A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes

Size: px
Start display at page:

Download "A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes"

Transcription

1 Journal of Computer Scence 7 (5): , 2011 ISSN Scence Publcatons A Novel Enhancement Technque of the Hll Cpher for Effectve Cryptographc Purposes 1 A.F.A. Abdn, 1 O.Y. Chuan and 2 M.R.K. Arffn 1 Department of Computer Scence, Faculty of Informatcs, Unversty Sultan Zanal Abdn, Kuala Terengganu, Terengganu, Malaysa 2 Insttute for Mathematcal Research, Unversty Putra Malaysa, UPM Serdang, Selangor, Malaysa Abstract: Problem statement: The Hll cpher s the frst polygraph cpher whch has a few advantages n data encrypton. However, t s vulnerable to known plantext attack. Besdes, an nvertble key matrx s needed for decrypton. It may become problematc snce an nvertble key matrx does not always exst. Approach: In ths study, a robust Hll algorthm (Hll++) has been proposed. The algorthm s an extenson of Affne Hll cpher. A random matrx key, RMK s ntroduced as an extra key for encrypton. An algorthm proposed for nvolutory key matrx generaton s also mplemented n the proposed algorthm. Results: A comparatve study has been made between the proposed algorthm and the exstng algorthms. The encrypton qualty of the proposed algorthm s also measured by usng the maxmum devaton factor and correlaton coeffcent factor. Concluson/Recommendatons: The proposed algorthm ntroduced a random matrx key whch s computed based on the prevous cphertext blocks and a multplyng factor. A modfed of Hll Cpher s free from the all-zero plantext blocks vulnerablty. Usage of nvolutory key for encrypton and decrypton managed to solve the non nvertble key matrx problem. It also smplfy the computatonal complexty n term of generatng the nverse key matrx. Key words: Affne cpher, cryptography theory, hll cpher, nvolutory matrx, polygraph cpher, data encrypton, symmetrc cryptosystem, Advanced Encrypton Standard (AES), Data Encrypton Standard (DES), Intal Vector (IV), proposed algorthm INTRODUCTION Today, nformaton s one of the most valuable ntangble assets. Due to ths fact, nformaton securty had become an mportant ssue. Cryptography s one of the methods used to protect data from unauthorzed access and beng stolen. There are two types of cryptosystem, whch are symmetrc cryptosystem and asymmetrc cryptosystem. In Symmetrc cryptosystem, the sender and recpent share the same key. It means the same key s used for encrypton and decrypton. In Asymmetrc cryptosystem, dfferent keys are used. A publc key s used by sender to encrypt the message whle the recpent used a prvate key to decrypt t. Both of these cryptosystem have ther own pros and cons. For nstance, Symmetrc cryptosystem consume less computng power but t s less secure than Asymmetrc cryptosystem. Currently, there are a few cryptosystem whch are wdely mplemented such as Advanced Encrypton Standard (AES), Twofsh, Rver Cpher 4 (RC4) and Data Encrypton Standard (DES). However, these modern cryptosystem have ther orgns. The classcal cpher such as Caesar Cpher, Hll Cpher, Vgenère Cpher act as the foundaton for the cryptology s world today. Ths study focuses on Hll Cpher whch was frst descrbed n 1929 by ts nventor, the mathematcan Lester S. Hll, n the journal The Amercan Mathematcal Monthly (Esenberg, 1998). Although ts vulnerablty to cryptanalyss has rendered t unusable n practce, t stll serves an mportant pedagogcal role n cryptology and lnear algebra (Tooran and Falahat, 2009). Hll Cpher s the frst polygraph cpher. It has a few advantages n data encrypton such as resstant towards frequency analyss, hgh speed and hgh throughput. The core of Hll Cpher s matrx manpulaton (Bbhudendra, 2006; Al-Sad and Sad, 2009; Pour et al., 2009; Sastry and Shankar, 2007). It s Correspondng Author: A.F.A. Abdn, Faculty of Informatcs, Unversty Sultan Zanal Abdn, Kuala Terengganu, Terengganu, Malaysa 785

