GESJ: Computer Science and Telecommunications 2016 No.2(48) ISSN
|
|
- Jasper Hunter
- 7 years ago
- Views:
Transcription
1 GESJ: Computer Scece ad Telecommucatos 206 No.2(48) ISSN UDC USING GENETIC ALGORITHM FOR CRYPTANALYSIS CRYPTOALGORITHM MERKLE-HELLMAN Lal Besela Sokhum State Uversty,Poltkovskaa str., Tbls, Georga Abstract The artcle cosders possblty of usg geetc algorthms cryptaalyss, amely for crackg Merkle Hellma cryptosystem. The expermetal results show the effcecy usg of geetc algorthms for cryptaalyss moder cryptosystems. Idex Terms: geetc algorthms, cryptosystem, the system Merkley-Hellma cryptaalyss. I. Itroducto Merkle-Hellma s famous artcle was publshed 978 [], whch descrbes the publc key (asymmetrc) crypto system, based backpack task [2] Oe of the partcular case, whch ca be summed up as follows: V the capacty kapsack ad B = { b, b2,... b} obects set, whch have a certa capactes. Our task s to fd a B subset of the abudace B B of the elemets the equato to be executed. V = = 49 b x where, x {0, }, =,2,...,. If x = t meas that the subect should be put kapsack, ad f x = 0 the subect does ot vest kapsack. As s well kow [2], kapsack task belogs to the group of NP complexty of the problem, but ths partcular case, f the B set s the cremetal sequece, the sequece of each b member satsfes the codto > b b, = The there's the task of the lear complexty of the algorthm [2]. Merkle ad Hellma bult the ope crypto system usg of ths system. The ecrypto key A = { a, a2,... a} s ot reasoable for the creasg sequece, where A the sequece of each member a the followg method: a = b t (mod m) () ad where m, t Z the followg codtos are fulflled: m > b = ( t, m) = Secret decrypto of the key s trple ( B, m, t). Ope Text, whch represets zeros everywhere ad roll sequece, durg the legth of the ecrypto tme wll be dvded to a umber L of blocks ad performs the role x {0, } of abudace. Ecrypted text S, S2,..., SL sums, whch are calculated by the formula:
2 GESJ: Computer Scece ad Telecommucatos 206 No.2(48) ISSN S = = x a Ope Text s eeded to repar the problem solved backpack above opto lear complexty algorthm, the kow B ad the Ascedg ad m ad t optos. To do ths, multpled t - by the sum of each module m / S = S t (mod m) (3) ad becomes a backpack to the soluto of lear complexty algorthm separately for each S of the sum metoed, whe t s kow B the ascedg sequece. I order to break the adversary system, ad t wll have to fd the Ope Text soluto of NP complexty of the task, whch s practcally mpossble, whe two hudred to three hudred elemets of B the sequece of the umber are chaged. At a glace, ths cryptosystem really was protected from ay attacks ad was the fastest publc key system, the use of whch has a large capacty to ecrypt texts, but t was dscovered that he had some falg[3], wth whch the famous scetst A.Shamr used polyomal dffculty Algorthm ad broke the system [4]. From ths falg frst to ote that the secret key from the publc key recepto, ulke other ope-key crypto systems are ot oe-way fucto. Also, as t tured out, ot ecessarly to fd exactly the (t 0, m 0 ) par, wth the help of whch over creasg sequece returs the key - Not over creasg sequece. As t tured out, all of the cremetal sequece, from whch the addtoal beds A ot use ca be obtaed ascedg secret key, or a key o the attack. These vulerabltes by usg A.Shamr us cryptoalgorthm to attack the system, whch cossts of two parts. I the frst part of the algorthm to a whole umber, whch satsfed the codtos for the u / m values for some a of these fuctos s the mmum terval. Such umbers to fd the algorthm Dophate approxmato method for (u, m) pars, whch wll be possble to ope the key to the secret key to calculate. II. Geetc algorthms Geetc algorthms orgally used for solvg optmzato problems. Over tme, he foud the use of scece varous felds. Geetc algorthms based o bologcal evoluto s oe of the basc prcple: the fght to save the evromet as much as possble adaptato of the populato, whch s acheved by stregtheg ad developmet of ew geeratos of more ad better features. Geetc algorthms for modelg of ths prcple s as follows: radom soluto set-elected caddates ad the populato of the geetc operators: selecto, crossovg ad mutato usg a ew geerato of caddates accepted soluto, whch s closer to the average of the real soluto, tha those of the prevous geerato. It depeds o how we use geetc algorthms ad the qualty of the crtera we have selected, or how to use the ftess fucto. Geetc algorthms are oe of the maor advatages of search algorthms other tha the possblty of ther parallelzato, whch substatally reduce the attack. (2) III. Usg geetc algorthm Merkle-Hellma algorthm s eeded to spol Cryptographc algorthms for the aalyss of geetc algorthms use a ew drecto, whch s stll uable to settle the practcal cryptologsts. There are dozes of works whch authors try to 50
