How To Make A Secure Internet On A Physcal Nose (A Key Dstrbuton) System For A Secure Network On A Network On The Pc Or Macbook Or Ipa (Aipa) On A Pc Or Ipo (A
|
|
- Gwen Baker
- 3 years ago
- Views:
Transcription
1 NOISE SECURED INTERNET Geraldo A. Barbosa QuantaSec, Consultng and Projects n Quantum Cryptography Ltd. Av. Portugal 1558, Belo Horzonte G Brazl. Emal: GeraldoABarbosa@hotmal.com (Dated: 18 January 2006.) arxv:quant-ph/ v3 28 Feb 2006 Ths work shows how a secure Internet can be mplemented through a fast key dstrbuton system that uses physcal nose to protect the transmtted nformaton. Startng from a shared random sequence K 0 between two (or more) users, long sequences R of random bts can be shared and not nvolvng a thrd party. The sgnals sent over the Internet are determnstc but have a bult-n Nature-made uncertanty that protects the shared sequences. After prvacy amplfcaton the shared R random bts encrypted by nose are subsequently utlzed n one-tme-pad data cpherng. The physcal generated protecton s not susceptble to advances n computaton or mathematcs. In partcular, t does not depend on the dffculty of factorng prme numbers as many cryptography systems rely on. KeyWords: Cryptography, Physcal Nose, Internet, Secret Key, No Thrd-Party, fast communcaton, amplfcaton allowed INTRODUCTION The Internet s currently the man communcaton vehcle for ctzens n general, banks and E-commerce. Protocols based on mathematcal complextes strve to offer a secure Internet whle hackers attempt to break n for profts. As a matter of fact, the exstng Internet offers only tenuous securty. Whle a few securty provders offer reasonable servce wthn the current technologcal landscape, they are vulnerable to technologcal advances. A search for new paradgms to establsh a secure Internet but not senstve to technologcal or mathematcal advances s ongong. Ths paper descrbes how to mplement a practcal secure communcaton system for the Internet whle avodng altogether protocols based purely on mathematcal complextes. Ths nose-encrypton system reles on laws of Nature but also avods sngle-photon state protocols such as BB84 [1]. Sngle-photon protocols cannot be amplfed and therefore do not work for the long-haul communcatons necessary for the Internet. Furthermore, sgnals from sngle-photon protocols cannot be converted from optcal to electrcal and back to optcal wthout loss of securty. Nor they are practcal for wavelength multplexng (WD). These steps are necessary to the Internet. Alternatve systems such as those usng dscrete or contnuous varable processes and relyng on homodyne measurements (e.g., Ref. [2]) are very senstve to nose, whch leads to low key rate transfer, and cannot work n the naturally dsturbed and complex Internet networks. In the proposed mplementaton of a secure Internet determnstc cphered sgnals go through arbtrary communcaton channels. They are cphered by random sgnals from physcal sources n nonorthogonal -ry bases. Ths system has evolved from a key dstrbuton system recently proposed [3, 4](See also [6] and [7]). Ths secure Internet dstrbutes determnstcally random sequences of bts to be utlzed n a fast one-tme-pad scheme. A smplfed but mperfect llustraton of ths system based on physcal nose would be a publc rado staton emtter A that changes ts carrer frequency n a very fast and truly random way. A user B who possesses a perfect knowledge of ths random varaton could set hs tuner to automatcally lock onto t. A clear sound or message would result. To an ntruder who does not possess any nformaton on the carrer varatons, only nose wll be detected. Actually, the presented cryptographc system does not rely on frequency varatons but on random jumps among dstnct nonorthogonal phase bases where the bts are nscrbed. Ths s as far as ths analogy goes. The securty of the key dstrbuton provded by ths system reles on a few ponts: 1) A shared secrecy by A and B on a startng key sequence K 0 and 2) a bt-by-bt uncertanty Nature-made nose N assocated to each bt R and recorded on a nterleaved -ry nonorthogonal bass. Knowledge of K 0 gves for the legtmate users the mappng of the bases jumps n the emtter and thus the bt R nscrbed on each bass. Prvacy amplfcaton procedures statstcally exclude the eventually compromsed fracton of shared bts. The sequences of random bts R wll be generated by a truly random process and sent oneby-one between users A (Alce) and B (Bob). The batch of shared secret bts R wll be used subsequently n onetme-pad cpherng. The nose N protects each bt R from the attacker E (Eve) and provdes the nformaton securty level assocated wth all shared R. Whle ths nose-secured Internet s logcally equvalent to the optcal system dscussed on Refs. [3] and [4] t has a major dstnctve feature: In Ref. [3] the nose arses as part of the sgnal measurement by the attacker and
2 2 s nherent to the optcal feld n a fber channel. Here the sgnal sent over the network s a recorded sgnal and, as such, t s determnstc but contans bt nformaton R and the assocated nose N. Ths s equvalent to recordng the results of an exceedngly nosy experment and gvng them to two researchers for nterpretaton: one that knows how to subtract the nose and the other one, the attacker, that cannot get rd of the nherent nose. BASIC SCHEE The sgnals are created by a physcal random generator (PhRG). The nose N assocated wth the bt R nscrbed onto the -ry nonorthogonal bass ( 2) produces the uncertanty measured by the attacker. Ths mples that the the emtter has to be equpped to detect and record the sgnals generated by the PhRG. In other words, the defnton of the measurng system s made by the emtter, not the attacker. The sgnal sent s the sgnal controlled and measured by the emtter wth a detecton system of hs choce. No restrctons are placed on the attacker to obtan the exchanged sgnals on a publc channel. She may obtan perfect copes of the transmsson. The sgnals emtted by the legtmate user obey constrants mposed to provde full securty. Among the advantages of the proposed system are: 1) Any publc channel may be used for transmsson (optcal fbers, TV, mcrowave, and so on); 2) The determnstc sgnals can be amplfed wth no securty loss; 3) Sgnals can be converted from electromagnetc to electrcal and back to electromagnetc wth no securty loss; 4) Wavelength multplexng s allowed on the network; 5) Current Network and IP protocols can be used wth no modfcatons for users n any IP classes. Fg. 1 shows a block dagram for one cycle of the key dstrbuton system. It descrbes how legtmate users A and B dstrbute or transfer fresh random key bts generated by a PhRG (to be descrbed ahead). Just to be more general, a descrpton startng wth a ry system of levels wll be presented. At the end, ths system wll be smplfed for a speed-up n the communcaton process wth no securty loss. A and B share a startng random key sequence (#1) desgnated by K 0 (#2) of length L (See Fg. 1). These L bts are dvded nto blocks of sze k (b(k ), b(k 1 ),...b(k 1 )) and each block defnes randomly a bass k 0 over a nonorthogonal set of bases on a cpherng wheel (#3) wth bases, where = 2 k. k 0 = b(k )2 k 1 b(k 1 )2 k 2...b(k 1 )2 0. (1) Gven a k 0 value (#4), a bt 0 could be nscrbed, e.g., n a unform cpherng wheel such as the one shown n Ref. [3] where the phase values defnng each bass are k PhR G #1 #2 N σ N σ #2 K 0 K 0 #3 #4 #4 #3 L k 0 k Y1 = R1 N1 k 0 #6 0 R 1 #8 N 1 R1 N1 #7 #9 #10 ( πk φ, πr ϕ, πn φ ) A #5 k b N #6 #11 R 1 k 1 #16 R N 2 2? R 2 Y = R N k #15 #13 #17 #8 #6 #11 B 0 11 GABarbosa 12 July ? R 1 k 1 R 2 N 2 K R, R,... R, R,... #13 #14 k PhR G FIG. 1: A sketch of one cycle of operatons of the key dstrbuton process n the Nose Secured Internet s shown. gven by φ k0 = π [ k0 1 ] ( 1)k0, k 0 = 0, 1,... 