RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs

Size: px
Start display at page:

Download "RSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs"

Transcription

1 RSA Cryptography usng Desgne Processor an McroBlaze Soft Processor n FPGAs M. Nazrul Islam Monal Dept. of CSE, Rajshah Unversty of Engneerng an Technology, Rajshah-6204, Banglaesh M. Al Mamun Dept. of CSE, Rajshah Unversty of Engneerng an Technology, Rajshah-6204, Banglaesh Boshr Ahme Dept. of CSE, Rajshah Unversty of Engneerng an Technology, Rajshah-6204, Banglaesh ABSTRACT Some applcatons such as RSA encrypton/ecrypton nee nteger arthmetc operatons wth many bts. However, such operatons cannot be performe rectly by conventonal CPUs, because ther nstructon supports ntegers wth fxe bts, say, 64 bts. Snce the CPUs nee to repeat arthmetc operatons to numbers wth fxe bts, they have conserably overhea to execute applcatons nvolvng nteger arthmetc wth many bts. On the other han, Ths paper mplements harware algorthms for such applcatons n the FPGAs for further acceleraton. However, the mplementaton of harware algorthm s usually very complcate an ebuggng of harware s too har. The man contrbuton of ths paper s to present an ntermeate approach of software an harware usng FPGAs. More specfcally, ths paper presents a processor base on FDFM (Few DSP slces an Few Memory blocks) approach that supports arthmetc operatons wth flexbly many bts, an mplement t n the FPGA. To show the potentalty of esgne processor, 128- bt RSA encrypton/ecrypton s mplemente an compare wth soft processor McroBlaze n FPGA. The resultng processor uses only one DSP48E1 slce an four Block RAMs (BRAMs), an RSA encrypton software on t runs n 0.42ms. However, McroBlaze uses three DSP48E1 slces an 170 Block RAMs (BRAMs) an runs n ms. Hence, the propose esgne processor s sgnfcantly effcent n terms of resource use an tme complexty n comparson to soft processor McroBlaze n FPGAs. Also the propose processor can be use effcently for longer bt arthmetc operaton such as 2048-bt wthout further mofcatons an hence t s more flexble. General Terms RSA Securty Algorthm Keywors Multple-Length-Arthmetc, McroBlaze, Soft Processor, Montgomery Moular Multplcaton n RSA, FPGA, DSP Slces, Block RAMs. 1. INTRODUCTION An FPGA s a programmable logc evce esgne to be confgure by the customer or esgner by HDL (Harware Descrpton Language) after manufacturng. An FPGA chp mantans relatve lower prce an programmable features [1], [2], [3], hence, t s wely use recently. The reaers may refer to see some crcut mplementatons n FPGAs [4], [5], [6], [7], [8], [9], [10], [11], [12] to accelerate computaton. Applcatons requre arthmetc operatons on nteger numbers whch excee the range of processng by a CPU rectly s calle Multple Double Length Numbers or Multple Precson Numbers an hence, computaton of these numbers s calle Multple-Length-Arthmetc. More specfcally, applcaton requres nteger arthmetc operatons for multple-length numbers wth sze longer than 64 bts cannot be performe rectly by conventonal 64-bt CPUs, because ther nstructon sup-ports ntegers wth fxe 64 bts. To execute such applcaton, CPUs nee to repeat arthmetc operatons for those numbers wth fxe 64 bts whch ncrease the executon overhea. Alternatvely, harware algorthms for such applcatons can be mplemente n FPGAs to spee up computatons. However, the mplementaton of harware algorthm s usually very complcate an ebuggng of harware s too har. Snce, low level of nstructons, represente by 0 s an 1 s s an almost mpossble to unerstan even by an expert, the ebuggng of an algorthm at ths level s very har. Moreover, to mplement harware algorthm, wrtten by harware language such as Verlog HDL, users shoul have suffcent knowlege of harware such as regsters whch makes t complcate to the non-expert or to the begnners. The nstructons n assembly language are wrtten by alphanumerc symbols nstea of 0 s an 1 s n low level that s an almost smlar to the hgh level language, wrtten by Englsh whch makes the nstructons as well as algorthms easy to rea, mofy an ebuggng by the non-expert or by the begnners. The man contrbuton of ths paper s precsely escrbe as follows: To prove the potentalty of the propose processor, 128-bt RSA s mplemente an compare wth soft processor McroBlaze n FPGA whch mples that propose processor s sgnfcantly effcent n terms of resource use an tme complexty. Also, the propose flexble-length arthmetc processor base on FDFM approach can be use for computng of nteger numbers wth flexbly many bts, even longer than 2048-bt by a sngle machne nstructon. To make the ebuggng an further evelopment easy, an ntermeate approach of software an harware s presente. Ths esgne processor proves flexblty so that t can be use for computng of nteger numbers wth flexbly many bt such as 64-bt, 128-bt, even longer than 2048-bt wthout further mofcaton. 25

