R-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)
|
|
- Alban Warner
- 7 years ago
- Views:
Transcription
1 R-AS: AS FUNCTION USING RANDO QUADRATIC POLYNOIALS OVER GF() Dhananoy Dey 1, Noopur Shrotrya 1, Indranath Sengupta 1 SAG, etcalfe ouse, Delh-11 54, INDIA. {dhananoydey, noopurshrotrya}@sag.drdo.n Department of athematcs, Jadavpur Unversty, Kolkata, WB 7 3, INDIA. sengupta.ndranath@gmal.com ABSTRACT In ths paper we descrbe an mproved verson of F-hash [7] vz. R-hash: ash Functon Usng Random Quadratc Polynomals Over GF(). The compresson functon of F-hash conssts of 3 polynomals wth 64 varables over GF(), whch were taken from the frst 3 polynomals of FE challenge-1 by forcng last 16 varables as. The mode operaton used n computng F-hash was erkle-damgard. We have randomly selected 3 quadratc non-homogeneous polynomals havng 64 varables over GF() n case of R-hash to mprove the securty of the compresson functon used n F-hash. In desgnng R-hash, we have also changed the mode operaton used n F-hash, because of the theoretcal weakness found n the erkle-damgard constructon. In ths paper we wll prove that R-hash s more secure than F-hash and SA-56 as well as we wll show that t s also faster than F-hash. KEYWORDS Dedcated hash functons, dfferental attack, Q problem, premage attack. 1. INTRODUCTION After recent cryptanalytc attack on D5 [][15] [8] [31] and SA-1 [5] [6] [3] [4] [9], the securty of ther successor, SA- famly [1], aganst all knds of cryptanalytc attacks has become an mportant ssue. Although many theoretcal attacks [1], [18], [19], [], [1], [6] on the reduced round of SA-56 have been publshed durng 3 to 8, but there s stll no threat to the securty of SA-56. In 7 NIST announced the SA-3 competton [] for selectng a new hash functon, whch would resst length extenson attack and other theoretcal weakness of erkle-damgard constructon. The desgn prncples of all submtted hash functons for SA-3 competton are dfferent from erkle-damgard constructon. We can broadly categorse all the submtted hash functons accordng to ther desgn prncple n the followng way: balanced Festel network, unbalanced Festel network, wde ppe desgn, key schedule, DS matrx, output transformaton, S-box and feedback regster. NIST has already declared the DOI : 1.511/cst
2 SA-3 hash functon on Oct 1. NIST has selected Keccak [3] as the SA-3 hash from the fve SA-3 fnalsts, vz., Blake [1], Grøstl [9], J [7], Keccak [3] and Sken [8]. The compresson functon of F-hash [7] was desgned n such a way that t conssts of the frst 3 polynomals wth frst 64 varables taken from the polynomals of FE challenge-1 by forcng last 16 varables of the 8 varables to. A new hash functon R-hash has been desgned by modfyng F-hash by takng random quadratc polynomals to mprove the securty as well as the effcency of F-hash. The compresson functon of R-hash depends on the followng wellknown facts: It s easy to compute the values of a random set of m multvarate polynomals n n varables over a fnte feld F vz., p ( x,, x ),, p ( x,, x )) for any fxed n ( x 1,, x n ) F. ( 1 1 n m 1 n Solvng random system of polynomal equatons s an NP-hard problem * [11]. In desgnng R-hash, we have changed the paddng procedure, from the one we have appled n F-hash, to ncrease the sze of the nput to the hash functon. We have also changed the erkle- Damgard constructon appled n F-hash by applyng double-ppe desgn to remove the multcollsons attack [13], length extenson attack, fxed-pont attack [16] and herdng attack [14]. A complete descrpton of R-hash and ts analyss wll be presented n the followng subsequent sectons.. R-AS FUNCTION R-hash functon can take