How To Make A Secure Internet On A Physcal Nose (A Key Dstrbuton) System For A Secure Network On A Network On The Pc Or Macbook Or Ipa (Aipa) On A Pc Or Ipo (A

Size: px
Start display at page:

Download "How To Make A Secure Internet On A Physcal Nose (A Key Dstrbuton) System For A Secure Network On A Network On The Pc Or Macbook Or Ipa (Aipa) On A Pc Or Ipo (A"

Transcription

1 NOISE SECURED INTERNET Geraldo A. Barbosa QuantaSec, Consultng and Projects n Quantum Cryptography Ltd. Av. Portugal 1558, Belo Horzonte G Brazl. Emal: GeraldoABarbosa@hotmal.com (Dated: 18 January 2006.) arxv:quant-ph/ v3 28 Feb 2006 Ths work shows how a secure Internet can be mplemented through a fast key dstrbuton system that uses physcal nose to protect the transmtted nformaton. Startng from a shared random sequence K 0 between two (or more) users, long sequences R of random bts can be shared and not nvolvng a thrd party. The sgnals sent over the Internet are determnstc but have a bult-n Nature-made uncertanty that protects the shared sequences. After prvacy amplfcaton the shared R random bts encrypted by nose are subsequently utlzed n one-tme-pad data cpherng. The physcal generated protecton s not susceptble to advances n computaton or mathematcs. In partcular, t does not depend on the dffculty of factorng prme numbers as many cryptography systems rely on. KeyWords: Cryptography, Physcal Nose, Internet, Secret Key, No Thrd-Party, fast communcaton, amplfcaton allowed INTRODUCTION The Internet s currently the man communcaton vehcle for ctzens n general, banks and E-commerce. Protocols based on mathematcal complextes strve to offer a secure Internet whle hackers attempt to break n for profts. As a matter of fact, the exstng Internet offers only tenuous securty. Whle a few securty provders offer reasonable servce wthn the current technologcal landscape, they are vulnerable to technologcal advances. A search for new paradgms to establsh a secure Internet but not senstve to technologcal or mathematcal advances s ongong. Ths paper descrbes how to mplement a practcal secure communcaton system for the Internet whle avodng altogether protocols based purely on mathematcal complextes. Ths nose-encrypton system reles on laws of Nature but also avods sngle-photon state protocols such as BB84 [1]. Sngle-photon protocols cannot be amplfed and therefore do not work for the long-haul communcatons necessary for the Internet. Furthermore, sgnals from sngle-photon protocols cannot be converted from optcal to electrcal and back to optcal wthout loss of securty. Nor they are practcal for wavelength multplexng (WD). These steps are necessary to the Internet. Alternatve systems such as those usng dscrete or contnuous varable processes and relyng on homodyne measurements (e.g., Ref. [2]) are very senstve to nose, whch leads to low key rate transfer, and cannot work n the naturally dsturbed and complex Internet networks. In the proposed mplementaton of a secure Internet determnstc cphered sgnals go through arbtrary communcaton channels. They are cphered by random sgnals from physcal sources n nonorthogonal -ry bases. Ths system has evolved from a key dstrbuton system recently proposed [3, 4](See also [6] and [7]). Ths secure Internet dstrbutes determnstcally random sequences of bts to be utlzed n a fast one-tme-pad scheme. A smplfed but mperfect llustraton of ths system based on physcal nose would be a publc rado staton emtter A that changes ts carrer frequency n a very fast and truly random way. A user B who possesses a perfect knowledge of ths random varaton could set hs tuner to automatcally lock onto t. A clear sound or message would result. To an ntruder who does not possess any nformaton on the carrer varatons, only nose wll be detected. Actually, the presented cryptographc system does not rely on frequency varatons but on random jumps among dstnct nonorthogonal phase bases where the bts are nscrbed. Ths s as far as ths analogy goes. The securty of the key dstrbuton provded by ths system reles on a few ponts: 1) A shared secrecy by A and B on a startng key sequence K 0 and 2) a bt-by-bt uncertanty Nature-made nose N assocated to each bt R and recorded on a nterleaved -ry nonorthogonal bass. Knowledge of K 0 gves for the legtmate users the mappng of the bases jumps n the emtter and thus the bt R nscrbed on each bass. Prvacy amplfcaton procedures statstcally exclude the eventually compromsed fracton of shared bts. The sequences of random bts R wll be generated by a truly random process and sent oneby-one between users A (Alce) and B (Bob). The batch of shared secret bts R wll be used subsequently n onetme-pad cpherng. The nose N protects each bt R from the attacker E (Eve) and provdes the nformaton securty level assocated wth all shared R. Whle ths nose-secured Internet s logcally equvalent to the optcal system dscussed on Refs. [3] and [4] t has a major dstnctve feature: In Ref. [3] the nose arses as part of the sgnal measurement by the attacker and