2 Snce, the esgne processor base on FDFM approach, the key ea of the FDFM approach s to use few DSP slces an few block RAMs to perform routne computatons whch can be treate alternatvely as a resource effcent approach. Let us explan brefly the FDFM approach usng a smple example. Fgure 1 (1) llustrates a harware algorthm to compute the output of FIR (Fnte Impulse Response) y = a 0 x +a 1 x 1 +a 2 x 2 +a 3 x 3. A conventonal approach mplementng the FIR s to use four DSP slces as llustrate n Fgure 1 (2)[13]. In ths conventonal approach, the number of DPS blocks must be the same as that of multplers n the harware algorthm. However, FDFM approach uses one or few DSP slces an one or few block RAMs to mplement the FIR. The Fgure 1 (3) shows the FDFM approach usng one DSP slce an one block RAM to mplement the same mentone above. Note that, the coeffcents a 0,a 1,... are store n the block RAM. The most common FPGA archtecture conssts of an array of logc blocks, I/O pas, Block RAMs an routng channels. Furthermore, embee DSP blocks whch s ntegrate nto an FPGA that makes a hgher performance an a broaer applcaton. Fgure 2 llustrates the Vrtex-6 FPGA evelope by Xlnx. The CLB (Confgurable Logc Blocks) n Vrtex-6 conssts of 2 sub-logc blocks calle slce. Usng LUTs (Look Up Tables) an Flp-Flops n the slces, varous combnatoral crcuts an sequental crcuts can be mplemente. The summarzaton of the several sgnfcant ponts of the results s escrbe as follows: 1. A flexble-length-arthmetc processor s propose for the applcatons whch requre arthmetc operatons for numbers longer than 64 bts. Even, numbers longer than 2048 bts or hgher can be compute by the esgne processor wthout any mofcaton. 2. The propose processor s flexble n a sense that t can support arthmetc operatons for numbers wth flexbly many bts or numbers wth varable sze longer than 64 bts. 3. Fnally, the potentalty of ths processor s checke by mplementng 128-bt RSA an compare wth soft processor McroBlaze whch shows that the propose processor s sgnfcantly effcent. Fgure 1: FDFM approach over conventonal one for FIR The reaers may refer to the papers [14], [15], [16], [17] n whch they can fn etals about FDFM approach an conventonal approach. The rest of ths paper s organze as follows: Secton II brefly escrbes the Multple-length-arthmetc operaton. In Secton III escrbes the propose archtecture. The RSA cryptography as an applcaton s escrbe brefly n Secton IV; however the reaers may refer to the prevous paper [23] for etals. Secton V escrbes expermental results an scussons. Fnally Secton VI conclues ths work. 2. MULTIPLE-LENGTH-ARITHMETIC OPERATION The man purpose of ths secton s to escrbe Multple- Length-Arthmetc operatons. Suppose that A an B are two multple-length numbers of 1024 bts each. These numbers are parttone nto several blocks of 17 bts. Frst, let us see that how a multple-length number of 1024 bts s store n ata memory. Fgure 3(a) shows a ata memory (BRAM). Every 17-bt block ata together wth 1-bt flag represents a btblock of 18 bts an MSB (Most Sgnfcant Bt) of each btblock s known as flag whch set to 1 ncates the en of each store multple-length ata nto the ata memory as shown n Fgure 3(b). In ths fgure, multple-length ata A of 1024 bts s ve nto 61 numbers of 17 bts block such as a 0, a 1,...,, a 60, a 61. Every 17 bts block of multple-length ata, A together wth 1-bt flag s store n fferent memory locaton of the ata memory (BRAM). Fgure 2: Internal Confguraton of Vrtex-6FPGA 26

