Robust biometric-based user authentication scheme for wireless sensor networks

Size: px
Start display at page:

Download "Robust biometric-based user authentication scheme for wireless sensor networks"

Transcription

1 Robut bometrc-baed uer autentcaton ceme for wrele enor network Debao He* cool of Matematc and tattc Wuan nverty Wuan Cna Emal: Abtract: Wrele enor network (WN) are appled wdely a varety of area uc a realtme traffc montorng meaurement of emc actvty wldlfe montorng and o on. er autentcaton n WN a crtcal ecurty ue due to ter unattended and otle deployment n te feld. In 010 Yuan et al. propoed te frt bometrc-baed uer autentcaton ceme for WN. However Yoon et al. ponted out tat Yuan et al. ceme vulnerable to te nder attack uer mperonaton attack GW-node mperonaton attack and enor node mperonate attack. To mprove ecurty Yoon et al. propoed an mproved ceme and clamed ter ceme could wttand varou attack. nfortunately we wll ow Yoon et al. ceme vulnerable to te denal-of-ervce attack (Do) and te enor node mperonaton attack. To overcome te weaknee n Yoon et al. ceme we propoe a new bometrc-baed uer autentcaton ceme for WN. Te analy ow our ceme more utable for practcal applcaton. Key word: ecurty; Autentcaton; Bometrc; Wrele enor network; Cryptograpy 1. Introducton Wrele enor network (WN) are nnovatve ad-oc wrele network contng of a large number of enor node wt lmted power computaton torage and communcaton capablte [1]. Wt te development of enor tecnology mcroelectronc tecnology network tecnology and wrele communcaton tecnology WN are wdely ued n mltary envronmental montorng medcal buldng condton montorng and o on. In order to guarantee ecure communcaton autentcaton ceme for WN ave uccefully drawn reearcer attenton and been tuded wdely. In 004 Benenon et al. [] frt decrbed everal ecurty ue n WN epecally te acce control problem. Ten Benenon et al. [] propoed a uer autentcaton ceme ung ellptc curve cryptograpy (ECC). Wong et al. [4] ponted out tat Benenon et al. [] vulnerable to mperonaton attack and denal-of-ervce (Do) attack. To mproved ecurty Wong et al. [4] propoed a dynamc uer autentcaton ceme for WN. Wong et al. ceme very 1

2 effcent nce only one-way a functon and mple XOR operaton are requred n t. nfortunately Wong et al. ceme vulnerable to many attack uc a replay attack forgery attack tolen-verfer attack and paword gueng attack [ ]. Vadya et al. [8] alo ponted out tat Teng et al. ceme [5] Lee et al. and Ko et al. ceme [7] are vulnerable to replay of account-logn attack man-n-te-mddle attack forgery attack and tolenverfer attack and node capture attack. Vadya et al. alo propoed two mproved ceme to mprove te ecurty. In tradtonal autentcaton ceme for WN [4-8] te ecurty of te autentcaton ceme baed on paword. However mple paword are eay to break by mple dctonary attack nce tey ave low entropy. To olve te problem cryptograpc key (e.g. 18bt for te advanced encrypton tandard AE; [9]) are ued. However cryptograpc key are dffcult to memorze nce tey are very long and random. Furtermore bot paword and cryptograpc key are unable to provde non-repudaton becaue tey can be forgotten lot or wen tey are ared wt oter people tere no-way to know wo actual uer [10]. Terefore bometrc key are propoed wc are baed on pyologcal and beavoral caractertc of peron uc a fngerprnt face re and geometry and palm prnt etc. ome advantage of bometrc key are decrbed a follow [11]: Bometrc key cannot be lot or forgotten. Bometrc key are very dffcult to copy or are. Bometrc key are extremely ard to forge or dtrbute Bometrc key cannot be gueed ealy. omeone bometrc not eay to break tan oter. A a reult bometrc-baed uer autentcaton are nerently more relable and ecure tan uual tradtonal uer autentcaton ceme. In 010 Yuan et al. [1] propoe te frt bometrc-baed uer autentcaton ceme for WN. Ter ceme very effcent nce only te a functon ued n t. However Yoon et al. [1] ponted out tat Yuan et al. ceme vulnerable to te nder attack uer mperonaton attack GWnode mperonaton attack and enor node mperonate attack. To mprove ecurty Yoon et al. propoed an mproved ceme and clamed ter ceme could wttand varou attack. In t paper we wll demontrate tat Yoon et