3 GESJ: Computer Scece ad Telecommucatos 206 No.2(48) ISSN show the advatages of ths approach ca have a comparso wth other methods. Our goal s to demostrate the advatages of the use of geetc algorthms for the aalyss of crypto Compared wth other methods. It was at ths pot we took a crypto system has bee broke Merkl-Hellma, the breakg of whch we tred usg geetc algorthms, ad we compared the results obtaed by the results of Shamr's algorthm. There are some hard work, where merkl-hellma crypto system s explaed by meas of geetc algorthms, but all these cases the attack s made by meas of a cpher text [7]. These studes, however, we're lookg for the secret key of the publc key to the techque smlar to Shamr. Have developed a ew heurstc methods, whch resulted the use of geetc algorthms s to make more accurate ad quck. I ths artcle, the results of the study ca be used other asymmetrc crypto systems ad software crypto aalyss. IV. Problems explorato As metoed above there are works, whch dscusses the use of geetc algorthms Merkle- Hellma crypto system for cryptaalyss. But our attack method s totally dfferet from the methods used the works. Also, we use the two dfferet geetc algorthm, whch s dfferet from other geetc algorthms (dfferet selecto crtera ad the qualty of the crossover process). We carry out attacks o the cpher text of the key meas. Our task s to fd a (u, m) par, the publc key to fd the cremetal sequece of the followg formula b = au(modm) Where u=t -. (4) Asked to solve the problem, we have establshed two dfferet algorthms. Ther sale at the base of the C ++ laguage. Each algorthm cossts of the preparato ad the ma part. Becomg part of the preparato of the formato - Hellma algorthm to ecrypt Merkle: We took { b, b2,... b} a creasg sequece, m module base ad have selected the t multpler, whch calculated the publc key a = b t(mod m) ad (3) the formula to be trasferred ecrypted formato. The frst algorthm to work as follows:. The data from the soluto set-caddates from the populato, whch s to take pctures of a radom geerator to talze. The tal soluto set-caddate of the Ascedg (closed key), whch s represeted a bary form. Its sze s equal to, where s the sze of the publc key, ad each of ts members (the gee) Sze 2d * created equal, where d s the proportoalty coeffcet, ad for each bt rate dex. Each member of the bts starts at. 2. Wth the help of a radom geerator for each of the Ascedg troducg m base (bary form), whose legth s equal to d * (t must be the result of more tha Ascedg elemets). 3. The populato of each of the caddate ad the correspodg soluto set-m base resettled to the decmal system. 4. Use exstg data, () obtaed from the formula Dophate equato b t km = a, where k = 2,3,4; We fd t a multtude of factors. 5. t multplcato of the may select oly those t, for whch t <m ad (t, m) =. 6. The soluto set-secret three caddates for () the formula calculatg the ope key. 7. Ftess fucto we set the qualty of the selecto crtera. I our case, the qualty of the selecto crtera, t s the 6th step of the Publc key elemets to match the Publc key elemets. If the umber of tems matchg the key legth s equal to or, the the results obtaed ad the algorthm s complete, but f you do ot match the umber of key elemets of the algorthm ad cotue movg to the ext step. 8. The selecto fucto of the selecto fucto becomes the L / 2 (L s the tal populato sze), the umber of caddates for the soluto set-elect, whose ftess fucto s hgher. 5
4 GESJ: Computer Scece ad Telecommucatos 206 No.2(48) ISSN The soluto set-elected caddates carry out the fucto of crossover. Crossovg Fucto are as follows: A) radom geerator, the soluto set, choosg betwee two caddates, the caddate soluto set (the selecto s made so that breedg pars are ot repeated). B) Each caddate soluto set-dvded to two parts ad the adopted two ew soluto setcaddate. Usually, two paret soluto set-up as a caddate for the four successor, but our case we get oly two successor caddate soluto set, we are terested oly the read. Ascedg. 