3 Fgure 3: Data of 1024-bt Length s Store n Memory (BRAM) For the beneft of reaers, Fgure 4 escrbes the nstructon memory as well as nstructon format of multple-length or mult-ouble long ata. Fgure 4 (a) represents an nstructon memory n whch 53 bts nstructon together wth 1-bt flag can be store at any aress of the nstructon memory aresses. In ths case, 1-bt flag s set to 1 ncates the last nstructon for executon. Note that, aresses of the nstructon memory are hanle by the Program Counter (PC). Let us gve an example of a multplcaton of two multplelength or two mult-ouble long ata. However, other arthmetc operatons can also be performe such as aton, subtracton, vson, comparson of mult-ouble long ata. Suppose u an v represents two mult-ouble long ata. Let us multply u by v an the result s store n w, that s w = u. v. An assembly nstructon for ths computng of mult-ouble long ata s as follows: MUL A, B, C In the above nstructon, A, B an C are known as operans of 16-bt each whch can be use to ncate 2 16 fferent aresses 0, 1,..., 2 16 of the ata memory (BRAM) an MUL s known as OPCODE of 5-bt whch etermnes the operaton of operans (n ths case multplcaton) as llustrate n Fgure 4(b). The reaers may refer to the paper [23] for etals n whch an example s clearly escrbe for mult-ouble long multplcaton. Let us see Algorthm 1 for multplcaton of two mult-ouble long ata u an v. Fgure 5: The Propose Processor Archtecture Algorthm 1: Mult-Double Long Multplcaton B: number of gts n rax-2 17 operans n: last number of gt of rax-2 17 numbers n u m: last number of gt of rax-2 17 numbers n v n 1 Input: u = u. B =0 Output: w=u.v 1. for j=0 to m-1 o 2. c 0 3. w for =0 to n-1 o 5. {c,w +j } w +j u. v j +c 6. En for 7. Wn+j c 8. En for n+m 1 9. Return w. B =0 m 1,v = v. B =0 Snce there s a page lmtaton, hence the reaers may refer to the prevous paper [23] to show a smple example of the above algorthm. 3. PROPOSED ARCHITECTURE Let us brefly escrbe the propose processor archtecture for multple-length-arthmetc operatons. The esgne processor conssts of program counter, nstructon memory, aress counters, ata memory, ALU, regsters, control unts as llustrate n Fgure 5 an Fgure 6. Because of page lmtaton, the reaers may refer to the prevous paper [23] for etals. Fg.4.An Instructon Memory an an Instructon Format for Mult-Double Data 27

4 Fgure 6: ALU Archtecture In the followng secton, RSA cryptography s mplemente usng the propose archtecture an t s programme by assembly language. The assembly nstructons of number, 117, each of 54-bt are neee to mplement moular exponentaton algorthm. In ths paper, only the assembly coe s shown for Montgomery Multplcaton as llustrate n the prevous paper [23]. In below assembly coe, the regsters R1 an R2 are use to take nputs X an Y, each of 64-bt. Also 64-bt M s gven. The regsters R3, R4, R5 s use to hol the ntermeate results an fnal results of the Montgomery Multplcaton s store ether n R6 or C. Note that, 64-bt ata n regster R1 s ve nto several blocks of 17-bt each an these are store n several block regsters such as R1 0, R1 1, R1 2, R1 3 (lower block to hgher block). For the case of other regsters, these can be explane n smlar way. [Assembly Coe for Montgomery Multplcaton] R1=X, R2=Y; R3=0, R4=0, R5=0, R6=0; C=0; 01: MUL, R1 0, R2 0, R3 0 ; X (R1) Y(R2) store n R3 02: MOVI, R3 0, R4 0, R3 3 ; copy blocks of R3 nto R4 03:MASK, R4 3, R4 3, 1FFF; make last 4-bt of R4 3 as 0 s 04: MUL, R4 0, M 0 1 R,5 0 ; R4M 1 store n R5 05: MOVI, R5 0, R4 0, R5 3 ; copy blocks of R5 nto R4 06:MASK, R4 3, R4 3, 1FFF; make last 4-bt of R4 3 as 0 s 07: MUL, R4 0, M 0, R5 0 ; R4 M store n R4 08: ADD, R3 0, R5 0, R6 0 ; store R3 + R5 n R6 09: SHR, R6 3, R6 0, 13; 64-bt shft rght of R6 0A: CMP, R6 0, M 0 ; R6 compare wth M 0B: JC, 0D; f R6 > M, go to OD 0C: SUB, R6 0, M 0, R6 0 ; R6-M s the results n R6 0D:MOV, R6 0, C 0 ; results n R6 move to C 4. AN APPLICATION OF RSA CRYPTOGRAPHY USING THE PROPOSED PROCESSOR Ths secton brefly revews the RSA Cryptography whch s escrbe etals n paper [15]. Usng the propose processor, the same algorthm s mplemente by software, nstea of HDL as llustrate n paper [15] to make t easy for mofcatons or changes by a non-expert or by a begnner. In RSA [18], the moular exponentaton C = P E mo M or P = C D mo M are compute, where P an C are plan an cypher text, an (E, M) an (D, M) are encrypton an ecrypton keys. Usually, the bt length n P, E, D, an M s 512 or larger. Also, the moulo exponentaton s repeately compute for fxe E, D, an M, an varous P an C. Snce moulo operaton s very costly n terms of the computng tme an harware resources, Montgomery moular multplcaton [19], [20], [21] s use, whch oes not rectly compute moulo operaton. Montgomery multplcaton [19], [20], [21] s an optmal metho to calculate moular exponentaton. Three R-bt numbers X, Y, an M are gven, an (X Y + q M ) 2 R mo M s compute, where an nteger q s selecte such that the least sgnfcant R bts of X Y + q M are zero. The value of q can be compute as follows. Let ( M 1 ) enote the mnmum non-negatve number such that ( M 1 ) M 1( or 2 R 1) (mo 2 R ). Snce M s o, then ( M 1 ) < 2 R always hols. The q can be selecte such that q = ((X Y ) ( M 1 ))[r 1, 0]. For such q, (X Y +q M )[r 1, 0] are zero. The reaers may refer to paper [23] for an example. Rax-2 r Montgomery multplcaton s shown n Algorthm 2. In Algorthm 2, = [R/r] presents the number of gts n rax-2 r operans. The multpler Y s parttone by each r-bt an Y represents the -th gt of Y. Therefore, Y coul be gven by Y = 1 =0 2 r. Y. After loops, R-bt Montgomery multplcaton can be compute. As far as now, Montgomery multplcaton coul be compute by multplcaton, aton an shft operatons wthout moulo operatons. Algorthm 2: rax-2 r Montgomery Multplcaton rax-2 r, = [R/r], X, Y, M {0, 1,..., 2 R 1}, 0 Y 2 r. Y, Y {0, 1,..., 2 r 1} ( M 1 ) M 1 mo 2 r, M 1 {0, 1,..., 2 r 1} Input: X, Y, M, M 1 Output: S = X Y 2 r mo M 1. S for = 0 to 1 o 3. q ((S + X Y ) ( M 1 )) mo 2 r 4. S +1 (X Y + q M + S ) / 2 r 5. en for 6. f (M S ) then S S M Snce X Y + q M X Y (mo M), the (X Y + q M ) 2 R mo M = X Y 2 R mo M can be wrtten. Let us see how Montgomery moular multplcaton s use to compute C = P E mo M. Suppose C = P E mo M nees to be compute. For smplcty, assume that E s a power of two. Snce R an M are fxe, agan assume that 2 2R mo M s compute beforehan. Frst compute P (2 2R mo M) 2 R mo M =P 2 R 28