2 lnear algebra equaton s C = K P (mod m), where C represents cpher text row vector, K represents key matrx and P represents plantext row vector respectvely. For decrypton, an nverse key matrx, K -1 s needed. Ths s the major drawback of Hll cpher snce not every key matrx s nvertble. Another vulnerablty of the Hll cpher s t compromsed to the known-plantext attacks. Ths means the message encrypted can be broken f the attacker gans enough pars of plantexts and cphertexts. In ths study, a modfed verson of Hll cpher s proposed to overcome all the drawbacks mentoned above. The proposed algorthm s an extenson from Affne Hll cpher. The rest of ths study s organzed as follows. J. Computer Sc., 7 (5): , 2011 needed for decrypton and ths defntely smplfy the computatonal complexty and save the computatonal tme. However, ths algorthm stll contans some of the major drawbacks of the orgnal Hll cpher such as the vulnerablty to known-plantext attack. Besdes, ths algorthm s also not sutable to encrypt all-zeroes plantext as C wll always equals zero when P equals zero (Rangel-Romero et al., 2006). MATERIALS AND METHODS The proposed algorthm: The proposed algorthm s based on Affne Hll cpher, whch s the combnaton of Hll cpher and affne cpher. Affne Hll cpher mxes the Hll cpher wth a nonlnear affne transformaton (Stndon, 2006). Dfferng from the Hll cpher, the plantext s encrypted as C = PK + V (mod m). To produce a robust cryptosystem, we extend ths encrypton core. Ths extenson wll solve the nonnvertble key matrx problem and ncrease the randomzaton of the algorthm to enhance ts resstance towards common attacks. Wth the proposed algorthm, the plantext s encrypted as C = PK + RMK (mod m) wth three parameters, α, β and γ. The non-nvertble key matrx problem s solved by mplementng an algorthm proposed by Bbhudendra (2006). Ths algorthm produces an nvolutory key matrx whch can be used for both encrypton and decrypton process. Obvously, t reduces the computatonal complexty n decrypton. Besdes, a random matrx key, RMK s needed for encrypton apart from the nvolutory key matrx. Ths RMK s computed based on the prevous cphertext blocks and a multplyng factor. It enhances the securty of the proposed algorthm as t ncreased the resstance of the algorthms to known plantext attack. Lterature revew: Snce the Hll Cpher serves as an mportant pedagogcal role n both cryptology and lnear algebra, several researches have been done to mprove the Hll cpher. Rushd and Mousa (2009) had desgned a robust cryptosystem algorthm for nonnvertble matrces based on Hll cpher. The nonnvertble key matrx problem s solved by convertng each plantext character nto two cpher text characters. So wth the decrypton, the process nvolves the converson of two cpher text characters nto one plantext character. Although ths algorthm solved the non-nvertble key problem, t s tme-consumng as the decrypton process nvolved the computaton of an nverse key matrx. It wll defntely delay the decrypton process especally when t nvolved hgh dmensonal key matrx. Ismal et al. (2006) proposed a modfed Hll cpher whch used one-tme-one key matrx to encrypt each plantext blocks. In ths algorthm, each plantext block s encrypted by usng ts own key. Ths unque key s computed by multplyng the current key wth a secret Mathematcal notaton: Intal Vector (IV). The multplyng operaton s carred out row by row, thus the algorthm s named as Hll C = Cphertext Multplyng Rows by Intal Vector (Hll MRIV). Ths P = Plantext algorthm s proved to yeld better encrypton qualty. K = n n matrx key However, t s proved by Rangel-Romero et al. (2006) RMK = Random n n matrx key that ths proposed algorthm s stll vulnerable towards α = 1st seed number known-plantext attack. Besdes, Ismal et al. (2006) β = 2nd seed number does not tackle the non-nvertble key matrx problems γ = Multplyng factor whch may lead to falure n decrypton. n = Length of matrx rows and columns Bbhudendra (2006) also proposed an advanced m = Value of modulus, m > 1 Hll cpher algorthm (AdvHll) whch s able to solve b = Number of plantext blocks the non-nvertble key matrx problem. To make sure every cphertext block can be decrypted, an nvolutory Proposed algorthm: The encrypton algorthm s as key matrx s used for encrypton. An nvolutory key follows: matrx s a key whch can be used for both encrypton and decrypton. It means an nverse key matrx s not Randomly select α, β and γ 786