2 2 s nherent to the optcal feld n a fber channel. Here the sgnal sent over the network s a recorded sgnal and, as such, t s determnstc but contans bt nformaton R and the assocated nose N. Ths s equvalent to recordng the results of an exceedngly nosy experment and gvng them to two researchers for nterpretaton: one that knows how to subtract the nose and the other one, the attacker, that cannot get rd of the nherent nose. BASIC SCHEE The sgnals are created by a physcal random generator (PhRG). The nose N assocated wth the bt R nscrbed onto the -ry nonorthogonal bass ( 2) produces the uncertanty measured by the attacker. Ths mples that the the emtter has to be equpped to detect and record the sgnals generated by the PhRG. In other words, the defnton of the measurng system s made by the emtter, not the attacker. The sgnal sent s the sgnal controlled and measured by the emtter wth a detecton system of hs choce. No restrctons are placed on the attacker to obtan the exchanged sgnals on a publc channel. She may obtan perfect copes of the transmsson. The sgnals emtted by the legtmate user obey constrants mposed to provde full securty. Among the advantages of the proposed system are: 1) Any publc channel may be used for transmsson (optcal fbers, TV, mcrowave, and so on); 2) The determnstc sgnals can be amplfed wth no securty loss; 3) Sgnals can be converted from electromagnetc to electrcal and back to electromagnetc wth no securty loss; 4) Wavelength multplexng s allowed on the network; 5) Current Network and IP protocols can be used wth no modfcatons for users n any IP classes. Fg. 1 shows a block dagram for one cycle of the key dstrbuton system. It descrbes how legtmate users A and B dstrbute or transfer fresh random key bts generated by a PhRG (to be descrbed ahead). Just to be more general, a descrpton startng wth a ry system of levels wll be presented. At the end, ths system wll be smplfed for a speed-up n the communcaton process wth no securty loss. A and B share a startng random key sequence (#1) desgnated by K 0 (#2) of length L (See Fg. 1). These L bts are dvded nto blocks of sze k (b(k ), b(k 1 ),...b(k 1 )) and each block defnes randomly a bass k 0 over a nonorthogonal set of bases on a cpherng wheel (#3) wth bases, where = 2 k. k 0 = b(k )2 k 1 b(k 1 )2 k 2...b(k 1 )2 0. (1) Gven a k 0 value (#4), a bt 0 could be nscrbed, e.g., n a unform cpherng wheel such as the one shown n Ref. [3] where the phase values defnng each bass are k PhR G #1 #2 N σ N σ #2 K 0 K 0 #3 #4 #4 #3 L k 0 k Y1 = R1 N1 k 0 #6 0 R 1 #8 N 1 R1 N1 #7 #9 #10 ( πk φ, πr ϕ, πn φ ) A #5 k b N #6 #11 R 1 k 1 #16 R N 2 2? R 2 Y = R N k #15 #13 #17 #8 #6 #11 B 0 11 GABarbosa 12 July ? R 1 k 1 R 2 N 2 K R, R,... R, R,... #13 #14 k PhR G FIG. 1: A sketch of one cycle of operatons of the key dstrbuton process n the Nose Secured Internet s shown. gven by φ k0 = π [ k0 1 ] ( 1)k0, k 0 = 0, 1,... 1, (2) 2 and a bt 1 wll be nscrbed dsplaced by π wth respect to bt 0 over each bass. A PhRG (#5) generates random bts R 1 (#6) that A would lke to transfer securely to B. These sgnals contan nose N 1 (#7) wth a natural phase dstrbuton (e.g., Gaussan dstrbuted) of wdth σ φ. R 1 can be understood n phase unts (rd): values 0 or π for bts 0 and 1. The Gaussan dstrbuton wdth σ φ (Set such that σ φ < π/2) may be wrtten σ φ = πn σφ / where N σ s the number of bases covered by N (See Ref. [3]). The sgnal to be sent over the generc Internet communcaton channel (#8) (network and servers) s Y 1 = R 1 N 1 k 0. The combned effects of N 1 k 0 s to hde the bt value R 1 on the cpherng wheel (#9). Although contanng random nformaton Y 1 s a determnstc sgnal and as such can be amplfed and converted nto dfferent sgnals through arbtrary nodes wthout any loss of securty. B has to extract R 1 from Y 1. To ths end he utlzes the same sequences from K 0 utlzed by A to generate the base values k 0 (#4). He subtracts ths value from Y 1 and obtans R 1 N 1 (#10) and obtan sgnals n bnary bases (sngle k value). The effect of the nose N 1 on Bob s bnary bass s neglgble because σ φ < π/2 and hs decson on the bt value s easy; therefore, he obtans R 1 (#6). From the receved sequence R he forms bt blocks of length k and constructs a new base sequence k 1. The next steps are smlar to the frst ones. Bob s PhRG (#12) generates sgnal contanng bts R 2 (#13) assocated to nose N 2 (#14). The sgnal Y 2 = R 2 N 2 k 1 s sent over the communcaton channel (#8). The bt value #12 k