5 mo M usng the Montgomery moular multplcaton, then compute the square (P 2 R mo M ). (P 2 R mo M ) 2 R mo M = P 2 2 R mo M. It shoul be clear that, by repeatng the square computaton usng the Montgomery moular multplcaton, havng P E 2 R mo M. After that, multply 1, that s (P E 2 R mo M ) 1 2 R mo M =P E mo M s compute. In ths way, cypher text C coul be obtane. Algorthm 3 shows the moular exponentaton usng Montgomery multplcaton of Algorthm 2. In Algorthm 3, E b represents the sze of E. Inputs 2 2r mo M an M 1 are gven. To use Montgomery moular multplcaton, C an P are converte from 1 an P n the 1st lne an the 2n lne, respectvely. The lne 1, 2, 4, 5 an 7 n Algorthm 3 can be compute usng Montgomery multplcaton of Algorthm 2. Algorthm 3: Moular Exponentaton E 0 E 2E b 1, b 1 E 2. E, E {0, 1} 0 Input: P, E, M, M 1, 2 2r mo M Output: C = P E mo M 1. C (2 2r mo M ) 1 2 r mo M ; 2. P (2 2r mo M ) P 2 r mo M ; 3. for = E b 1 ownto 0 o 4. C C C 2 r mo M ; 5. f E = 1 then C C P 2 r mo M ; 6. en for 7. C C 1 2 r mo M ; Let {A : B} enote a concatenaton of A an B. For example, f A = (F F ) 16 an B = (EC) 16, {A : B} = (F F EC ) 16. Algorthm 4 s an mprove algorthm from Algorthm 2. Conserng the features of the target Vrtex 6 FPGA, rax s selecte. Let R enotes the sze of Montgomery multpler operans X, Y, an M. Also, = [R/17] s the number of gts of the operans on rax In the algorthm, the 17 R + 3 conton s ntrouce to gnore the subtracton shown n the 6th lne of Algorthm 2. If the conton s satsfe, t can be guarantee that at least 3-bt 0 s pae to the most sgnfcant bts of the most sgnfcant gt as the reunancy. Due to the strngent page lmtaton, the proof s omtte. However, M C s always satsfe n the moular exponentaton shown n Algorthm 3. Further, n practcal RSA encrypton, the sze of operans s rax-2 numbers such as 512-bt, 1024-bt, 2048-bt, an 4096-bt. For rax-2 17 system, the conton 17 R +3 s satsfe. If the conton s not satsfe, then t nees to appen one reunant gt at the most sgnfcant gt. Algorthm 4: Montgomery Algorthm rax-2 17, = [R/17], 17 R + 3, X, Y, M, S {0, 1,..., 2 R 1}, M 1, α, β, γ, C α, C β {0, 1,..., }, C γ, C S {0, 1}, 0 X X, X {0, 1,..., }, X = 0 0 Y Y, Y {0, 1,..., } 0 M M, M {0, 1,..., }, M = j S. S, S j 0 (, j) (,j) {0, 1,..., }, S = 0 Input: X, Y, M, M 1 Output: S = X Y 2 17 mo M 1. S for = 0 to 1 o 3. q ((X0 Y + S (,0) ) ( M 1 )) mo C α, C β, C γ, C S 0 5. for j = 0 to o 6. {C α : α} X j Y + C α 7. {C β : β} q M j + C β 8. {C γ : γ} α + β + C γ 9. {C S : S (+1,j 1) } γ + S (,j) + C S 10. en for 11. en for Algorthm 4 s a rax-2 17 gt seral Montgomery algorthm from Algorthm 2. In other wors, each 17-bt, as 1 gt, s processe every clock cycle. For ths reason, the operans X, Y, M, an S are splt nto 17-bt gts X j, Y j, M j, an S (,j), respectvely. The loop from the 2n to 11th lnes of Algorthm 4 correspons to the 2n to 5th lnes of Algorthm 2. Comparng the two algorthms, S +1 (X Y + q M + S )/ 2 r of the 4th lne of Algorthm 2 correspons to the gt seral processng by 4th to 10th lnes of Algorthm 4. In Algorthm 4, C α, C β, C γ, an C S are carres an they are ae at the next loop. In the algorthm, C α, C β are 17-bt carres for 17-bt MACC, an C γ, C S are 1-bt carres for 17-bt aton. For example, at the 6th lne X j, Y are tme an ae to 17-bt carry C α, the result s 34-bt. A prouct of X j an Y, an an aton of the prouct an C α are compute. The resultng upper 17-bt enotes a carry C α whch can be ae at next loop. The lower 17-bt of result s α whch s use at the 8th an 9th lnes. These carres n the algorthm appear n both the 17-bt MACC an the 17-bt aer to prevent a long carry chan that causes crcut elay. The propose flexble-length-arthmetc processor archtecture s use to mplement moular exponentaton algorthm an evaluate on Xlnx Vertex-6 XC6VLX240T-3FF1156, programme by software an synthess wth Xlnx ISE Founaton Table II an Table I show the synthesze result for ths work. For the beneft of reaers, an optmal mplementaton[15] s recalle, whch s evaluate on Xlnx Vrtex-6 FPGA XC6VLX240T-1, programme by harware escrpton language Verlog HDL an synthesze by Xlnx ISE Founaton Note that, the optmal one, programme by HDL s specalze esgn by an expert so that t s ffcult to ebug or change by a non-expert or sometmes even by an expert. However, propose approach s n between software an harware whch makes ebuggng easy to the non-experts or begnners. Ths mplementaton s near to the optmal one [15]. Hence, t s sa that the mplementaton s an almost scalable n ths paper. However, the optmal one [15] s esgne to be mplemente by harware language, HDL whch s ffcult for mofcatons or changes by non-expert, because ths s specally esgne by an expert. 29