3 al. ceme vulnerable to te denal-of-ervce attack (Do) and te enor node mperonaton attack. We alo propoe an mproved ceme to overcome te weaknee n Yoon et al. ceme. Te ret of t paper organzed a follow. ecton revew te concept of Yoon et al. ceme and ecton dcue t weakne analy. ecton 4 ow te detal of our propoed ceme wle ecton 5 demontrate te ecurty analy of our propoed ceme. ecton 6 compare te performance of te related ceme. Fnally ecton 7 conclude t paper.. Revew of Yoon et al. ceme In t ecton we wll revew Yoon et al. ceme. For convenence te notaton ued trougout t paper are ummarzed a follow: : te t uer; ID PW repectvely; B : GW node : te gateway node of WN; : te t enor node; dentty paword and bometrc template ID : dentty; d() : ymmetrc parametrc functon; τ : predetermned treold for bometrc verfcaton; Ek () : a ymmetrc encrypton functon wt key k ; Dk () : te decrypton functon correpondng to Ek ( ) ; () : ecure one-way a functon; :bt-we excluve-or(xor) operaton; : concatenaton operaton; Yoon et al. ceme nclude tree pae: regtraton pae logn pae and autentcaton pae. Tey are decrbed a follow..1. Regtraton pae In t pae template lcene to ubmt a value of dentty ID and bometrc B to GW node n a ecure manner. Ten GW node ue a. Te detaled tep a own n Fg. 1 are depcted a follow:

4 1). nput bometrc B on te pecfc devce compute E = ( ID B) and end ID and E to te GW node n a ecure manner. ). On recevng ID and E te GW node compute R = ID ( x) E and W = ( ID y) E were ecret nformaton x known to only GW GW node and y a ecret parameter generated by node and tored n ome degnated enor node before te node n te feld are deployed. ). GW node generate a mart card wt parameter ID E R W () d( ) and τ were d( ) a ymmetrc parametrc functon and τ a predetermned treold [14] for bometrc verfcaton... Logn pae Wen Fg. 1. Regtraton pae of Yoon et al. ceme enter B n order to delver ome query to or acce data from te network a own Fg. te mart card mut perform te followng tep to valdate te legtmacy of. 1). nert mart card nto te card reader and nput B on te pecfc devce. ). Te mart card compute E = ( ID B) and read E from te mart card. If de ( E) τ ten te mart card top te eon. Oterwe te mart card compute D = R E F = W E and V = ( D F T) were T te current tmetamp. ) end te logn meage M1 = ( ID V T) to GW node... Autentcaton pae Wen GW node receve te logn meage M 1 at tme T t wll perform te followng tep to autentcate. 4

5 1). GW node ceck te frene of T by verfe weter te equaton T T Δ T old. If te equaton old GW node top te eon were Δ T te expected tme nterval for te tranmon delay. ). GW node compute D = ( ID x) F = ( ID y) and V = ( D F T). Ten GW node ceck weter V and V are equal. If tey are not equal GW node top te eon. Oterwe GW node compute V = ( ID ID F T ) and end te meage M = ( ID V T ) g g g g to were T g te current tmetamp. ). pon recevng te meage M ceck te frene of T g by verfe weter te equaton T Tg Δ T old were T te tme receve M. If te equaton old expected tme nterval for te tranmon delay. top te eon were Δ T te 4). ceck weter V g and ID ( ID ID ( y) T g) are equal. If tey are not equal top te eon key. Oterwe compute V = ( ID ( ID y) RM T) and end M = ( RM V T ) to were T te current tmetamp and RM repond. 5). pon recevng te meage M verfe weter te equaton receve M. If te equaton old expected tme nterval for te tranmon delay. ceck te frene of T by T T Δ T old were T te tme top te eon were Δ T te 6). ceck weter V and ID ( F RM T ) are equal. If tey are not equal meage RM. top te eon key. Oterwe accept te repone 5

6 Fg.. Logn and autentcaton pae of Yoon et al. ceme. Cryptanaly of Yoon et al ceme.1. Denal-of-ervce attack One of te fundamental properte of a ecure one-way a functon tat te output are very entve to mall perturbaton n ter nput. Te cryptograpc a functon cannot be appled tragtforwardly wen te nput data are wt noy uc a bometrc [15]. Ten te predetermned treold for bometrc verfcaton cannot be ued to meaure output of a functon. In regtraton pae of Yoon et al. ceme te uer compute E = ( ID B) baed on dentty ID and peronal bometrc template Te a value B. E tored n te mart card for purpoe of autentcaton. However te autentcaton procedure may reult n erou flaw becaue de ( E) < τ may never ucceed nce te nputted bometrc belongng to te ame peron may dffer lgtly from tme to tme. Tu te condton de ( E) < τ may never ucceed due to bac property of te one-way a functon ( ). A a reult t may caue te legal uer unable to pa bometrc verfcaton at te logn pae of Yoon et al. ceme. Terefore Yoon et al. ceme vulnerable to te denal-of-ervce attack. 6

7 .. enor node mperonaton attack Generally peakng enor node are often deployed n a otle envronment [16]. Ten ome enor node may be captured by te adverary A. Once A capture a enor node + 1 e could extract te ecret key y troug te dfferental power attack [17 18]. Ten e could mperonate any oter legal enor node GW a follow. 1) A ntercept te meage M = ( ID Vg Tg) ent to by node. ) A forge a repond RM compute V = ( ID ( ID y) RM T ) and end M = ( RM V T ) to were It to ay receved meage ent by te node mperonaton attack. V could pa te verfcaton of 4. Propoed ceme T te current tmetamp.. Ten beleve tat te. Terefore Yoon et al. ceme vulnerable to To olve te weakne of Yoon et al. ceme we propoe a new bometrcbaed uer autentcaton ceme for WN. In order to execute te propoed framework we condered tat te gateway a truted node and t old two mater key ( x and y ) wc are uffcently large for te enor network. Before tartng te ytem t aumed tat a long-term ecret key ID ( y ) generated by gateway tored n enor node before te node deployed were ID te dentty of Regtraton pae Wen a uer want to regter and become a new legal uer a own n Fg. te followng tep are performed durng te uer regtraton pae. 1). generate a random number b freely cooe dentty paword enor. PW and alo mprnt peronal bometrc mpreon ID B at te ten nteractvely ubmt { ID B ( PW B b )} to GW node va ecure cannel. 7

