bt of z s deterned, the other bts can be deterned b the equaton ( z z z L z )=( z z L z )+( k k k L k ). Furtherore, s coputed. Of course, a rando feld eleent over F a not be the x -coordnate of a pont on E(F ). In that

4 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 57 case, we can ncrease the rando feld eleent b pre). We also assue that the councatng and check whether the new eleent s the partes are C and S. C s publc-prvate ke par s x -coordnate of a pont on E(F ). The procedure s repeated untl the desred eleent s found. (Q C,d C ) and S s ke par s (Q S,d S ). At the end of the protocol, the councatng partes end up wth the sae value K whch s a pont on the curve. A 3 Analss and Desgn part of K (such as x -coordnate of K ) can be used as a secret ke to a setrc ke encrpton 3. Choosng the Ellptc Curve algorth. The Dffe-Hellan protocol based on ECC To obtan a desred securt level, the paraeter s llustrated n Tab. should be about 6. All bnar felds F have the Tab. The dffe-hellan protocol based on ECC propert that s pre, whch can resst recent attacks on ellptc curves defned over where s User C User S coposte. Accordng to Standard specfcatons for Choose d C [, n -] Choose d S [, n -] ublc Ke Crptograph, we appont =63 for F. Q C = d C G Q S = d S G 63 can provde excellent securt and hgh effcenc Send Q C eceve as well. And we select ellptc curve equaton: eceve Q S Send +x=x 3 +ax +b n F b generatng the coeffcent K =d C Q S K =d S Q C a and b randol. However, to avod supersngular ellptc curves and anoalous ellptc curves whch have securt vulnerablt, we ust also check the ellptc curve we generate. A ethod to check generated ellptc curve can be referred to ef. [8]. If an attacker can onl get publc ke Q C, Q S and the base pont G, he can not coprose the pont K. Ths s equvalent to get prvate ke d C or d S fro Q C, Q S and G, whch s an ellptc curve dscrete logarth proble (ECDL). 3. Ke Exchange rotocol Based on ECC 3.3 The Encrpton Schee To establsh a shared ke between two partes Based on the descrpton and analss above, an effcentl, the Dffe-Hellan ke exchange protocol [3] based on ECC s selected. We assue that the underlng feld F and the ellptc curve equaton E (F ): + x = x 3 + ax + b s selected. And the encrpton schee s presented n the followng. To elaborate our schee explctl, we assue the councatng partes are a clent and a server. The encrpton schee can be llustrated n Fg.. base pont G s set up, whose order s n (n s a Server Clent Choose feld F Generate the ellptc curve and the base pont, choose a setrc encrpton schee Send the choces eceve the paraeters Generate the publc and prvate ke par of server Exchange the publc Generate the publc and prvate ke par of clent Generate the shared ke b the Dffe-Hellan protocol based on ECC Generate the shared ke b the Dffe-Hellan protocol based on ECC Decrpt the cpher text b the setrc encrpton schee, and check the MAC to recover the plan text. Send the cpher text Encrpt the plan text b the setrc encrpton schee, and generate MAC. Fg. The flow chart of the encrpton schee