6 On the other han, the mplementaton of RSA encrypton/ecrypton usng propose processor archtecture s esgne to be mplemente by software, more specfcally by assembly language; hence t s easy for mofcatons or changes by a non-expert or by a begnner whch makes t flexble. Even though, t has ablty to support hgher bt (more than 2048-bt) of RSA encrypton/ecrypton. 5. EXPERIMENTAL RESULTS AND DISCUSSIONS The propose flexble-length-arthmetc processor archtecture s use to mplement moular exponentaton algorthm an evaluate on Xlnx Vertex-6 XC6VLX240T-3FF1156, programme by software an synthess wth Xlnx ISE Founaton Table I shows the synthesze result for the work n comparson to soft processor n FPGAs. Table I an Table II show the synthesze results of Vrtex-6 for comparng both mplementatons. In Table I, t s compare how much resource use to mplement RSA Cryptography. In ths table, the mplementaton uses 4 block RAMs an 1 DSP slce. On the other han, 70 block RAMs an 3 DSP slces are requre for the same mplementaton usng soft processor, McroBlaze n FPGAs. Hence, t s sa that ths work s more resource effcent. In Table II, tme complexty to mplement RSA Cryptography s compare. In ths table, the mplementaton requres 0.42ms. On the other han, soft processor, McroBlaze nees ms for the same mplementaton. Hence, t s sa that ths work s more effcent n term of tme complexty. Base on results n Table I an Table II, t s sa that, ths mplementaton of RSA encrypton/ecrypton usng propose processor s sgnfcantly effcent (less resource use, less tme) n comparson to soft processor, McroBlaze. Also esgne processor archtecture can be use to mplement 256-bt, 512-bt, 1024-bt, even more than 2048-bt RSA encrypton/ecrypton wthout further mofcatons or changes. Hence t s flexble. Table I: Comparson of Resource Use to Implement 128- bt RSA Cryptography Target FPGA: Vertex-6 FPGA Desgne Processor: Flexble Length Arthmetc Processor Soft Processor n FPGA: McroBlaze Slce Use 170/ / Block RAM Use 4/416 70/416 DSP (DSP48E1) Use Clock Frequency n MHz 1/768 3/ Table II: shows the synthesze result to compare tme complexty Number of bts, R 64bts 128bt A: Soft Processor McroBlaze B: Desgne Processor: Flexble Length Arthmetc Processor No. of Cycles Worst Case Executon Tme[ms] A/B: Rato of Executon Tme No. of Cycles Worst Case Executon Tme[ms] CONCLUSIONS In ths paper, an ntermeate approach of software an harware s presente usng DSP Slces an Block RAMs n FPGAs. More specfcally, a flexble-length-arthmetc processor base on FDFM approach s presente that supports arthmetc operatons for numbers wth flexbly many bts, even longer than 2048 bts. The potentalty of ths processor s shown through the mplementaton of moular exponentaton algorthm an compares t wth the mplementaton results usng 32-bt soft processor, McroBlaze n FPGA. The results n Table I an Table II show that ths work s sgnfcantly effcent n terms of resource use an tme complexty. In future, t can be apple for hgher bt RSA cryptography. 7. REFERENCES [1] VIRTEX-6 FPGA Memory Resources (V1.5), Xlnx Inc., [2] VIRTEX 6 ML605 Harware USER GUIDE (V1.2.1), Xlnx Inc., [3] VIRTEX-6 FPGA DSP48E1 SLICE USER GUIDE (V1.3), Xlnx Inc., [4] J. Borm, Y. Ito, an K. Nakano, Acceleratng the CKY parsng usng FPGAs, IEICE Transactons on Informaton an Systems, vol. E86-D, no. 5, pp , [5] J. L. Borm, Y. Ito, an K. Nakano, Instance-specfc solutons to accelerate the CKY parsng for large context-free grammars, Internatonal Journal on Founatons of Computer Scence, vol. 15, no. 2, pp , [6] Y. Ito an K. Nakano, A harware-software cooperatve approach for the exhaustve verfcaton of the Collatz conjecture, n Proc. of Internatonal Symposum on Parallel an Dstrbute Processng wth Applcatons, 2009, pp [7] K. Nakano an Y. Yamagsh, Harware n choose k counters wth applcatons to the partal exhaustve search, IEICE Transactons on Informaton an Systems, vol. E88-D, no. 7, [8] Y. Ito an K. Nakano, Effcent exhaustve verfcaton of the Collatz conjecture usng DSP blocks of Xlnx FPGAs, Internatonal Journal of Networkng an 30