3 3 R 2 s hdden by the overall nose N 2 k 1 (#15). From her knowledge of R 1 (#6) and, therefore, k 1 (#14), Alce subtracts k 1 from Y 2 and obtans R 2 N 2 (#16). On her bnary bass she easly obtans R 2 (#13). The frst cycle s complete. A and B contnue to exchange random sequences as n the frst cycle. The shared sequences (R 1,..., R 2,...), after a prvacy amplfcaton process, are the random bts to be subsequently utlzed for one-tmepad cpher. Note that whle for noseless sgnals Y 1 = b and Y 2 = b carryng a repeated bt b, one has Y 1 Y 1 = 0, nosy sgnals gve Y 1 = b N 1 and Y 1 = b N 2 and, therefore, Y 1 Y 1 = N 1 N 2 (= 0 or1). Ths frustrates several correlaton attacks. SOE SECURITY CONSIDERATIONS Securty analyses were presented for the purely optcal counterparts of ths -ry key dstrbuton system for Internet and are equally vald here. Ref. [3] presented a bt-by-bt analyss and [5] showed that the attacker s ntal uncertanty on the whole sequence of shared bts s equal to her uncertanty of the startng shared sequence K 0. Ths dependence on the frst key shared key sequence K 0 can be seen from the mutual nformaton, defned by I(R : Y (R)) = H(R) H(R Y (R)). (3) I(R : Y (R)) s used to wrte the dfference between the mutual nformaton between B and E n one cycle of length L: I = I B I E = [H(R) H(R Y B (R))] [H(R) H(R Y E (R))] = H(R Y E (R)) H(R Y B (R)). (4) Eve s uncertanty on R gven Y E (R) s maxmal (H(R Y E (R)) L) whle Bob may obtan the whole sequence R from Y B : H(R Y B (R)) = 0. Therefore, I L n the frst cycle. Applyng the chan rule H(L 1, L 2,..., L n Y E ) = one may see that H(L 1, L 2,..., L n Y E ) = n H(L Y, L 1,..., L 1 ), (5) =1 =H(L 1 Y E ) H(L 2 Y E, L 1 ) H(L 3 Y E, L 1, L 2 ).. (6) If the startng key (K 0 wth length L = L 1 ) s open to Eve, she obtans L 2 (H(L 2 Y E, L 1 ) = 0) n the same way as Bob and also obtans all keys n the subsequent rounds. The nose level superposed to the bts sent are desgned to hde each L j from the attacker. Prvacy amplfcaton a necessary step appled to the shared bts dscards nformaton eventually leaked to the attacker and defnes the fnal shared length of secure bts. laser detector NDF V V V V sgn = V V V = V, V = ± V π R φ ref V R V K0 φ mod PhRG FIG. 2: Sketch of PhRG wth a coherent lght source. Ths modulus can be added externally or externally to a computer. The laser beam s dvded by a beam spltter. The upper part shows a detectng system where sgnals V are generated correspondng to the sgn of the generated sgnal wth respect to the average sgnal ntensty. These bnary sgnals are converted nto bnary voltages V R = ±V π that consttute fresh random bts to be shared by A and B. The bottom part shows an nterferometer wth an optcal phase modulator (φ mod) n one of the arms. The laser beam s adjusted to an adequate ntensty by a neutral densty flter (or automatzed flter). Voltage values V K0 defnng -ry phase bases (e.g, = 2) are added to V R and appled to the phase modulator. Detectors at the nterferometer output produce the phase sgnals carryng bass, bt and nose nformaton shown n Fg. 1 as Y. THE PHYSICAL RANDO GENERATOR Fg. 2 sketches the PhRG and the nput V K0 contanng recorded bases nformaton. The PhRG generate voltage sgnals correspondng to bts V R. These sgnals are added to the bass nformaton suppled by V K0 and suppled to a phase modulator n one arm of an optcal nterferometer. Output lght s detected and converted to phase sgnals (wth respect to the laser feld) that also contan phase nose assocated wth coherent lght. These sgnals are wrtten Y n Fg. 1. As shown n Refs. [3] and [4], ths phase modulaton of coherent sgnals produce sgnals that carry a phase uncertanty gven by the Gaussan dstrbuton p u e ( φ)2 /2σ 2 φ, (7) where σ φ = 2/ n and n s the average number of photons n one bt. Whle several desgn varatons are possble, Fg. 2 shows basc parts to be consdered. For secure transmsson of sgnals the physcal randomness s necessary as no known mathematcal algorthm has been proven to generate true random numbers. Several physcal sources may be used alternatvely such as optcal or thermal sources. However, optcal sources can be much faster than the thermal ones and are therefore necessary