arbtrary length ( 64 < 51-bt block) of nput and gves 56 bts 51 * 56 output,.e. we can wrte R hash : ( Z ) Z. We have desgned R-hash by changng the compresson functon as well as the mode operaton. The compresson functon conssts of 3 random polynomals wth 64 varables of degree over GF(). Snce the number of coeffcents of a polynomal of degree wth 64 varables over GF() s at most 81, to generate 3 random polynomals wth 64 varables of degree over GF() requres 6659 random bts. These bts were generated n the followng way: () Frst we compute SA-51 of a fle contanng 968bb576eeb7c6def469a6b48497c4739ac188ef1f948d8a15399b3af8deb91db ef377e366ba9f3e11a85bc41dc49f716d5a1489aec7. () Then we apply SA-51 to the output of the above fle. () We repeat the above process 131 tmes. * It s true even f we restrct the total degree of these polynomals to at least. 16
3 The hash value of a message of length followng manner: L = 51 l + 8r bts can be computed n the Paddng: Frst we append 1 to the end of the message to ndcate the termnaton of the message. Let k be the number of zeros added for paddng. Frst, 7-bt representaton of r bytes s appended to the end of k zeros and then 64-bt representaton of l blocks s placed to the end of 7- bt representaton of r bytes. Now k wll be the smallest non-negatve nteger satsfyng the followng condton: 8r + 1+ k mod 51. e., k + 8r 44 mod 51 The paddng procedure s shown n Fgure 1. Accordng to ths paddng procedure, we can 9 64 compute the hash value of a message of length ( 1) bts. 1 k-bt 7-bt 64-bt Fgure 1: Paddng Procedure Parsng: Let l' be the length of the padded message. Dvde the padded message nto n ( = l' / 51) 51-bt block.e. sxteen 3-bt words nstead of 448-bt block, whch s () appled n F-hash to mprove the effcency. Let denote the th block of the padded message, where 1 n and each word of th block s denoted by for 15. Intal Value: Take the frst 56 bts ntal value.e., eght 3-bt words from the expanson of the fractonal part of and hexadecmal representaton of these eght words are gven below: () = 43F6A88, = A4938, Thus IV =. 1 = 85A38D3, = 99F31D, 6 = 13198AE, = 8EFA98, 3 7 = , = EC4E6C89. ( 1) () ( n) ash Computaton: For each 51-bt block,,,, the followng four steps are executed for all the values of from 1 to n. 1. Intalzaton: The frst channg varable CV = 1 7 s the 56-bt ntal value IV.. Transformaton: Dvde the nput message block nto two equal parts,.e., = L R. Transform the message block n the followng way: L ( L CV counter ), ' 1 161
4 where counter mod 64 =. Xorng counter removes the fxed pont attack, because as the number of blocks ncreases, counter wll be dfferent for each block. Now, = L' R. We dvde ths 3. Iteraton: () nto sxteen 3-bt words, 1,, 15. For = to 6 (a) For k = to 7 k p( k k + 1) (b) R' ( R ( 1 7 )) (c) For = to 15 + mod 16 where p : Z 64 Z 3 be a functon defned by p 31 3 ( x) =. p1( x1,, x64) +. p( x1,, x64) p3( x1,, x64 x Z can be represented by 1x x64, Snce any element 64 x where x1x x64 denotes the bnary representaton of x n decreasng order of ther sgnfcance. p x 1,, x ) denotes the th polynomal wth 64 varables. ( 64 ) For = 7 CV R'' ' (a) p( ) k k k + 1 R ''' ( R'' ( 1 7 (b) )) The fnal hash value of the message wll be Ln, attack, multcollson attack and herdng attack. Snce to remove the length extenson CV s the ntal value for ( +1) the block and CVn s not known; hence appendng any extra block to compute the R-hash would not be possble. The complete algorthm s gven n Algorthm 1 and block dagram of R-hash s shown n Fgure. Process of Implementaton: In order to compute R-hash(), frst the paddng rule s appled and then the padded message s dvded nto 51-bt blocks. Now each 51-bt block s dvded nto sxteen 3-bt words and each 3-bt word s read n lttle endan format. For example, suppose we have to read an ASCII fle wth data abcd, t wll be read as x