8 ) GW node compute R = ID ( x) PW ( B b) were x a ecret key mantaned by GW node. Ten GW node wrte te ecure nformaton { R B ( ) d( ) τ} to te memory of mart card and ue t to troug a ecure cannel. ) pon recevng te mart card nput te random number b and fn te regtraton. 4.. Logn pae Wen Fg.. Regtraton pae of our ceme enter B n order to delver ome query to or acce data from te network a own Fg. 4 te mart card mut perform te followng tep to valdate te legtmacy of. 1). nert mart card nto te card reader and nput B * on te pecfc devce. ) If d B B * ( ) τ mart card reect te requet. Oterwe enter paword PW and dentty ID and ten te mart card generate a random number r and compute D = Z ( PW B b) k = ( D T) C = E ( ID r) were T te current tmetamp. k ) end te logn meage M1 = ( ID C T) to GW node... Autentcaton pae Wen GW node receve te logn meage M 1 at tme T t wll perform te followng tep to autentcate. 8

9 1). GW node ceck te frene of T by verfe weter te equaton T T Δ T old. If te equaton old GW node top te eon were Δ T te expected tme nterval for te tranmon delay. ). GW node compute D = ( ID x) k = ( D T) and ID r = Dk ( C). Ten GW node ceck weter ID and ID are equal. If tey are not equal GW node top te eon. Oterwe GW node compute k = ( ( ID y) T ) C = E ( ID r ) and end te meage g g g kg M = ( ID Cg Tg) to were T g te current tmetamp. ). pon recevng te meage M ceck te frene of T g by verfe weter te equaton T Tg Δ T old were T te tme receve M. If te equaton old top te eon were Δ T te expected tme nterval for te tranmon delay. 4). compute k g = ( D Tg) and ID r = Dk ( Cg). Ten ceck g weter ID and ID are equal. If tey are not equal top te eon. Oterwe compute V = ( ID r RM T ) and end M = ( RM V T ) to were T te current tmetamp and RM repond. 5). pon recevng te meage M verfe weter te equaton receve M. If te equaton old expected tme nterval for te tranmon delay. ceck te frene of T by T T Δ T old were T te tme top te eon were Δ T te 6). ceck weter V and ID ( r RM T ) are equal. If tey are not equal meage RM. top te eon key. Oterwe accept te repone 9

10 Fg. 4. Logn and autentcaton pae of our ceme 4. ecurty analy In t ecton we wll dcu te ecurty of our ceme a follow. Denal-of-ervce attack. In our ceme wen te uer nput bometrc * B te mart wll ceck te valdty of B * bye ceckng weter db B * ( ) τ old. Troug te work n [15] we know tat * B could pa te verfcaton of te mart card altoug tere ome lgt dfference between B * and B. Terefore our ceme could wttand denal-of ervce attack. enor mperonaton attack. Te adverary A may capture ome enor node + 1 and extract te ecret key ID ( + 1 y) troug te dfferental power attack [17 18]. He may ntercept te meage M = ( ID C T ) g g tranmtted to te enor node. However e cannot decrypt te meage C g nce e doe not ave ecret key ID ( y ). Ten e cannot generate a legal meage M = ( RM V T ). Terefore our ceme could wttand te enor mperonaton attack. 10

11 er mperonaton attack. uppoe an attacker want to forge a logn meage M1 = ( ID C T). However te attacker can not forge C wtout knowng D = ( ID x) or te mater key x. Terefore our ceme could wttand uer mperonaton attack. Gateway mperonaton attack. A long a an attacker doe not poe te ecret key ID ( y ) e cannot mperonate te gateway and cannot ceat te enor node nce e cannot generate legal C g. Hence t frutrate attacker to generate te vald meage M = ( ID C T ) to te enor node. Terefore our g g ceme could wttand gateway mperonaton attack. Mutual autentcaton. Our ceme provde mutual autentcaton were all entte (.e. uer gateway and enor node) are mutually autentcatng eac oter. More pecfcally wen GW node receve te meage M1 = ( ID C T) t can make ure tat weter te meage generated by troug ceckng weter te equaton ID = ID old. Wen te enor node receve meage M = ( ID C T ) t enure tat t meage generated by g g GW node troug ceckng weter te equaton ID = ID. Furtermore wen te uer receve meage M = ( RM V T ) e can alo confrm tat t meage generated by te enor node by ceckng weter te equaton V = ( ID r RM T ) old. Terefore our ceme could provde mutual autentcaton. Replay attack. Our ceme retant to replay attack becaue te autentcty of meage M 1 M and M are valdated by ceckng te frene of four tmetamp. Let aume an ntruder ntercept a logn requet meage M1 = ( ID C T ) and attempt to acce te enor node by replayng te ame meage M 1. Te verfcaton of t logn attempt fal nce te tme dfference expre (.e. T T Δ T ). mlarly f an ntruder ntercept a vald meage M = ( ID C T ) and attempt to replay t to te enor node te g g verfcaton requet wll fal at te enor node becaue of te tme dfference expre agan (.e. attack. T Tg Δ T ). Terefore our ceme could wttand replay 11