3 J. Computer Sc., 7 (5): , 2011 Generate {x 1, x 2,, x n } based on α Produce a n n matrx based on the set of numbers {x 1,x 2,, x n } Wth ths n n matrx, generate an nvolutory matrx K based on the algorthm proposed by Bbhudendra et al. (2009) Generate {y 1, y 2,, y n n } based on β Produce a n n matrx, Ktemp 1 based on the set of numbers {y 1, y 2,, y n n } Compute RMK 1 by multplyng each rows of Ktemp 1 matrx key wth γ 1 For the frst plantext block P 1, the encrypton formula s: C 1 = P 1 K 1 + RMK 1 (mod m) Repeat Step 1 to 4 to produce the remanng nvolutory matrx key, {K 2, K 3,, K b }. To compute the remanng n n random matrx key, {RMK 2, RMK 3,, RMK b }, the formula s: RMK = C -1 γ, where = {2, 3,, b} The proposed encrypton algorthm s as follows: ( ) ( ) C = PK + RMK mod m, = 1 C = C = PK + RMK mod m where, RMK = C -1 γ, = {2, 3,, b}. To compute the remanng n n random matrx key, {RMK 2, RMK 3,, RMK b }, the formula s: RMK = C -1 γ, where = {2, 3,, b}. The proposed decrypton algorthm s as follows: ( ) ( ) = ( ) ( ) P = C RMK K mod m, = 1 P = P C RMK K mod m where, RMK = C -1 γ, = {2, 3,, b}. RESULTS AND DISCUSSION Comparson has been done between the proposed encrypton algorthm, Hll++ and a few others prevous Hll algorthms. Table 1 shows that Hll++ has features whch obvously overcome some of the vulnerabltes n the exstng Hll algorthms. Obvously, Table 1 shows that Hll++ s the better than all the prevous Hll algorthms as t fulflled the two comparson factors. Snce the algorthm (Bbhudendra, 2006) s mplemented n Hll++, thus an nverse key matrx s not needed for the decrypton process. Apart from ths, all the algorthms ncludng the algorthm proposed by Bbhudendra (2006) suffered a same problem. When all the characters n a plantext block are zeroes, all these algorthms may become problematc as f P equals zero, C wll also become 0. It means the encrypton process wll totally faled. However, Hll++ stll have the ablty to encrypt the plantext effectvely even f P equals zero. The decrypton algorthm s as follows: Generate {x 1, x 2,, x n } based on α Produce a n n matrx based on the set of numbers {x 1, x 2,, x n } Wth ths n n matrx, generate an nvolutory matrx K based on the algorthm proposed by Bbhudendra et al. (2009). Generate {y 1, y 2,, y n n } based on β 1 Produce a n n matrx, Ktemp 1 based on the set of numbers {y 1, y 2,, y n n } Compute RMK 1 by multplyng each rows of Ktemp 1 matrx key wth γ 1 For the frst plantext block P 1, the decrypton formula s: P 1 = (C 1 RMK 1 ) K 1 (mod m) 787 Measurng factors of encrypton s qualty: The comparson done on prevously had showed that Hll++ s better compared to the exstng Hll algorthms. But, dependng on ths comparson only s not enough n judgng the encrypton qualty of the proposed algorthm. Thus, two measurng technques have been used to evaluate the encrypton qualty of the proposed algorthm. These technques are the maxmum devaton measures Zedan et al. (2003) and the correlaton coeffcent measures. Table 1: Comparson between Hll++ and exstng hll algorthm Comparson factor Vulnerable f Need nversed there are Cpher key matrx all-zero blocks Orgnal hll Yes Yes Ismal et al. s algorthm Yes Yes Rushd et al. s algorthm Yes Yes Bbhudendra et al. s algorthm No Yes Hll++ No No