4 4 when speed s requred. A PhRG can be seen as modulus that can be hooked (nternally or externally) to a computer lnked to the Internet ether n dedcated use or open to users such as n a cybercafe. In such a publc system users may generate and record on portable memores a batch of secure keys or use them to exchange one-tme-pad cphered nformaton. One may also wonder about the cost of a brute force attack to determne the startng key K 0 from the transmtted sgnals. Under the assumpton that the uncertanty presented to the attacker covers N σ bases, the attacker would know that the bass k used n a gven transmsson s around a gven regon wthn the uncertanty N σ. For a -ry system of unformly spaced bases ths amounts that only a set of less relevant bts b(k σ ) n Eq. (1) hde the correct bass. These b(k σ ) bts could be permutated n b(k σ )! ways. As each bt could be ether 0 or 1 the total number of permutatons to be searched for each bt emsson would be (log 2 N σ )!N σ. For the total number of K 0 bts the number of combnatons would be C = 2 K0 (log 2 N σ )!N σ. (8) Under ths example of a unform cpherng wheel exemplfed by Eq. (2), t s understood that the attacker may know the fracton 1 (N σ /) of the total number of shared bts k used by A and B to cpher a fresh generated bt. For a sequence of L shared bts, Eve may obtan L[1 (N σ /)] bts among L because they were not covered by nose. These bts have to be subsequently dscarded by A and B through prvacy amplfcaton processes. SIPLIFIED BASES Use of a non-unform set of bases leads to a more economcal system: nstead of a unformly spaced crcle of phases gven by Eq. (2) one may use just a sector of phase values where the number of bases s just = 2. See Fg. 3. The sector wdth or bases separaton s made less than 2N σ. Therefore, all bases wll be wthn the phase fluctuatons caused by the nose N j. Phase postons on ths sector are gven by φ k0 = [ k 0 φ 1 π 1 ( 1)k0 2 ], k 0 = 0, 1. (9) Wth ths sector of phase bases the number of possble combnatons for a brute force attack searchng for all possbltes that may lead to K 0 s C = 2 2 K0. Reasonable K 0 lengths could be, say, 10 6, 10 9 ; they gve a number of combnatons C to be tred that s not computatonally feasble. Ref. [4] derved explct equatons for the mutual nformaton of the process and showed numercal examples to quantfy securty n terms of the dfference of the mutual nformaton functons for A and B and A and E 2σ φ = 2 2/ n k = 0 k = 1 FIG. 3: A cpherng set of bases n a phase sector wth = 2. σ φ s the standard devaton n the phase caused by fluctuatons n the lght feld. φ 1 s the spacng between two bases and should be kept φ 1 π/2. n s adjusted so that π/2 > σ φ φ 1, e.g. n < 100. Two states or bts can be nscrbed on each bass. Dark crcles ndcate postons for a bt 0 and open crcles gve possble postons for a bt 1. (I AE = ǫi AB, ǫ 1). As has also been shown, the securty of one sequence sent depends on the secrecy of the former sequence receved. Ths s an a-pror condton over whch I AB > I AE follows. Statstcally, the attacker may acqure some bts correctly and the legtmate users have to use prvacy amplfcaton protocols to elmnate that possble amount of nformaton acqured by Eve. Prvacy amplfcaton randomly reduce the number of bts to elmnate possble nformaton leaked to Eve. A and B are able to share a large number of random sequences R K 0 before the bt reconclaton and prvacy amplfcaton steps severely shorten the length L of the sequences. These length reductons lead to a slow down of the process and eventually to ts halt. A convenent mnmum length L mn can be chosen so that a new fresh sequence K 0 restarts the whole process. See Ref. [4] for a dscusson on the dstllaton process. The amount of possble leakage can be estmated usng mutual nformaton functons as shown n Ref. [4]. It was shown that a fracton 1 f (f n the example gven) could be compromsed n every cycle; therefore, 0.1% should be elmnated by prvacy amplfcaton protocols. As a result, the remanng fracton f of bts n every cycle s secure. A and B then succeed after many cycles n sharng a number of secure bts much larger than the ntal shared sequence K 0. Wth the example gven n Ref. [4], after sharng 10 3 L bts, 660L (66%) wll be dstlled by prvacy amplfcaton. Renewal of fresh startng sequences K 0 was dscussed n Refs. [3] and [4]. Ancent methods such as hand-to-hand delvery and steganography could be used for some applcatons. Even certfed key provders may be acceptable for some uses. The slow BB84 key dstrbuton process could also be used to φ 1