5 58 Journal of Electronc Scence and Technolog of Chna Vol. Frstl, the server should deterne the underlng fled F, the ellptc curve, a base pont and the setrc encrpton schee to be used, then send these choces to the clent. After the two councatng partes generate ther own ke par, the send ther respectve publc kes to each other and negotate the shared ke b the Dffe-Hellan rotocol based on ECC. Now two partes can conduct encrpton and decrpton va the setrc ke schees (such as btwse exclusve-or encrpton algorth, IDEA, 3DES, AES, etc.). To ensure the ntegrt of the cpher-text, soe essage authentcaton code (MAC) schee s taken. 4 Ipleentaton and Applcaton In the pleentaton of the encrpton software, we choose the exclusve-or encrpton algorth as the setrc encrpton algorth. The bte length of encrpted data packet s set to be 4. [4,5] HMAC_SHA-_6 s selected as the s selected as the MAC schee. These choces can ensure desrable securt. The effcenc of the encrpton software s deterned b the calculaton operatons of feld eleents and ellptc curve ponts based on ONB for fled F and the conversons between the ellptc curve ponts and the feld eleents. To ake our code ore concse, effcent and reusable, we choose Turbo C. as the developent tool, and encapsulate all the underlng functons n a dnac lnk lbrar (DLL) fle. The perforance results of the encrpton software are tested on a platfor entu Ⅲ 733. Tab. shows the te for encrpton and decrpton operatons. 63 Tab. Te for ECC operatons over F Operaton ando curve over F 63 Encrpton Decrpton 3.96 llseconds.58 llseconds We have appled the toolkt (DLL fle) to a project (naed User Identt Identfcaton) of Cheng Dan Unead software Lt Corporaton. The an technologes nclude: at clent, a thero-senstve sensor obtans the user s lve fngerprnt; The data of lve fngerprnt are processed, then encrpted b the encrpton toolkt and transtted to the server; At server, Encrpted data are decrpted and the pattern recognton operaton s conducted. Fnall the purpose of dentfng the user s dentt s acheved. The practcal functon and perforance test of the sste shows that the toolkt s characterzed b effcent [6] securt and hgh effcenc. 5 Conclusons SA has been n publc ke sstes for over two decades, but ECC offers an alternatve. ECC s exctng because of the potental to provde slar levels of securt copared to SA but wth sgnfcantl reduced ke szes. ECC presuabl offers faster processng, and lower deands on eor and bandwdth, whch are crtcal n the space of oble solutons [3,7] the threshold crptograph develops fast. Currentl, the research on [8]. However, the threshold crptograph technologes based on ECC deserve great attenton. eferences [] Xu Qulang, L Daxng. Ellptc curve crptosstes[j]. Journal of Coputer esearch and Developent, 999, 36(): 8 (n chnese) [] Wang Hanqang, We Qngfu. A publc ke crptosste based on ellptc curves over Z/nZ[J]. Journal of Chna Insttute of Councatons, 999, (7):6 (n chnese) [3] Zhang Xanfeng, Qn Zhguang, Lu Jnde. An analss of the securt and effcenc on ellptc curve crptosstes[j]. Journal of Unverst of Electronc Scence and Technolog of Chna,, 3():44 (n Chnese) [4] Certco Corp. Current ublc-ke Crptographc Sste[DB/OL]. A Cetco Whtepaper, Canada,. pdf [5] Certco Corp. earks on the securt of the ellptc curve crptosste[db/ol]. A Cetco Whtepaper, Canada,. Ecc Whte3.pdf [6] Lopez J, Dahab. An Overvew of Ellptc Curve Crptograph[DB/OL]. htl. [7] Certco Corp. Math. Canada[DB/OL]. certco.co/resources/ecc/ath7.htl 3