7 Computng, vol. 1, no. 1, pp , [9] K. Nakano an E. Takamch, An mage retreval system usng FPGAs, IEICE Transactons on Informaton an Systems, vol. E86-D, no. 5, pp , May [10] Y. Ago, Y. Ito, an K. Nakano, An FPGA mplementaton for neural networks wth the FDFM processor core approach, Internatonal Journal of Parallel, Emergent an Dstrbute Systems, vol. 28, no. 4, pp , [11] Y. Ito an K. Nakano, Low-latency connecte component labelng usng an FPGA, Internatonal Journal of Founatons of Computer Scence, vol. 21, no. 03, pp , [12] X. Zhou, N. Tomagou, Y. Ito, an K. Nakano, Effcent Hough transform on the FPGA usng DSP slces an block RAMs, n Proc. of Internatonal Parallel an Dstrbute Processng Symposum Work-shops, May 2013, pp [13] VIRTEX-6 FPGA DSP48E1 SLICE USER GUIDE (V1.2), Xlnx Inc., [14] Y. Ago, A. Inoue, K. Nakano, an Y. Ito, The parallel FDFM processor core approach for neural networks, n Proc. of Internatonal Conference on Networkng an Computng, December 2011, pp [15] S. Bo, K. Kawakam, K. Nakano, an Y. Ito, An RSA encrypton harware algorthm usng a sngle DSP Block an sngle Block RAM on the FPGA, Internatonal Journal of Networkng an Computng, vol. 1, no. 2, pp , July [16] Y. Ito, K. Nakano, an S. Bo, The parallel FDFM processor core approach for CRT-base RSA ecrypton, Internatonal Journal of Networkng an Computng, vol. 2, pp , [17] K. Nakano, K. Kawakam, an K. Shgemoto, RSA encrypton an ecrypton usng the reunant number system on the FPGA, n In Proc. IEEE Internatonal Symposum on Parallel an Dstrbute Processng, May 2009, pp [18] R. L. Rvest, A. Shamr, an L. Aleman, A metho for obtanng gtal sgnatures an publc-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp , 1978 [19] T. Blum an C. Paar, Montgomery moular exponentaton on recon-fgurable harware, n Proc. of the 14th IEEE Symposum on Computer Arthmetc, 1999, pp [20] P. L. Montgomery, Moular multplcaton wthout tral vson, Math. of Comput., vol. 44, pp , [21] A. F. Tenca an C. K. Koc, A scalable archtecture for Montgomery multplcaton, n Proc. of the Frst Internatonal Workshop on Crypto-graphc Harware an Embee Systems, 1999, pp [22] M. Nmura an Y. Fuwa, Improvement of rax-2 k sgne-gt number for hgh spee crcut, Formalze Mathematcs, vol. 11, no. 2, , January 2003 [23] M. Nazrul Islam Monal, Kohan Sa, K. Nakano, an Y. Ito, A Flexble-Length-Arthmetc Processor Usng Embee DSP Slces an Block RAMs n FPGAs, In Proc. of the Frst Internatonal Symposum on Computng an Networkng (CANDAR 13), pp , December IJCA TM : 31