4 J. Computer Sc., 7 (5): , 2011 Fg. 1: Devaton graph between plantext and cphertext encrypted usng dfferent algorthms Table 2 showed the comparsons of the results from two dfferent measurng factors. In Table 2, MF1 ndcates the maxmum devaton measure whle MF2 represent the correlaton coeffcent measure. From the table, t showed that Hll++ has the greatest MF1 and ts MF2 s the closest to zero. A negatve value of correlaton coeffcent means that the two varables (plantext and cphertext) are negatvely correlated. The MF2 of Hll++ whch s nearly zero showed that Hll++ can encrypt plantext nto totally dfferent cphertext. Wth the greatest MF1 and MF2 whch s the closest to zero, t can be concluded that Hll++ s a better algorthm compared to the orgnal Hll and HllMRIV. CONCLUSION Table 2: The evaluaton for encrypton qualty of orgnal Hll cpher, HllMRIV and Hll++ Measurng factor Cpher MF1 MF2 Orgnal hll Hll MRIV Hll The maxmum devaton factor measures the qualty of encrypton based on the devaton between the plantext and cphertext. The more s the cphertext devated from the plantext, the better s the encrypton algorthm. The correlaton coeffcent factor measures the qualty of encrypton based on the relatonshp between two varables, whch are plantext and cphertext n ths case. If the correlaton coeffcent s one, t means that the plantext and cphertext are hghly dependent. If the correlaton coeffcent s zero, t means that the cphertext and the plantext are not correlated (ndependent between these two varables). Thus, the smaller s the values of the correlaton coeffcent, the better s the qualty of encrypton. Results and analyss: In our experment, a smple message wth a total of one hundred and twelve characters s encrypted by usng three dfferent verson of Hll cpher algorthm. These algorthms are the orgnal Hll, HllMRIV and Hll++. The results are presented both n graph and table. Graph n Fg. 1 showed three curves whch represent the absolute dfference between plantext and cphertext (encrypted by usng three dfferent algorthms, orgnal Hll, HllMRIV and Hll++ respectvely). Based on the graph, the area under the absolute dfference curve can be computed. The wder s the area under the absolute dfference curve, the better s the qualty of encrypton. The sum of devaton (area) computed from ths graph s presented under the MF1 column n Table We have presented a modfed verson of Hll cpher whch s an extenson of Affne Hll cpher. We called t as Hll++. Hll++ ntroduces a random matrx key whch s computed based on the prevous cphertext blocks and a multplyng factor. Ths sgnfcantly ncreased the resstance of the algorthm to the known plantext attack. Hll++ also mplemented an nvolutory key generaton algorthm where the same key matrx can be used for both encrypton and decrypton. It means Hll++ does not requre any addtonal operaton to compute an nverse key, whch s defntely more tme-savng. The comparson showed that Hll++ s the only algorthm whch full flled both comparson factors, whch are no nverse key needed and not vulnerable f there are all-zeroes block. Statstcal analyss presented also showed satsfactory results. Hll++ has better encrypton qualty compared to the orgnal Hll cpher and HllMRIV. REFERENCES Al-Sad, N.M.G. and M.R.M. Sad, A new approach n cryptographc systems usng fractal mage codng. J. Math. Stat., 5: DOI: /jmssp Bbhudendra, A., Novel methods of generatng self-nvertble matrx for hll cpher algorthm. Int. J. Secur., 1: Bbhudendra, A., K.P. Saroj, K.P. Sarat and P. Ganapat, Image encrypton usng advanced hll cpher algorthm. Int. J. Recent Trends Eng., 1: /jrte pdf

5 J. Computer Sc., 7 (5): , 2011 Esenberg, M., Hll cphers and modular lnear algebra. Mmeographed notes. Unversty of Massachusetts. Ismal, I.A., M. Amn and H. Dab, How to repar the hll cpher. J. Zhejang Unv. Sc. A., 7: DOI: /jzus.2006.A2022 Pour, D.R., M.R.M. Sad, K.A.M. Atan and M. Othman, The new varable-length key symmetrc cryptosystem. J. Math. Stat., 5: DOI: /jmssp Rangel-Romero, Y., G. Vega-García, A. Menchaca- Méndez, D. Acoltz-Cervantes and L. Martínez- Ramos et al., Comments on How to repar the Hll cpher. J. Zhejang Unv. Sc. A., 9: DOI: /jzus.A Rushd, A.H. and F. Mousa, Desgn of a robust cryptosystem algorthm for non-nvertble matrces based on hll cpher. Int. J. Comput. Sc. Network Secur., 9: pdf Sastry, V.U.K. and N.R. Shankar, Modfed hll cpher wth nterlacng and teraton. J. Comput. Sc., 3: DOI: /jcssp Stndon, D.R., Cryptography Theory and Practce. 3rd Edn., Chapman and Hall/CRC, ISBN: , pp: 593. Tooran, M. and A. Falahat, A secure varant of the hll cpher. Proceedngs of the 40th IEEE Symposum on Computers and Communcatons Sousse, July 5-8, Tunsa, pp: ISSN: Zedan, I.E., M.M. Fouad and D.H. Salem, Applcaton of data encrypton standard to btmap and JPEG mages. Proceedngs of the 20th Natonal Rado Scence Conference, Mar , Caro, Egypt, pp: ber=