1, (2) 2 and a bt 1 wll be nscrbed dsplaced by π wth respect to bt 0 over each bass. A PhRG (#5) generates random bts R 1 (#6) that A would lke to transfer securely to B. These sgnals contan nose N 1 (#7) wth a natural phase dstrbuton (e.g., Gaussan dstrbuted) of wdth σ φ. R 1 can be understood n phase unts (rd): values 0 or π for bts 0 and 1. The Gaussan dstrbuton wdth σ φ (Set such that σ φ < π/2) may be wrtten σ φ = πn σφ / where N σ s the number of bases covered by N (See Ref. [3]). The sgnal to be sent over the generc Internet communcaton channel (#8) (network and servers) s Y 1 = R 1 N 1 k 0. The combned effects of N 1 k 0 s to hde the bt value R 1 on the cpherng wheel (#9). Although contanng random nformaton Y 1 s a determnstc sgnal and as such can be amplfed and converted nto dfferent sgnals through arbtrary nodes wthout any loss of securty. B has to extract R 1 from Y 1. To ths end he utlzes the same sequences from K 0 utlzed by A to generate the base values k 0 (#4). He subtracts ths value from Y 1 and obtans R 1 N 1 (#10) and obtan sgnals n bnary bases (sngle k value). The effect of the nose N 1 on Bob s bnary bass s neglgble because σ φ < π/2 and hs decson on the bt value s easy; therefore, he obtans R 1 (#6). From the receved sequence R he forms bt blocks of length k and constructs a new base sequence k 1. The next steps are smlar to the frst ones. Bob s PhRG (#12) generates sgnal contanng bts R 2 (#13) assocated to nose N 2 (#14). The sgnal Y 2 = R 2 N 2 k 1 s sent over the communcaton channel (#8). The bt value #12 k
3 3 R 2 s hdden by the overall nose N 2 k 1 (#15). From her knowledge of R 1 (#6) and, therefore, k 1 (#14), Alce subtracts k 1 from Y 2 and obtans R 2 N 2 (#16). On her bnary bass she easly obtans R 2 (#13). The frst cycle s complete. A and B contnue to exchange random sequences as n the frst cycle. The shared sequences (R 1,..., R 2,...), after a prvacy amplfcaton process, are the random bts to be subsequently utlzed for one-tmepad cpher. Note that whle for noseless sgnals Y 1 = b and Y 2 = b carryng a repeated bt b, one has Y 1 Y 1 = 0, nosy sgnals gve Y 1 = b N 1 and Y 1 = b N 2 and, therefore, Y 1 Y 1 = N 1 N 2 (= 0 or1). Ths frustrates several correlaton attacks. SOE SECURITY CONSIDERATIONS Securty analyses were presented for the purely optcal counterparts of ths -ry key dstrbuton system for Internet and are equally vald here. Ref. [3] presented a bt-by-bt analyss and [5] showed that the attacker s ntal uncertanty on the whole sequence of shared bts s equal to her uncertanty of the startng shared sequence K 0. Ths dependence on the frst key shared key sequence K 0 can be seen from the mutual nformaton, defned by I(R : Y (R)) = H(R) H(R Y (R)). (3) I(R : Y (R)) s used to wrte the dfference between the mutual nformaton between B and E n one cycle of length L: I = I B I E = [H(R) H(R Y B (R))] [H(R) H(R Y E (R))] = H(R Y E (R)) H(R Y B (R)). (4) Eve s uncertanty on R gven Y E (R) s maxmal (H(R Y E (R)) L) whle Bob may obtan the whole sequence R from Y B : H(R Y B (R)) = 0. Therefore, I L n the frst cycle. Applyng the chan rule H(L 1, L 2,..., L n Y E ) = one may see that H(L 1, L 2,..., L n Y E ) = n H(L Y, L 1,..., L 1 ), (5) =1 =H(L 1 Y E ) H(L 2 Y E, L 1 ) H(L 3 Y E, L 1, L 2 ).. (6) If the startng key (K 0 wth length L = L 1 ) s open to Eve, she obtans L 2 (H(L 2 Y E, L 1 ) = 0) n the same way as Bob and also obtans all keys n the subsequent rounds. The nose level superposed to the bts sent are desgned to hde each L j from the attacker. Prvacy amplfcaton a necessary step appled to the shared bts dscards nformaton eventually leaked to the attacker and defnes the fnal shared length of secure bts. laser detector NDF V V V V sgn = V V V = V, V = ± V π R φ ref V R V K0 φ mod PhRG FIG. 2: Sketch of PhRG wth a coherent lght source. Ths modulus can be added externally or externally to a computer. The laser beam s dvded by a beam spltter. The upper part shows a detectng system where sgnals V are generated correspondng to the sgn of the generated sgnal wth respect to the average sgnal ntensty. These bnary sgnals are converted nto bnary voltages V R = ±V π that consttute fresh random bts to be shared by A and B. The bottom part shows an nterferometer wth an optcal phase modulator (φ mod) n one of the arms. The laser beam s adjusted to an adequate ntensty by a neutral