6 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 59 [8] IEEE Standards Departent[S]. IEEE 363/D3 (Draft Verson 3), Standard Specfcatons for ublc Ke Crptograph, , [9] Agnew G B, Mulln C, Vanstone S A.An pleentaton of ellptc curve crptosstes over F 55 [J]. IEEE journal FC 4, [6] Chengdan Unead software lt corp[]. The test report of UID,. 5 [7] Chrstopher M K, Curts E D, Osanoglu T. Securt Archtecture: Desgn, Deploent and Operatons[M]. on selecte.d areas n coun- catons, 993, (5):84 ~ 83 [] Tatsuak Okaoto, Echro Fujsak, Hkaru Morta. SEC: rovabl Secure Ellptc Curve Encrpton Schee Sdne: Osborne/McGraw-Hll,, 9 [8] Desedt Y. Soe ecent esearch Aspects of Threshold Crptograph[DB/OL]. co/dese dt97soe htl, 997 [DB/OL] / 363a/co-ntrbutons/psec.pdf [] Hankerson D, Julo Lopez, Menezes A. Software pleentaton of Ellptc Curve Crptograph Over Bref Introducton to Author(s) ZHANG Xanfeng( 张 险 峰 )was born n 973. He s now pursung h.d. degree n UESTC. Hs research nterests nclude: Bnar Felds[DB/OL].. prnceton. nforaton securt, crptograph technolog. E-al: edu/ fskran/ reposto-r/ CHES/ hankerson software. pdf zhangxf@uestc.edu.cn QIN Zhguang( 秦 志 光 )was born n 957. He s now a [] Brown M, Hankerson D, Lopez J. Software rofessor, and Doctoral Advsor n UESTC. Hs research pleentaton of the NIST Ellptc Curve Over re Felds[DB/OL].. edu/users/ halton/secu-rt/pubs/software_ipleentaton_of_ nterests nclude: nforaton securt, ITS and ddleware E-al: qnzg@uestc.edu.cn ZHOU Shje( 周 世 杰 )was born n 97. He s now the_nist_ Ellptc. pdf pursung h.d. degree n UESTC. Hs research nterests [3] Ados M, Sava E C. Ipleentng Network Securt nclude: coputng, nforaton securt, and dstrbuted rotocols based on Ellptc Curve Crptograph[DB/OL]. coputng. E-al: sjzhou@uestc.edu.cn c6nsecc.pdf, LIU Jnde( 刘 锦 德 )was born n 93. He s now a -7-5 rofessor and Doctoral Advsor n UESTC. Hs research [4] ANSI X9.7-99x. Keed Hash Message Authentcaton nterests nclude: openng dstrbuted coputng and code[a]. Workng Draft. 998 [5] Krawczk H, Bellare M, Canett. HMAC: Keed Hashng for Message Authentcaton[DB/OL]. Internet ddleware technolog, oble agent technolog. E-al: jdlu@uestc.edu.cn (Contnued fro page 4) Theor[M]. Chengdu: ublshng House of UESTC, 996. (n Chnese) 4 Conclusons Fro the analss above, the expresson of couplng rato k s obtaned. The equvalent crcut of the couplng between the crostrp and D s analzed and the coponents expresson s obtaned. eferences [] L Yng. Theor and Applcaton of Electroagnetc D[M]. Bejng: ublshng House of Electroncs Industr, 988. (n Chnese) [] Vrdee B S, arsons A J, Meadows G. Coercal coputer-aded desgn software optses DO Crcut Desgn[J]. Mcrowave Conference/Brazl, 993, SBMO Internatonal, 993, (5): [3] Lou enha, Fu Guoxng, Yuan Jnghong. Electroagnetc Bref Introducton to Author(s) LIAO Juan( 廖 娟 )was born n Schuan, Chna, n 977. She receved B.S degree n E.E. n and M.S degree n Crcuts an Sstes n fro UESTC. After graduaton fro UESTC, She s now engaged as an engneer of oble councaton b the Councaton Copan of Chna. LIU Guanghu( 刘 光 祜 )was born n Schuan, Chna, n 946. He graduated fro E.E. Dept. of Harbn Engneerng Unverst n 968. As a senor vstng scholar, He used to be nvted to Unverst of Nevada-eno n USA to do research fro 989 to 99. He s now a rofessor and the Chef Lecturer of UESTC and Head Engneer of Chengdu Sne Scence and Technolog CO. Ltd. of UESTC. Hs research nterests nclude: F and crowave crcuts and sstes.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Electricity Trade Model for Microgrid Communities in Smart Grid

An Electricity Trade Model for Microgrid Communities in Smart Grid An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,

More information

Elastic Systems for Static Balancing of Robot Arms

Elastic Systems for Static Balancing of Robot Arms . th World ongress n Mechans and Machne Scence, Guanajuato, Méco, 9- June, 0 _ lastc Sstes for Statc alancng of Robot rs I.Sonescu L. uptu Lucana Ionta I.Ion M. ne Poltehnca Unverst Poltehnca Unverst Poltehnca

More information

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set

More information

An Enhanced K-Anonymity Model against Homogeneity Attack

An Enhanced K-Anonymity Model against Homogeneity Attack JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe

More information

We are now ready to answer the question: What are the possible cardinalities for finite fields?