5 R hash ( a ) 3. ANALYSIS OF R-AS = 7 A8 FA 11 D 7 E1E B 8 EB 55 F 19 D 39 C 6488 CBE C 61 9 E E 7 DBE 8 A 3 AAEFE 38 R hash ( ab ) = 69 C 8 E F 75 DDBC 5 A8 A 687 B 97 BE 9 A 6 F 48 E 75 BB 73 B 3 FC 17 AD F 5 E 88 R hash ( abc ) = AE 1771 AE 76 C 49 CB D 8 B 8 A9 849 FAF 9 5 E 51 BC 14 DBBF 4 AE 7 AA 8 F Test Value of F-hash: Test values of the three nputs are gven below: In ths secton we wll present the complete analyss of R-hash, whch ncludes propertes, effcency, as well as the securty analyss of ths functon Effcency of R-hash Functon The followng table gves a comparatve study n the effcency of R-hash wth F-hash on an Intel CoreDuo PC wth P84 Ghz processor wth GB RA. Fle Sze (n B) F-hash (n sec) R-hash (n Sec) Table 1: Comparatve n the Effcency of R-hash Ths shows that R-hash s almost three tmes faster than F-hash. 3.. Premage Resstance To fnd premage of R-hash, one has to solve 3 random quadratc multvarate polynomal equatons wth 64 varables over GF() whch s an Q-problem. If t s easy to fnd out premage of R-hash, then Q-problem s no longer an NP-hard problem, whch s a contradcton. Thus R-hash s premage resstant hash functon Second Premage Resstance We know that collson resstance mples second premage resstance. Therefore, the proof of collson resstance of R-hash gves the second premage resstance of R-hash Collson Resstance Snce we have totally changed the desgn prncple of the compresson functon n R-hash, therefore the dfferental attack appled for SA- and SA-1 by Chabaud and Joux n [4] and by Wang et al. n [3], [9] to fnd the collson s not applcable to R-hash functon. All these attacks use the message expanson relaton to fnd the collson, 163
6 Input Repeat for each block w o w 15 L R CV -1 Counter L R L R <<< 64 p Repeat 6 tmes L R p L R... CV L n R n R hash Fgure : Block Dagram of R-hash 164
7 but n our desgn, we have not appled the message expanson algorthm. ence, ths hash functon s collson resstance aganst the above methods. Snce the desgn of the compresson functon of R-hash s dfferent from SA- famly, the cross dependence equaton descrbed by Sanadhya and Sarkar n [5] cannot be formed n R-hash. Thus ths procedure too cannot be appled to our hash functon for fndng collsons. Besdes these, we have computed R-hash for a number of fles by changng only one bt to the nput. In most of the cases, we found that 17 bts changed after one round computaton of R-hash and 51 bts changed after two rounds. So t would be dffcult to control these bts as the number of rounds ncreases. Thus, dfferental attack to fnd the collson for R- hash would be dffcult Avalanche Effect We have taken an nput fle consstng of 51 bts and computed R-hash(). By th changng the bt of, the fles have been generated, for Thus ammng dstance of each from s exactly 1 for We then computed R- hash( ) for 1 51, computed the ammng dstances d between R-hash() and R- hash( ), for 1 51 and fnally computed the dstances between correspondng eght 3-bt words of the hash values. The followng table shows the maxmum, the mnmum, the mode and the mean values of the above dstances. Changes W1 W W3 W4 W5 W6 W7 8 W F-hash R-hash ax n ode ean Table : ammng Dstances To satsfy strct avalanche crteron, each d should be 18 for But we have found that d ' s were lyng between 14 and 165 for the above fles and n most of the cases d = 131. The observed devaton s acceptable so as to resst collson search usng dfferental attack. The followng table and fgure show the dstrbuton of the 51 fles wth respect to ther dfferences (dstance) n bts. Range of Dstance No. of Fles % F-hash % R-hash 18 ± ± ± ± Table 3: Dstrbuton of the Dfferences of R-hash by Changng a Sngle Bt 165