12 Man-n-te-mddle attack: Man-n-te-mddle attack mean tat an actve attacker ntercept te communcaton lne between a legal uer and te erver and ue ome mean to uccefully maquerade a bot te erver to te uer and te uer to te erver. Ten te uer wll beleve tat e talkng to te ntended erver and vce vera. From te above dcuon we know tat our ceme can provde mutual autentcaton ten our ceme could wttand man-n-temddle attack. tolen-verfer attack. An attacker wo teal te paword-verfer (e.g. aed paword) from te gateway can ue te tolen-verfer to mperonate a legal uer to logn to te ytem. Te propoed ceme free from te tolen verfer attack. Tere no uc nformaton tored at te erver by wc an adverary can make a fabrcated logn requet to mperonate a legal uer to logn te erver or can mperonate te gateway to ceat te legal uer and te enor node. Inder attack. It poble n a real-tme envronment wen te gateway manager or ytem admntrator can ue te uer paword paword) to mperonate te uer PW (e.g. weak troug any oter network gateway. In t cae our ceme doe not gve any room for prvleged nder nce n te regtraton pae te uer paword. Tu te nder of GW pang PW ( B b ) ntead of te plan node cannot get pw ealy. Here b a uffcently g entropy number wc not revealed to GW node. Furtermore te propoed ceme doe not tore any verfer table and can ret te nder attack. 5. Performance comparon For te convenence of evaluatng te computatonal cot we defne ome notaton a follow T : Te tme of executng a one-way a functon. T ym : Te tme of executng a ymmetrc encrypton/decrypton functon. In Table 1 we ummarze te performance reult of te propoed ceme. Accordng to Table 1 we know tat te uer te enor node and te gate way requre T +1T ym T +1T ym T +T ym eparately. It well known tat a one- 1

13 way a functon and a ymmetrc encrypton/decrypton functon a almot ame computatonal cot. Ten te computatonal cot of te uer te enor node and te gate way n our ceme are lgtly ger tan tat of Yuan et al. ceme and Yoon et al. ceme. However Yuan et al. ceme cannot wttand denal-of-ervce attack nder attack uer mperonaton attack gateway node mperonaton attack and enor node mperonaton attack. Bede Yoon et al. ceme vulnerable denal-of-ervce attack and enor node mperonaton attack. It acceptable to enance te ecurty at te cot of ncreang uer computaton cot lgtly. Ten our ceme more utable for WN. 6. Concluon Te paper demontrate tat Yoon et al. ceme vulnerable to te denalof-ervce attack and te enor node mperonaton attack. To overcome te ecurty vulnerablty we provde a new bometrc-baed uer autentcaton ceme for WN. Te analy ow te propoed ceme more uted to WN envronment. Reference [1] Akyldz I. u W. an Y. Cayrc E. A urvey on aenor network. IEEE Comm. Mag [] Benenon Z.; Gartner F.; Kedogan D. er Autentcaton n enor network (extended abtract). In Proceedng of te Informatk Jaretagung der Geellcaft fur Informatk Workop on enor Network lm Germany eptember 004. [] Benenon Z.; Gedcke N.; Ravo O. Realzng robut uer autentcaton n enor network. In Proceedng of te Workop on Real-World Wrele enor Network (REALWN 05) tockolm weden 0 1 June 005. [4] Wong K.H.M.; Zeng Y.; Cao J.; Wang. A dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Internatonal Conference on enor Network bqutou and Trutworty Computng (TC 06) Tacung Tawan 5 7 June 006. [5] Teng H.R.; Jan R.H.; Yang W. An mproved dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Global Communcaton Conference (GLOBECOM 07) Wangton DC A 6 0 November 007; pp [6] Lee T.H. mple dynamc uer autentcaton protocol for wrele enor network. In Proceedng of te nd Internatonal Conference on enor Tecnologe and Applcaton (ENORCOMM 08) Cap Eterel France 5 1 Augut 008; pp