densty flter (or automatzed flter). Voltage values V K0 defnng -ry phase bases (e.g, = 2) are added to V R and appled to the phase modulator. Detectors at the nterferometer output produce the phase sgnals carryng bass, bt and nose nformaton shown n Fg. 1 as Y. THE PHYSICAL RANDO GENERATOR Fg. 2 sketches the PhRG and the nput V K0 contanng recorded bases nformaton. The PhRG generate voltage sgnals correspondng to bts V R. These sgnals are added to the bass nformaton suppled by V K0 and suppled to a phase modulator n one arm of an optcal nterferometer. Output lght s detected and converted to phase sgnals (wth respect to the laser feld) that also contan phase nose assocated wth coherent lght. These sgnals are wrtten Y n Fg. 1. As shown n Refs. [3] and [4], ths phase modulaton of coherent sgnals produce sgnals that carry a phase uncertanty gven by the Gaussan dstrbuton p u e ( φ)2 /2σ 2 φ, (7) where σ φ = 2/ n and n s the average number of photons n one bt. Whle several desgn varatons are possble, Fg. 2 shows basc parts to be consdered. For secure transmsson of sgnals the physcal randomness s necessary as no known mathematcal algorthm has been proven to generate true random numbers. Several physcal sources may be used alternatvely such as optcal or thermal sources. However, optcal sources can be much faster than the thermal ones and are therefore necessary
4 4 when speed s requred. A PhRG can be seen as modulus that can be hooked (nternally or externally) to a computer lnked to the Internet ether n dedcated use or open to users such as n a cybercafe. In such a publc system users may generate and record on portable memores a batch of secure keys or use them to exchange one-tme-pad cphered nformaton. One may also wonder about the cost of a brute force attack to determne the startng key K 0 from the transmtted sgnals. Under the assumpton that the uncertanty presented to the attacker covers N σ bases, the attacker would know that the bass k used n a gven transmsson s around a gven regon wthn the uncertanty N σ. For a -ry system of unformly spaced bases ths amounts that only a set of less relevant bts b(k σ ) n Eq. (1) hde the correct bass. These b(k σ ) bts could be permutated n b(k σ )! ways. As each bt could be ether 0 or 1 the total number of permutatons to be searched for each bt emsson would be (log 2 N σ )!N σ. For the total number of K 0 bts the number of combnatons would be C = 2 K0 (log 2 N σ )!N σ. (8) Under ths example of a unform cpherng wheel exemplfed by Eq. (2), t s understood that the attacker may know the fracton 1 (N σ /) of the total number of shared bts k used by A and B to cpher a fresh generated bt. For a sequence of L shared bts, Eve may obtan L[1 (N σ /)] bts among L because they were not covered by nose. These bts have to be subsequently dscarded by A and B through prvacy amplfcaton processes. SIPLIFIED BASES Use of a non-unform set of bases leads to a more economcal system: nstead of a unformly spaced crcle of phases gven by Eq. (2) one may use just a sector of phase values where the number of bases s just = 2. See Fg. 3. The sector wdth or bases separaton s made less than 2N σ. Therefore, all bases wll be wthn the phase fluctuatons caused by the nose N j. Phase postons on ths sector are gven by φ k0 = [ k 0 φ 1 π 1 ( 1)k0 2 ], k 0 = 0, 1. (9) Wth ths sector of phase bases the number of possble combnatons for a brute force attack searchng for all possbltes that may lead to K 0 s C = 2 2 K0. Reasonable K 0 lengths could be, say, 10 6, 10 9 ; they gve a number of combnatons C to be tred that s not computatonally feasble. Ref. [4] derved explct equatons for the mutual nformaton of the process and showed numercal examples to quantfy securty n terms of the dfference of the mutual nformaton functons for A and B and A and E 2σ φ = 2 2/ n k = 0 k = 1 FIG. 3: A cpherng set of bases n a phase sector wth = 2. σ φ s the standard devaton n the phase caused by fluctuatons n the lght feld. φ 1 s the spacng between two bases and should be kept φ 1 π/2. n s adjusted