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM

DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM G. RAMESH AD R. UMARAI: DATA SECURITY I LOCAL AREA ETWORK BASED O FAST ECRYPTIO ALGORITHM DATA SECURITY I LOCAL AREA ETWORK BASED O FAST ECRYPTIO ALGORITHM G. Ramesh and R. Umaran Department of MCA, Thruvalluvar

More information

SIMPLE LINEAR CORRELATION

SIMPLE LINEAR CORRELATION SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Fully Homomorphic Encryption Scheme with Symmetric Keys

Fully Homomorphic Encryption Scheme with Symmetric Keys Fully Homomorphc Encrypton Scheme wth Symmetrc Keys A Dssertaton submtted n partal fulfllment for the award of the Degree of Master of Technology n Department of Computer Scence & Engneerng (wth specalzaton

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: jean-perre.barrot@cnes.fr 1/Introducton The

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato

More information

Binomial Link Functions. Lori Murray, Phil Munz

Binomial Link Functions. Lori Murray, Phil Munz Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP

Research on Transformation Engineering BOM into Manufacturing BOM Based on BOP Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Compressed Sensing Based Encryption Approach for Tax Forms Data

Compressed Sensing Based Encryption Approach for Tax Forms Data Vol. 4, o.11, 15 Compressed Sensng Based Encrypton Approach for Tax Forms Data Adran Brezulanu Gheorghe Asach Techncal Unversty of Ias Ias, Romana Monca Fra Romanan Academy Insttute of Computer Scence

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

Erasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures

Erasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures Internatonal Journal of Grd Dstrbuton Computng, pp.5-26 http://dx.do.org/0.4257/gdc.205.8.2. Erasure Codes-based Storage-aware Protocol for Preservng Cloud Data under Correlaton Falures Zhqang Ruan and

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

An interactive system for structure-based ASCII art creation

An interactive system for structure-based ASCII art creation An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am

More information

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Decision Tree Model for Count Data

Decision Tree Model for Count Data Proceedngs of the World Congress on Engneerng 2012 Vol I Decson Tree Model for Count Data Yap Bee Wah, Norashkn Nasaruddn, Wong Shaw Voon and Mohamad Alas Lazm Abstract The Posson Regresson and Negatve

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Search Efficient Representation of Healthcare Data based on the HL7 RIM

Search Efficient Representation of Healthcare Data based on the HL7 RIM 181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

E-book Review on the Natonal System of Permutaton

E-book Review on the Natonal System of Permutaton Memory-Based and Dsk-Based Algorthms for Very Hgh Degree Permutaton Groups Gene Cooperman College of Computer Scence Northeastern Unversty Boston, MA 02115 / USA gene@ccs.neu.edu Erc Robnson College of

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding

Effective wavelet-based compression method with adaptive quantization threshold and zerotree coding Effectve wavelet-based compresson method wth adaptve quantzaton threshold and zerotree codng Artur Przelaskowsk, Maran Kazubek, Tomasz Jamrógewcz Insttute of Radoelectroncs, Warsaw Unversty of Technology,

More information

Secure encrypted-data aggregation for wireless sensor networks

Secure encrypted-data aggregation for wireless sensor networks In Wreless Networks, 16:4, May 2010, pp. 915-927 Wreless Netw (2010) 16:915 927 DOI 10.1007/s11276-009-0177-y Secure encrypted-data aggregaton for wreless sensor networks Shh-I Huang Æ Shuhpyng Sheh Æ

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Sciences Shenyang, Shenyang, China.

Sciences Shenyang, Shenyang, China. Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing 1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor

More information