14 [7] Ko L.C. A novel dynamc uer autentcaton ceme for wrele enor network. In Proceedng of te IEEE Internatonal ympoum on Wrele Communcaton ytem 008 IWC'08 Reykavk Iceland 1 4 October 008; pp [8] Vadya B.; Rodrgue J.J.P.C.; Park J.H. er autentcaton ceme wt peudonymty for ubqutou enor network n NGN. Internatonal Journal Communcaton ytem [9] Advanced Encrypton tandard /ttp://crc.nt.gov/encrypton/ae/. [10] L C. Hwang M.: An effcent bometrc-baed remote autentcaton ceme ung mart card Journal of Network and Computer Applcaton [11] Ln C. La Y.: A flexble bometrc remote uer autentcaton ceme Comput. tandard Interf (1) 19. [1] Yuan J. Jang C. Jang Z. A bometrc-baed uer autentcaton for wrele enor network Wuan nverty Journal of Natural cence vol. 15 no. pp [1] Yoon E. Yoo K. A New Bometrc-baed er Autentcaton ceme wtout ung Paword for Wrele enor Network 011 0t IEEE Internatonal Workop on Enablng Tecnologe: Infratructure for Collaboratve Enterpre [14] Inuma M. Otuka A. Ima H. Teoretcal framework for contructng matcng algortm n bometrc autentcaton ytem In proc. of ICB 009 LNC 5558 pp [15] Lnnartz J.-P. Tuyl P.: New eldng functon to enance prvacy and prevent mue of bometrc template. Proc. Audo and Vdeo-Baed Bometrc Peron Autentcaton 00 (LNC 688) pp [16] Perrg A tankovc J Wagner D ecurty n Wrele enor Network. Communcaton of te ACM (6):5-57. [17] P. Kocer J. Jaffe B. Jun Dfferental power analy Proceedng of Advance n Cryptology (CRYPTO 99) 1999 pp [18] T.. Meerge E.A. Dabb R.H. loan Examnng mart-card ecurty under te treat of power analy attack IEEE Tranacton on Computer 00; 51 (5):

15 Table 1. Performance comparon among dfferent ceme Computatonal (er) Computatonal (enor node) Computatonal (Gateway) cot cot cot Ret denal-ofervce attack Ret mperonaton attack uer Ret enor node mperonaton attack Ret gateway mperonaton attack Yuan et al. ceme[1] 4T 1T 4T Yoon et al. ceme [1] T T 4T Our ceme T +1T ym 4T T +1T ym T T +T ym 5T Ret nde attack Mutual autentcaton Ret replay attack Ret tolen-verfer attack Ret man-n-temddle attack 15

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Control and Coordination of Interactive Videoconferencing over Hybrid Networks

Control and Coordination of Interactive Videoconferencing over Hybrid Networks 1 of 5 ontrol and oordnaton of Interactve Vdeoconferencng over Hybrd Network Tng-hao Hou, horng-horng Yang., Yun-Sun hu, and Km-Joan hen epartment of Electrcal Engneerng Natonal hung heng Unverty 160,

More information

THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko

THE ANALYSIS AND OPTIMIZATION OF SURVIVABILITY OF MPLS NETWORKS. Mohammadreza Mossavari, Yurii Zaychenko Internatonal Journal "Informaton Theore & Applcaton" Vol5 / 28 253 TE ANALYSIS AND OTIMIATION OF SURVIVABILITY OF MLS NETWORS Mohammadreza Moavar, Yur aychenko Abtract: The problem of MLS network urvvablty

More information

Pass by Reference vs. Pass by Value

Pass by Reference vs. Pass by Value Pa by Reference v. Pa by Value Mot method are paed argument when they are called. An argument may be a contant or a varable. For example, n the expreon Math.qrt(33) the contant 33 paed to the qrt() method

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS

PERFORMANCE ANALYSIS OF PARALLEL ALGORITHMS Software Analye PERFORMANCE ANALYSIS OF PARALLEL ALGORIHMS Felcan ALECU PhD, Unverty Lecturer, Economc Informatc Deartment, Academy of Economc Stude, Bucharet, Romana E-mal: alecu.felcan@e.ae.ro Abtract:

More information

T1 Estimates SAT - 2006

T1 Estimates SAT - 2006 T1 Etmate SAT - 006 Tax and Lmoune Servce (TL) NAICS : 4853** by Javer Oyarzun BSMD Stattc Canada 007-1-1 1. Introducton 1.1 Ue of admntratve data Over the lat few year, Stattc Canada (STC) ha been accentuatng

More information

Abstract. 2.2. Adjusted PPM.

Abstract. 2.2. Adjusted PPM. Effectvene of Avance an Authentcate Packet Markng Scheme for Traceback of Denal of Servce Attack Blal Rzv an Emmanuel Fernánez-Gaucheran Department of Electrcal & Computer Engneerng &Computer Scence Unverty

More information

Development and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements

Development and use of prediction models in Building Acoustics as in EN 12354. 1 Introduction. 2 EN 12354, part 1 & 2. 2.2 Lightweight single elements evelopment and ue of predcton model n Buldng Acoutc a n EN 1354 Eddy TNO Scence and Indutry, P.O. Box 155, N-600 A elft, The Netherland, eddy.gerreten@tno.nl Improvng the acoutc clmate n buldng an mportant

More information

A Novel Architecture Design of Large-Scale Distributed Object Storage System

A Novel Architecture Design of Large-Scale Distributed Object Storage System Internatonal Journal of Grd Dtrbuton Computng Vol.8, No.1 (2015), pp.25-32 http://dx.do.org/10.14257/gdc.2015.8.1.03 A Novel Archtecture Degn of Large-Scale Dtrbuted Obect Storage Sytem Shan Yng 1 and