We are now ready to answer the question: What are the possible cardinalities for finite fields? Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the

More information

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme

A Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters 01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;

More information

GENERALIZED PROCRUSTES ANALYSIS AND ITS APPLICATIONS IN PHOTOGRAMMETRY

GENERALIZED PROCRUSTES ANALYSIS AND ITS APPLICATIONS IN PHOTOGRAMMETRY SWISS FEDERL INSIUE OF ECHNOLOGY Insttute of Geodes and Photograetr EH-Hoenggerberg, Zuerch GENERLIZED PROCRUSES NLYSIS ND IS PPLICIONS IN PHOOGRMMERY Prepared for: Praktku n Photograetre, Fernerkundung

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng

More information

Two-Phase Traceback of DDoS Attacks with Overlay Network

Two-Phase Traceback of DDoS Attacks with Overlay Network 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of

More information

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter

GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter 2066 JOURL OF COMPUTERS, VOL. 9, O. 9, SEPTEMBER 204 GPS Recever utonoous Integrt Montorng lgorth Based on Iproved Partcle Flter Ershen Wang School of Electronc and Inforaton Engneerng, Shenang erospace

More information

Maximizing profit using recommender systems

Maximizing profit using recommender systems Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co

More information

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Quality of Service Analysis and Control for Wireless Sensor Networks

Quality of Service Analysis and Control for Wireless Sensor Networks Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as

More information

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA

Ganesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA 238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments

Revenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments 202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems

A Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Capacity Planning for Virtualized Servers

Capacity Planning for Virtualized Servers Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION

CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION Musheer Ahmad, Bashr Alam and Omar Farooq Department of Computer Engneerng, Jama Mlla Islama, New Delh, Inda musheer.cse@gmal.com, babashralam@gmal.com

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Online Algorithms for Uploading Deferrable Big Data to The Cloud

Online Algorithms for Uploading Deferrable Big Data to The Cloud Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The

More information

Analysis of Clock Synchronization Approaches for Residential Ethernet

Analysis of Clock Synchronization Approaches for Residential Ethernet Analyss of Clock Synchronzaton Approaches for Resdental Ethernet Geoffrey M. Garner (Consultant) Kees den Hollander SAIT, Sasung Electroncs ggarner@cocast.net, denhollander.c.@sasung.co Abstract Resdental

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

Inventory Control in a Multi-Supplier System

Inventory Control in a Multi-Supplier System 3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation

A Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract.

More information

A Hybrid Approach to Evaluate the Performance of Engineering Schools

A Hybrid Approach to Evaluate the Performance of Engineering Schools A Hybrd Approach to Evaluate the Perforance of Engneerng Schools School of Engneerng Unversty of Brdgeport Brdgeport, CT 06604 ABSTRACT Scence and engneerng (S&E) are two dscplnes that are hghly receptve

More information

Web Service-based Business Process Automation Using Matching Algorithms

Web Service-based Business Process Automation Using Matching Algorithms Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research

More information

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana

A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

21 Vectors: The Cross Product & Torque

21 Vectors: The Cross Product & Torque 21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Transformation of Commercial Flows into Physical Flows of Electricity

Transformation of Commercial Flows into Physical Flows of Electricity Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

Packet Reorderng Analysis

Packet Reorderng Analysis On Montorng of End-to-End Packet Reorderng over the Internet Bn Ye 1 Anura P. Jayasuana 1 Nschal M. Pratla 2 1Coputer Networkng Research laboratory, Colorado State Unversty, Fort Collns, CO 8523, USA 2

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide

Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB

More information

A Generalized Temporal and Spatial Role-Based Access Control Model

A Generalized Temporal and Spatial Role-Based Access Control Model 92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: swang@mal.cpu.edu.tw

More information

Applied Research Laboratory. Decision Theory and Receiver Design

Applied Research Laboratory. Decision Theory and Receiver Design Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order

More information

Virtual machine resource allocation algorithm in cloud environment

Virtual machine resource allocation algorithm in cloud environment COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal

More information