8 3.6. Randomness Test Fgure 3: Dstrbuton of the Dfferences of R-hash by Changng a Sngle Bt To conduct randomness test, we have generated a fle consstng of bts by concatenatng all the output of R-hash of the fles, 1,,, 51. After that, we have dvded bts nto 64 blocks of length 48 bts each, 3 blocks of length 496 bts each, 16 blocks of length 819 bts each, 8 blocks of length bts each, 4 blocks of length 3768 bts each, blocks of length bts each and 1 block of the complete bts. Thus we have generated 17 blocks n total and conducted fve basc randomness tests n these blocks. The concse result s shown n the followng table The Bt-Varance Test Test No. of Passed Faled % Blocks Frequency Seral Poker Runs Autocorrelaton Table 4: Result of Randomness Test The bt varance test conssts of measurng the mpact of change n nput message bts on the dgest bts. ore specfcally, gven an nput message, all the small changes as well as the large changes of ths nput message bts are taken and the bts n the correspondng dgest are evaluated for each such change. Afterwards, for each dgest bt the probabltes 166
9 of takng on the values of 1 and are measured consderng all the dgests produced by applyng nput message bt changes. If P ( 1) = P () = 1/ for all dgest bts = 1,, 56 then, the R-hash functon has attaned maxmum performance n terms of the bt varance test [17]. The bt varance test actually measures the unformty of each bt of the dgest. Snce t s computatonally dffcult to consder all nput message bt changes, we have evaluated the results for only up to 513 fles, vz., 1,,, 51, whch we have generated for conductng avalanche effect, and found the followng results: Number of dgests = 513 ean frequency of 1s (expected) = 56.5 ean frequency of 1s (calculated) = CONCLUSIONS In ths paper a dedcated hash functon R-hash has been presented whose securty s based on the Q-problem over fnte feld. Ths hash functon has the followng advantages over F-hash: t s much more effcent, t s secure aganst multcollson attack, fxed pont attack, length extenson attack and herdng attack. oreover, analyss of ths hash functon vz. avalanche effect, bt-varance test, randomness test as well as securty proof are also descrbed here. From these expermental results, t s clear that ths hash functon can also be used as a pseudo-random number generator because of the good randomness property of ts output besdes the other applcatons of cryptographc hash functons. ACKNOWLEDGEENTS The frst two authors are thankful to rs Pratbha Yadav, SAG, for her support to carry out ths work and are also very thankful to Dr. P. K. Saxena, Drector SAG, for hs encouragement to pursue ths work. The authors are thankful to r. Bharat Lal Jangd, SAG, for carryng out the randomness tests of R-hash. The authors are also thankful to Dr. P. R. shra, SAG, for hs crtcal suggestons and comments on the frst draft of ths paper. REFERENCES [1] J. Aumasson, L. enzen, W. eer, R. Phan, SA-3 Proposal BLAKE (9), submsson to NIST s SA-3 competton. [] J. Black,. Cochran & T. ghland, A Study of the D5 Attacks: Insghts and Improvements, n Proceedngs of Fast Software Encrypton FSE 6, LNCS 447, Sprnger, 6. [3] G. Berton, J. Daemen,. Peeters, G. Assche, The KECCAK sponge functon famly (9), submsson to NISTs SA-3 competton. [4] F. Chabaud & A. Joux, Dfferental Collsons n SA-, advances n Cryptology - CRYPTO 98, LNCS 146, Sprnger-Verlag, [5] C. Cannere, F. endel & C. Rechberger, Collsons for 7-step SA-1: On the Full Cost of Collson Search, n Proceedngs of SAC 7, LNCS 4876, Sprnger, 7. [6] C. Cannere & C. Rechberger, Premages for Reduced SA- and SA-1, advances n Cryptology - CRYPTO 8, LNCS 5157, Sprnger-Verlag,