More information

E-learning Vendor Management Checklist

E-learning Vendor Management Checklist E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net

More information

Polarimetric parameters associated to commercial optical fibers

Polarimetric parameters associated to commercial optical fibers RESEARCH Revta Mexcana de Fíca 6 14 443 45 NOVEMBER-DECEMBER 14 Polarmetrc parameter aocated to commercal optcal fber O. J. Velae-Ecobar a, K. M. Sala-Alcántara b, R. Epnoa-Luna b,, G. Atondo-Rubo a, and

More information

Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes

Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 47 Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: sdx86@uow.edu.au

More information

An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications

An Integrated Resource Management and Scheduling System for Grid Data Streaming Applications An Integrated eource Management and Schedulng Sytem for Grd Data Streamng Applcaton Wen Zhang, Junwe Cao 2,3*, Yheng Zhong,3, Lanchen Lu,3, and Cheng Wu,3 Department of Automaton, Tnghua Unverty, Bejng

More information

Payback Period Estimation of Ground-Source and Air-Source Multi Heat Pumps in Korea Based on Yearly Running Cost Simulation

Payback Period Estimation of Ground-Source and Air-Source Multi Heat Pumps in Korea Based on Yearly Running Cost Simulation Purdue nverty Purdue e-pub Internatonal Refrgeraton and Ar ondtonng onference Scool of Mecancal Engneerng 00 Payback Perod Etmaton of Ground-Source and Ar-Source Mult Heat Pump n Korea Baed on Yearly Runnng

More information

A Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones

A Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones A Novel teganograpic Algoritm and Haing to Improve Autentication uing Mobile Pone G. umalata 1 & P. Maduravani 2 1 Dept. o IT, ree Nidi Intitute o cience & Tecnology 2 Dept. o CE Malla Reddy College o

More information

ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( )

ARTICLE IN PRESS. JID:COMAID AID:1153 /FLA [m3g; v 1.79; Prn:21/02/2009; 14:10] P.1 (1-13) Computer Aided Geometric Design ( ) COMAID:5 JID:COMAID AID:5 /FLA [mg; v 79; Prn:/0/009; 4:0] P -) Computer Aded Geometrc Degn ) Content lt avalable at ScenceDrect Computer Aded Geometrc Degn wwwelevercom/locate/cagd Fat approach for computng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Basic Principle of Buck-Boost

Basic Principle of Buck-Boost Bac Prncple of Buck-Boot he buck-boot a popular non-olated nvertng power tage topology, ometme called a tep-up/down power tage. Power upply degner chooe the buck-boot power tage becaue the requred output

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH

MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH . About Matcad MATHCAD'S PROGRAM FUNCTION and APPLICATION IN TEACHING OF MATH DE TING WU Depart of Mat Moreouse College Atlanta, GA.33, USA dtwu@moreouse.edu. Introducton Matcad s one of popular computer

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

CERTIFICATE OF ANALYSIS ERM -EB313 AlMg3

CERTIFICATE OF ANALYSIS ERM -EB313 AlMg3 n cooperaton wth the WG Alumnum of the Commttee of Chemt of GDB Date of ue: February 2006 (reved Aprl 2011) CERTIFICATE OF ANALYSIS ER -EB313 Alg3 Certfed Value Certfed value 1) Uncertanty 2) Element a

More information

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving

A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving A Novel Mult-factor Authentcated Key Exchange Scheme Wth Prvacy Preservng Dexn Yang Guangzhou Cty Polytechnc Guangzhou, Chna, 510405 yangdexn@21cn.com Bo Yang South Chna Agrcultural Unversty Guangzhou,

More information

REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012.

REVISTA INVESTIGACIÓN OPERACIONAL VOL., 33, NO. 3, 233-244, 2012. REVISA INVESIGACIÓN OPERACIONAL VOL., 33, NO. 3, 33-44,. ORDERING POLICY FOR INVENORY MANAGEMEN WHEN DEMAND IS SOCK- DEPENDEN AND A EMPORARY PRICE DISCOUN IS LINKED O ORDER UANIY Nta H. Shah Department

More information

The Design of Reliable Trust Management Systems for Electronic Trading Communities

The Design of Reliable Trust Management Systems for Electronic Trading Communities The Degn of Relale Trut Management Sytem for Electronc Tradng Communte Chryantho Dellaroca Sloan School of Management Maachuett Inttute of Technology Room E53-315 Camrdge, MA 02139 dell@mt.edu Atract:

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Hospital care organisation in Italy: a theoretical assessment of the reform

Hospital care organisation in Italy: a theoretical assessment of the reform Dartmento d Scenze Economche Unvertà d Breca Va S. Fautno 7/b 5 BESCIA Tel. 3 98885 Fax. 3 988837 e-mal: levagg@eco.unb.t otal care organaton n Italy: a theoretcal aement of the reform oella evagg Abtract.