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems A Practcal Stuy of Regeneratng Coes for Peer-to-Peer Backup Systems Alessanro Dumnuco an Ernst Bersack EURECOM Sopha Antpols, France {umnuco,bersack}@eurecom.fr Abstract In strbute storage systems, erasure

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes The Desgn of Effcently-Encoable Rate-Compatble LDPC Coes Jaehong Km, Atya Ramamoorthy, Member, IEEE, an Steven W. McLaughln, Fellow, IEEE Abstract We present a new class of rregular low-ensty party-check

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS

A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS Internatonal Journal of Computer Networks & Communcatons (IJCNC) Vol.4, No., January 0 A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS M. Golam Rabul Alam, Chayan

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem

Implementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

THE LOAD PLANNING PROBLEM FOR LESS-THAN-TRUCKLOAD MOTOR CARRIERS AND A SOLUTION APPROACH. Professor Naoto Katayama* and Professor Shigeru Yurimoto*

THE LOAD PLANNING PROBLEM FOR LESS-THAN-TRUCKLOAD MOTOR CARRIERS AND A SOLUTION APPROACH. Professor Naoto Katayama* and Professor Shigeru Yurimoto* 7th Internatonal Symposum on Logstcs THE LOAD PLAIG PROBLEM FOR LESS-THA-TRUCKLOAD MOTOR CARRIERS AD A SOLUTIO APPROACH Professor aoto Katayama* an Professor Shgeru Yurmoto* * Faculty of Dstrbuton an Logstcs

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Fast degree elevation and knot insertion for B-spline curves

Fast degree elevation and knot insertion for B-spline curves Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence

More information

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. We characterze all cyclotomc polynomals of even egree wth coeffcents restrcte to the set {+1, 1}. In ths

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

High Performance Latent Dirichlet Allocation for Text Mining

High Performance Latent Dirichlet Allocation for Text Mining Hgh Performance Latent Drchlet Allocaton for Text Mnng A thess submtte for Degree of Doctor of Phlosophy By Department of Electronc an Computer Engneerng School of Engneerng an Desgn Brunel Unversty September

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

On the Optimal Marginal Rate of Income Tax

On the Optimal Marginal Rate of Income Tax On the Optmal Margnal Rate of Income Tax Gareth D Myles Insttute for Fscal Stues an Unversty of Exeter June 999 Abstract: The paper shows that n the quas-lnear moel of ncome taxaton, the optmal margnal

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Decomposition Methods for Large Scale LP Decoding

Decomposition Methods for Large Scale LP Decoding Decomposton Methos for Large Scale LP Decong Sharth Barman Xshuo Lu Stark Draper Benjamn Recht Abstract Felman et al. IEEE Trans. Inform. Theory, Mar. 2005) showe that lnear programmng LP) can be use to

More information

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org A Bnary Quantum-behave Partcle Swarm Optmzaton Algorthm wth Cooperatve

More information

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Search Efficient Representation of Healthcare Data based on the HL7 RIM

Search Efficient Representation of Healthcare Data based on the HL7 RIM 181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A) 3.1 B) 3.3 C) 3.5 D) 3.7 E) 3.9 Solution.