10 [7] D. Dey, P. R. shra & I. Sengupta, F-hash: ash Functons Usng Restrcted FE Challenge-1, Internatonal Journal of Advanced Scence and Technology Vol. 37, Dec 11. Avalable onlne at [8] N. Ferguson, S. Lucks, B. Schneer, D. Whtng,. Bellare, T. Kohno, J. Callas, J. Walker, The Sken ash Functon Famly (9), submsson to NIST s SA-3 competton. [9] P. Gauravaram, L. Knudsen, K. atusewcz, F. endel, C. Rechberger,. Schlaffer, S. Thomsen, Grøstl a SA-3 Canddate (9), submsson to NIST s SA-3 competton. [1]. Glbert &. andschuh, Securty Analyss of SA-56 and Ssters, n Proceedngs of SAC 3, LNCS 36, Sprnger, 3. [11]. Garey & D. Johnson, Computers and Intractablty - A Gude to the Theory of NPcompleteness, Freeman and Co., [1] S. Indesteege, F. endel, B. Preneel & C. Rechberger, Collsons and other Non-Random Propertes for Step-Reduced SA-56. Cryptology eprnt Archve. Avalable onlne at [13] A. Joux, ultcollsons n Iterated ash Functons - Applcaton to Cascaded Constructons, advances n Cryptology CRYPTO 4, LNCS 315, Sprnger, 4. [14] J. Kelsey & T. Kohno, erdng ash Functons and the Nostradamus Attack, advances n Cryptology EUROCRYPT 6, LNCS 44, Sprnger-Verlag, 6. [15] V. Klma, Tunnels n ash Functons: D5 Collsons wthn a nute, Cryptology eprnt Archve. Avalable onlne at [16] J. Kelsey & B. Schneer, Second Premages on n-bt ash Functons for uch Less Than n Work, advances n Cryptology EUROCRYPT 5, LNCS 3494, Sprnger-Verlag, 5. [17] D.Karras & V. Zorkads, A Novel Sute of Tests for Evaluatng One-Way ash Functons for Electronc Commerce Applcatons, IEEE,. [18] F. endel, N. Pramstaller, C. Rechberger & V. Rmen, Analyss of Step-Reduced SA-56, n Proceedngs of FSE 6, LNCS 447, Sprnger, 6. [19] F. endel, N. Pramstaller, C. Rechberger & V. Rmen, Analyss of Step-Reduced SA-56, Cryptology eprnt Archve. Avalable onlne at [] I. Nkolc & A. Bryukov, Collsons for Step-Reduced SA-56 n Proceedngs of FSE 8, Sprnger, 8. [1] Natonal Insttute of Technology, Secure ash Standard, FIPS Publcaton-18-,. Avalable onlne at [] Natonal Insttute of Standards and Technology, Cryptographc ash Proect, Avalable onlne at [3] N. Pramstaller, C. Rechberger & V. Rmen, Explotng Codng Theory for Collson Attacks on SA-1, n Cryptography and Codng, 1th IA Internatonal Conference Proceedngs, LNCS 3796, Sprnger, 5. [4]. Sugta,. Kawazoe &. Ima, Groebner Bass Based Cryptanalyss of SA-1, Cryptology eprnt Archve. Avalable onlne at [5] S. Sanadhya & P. Sarkar, Non-Lnear Reduced Round Attacks Aganst SA- ash famly, Informaton Securty and Prvacy - ACISP 8, LNCS, Sprnger, 8. [6] S. Sanadhya & P. Sarkar, Attackng Step Reduced SA- Famly n a Unfed Framework, Cryptology eprnt Archve. Avalable onlne at [7]. Wu, The ash Functon J (9), submsson to NIST s SA-3 competton. [8] X. Wang &. Yu, ow to Break D5 and Other ash Functons, advances n Cryptology EUROCRYPT 5, LNCS 3494, Sprnger, 5. [9] X. Wang, Y. Yn &. Yu, Fndng Collsons n the Full SA-1, advances n Cryptology CRYPTO 5, LNCS 361, pages 17-36, Sprnger, 5. [3] X. Wang,. Yu & Y. Yn, Effcent Collson Search Attacks on SA-, n Advances n Cryptology - CRYPTO 5, LNCS 361, Sprnger, 5. [31] T. Xe, D. Feng & F. Lu, A New Collson Dfferental for D5 wth ts Full Dfferental Path, Cryptology eprnt Archve. Avalable onlne at 168
1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationWe are now ready to answer the question: What are the possible cardinalities for finite fields?
Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationNPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationRisk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
More informationLogical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
More informationLoop Parallelization
- - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationn + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)
MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total
More informationUsage of LCG/CLCG numbers for electronic gambling applications
Usage of LCG/CLCG numbers for electronc gamblng applcatons Anders Knutsson Smovts Consultng, Wenner-Gren Center, Sveavägen 166, 113 46 Stockholm, Sweden anders.knutsson@smovts.com Abstract. Several attacks
More informationHow Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationMultiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers
Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller
More informationThe Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More information1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationAnts Can Schedule Software Projects
Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,
More informationExamensarbete. Rotating Workforce Scheduling. Caroline Granfeldt
Examensarbete Rotatng Workforce Schedulng Carolne Granfeldt LTH - MAT - EX - - 2015 / 08 - - SE Rotatng Workforce Schedulng Optmerngslära, Lnköpngs Unverstet Carolne Granfeldt LTH - MAT - EX - - 2015
More informationThe Load Balancing of Database Allocation in the Cloud
, March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton
More informationSoftware project management with GAs
Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de
More informationSingle and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationA Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes
Journal of Computer Scence 7 (5): 785-789, 2011 ISSN 1549-3636 2011 Scence Publcatons A Novel Enhancement Technque of the Hll Cpher for Effectve Cryptographc Purposes 1 A.F.A. Abdn, 1 O.Y. Chuan and 2
More informationMONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS
Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationFinite Math Chapter 10: Study Guide and Solution to Problems
Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationCS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements
Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there
More informationDesign of Output Codes for Fast Covering Learning using Basic Decomposition Techniques
Journal of Computer Scence (7): 565-57, 6 ISSN 59-66 6 Scence Publcatons Desgn of Output Codes for Fast Coverng Learnng usng Basc Decomposton Technques Aruna Twar and Narendra S. Chaudhar, Faculty of Computer
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationImplementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem
Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationFaraday's Law of Induction
Introducton Faraday's Law o Inducton In ths lab, you wll study Faraday's Law o nducton usng a wand wth col whch swngs through a magnetc eld. You wll also examne converson o mechanc energy nto electrc energy
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationTesting and Debugging Resource Allocation for Fault Detection and Removal Process
Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton
More informationDescriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications
CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationPRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.
PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato
More informationCOMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova
Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven
More informationA Simple Approach to Clustering in Excel
A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationBusiness Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2
Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43
More informationStatistical Methods to Develop Rating Models
Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationSensor placement for leak detection and location in water distribution networks
Sensor placement for leak detecton and locaton n water dstrbuton networks ABSTRACT R. Sarrate*, J. Blesa, F. Near, J. Quevedo Automatc Control Department, Unverstat Poltècnca de Catalunya, Rambla de Sant
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationA machine vision approach for detecting and inspecting circular parts
A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationAn Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More information