More information

Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm

Multifunction Phased Array Radar Resource Management: Real-Time Scheduling Algorithm Journal of Computatonal Informaton Sytem 7:2 (211) 385-393 Avalable at http://www.jofc.com Multfuncton Phaed Array Radar Reource Management: Real-me Schedulng Algorm Janbn LU 1,, Hu XIAO 2, Zemn XI 1,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

2.23 Gambling Rehabilitation Services. Introduction

2.23 Gambling Rehabilitation Services. Introduction 2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority

More information

Advances in Military Technology Vol. 10, No. 1, June 2015

Advances in Military Technology Vol. 10, No. 1, June 2015 AM Avance n Mltary echnology Vol., No., June 5 Mechancal an Computatonal Degn for Control of a -PUS Parallel Robot-bae Laer Cuttng Machne R. Zavala-Yoé *, R. Ramírez-Menoza an J. Ruz-García ecnológco e

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

The issue of whether the Internet will permanently destroy the news media is currently a

The issue of whether the Internet will permanently destroy the news media is currently a Wll the Internet etroy the New Meda? or Can Onlne Advertng Market Save the Meda? by Suan Athey, Emlo Calvano and Johua S. Gan * Frt raft: October, 009 Th Veron: November, 00 PRELIMINARY PLEASE O NOT QUOTE

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Dynamic Control of Data Streaming and Processing in a Virtualized Environment

Dynamic Control of Data Streaming and Processing in a Virtualized Environment > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Dynamc Control of Data Streamng and Proceng n a Vrtualzed Envronment Junwe Cao, Senor Member, IEEE, Wen Zhang,

More information

JCS&T Vol. 11 No. 1 April 2011

JCS&T Vol. 11 No. 1 April 2011 Reversble Data Hdng Explotng Varance n Wavelet Coeffcents Xu-Ren Luo Department of Electrcal and Electronc Engneerng, Cung Ceng Insttute of Tecnology, Natonal Defense Unversty, Tas, Taoyuan 33509, Tawan,

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Coalition Formation for Sourcing Contract Design with Cooperative Replenishment in Supply Networks

Coalition Formation for Sourcing Contract Design with Cooperative Replenishment in Supply Networks Coalton Formaton for Sourcng Contract Degn wth Cooperatve Replenhment n Supply Network Shem Ben Jouda Saouen Krchen Wald Klb November 014 CIRRELT-014-61 Coalton Formaton for Sourcng Contract Degn wth Cooperatve

More information

New method for grain size characterization of a multi-crystalline silicon ingot

New method for grain size characterization of a multi-crystalline silicon ingot New method for gran ze characterzaton of a mult-crytallne lcon ngot Maxme Forter, Erwann Fourmond, Jean-Mare Lebrun, Roland Enhau, Jed Kraem, Mutapha Lemt To cte th veron: Maxme Forter, Erwann Fourmond,

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Modeling ISP Tier Design

Modeling ISP Tier Design Modelng ISP Ter Degn We Da School of Informaton and Computer Scence Unverty of Calforna, Irvne Irvne, CA, US daw1@uc.edu Scott Jordan School of Informaton and Computer Scence Unverty of Calforna, Irvne

More information

s-domain Circuit Analysis

s-domain Circuit Analysis S-Doman naly -Doman rcut naly Tme doman t doman near rcut aplace Tranform omplex frequency doman doman Tranformed rcut Dfferental equaton lacal technque epone waveform aplace Tranform nvere Tranform -

More information

Impact of the design method of permanent magnets synchronous generators for small direct drive wind turbines for battery operation

Impact of the design method of permanent magnets synchronous generators for small direct drive wind turbines for battery operation Impact o the degn method o permanent magnet ynchronou generator or mall drect drve wnd turbne or battery operaton Mha PREDESCU, Dr. eng.*, Aurelan CRǍCIUNESCU, Pro. Dr. **, Andre BEJINARIU, Eng.*, Octavan

More information

The Impact of the Internet on Advertising Markets for News Media

The Impact of the Internet on Advertising Markets for News Media The Impact of the Internet on Advertng Market for New Meda by Suan Athey, Emlo Calvano and Johua S. Gan * Frt Draft: October, 009 Th Veron: October 0 In th paper, we explore the hypothe that an mportant

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Coordinate System for 3-D Model Used in Robotic End-Effector

Coordinate System for 3-D Model Used in Robotic End-Effector AU JT 8(: 8 (Apr Codnate Sytem f D Model Ued n Robot EndEffer ulfqar Al Soomro Shool of Advaned Stude, Aan Inttute of Tehnology Pathum Than, Thaland Abtrat Th paper reve the onept of odnate ytem on new

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

The Cox-Ross-Rubinstein Option Pricing Model

The Cox-Ross-Rubinstein Option Pricing Model Fnance 400 A. Penat - G. Pennacc Te Cox-Ross-Rubnsten Opton Prcng Model Te prevous notes sowed tat te absence o arbtrage restrcts te prce o an opton n terms o ts underlyng asset. However, te no-arbtrage

More information

Netherlands Published online: 27 Jun 2013.