so that π/2 > σ φ φ 1, e.g. n < 100. Two states or bts can be nscrbed on each bass. Dark crcles ndcate postons for a bt 0 and open crcles gve possble postons for a bt 1. (I AE = ǫi AB, ǫ 1). As has also been shown, the securty of one sequence sent depends on the secrecy of the former sequence receved. Ths s an a-pror condton over whch I AB > I AE follows. Statstcally, the attacker may acqure some bts correctly and the legtmate users have to use prvacy amplfcaton protocols to elmnate that possble amount of nformaton acqured by Eve. Prvacy amplfcaton randomly reduce the number of bts to elmnate possble nformaton leaked to Eve. A and B are able to share a large number of random sequences R K 0 before the bt reconclaton and prvacy amplfcaton steps severely shorten the length L of the sequences. These length reductons lead to a slow down of the process and eventually to ts halt. A convenent mnmum length L mn can be chosen so that a new fresh sequence K 0 restarts the whole process. See Ref. [4] for a dscusson on the dstllaton process. The amount of possble leakage can be estmated usng mutual nformaton functons as shown n Ref. [4]. It was shown that a fracton 1 f (f n the example gven) could be compromsed n every cycle; therefore, 0.1% should be elmnated by prvacy amplfcaton protocols. As a result, the remanng fracton f of bts n every cycle s secure. A and B then succeed after many cycles n sharng a number of secure bts much larger than the ntal shared sequence K 0. Wth the example gven n Ref. [4], after sharng 10 3 L bts, 660L (66%) wll be dstlled by prvacy amplfcaton. Renewal of fresh startng sequences K 0 was dscussed n Refs. [3] and [4]. Ancent methods such as hand-to-hand delvery and steganography could be used for some applcatons. Even certfed key provders may be acceptable for some uses. The slow BB84 key dstrbuton process could also be used to φ 1
5 5 dstrbute the startng sequences K 0 wth proven securty; the speed of the key dstrbuton process wll then boosted by the Nose Secured Internet system descrbed here. CONCLUSIONS It has been shown that two (or more) Internet users startng from a shared secret sequence of random bts K 0 and addng a smple hardware modulus (PhRG) to ther computers wll succeed n generatng a large number of secret keys to be used n one-tme-pad cpher. The system works at optcal speed and does not requre any specal Internet protocol. Sgnals assocated wth nose are generated n the PhRG and the sgnals to be sent are determnstc ones. The assocated securty s not related to protocols based on mathematcal complextes n current use. Ths system s proposed as a possble new paradgm for a secure Internet. Emal: geraldoabarbosa@hotmal.com Phone: Brazl(31) Conf. on Computers, Systems, and Sgnal Processng, Bangalore, Inda, 1984, pp. 175 to 179. [2] F. Grosshans and P. Granger, Contnuous Varable Quantum Cryptography Usng Coherent States, Phys. Rev. Lett. vol. 88, (2002) pp to to [3] G. A. Barbosa, Fast and secure key dstrbuton usng mesoscopc coherent states of lght, Phys. Rev. A vol. 68, (2003) pp to US Pat. Appl. 11/000,662, Publ. No. US2005/ A1. [4] G. A. Barbosa, Informaton theory for key dstrbuton systems secured by mesoscopc coherent states, Phys. Rev. A vol. 71, (2005) pp to [5] G. A. Barbosa, Fast and secure key dstrbuton usng mesoscopc coherent states of lght, quant-ph/ v4 28 Apr 2004 pp. 1 to 10. [6] G. A. Barbosa, E. Corndorf, P. Kumar, H. P. Yuen, Secure communcaton usng mesoscopc coherent states, Phys. Rev. Lett. 90, (2003) pp to [7] E. Corndorf, G. A. Barbosa, C. Lang, H. P. Yuen, P. Kumar, Hgh-speed data encrypton over 25km of fber by two-mode coherent-state quantum cryptography, Opt. Lett. 28, (2003) pp Quantum Cryptography wth Coherent-state Lght: Demonstraton of a Secure Data Encrypton Scheme Operatng at 100kb/s; G. A. Barbosa, E. Corndorf, and P. Kumar, Quantum Electroncs and Laser Scence Conference, OSA Techncal Dgest, Vol. 74, (2002) pp [1] C. Bennett, G. Brassard, Quantum cryptography, Publc key dstrbuton and con tossng, n Proc. IEEE Int.