5 5 dstrbute the startng sequences K 0 wth proven securty; the speed of the key dstrbuton process wll then boosted by the Nose Secured Internet system descrbed here. CONCLUSIONS It has been shown that two (or more) Internet users startng from a shared secret sequence of random bts K 0 and addng a smple hardware modulus (PhRG) to ther computers wll succeed n generatng a large number of secret keys to be used n one-tme-pad cpher. The system works at optcal speed and does not requre any specal Internet protocol. Sgnals assocated wth nose are generated n the PhRG and the sgnals to be sent are determnstc ones. The assocated securty s not related to protocols based on mathematcal complextes n current use. Ths system s proposed as a possble new paradgm for a secure Internet. Emal: geraldoabarbosa@hotmal.com Phone: Brazl(31) Conf. on Computers, Systems, and Sgnal Processng, Bangalore, Inda, 1984, pp. 175 to 179. [2] F. Grosshans and P. Granger, Contnuous Varable Quantum Cryptography Usng Coherent States, Phys. Rev. Lett. vol. 88, (2002) pp to to [3] G. A. Barbosa, Fast and secure key dstrbuton usng mesoscopc coherent states of lght, Phys. Rev. A vol. 68, (2003) pp to US Pat. Appl. 11/000,662, Publ. No. US2005/ A1. [4] G. A. Barbosa, Informaton theory for key dstrbuton systems secured by mesoscopc coherent states, Phys. Rev. A vol. 71, (2005) pp to [5] G. A. Barbosa, Fast and secure key dstrbuton usng mesoscopc coherent states of lght, quant-ph/ v4 28 Apr 2004 pp. 1 to 10. [6] G. A. Barbosa, E. Corndorf, P. Kumar, H. P. Yuen, Secure communcaton usng mesoscopc coherent states, Phys. Rev. Lett. 90, (2003) pp to [7] E. Corndorf, G. A. Barbosa, C. Lang, H. P. Yuen, P. Kumar, Hgh-speed data encrypton over 25km of fber by two-mode coherent-state quantum cryptography, Opt. Lett. 28, (2003) pp Quantum Cryptography wth Coherent-state Lght: Demonstraton of a Secure Data Encrypton Scheme Operatng at 100kb/s; G. A. Barbosa, E. Corndorf, and P. Kumar, Quantum Electroncs and Laser Scence Conference, OSA Techncal Dgest, Vol. 74, (2002) pp [1] C. Bennett, G. Brassard, Quantum cryptography, Publc key dstrbuton and con tossng, n Proc. IEEE Int.