Netherlands Published online: 27 Jun 2013. Th artcle wa downloaded by: [Bblotheek TU Delft] On: 04 Noveber 2013, At: 08:09 Publher: Routledge Infora Ltd Regtered n England and Wale Regtered Nuber: 1072954 Regtered offce: Morter Houe, 37-41 Morter

More information

How To Understand Propect Theory And Mean Variance Analysis

How To Understand Propect Theory And Mean Variance Analysis Invetment Management and Fnancal Innovaton, Volume 6, Iue 1, 2009 Enrco De Gorg (Swtzerland ), Thorten Hen (Swtzerland) Propect theory and mean-varance analy: doe t make a dfference n wealth management?

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C.

ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C. ITS-90 FORMULATIONS FOR VAPOR PRESSURE, FROSTPOINT TEMPERATURE, DEWPOINT TEMPERATURE, AND ENHANCEMENT FACTORS IN THE RANGE 100 TO +100 C Bob Hardy Thunder Scentfc Corporaton, Albuquerque, NM, USA Abtract:

More information

GRADUATION PROJECT REPORT

GRADUATION PROJECT REPORT SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

Math 113 HW #5 Solutions

Math 113 HW #5 Solutions Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten

More information

Service Provider SIP trunk Validation Detailed Test Plan

Service Provider SIP trunk Validation Detailed Test Plan E Document Number EDC-827327 Based on emplate EDC-206096 Rev 35 Create By Cecly Lu ervce Provder P trunk Valdaton Detaled Plan odfcatons Revson Name User d Date Comments 1 ony Banuelos tbanuelo 11/2/2009

More information

Evidence for Adverse Selection in the Automobile Insurance Market

Evidence for Adverse Selection in the Automobile Insurance Market Evdence for Adverse Selecton n te Automoble Insurance Market Racel J. Huang * Assstant Professor, Fnance Department Mng Cuan Unversty, Tape, Tawan Larry Y. Tzeng Professor, Department of Fnance Natonal

More information

Tangent Lines and Rates of Change

Tangent Lines and Rates of Change Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims

More information

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure IJCSI International Journal of Computer Science Iue, Vol. 9, Iue, No, January 0 ISSN (Online): 694-084 www.ijcsi.org 3 Hole Detection for Increaing Coverage in Wirele Senor Network Uing Triangular Structure

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

A new look at atomic broadcast in the asynchronous. crash-recovery model

A new look at atomic broadcast in the asynchronous. crash-recovery model A new look at atomc broadcast n the asynchronous crash-recovery model Sergo Mena André Schper École Polytechnque Fédérale de Lausanne (EPFL) Dstrbuted Systems Laboratory CH-1015 Lausanne, Swtzerland Tel.:

More information

Practical Design Considerations for Next Generation High-Speed Data Wireless Systems

Practical Design Considerations for Next Generation High-Speed Data Wireless Systems Practcal Desgn Consderatons for ext Generaton Hgh-peed Data Wreless ystems ChngYao Huang and Hue Yuan u Wreless Informaton and Technology Lab Department of Electroncs Engneerng atonal Chao Tung Unversty

More information

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks 0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

How To Ensure That An Eac Edge Program Is Successful

How To Ensure That An Eac Edge Program Is Successful Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.

More information

ThresPassport A Distributed Single Sign-On Service

ThresPassport A Distributed Single Sign-On Service ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn

More information

1. Introduction. 2. Derivation of a time-discrete algorithm for a PID controller

1. Introduction. 2. Derivation of a time-discrete algorithm for a PID controller PID Controller Calulu for HERMS home-brewng ytem Introuton h oument erbe the ervaton of a PID ontroller that an be mplemente n the brew applaton he PID ontroller houl be apable of ontrollng the temperature

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Mall Cell Network - Power, Memory and Networking

Mall Cell Network - Power, Memory and Networking Slow admon and power control for mall cell network va dtrbuted optmzaton Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah To cte th veron: Sew Eng Na, Tony Q.S. Quek, Mérouane Debbah. Slow admon and power control

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

3C-Auth: A New Scheme for Enhancing Security

3C-Auth: A New Scheme for Enhancing Security Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan

More information

ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING

ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING ADVANCED SECURE USER AUTHENTICATION FRAMEWOR FOR CLOUD COMPUTING Ri Jiang School of Information Science and Engineering Sotheat Univerity, Jiang 210096 Nanjing, ChinaS Email: R.Jiang@e.ed.cn Sbmitted:

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163. Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Applying the Value/Petri Process to ERP Software Development in China

Applying the Value/Petri Process to ERP Software Development in China Applyng the Value/Petr Proce to ERP Software Development n Chna LGuo Huang Barry Boehm Computer Scence Department Unverty of Southern Calforna Lo Angele, CA 90089-0781, USA 001 213-740-6470 {lguohua, boehm}@

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Applying the Francis-Hunston Model to a one-to-one EFL conversation

Applying the Francis-Hunston Model to a one-to-one EFL conversation Unverty of Brmngam Centre for Engl Language Stude September 2006 Module 4 Claroom & Spoken Dcoure -------------------------------------------------------- Applyng te Franc-Hunton Model to a one-to-one

More information