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationQuantization Effects in Digital Filters
Quantzaton Effects n Dgtal Flters Dstrbuton of Truncaton Errors In two's complement representaton an exact number would have nfntely many bts (n general). When we lmt the number of bts to some fnte value
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationThe circuit shown on Figure 1 is called the common emitter amplifier circuit. The important subsystems of this circuit are:
polar Juncton Transstor rcuts Voltage and Power Amplfer rcuts ommon mtter Amplfer The crcut shown on Fgure 1 s called the common emtter amplfer crcut. The mportant subsystems of ths crcut are: 1. The basng
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationLecture 2: Single Layer Perceptrons Kevin Swingler
Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationSection C2: BJT Structure and Operational Modes
Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationGRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM
GRAVITY DATA VALIDATION AND OUTLIER DETECTION USING L 1 -NORM BARRIOT Jean-Perre, SARRAILH Mchel BGI/CNES 18.av.E.Beln 31401 TOULOUSE Cedex 4 (France) Emal: jean-perre.barrot@cnes.fr 1/Introducton The
More informationQUESTIONS, How can quantum computers do the amazing things that they are able to do, such. cryptography quantum computers
2O cryptography quantum computers cryptography quantum computers QUESTIONS, Quantum Computers, and Cryptography A mathematcal metaphor for the power of quantum algorthms Mark Ettnger How can quantum computers
More informationNPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationLogical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationTHE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationSTANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.
STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationSecure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationVision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION
Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationSecure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More information1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
More informationA machine vision approach for detecting and inspecting circular parts
A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw
More informationComputer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.
Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationMONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS
Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationPortfolio Loss Distribution
Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationRelay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationOptical Measurement of the Speed of Sound in Air Over the Temperature Range 300-650 K
NASA/CR-2000-210114 ICASE Report No. 2000-20 Optcal Measurement of the Speed of Sound n Ar Over the Temperature Range 300-650 K Roger C. Hart ICASE, Hampton, Vrgna R. Jeffrey Balla and G.C. Herrng NASA
More informationNew Solutions for Substation Sensing, Signal Processing and Decision Making
Proceedngs of the 37th Hawa Internatonal Conference on System Scences - 2004 New Solutons for Substaton Sensng, Sgnal Processng and Decson Makng M. Kezunovc, Fellow IEEE Texas A&M Unversty Department of
More informationCHAPTER 14 MORE ABOUT REGRESSION
CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationMACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION
MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté
More informationOptical Signal-to-Noise Ratio and the Q-Factor in Fiber-Optic Communication Systems
Applcaton ote: FA-9.0. Re.; 04/08 Optcal Sgnal-to-ose Rato and the Q-Factor n Fber-Optc Communcaton Systems Functonal Dagrams Pn Confguratons appear at end of data sheet. Functonal Dagrams contnued at
More informationLoop Parallelization
- - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationA Simple Approach to Clustering in Excel
A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa
More informationAutomated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
More informationStatistical Methods to Develop Rating Models
Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationSPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:
SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and
More informationSUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.
SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationHALL EFFECT SENSORS AND COMMUTATION
OEM770 5 Hall Effect ensors H P T E R 5 Hall Effect ensors The OEM770 works wth three-phase brushless motors equpped wth Hall effect sensors or equvalent feedback sgnals. In ths chapter we wll explan how
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More information