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Quantization Effects in Digital Filters

Quantization Effects in Digital Filters Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

The circuit shown on Figure 1 is called the common emitter amplifier circuit. The important subsystems of this circuit are:

The circuit shown on Figure 1 is called the common emitter amplifier circuit. The important subsystems of this circuit are: polar Juncton Transstor rcuts Voltage and Power Amplfer rcuts ommon mtter Amplfer The crcut shown on Fgure 1 s called the common emtter amplfer crcut. The mportant subsystems of ths crcut are: 1. The basng

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Section C2: BJT Structure and Operational Modes

Section C2: BJT Structure and Operational Modes Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM

GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: jean-perre.barrot@cnes.fr 1/Introducton The

More information

QUESTIONS, How can quantum computers do the amazing things that they are able to do, such. cryptography quantum computers

QUESTIONS, How can quantum computers do the amazing things that they are able to do, such. cryptography quantum computers 2O cryptography quantum computers cryptography quantum computers QUESTIONS, Quantum Computers, and Cryptography A mathematcal metaphor for the power of quantum algorthms Mark Ettnger How can quantum computers

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS. STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Secure Network Coding Over the Integers

Secure Network Coding Over the Integers Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

A machine vision approach for detecting and inspecting circular parts

A machine vision approach for detecting and inspecting circular parts A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Optical Measurement of the Speed of Sound in Air Over the Temperature Range 300-650 K

Optical Measurement of the Speed of Sound in Air Over the Temperature Range 300-650 K NASA/CR-2000-210114 ICASE Report No. 2000-20 Optcal Measurement of the Speed of Sound n Ar Over the Temperature Range 300-650 K Roger C. Hart ICASE, Hampton, Vrgna R. Jeffrey Balla and G.C. Herrng NASA

More information

New Solutions for Substation Sensing, Signal Processing and Decision Making

New Solutions for Substation Sensing, Signal Processing and Decision Making Proceedngs of the 37th Hawa Internatonal Conference on System Scences - 2004 New Solutons for Substaton Sensng, Sgnal Processng and Decson Makng M. Kezunovc, Fellow IEEE Texas A&M Unversty Department of

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté

More information

Optical Signal-to-Noise Ratio and the Q-Factor in Fiber-Optic Communication Systems

Optical Signal-to-Noise Ratio and the Q-Factor in Fiber-Optic Communication Systems Applcaton ote: FA-9.0. Re.; 04/08 Optcal Sgnal-to-ose Rato and the Q-Factor n Fber-Optc Communcaton Systems Functonal Dagrams Pn Confguratons appear at end of data sheet. Functonal Dagrams contnued at

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

HALL EFFECT SENSORS AND COMMUTATION

HALL EFFECT SENSORS AND COMMUTATION OEM770 5 Hall Effect ensors H P T E R 5 Hall Effect ensors The OEM770 works wth three-phase brushless motors equpped wth Hall effect sensors or equvalent feedback sgnals. In ths chapter we wll explan how

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information