A) 3.1 B) 3.3 C) 3.5 D) 3.7 E) 3.9 Solution. ACTS 408 Instructor: Natala A. Humphreys SOLUTION TO HOMEWOR 4 Secton 7: Annutes whose payments follow a geometrc progresson. Secton 8: Annutes whose payments follow an arthmetc progresson. Problem Suppose

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Rank Based Clustering For Document Retrieval From Biomedical Databases

Rank Based Clustering For Document Retrieval From Biomedical Databases Jayanth Mancassamy et al /Internatonal Journal on Computer Scence and Engneerng Vol.1(2), 2009, 111-115 Rank Based Clusterng For Document Retreval From Bomedcal Databases Jayanth Mancassamy Department

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A General and Practical Datacenter Selection Framework for Cloud Services

A General and Practical Datacenter Selection Framework for Cloud Services 212 IEEE Ffth Internatonal Conference on Clou Computng A General an Practcal Datacenter Selecton Framework for Clou Servces Hong Xu, Baochun L henryxu, bl@eecg.toronto.eu Department of Electrcal an Computer

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

A Prefix Code Matching Parallel Load-Balancing Method for Solution-Adaptive Unstructured Finite Element Graphs on Distributed Memory Multicomputers

A Prefix Code Matching Parallel Load-Balancing Method for Solution-Adaptive Unstructured Finite Element Graphs on Distributed Memory Multicomputers Ž. The Journal of Supercomputng, 15, 25 49 2000 2000 Kluwer Academc Publshers. Manufactured n The Netherlands. A Prefx Code Matchng Parallel Load-Balancng Method for Soluton-Adaptve Unstructured Fnte Element

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

V. Chandrasekhar. National Instruments, Austin, TX, USA E-mail: Vikram.Chandrasekhar@ni.com

V. Chandrasekhar. National Instruments, Austin, TX, USA E-mail: Vikram.Chandrasekhar@ni.com 28 Int. J. Embedded Systems, Vol. 3, No. 3, 2008 Reducng dynamc power consumpton n next generaton DS-CDMA moble communcaton recevers V. Chandrasekhar Natonal Instruments, Austn, TX, USA E-mal: Vkram.Chandrasekhar@n.com

More information

The University of Texas at Austin. Austin, Texas 78712. December 1987. Abstract. programs in which operations of dierent processes mayoverlap.

The University of Texas at Austin. Austin, Texas 78712. December 1987. Abstract. programs in which operations of dierent processes mayoverlap. Atomc Semantcs of Nonatomc Programs James H. Anderson Mohamed G. Gouda Department of Computer Scences The Unversty of Texas at Austn Austn, Texas 78712 December 1987 Abstract We argue that t s possble,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks

A Perfect QoS Routing Algorithm for Finding the Best Path for Dynamic Networks A Perfect QoS Routng Algorthm for Fndng the Best Path for Dynamc Networks Hazem M. El-Bakry Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, EGYPT helbakry20@yahoo.com Nkos Mastoraks

More information

Fully Homomorphic Encryption Scheme with Symmetric Keys

Fully Homomorphic Encryption Scheme with Symmetric Keys Fully Homomorphc Encrypton Scheme wth Symmetrc Keys A Dssertaton submtted n partal fulfllment for the award of the Degree of Master of Technology n Department of Computer Scence & Engneerng (wth specalzaton

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Resource Scheduling in Desktop Grid by Grid-JQA

Resource Scheduling in Desktop Grid by Grid-JQA The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty

More information

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam DEGREES OF EQUIVALECE I A EY COMPARISO Thang H. L., guyen D. D. Vetnam Metrology Insttute, Aress: 8 Hoang Quoc Vet, Hano, Vetnam Abstract: In an nterlaboratory key comparson, a ata analyss proceure for

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Heuristic Static Load-Balancing Algorithm Applied to CESM

Heuristic Static Load-Balancing Algorithm Applied to CESM Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Computing Arbitrary Functions of Encrypted Data March 2010 Communications of the ACM

Computing Arbitrary Functions of Encrypted Data March 2010 Communications of the ACM Home» Magazne Archve» 2010» No. 3» Computng Arbtrary Functons of Encrypted Data» Full Text RESEARCH HIGHLIGHTS Computng Arbtrary Functons of Encrypted Data Crag Gentry Communcatons of the ACM Vol. 53 No.

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

A machine vision approach for detecting and inspecting circular parts

A machine vision approach for detecting and inspecting circular parts A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

An algorithm of choosing LSPs in the MPLS network with unreliable links

An algorithm of choosing LSPs in the MPLS network with unreliable links Ireneusz OLSZESKI Unversty of Technology an Lfe Scences n Bygoszcz, Faculty of Telecommuncatons an Electrcal Engneerng An algorthm of choosng LSPs n the MPLS network wth unrelable lnks Streszczene. pracy

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Title Language Model for Information Retrieval

Title Language Model for Information Retrieval Ttle Language Model for Informaton Retreval Rong Jn Language Technologes Insttute School of Computer Scence Carnege Mellon Unversty Alex G. Hauptmann Computer Scence Department School of Computer Scence

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

= i δ δ s n and PV = a n = 1 v n = 1 e nδ

= i δ δ s n and PV = a n = 1 v n = 1 e nδ Exam 2 s Th March 19 You are allowe 7 sheets of notes an a calculator 41) An mportant fact about smple nterest s that for smple nterest A(t) = K[1+t], the amount of nterest earne each year s constant =

More information

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion 212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information