0. After Crossover operato, we calculate the soluto set-caddates' ftess fucto, f ay soluto set-caddate's ftess fucto s ot equal to, the repeat o the 2d, 3rd, 4th, 5th, 6th, paragraph 7, 8, 9 steps 5 tmes, f we got the desred result, we cotue to work o the algorthm, otherwse movg to the ext step.. The use of mutato fucto. The repeat the 0th steps ad decde upo ay results of the algorthm to work. The algorthm of the expermets showed that most of the ftess fucto does ot exceed / 2-'s (half the legth of the key). Ths result s ot the best, but ths result may be ecrypted formato from the dea. That's why we chaged our approach ad establshed a secod algorthm, whch work as follows:. The tal populato of the m base, whch talze take pctures of radom geerator (to be submtted a bary system), whle the populato of each member (soluto set-caddates) sze s d * ; Where s equal to the legth of the publc key, ad d = 2; 2. take pctures of the soluto set - Dozes of caddates for trasfer to the system. 3. Shamr algorthm take the frst four members of the publc key ad calculate the verse of multplcato t, where the m base u = p m / a, u = t, <= p <=, 0 <= < 4 ; * To select u multpler, we mpose certa restrctos. Besdes ths (um) = ad u <m, multpler u, multpled by the thrd member of the publc key, must be greater tha the base m. Whe you add ths restrcto, we reduce the set of u caddate-solutos. (u, m) pars all of the possble caddates for a ew key to the closed (3) formula. 4. Ftess fucto we set the qualty of the selecto crtera. I ths case, the qualty of the selecto crtera, the 4th step of the prvate key of the ascedg. If the sequece of the rse of the ftess fucto value s equal to, the the results obtaed ad the algorthm s complete, but f the ftess fucto - tha movg to the ext step. 5. Crossover fucto soluto set-elected caddates are carryg out the fucto of crossover. Ths algorthm s essetally dfferet from the prevous algorthm Crossovg fucto from the fucto. A) Radom geerator, the soluto set, choosg betwee two caddates, the caddate soluto set (the selecto s made so that breedg pars are ot repeated). B) Each caddate soluto set s dvded to two parts (the mddle pot) ad ther Crossovg results a four-caddate soluto set. 6. The ewly-adopted soluto set for caddates to repeat the 2d, 3rd, 4th steps, f ay of the caddate's ftess fucto soluto set-- created equal, the the desred result s obtaed, ad the applcato s closed, otherwse movg to the ext step. 7. the selecto fucto selecto fucto becomes the L (L s the tal populato sze) of the soluto set-selecto of caddates, whose ftess fucto s hgher. 8. selected soluto set-caddates for repeat steps 5 ad 6. We have dcated that the process wll repeat 0 tmes. If ths process s repeated, 0 tmes ad we do t get the desred result, oly ths case we use a mutato, or chage the fucto of the gee, ad the repeat the 2d, 3rd ad 4th steps. Whe we get the desred results, we stop workg. But tests showed that o f the mutatos feature s ot eeded, ad the hybrdzato of a maxmum of 5 tmes usg we get the desred result. a 52
5 GESJ: Computer Scece ad Telecommucatos 206 No.2(48) ISSN Key legth s 20, the populato sze of 50 Iput data Secret key m t Publc kay The result (aga after Secret key m t - crossover operato) Lead tme 8,72 sec. Expermetal results show that the use of geetc algorthms Merkle -Hellma crypto system s broke very quckly. Therefore, we ca coclude that the use of geetc algorthms wll be effectve for other asymmetrc crypto systems for cryptaalyss. Referece [] Merkle R.C., Hellma M.E. Hddg formato ad sgatures trapdoor Kapsak, IEEE Tras. Iform. Theory, IT-24 (978), pp [2] Martello, S. ad P. Toth, Kapsack Problems: Algorthms ad Computer Implemetatos, Joh Wley &; Sos, West Sussex, Eglad, 990. [3] A. Salomaa, Publc-Key Cryptography, Sprger-Verlag, 990. [4] Garg P, Shastr A. A Improved Cryptaalytc Attack o Kapsack Cpher usg Geetc Algorthm. Iteratoal Joural of Iformato Techology, 3(3) (2006) 6. [5] Muthureguatha R., Vekatarama D., Raasekara P. Cryptaalyss of Kapsack Cher Usg Parrallel Evolutoary Computg. Iteratoal Joural of Recet Treds Egeerg, Vol., No, [6] Shamr A. A Polomal-Tme Algorthm for Breakg the Basc Merkle-Hellma Cryptosystem. IEEE Trasactos o Iformato Theory. Vol., IT-30, No5, 984, pp [7] R. Geetha Rama Geetc Algorthm soluto for Cryptaalyss of Kapsack Cpher wth Kapsack Sequece of Sze 6. Iteratoal Joural of Computer Applcatos ( ) Volume 35, No., 20. Artcle receved:
IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationOn formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationClassic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationPreprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationSTATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More informationConstrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationn. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.
UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More informationROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM
28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationSimple Linear Regression
Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8
More informationA Single Machine Scheduling with Periodic Maintenance
A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco
More informationFuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
, pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College
More informationTowards Network-Aware Composition of Big Data Services in the Cloud
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, Towards Network-Aware Composto of Bg Data Servces the Cloud Umar SHEHU Departmet of Computer Scece ad Techology Uversty of Bedfordshre
More informationTHE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ
SAÜ e Blmler Dergs, 5 Clt, 2 Sayı, THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES Vedat ŞİAP* *Departmet of Mathematcs, aculty of Scece ad Art, Sakarya Uversty, 5487, Serdva, Sakarya-TURKEY vedatsap@gmalcom
More informationPerformance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationThree Dimensional Interpolation of Video Signals
Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationFast, Secure Encryption for Indexing in a Column-Oriented DBMS
Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationRelaxation Methods for Iterative Solution to Linear Systems of Equations
Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet gerry@me.pdx.edu Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany
ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationResearch on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance
Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationCHAPTER 2. Time Value of Money 6-1
CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show
More informationExperimental Comparison of Genetic Algorithm and Ant Colony Optimization to Minimize Energy in Ad-hoc Wireless Networks
Proceedgs of e World Cogress o Egeerg ad Computer Scece 013 Vol II, 3-5 October, 013, Sa Fracsco, USA Expermetal Comparso of Geetc Algorm ad At Coloy Optmato to Mme Eergy Ad-hoc Wreless Networs Ibuuola
More informationApplication of Grey Relational Analysis in Computer Communication
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author
More informationSpeeding up k-means Clustering by Bootstrap Averaging
Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg
More informationAgent-based modeling and simulation of multiproject
Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationTESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs
More informationA COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS
A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationImpact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
More informationOPTIMAL KNOWLEDGE FLOW ON THE INTERNET
İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More informationAnalysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid
Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal
More informationCH. V ME256 STATICS Center of Gravity, Centroid, and Moment of Inertia CENTER OF GRAVITY AND CENTROID
CH. ME56 STTICS Ceter of Gravt, Cetrod, ad Momet of Ierta CENTE OF GITY ND CENTOID 5. CENTE OF GITY ND CENTE OF MSS FO SYSTEM OF PTICES Ceter of Gravt. The ceter of gravt G s a pot whch locates the resultat
More informationA system to extract social networks based on the processing of information obtained from Internet
A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts
More informationHow To Value An Annuity
Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationA PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING
West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationAn Application of Graph Theory in the Process of Mutual Debt Compensation
Acta Poltechca Hugarca ol. 12 No. 3 2015 A Applcato of Graph Theor the Process of Mutual Debt Compesato ladmír Gazda Des Horváth Marcel Rešovský Techcal Uverst of Košce Facult of Ecoomcs; Němcove 32 040
More informationThe Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal
Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag
More informationCurve Fitting and Solution of Equation
UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed
More informationOptimizing Software Effort Estimation Models Using Firefly Algorithm
Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly
More informationForecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
More informationNetwork dimensioning for elastic traffic based on flow-level QoS
Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto
More informationA two-stage stochastic mixed-integer program modelling and hybrid solution approach to portfolio selection problems
A two-stage stochastc mxed-teger program modellg ad hybrd soluto approach to portfolo selecto problems Fag He, Rog Qu The Automated Schedulg, Optmsato ad Plag (ASAP) Group, School of Computer Scece The
More informationSuspicious Transaction Detection for Anti-Money Laundering
Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg
More informationIntegrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
More informationAnalysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011
Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway
More informationof the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More information