Medical Algorithms of an Elliptical Portfolio

Size: px
Start display at page:

Download "Medical Algorithms of an Elliptical Portfolio"

Transcription

1 Coputers an Electrical Engineering 35 (29) Contents lists available at ScienceDirect Coputers an Electrical Engineering journal hoepage: An area/perforance trae-off analysis of a GF(2 ) ultiplier architecture for elliptic curve cryptography Miguel Morales-Sanoval, Clauia Feregrino-Uribe, René Cuplio *, Ignacio Algreo-Baillo Coputer Science Departent, National Institute for Astrophysics, Optics an Electronics, Luis Enrique Erro No. 1, Tonantzintla, Pue. 7284, Mexico article info abstract Article history: Receive 24 January 27 Receive in revise for 26 Noveber 27 Accepte 27 May 28 Available online 31 August 28 A harware architecture for GF(2 ) ultiplication an its evaluation in a harware architecture for elliptic curve scalar ultiplication is presente. The architecture is a paraeterizable igit-serial ipleentation for any fiel orer. Area/perforance trae-off results of the harware ipleentation of the ultiplier in an FPGA are presente an iscusse. Ó 28 Elsevier Lt. All rights reserve. 1. Introuction Finite fiels like the binary GF(2 ) an the prie GF(p) have been use successfully in error correction coes an cryptographic algoriths. In elliptic curve cryptography (ECC), the overall perforance of cryptographic ECC schees is harly eterine by arithetic in GF(2 ), being inversion an ultiplication the ost tie consuing operations. Accoring to the literature, arithetic in GF(2 ) binary fiels using polynoial basis leas to efficient harware ipleentations of ECC. Soe works relate to harware ipleentation of ECC have reporte paraeterizable GF(2 ) arithetic units to copute the ost tie consuing operation in elliptic curve cryptography, the scalar ultiplication. Those architectures are base on a iversity of ultiplication algoriths, for exaple: Massey Oura ultipliers [1], linear feeback shift registers ultipliers [2], Karatsuba [3,4], an igit-serial ultipliers [5]. Other works have stuie an ipleente GF(2 ) ultipliers using polynoial basis like [8,9]. Others have use ifferent algoriths, like the Montgoery ultiplication [1,11]. Although, fro the architectural point of view, it is well known that the arithetic unit has a big ipact in the tiing an area of harware for scalar ultiplication, it is not clear whether the architecture perforance is ue to the parallelis in the ultipliers, the nuber of ultipliers, or the kin of ultipliers use. This technical counication presents the harware architecture of a GF(2 ) igit-serial ultiplier an evaluates the area/perforance trae off, consiering various igit sizes an finite fiel orers. 2. GF(2 ) ultiplication architecture Multiplication in GF(2 ) in polynoial basis is the operation A(x) B(x) o F(x), that can be copute using a variety of propose algoriths in the literature. On the one han, serial or bit-serial algoriths, consier each iniviual bit of the operan B(x) which iplies a latency for ultiplication of clock cycles. On the other han, igit-serial ultipliers consier a group of bits of operan B(x) at tie an perfor the ultiplication in / cycles. However, it is not clear which is the * Corresponing author. Tel.: ; fax: E-ail aress: rcuplio@inaoep.x (R. Cuplio) /$ - see front atter Ó 28 Elsevier Lt. All rights reserve. oi:1.116/j.copeleceng

2 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) best size of for this kin of ultiplier to achieve an appropriate perforance that eets the constraints for a specific application. Varying the size of the igit allows to explore the cost in area an perforance iproveents fro a serial ipleentation up to a parallel ultiplication architecture. At each iteration, the operan A(x) is ultiplie by a group of bits of operan B(x) an the result is reuce oulo F(x). The result is ae accuulatively to the result of the next iteration, consiering the following bits of B(x) until all B(x) bits are processe. The reuction in the operation latency coes with an increent in the coplexity at each step of the ultiplication. For our ipleentation, we consier the igit serial Algorith 1 [6], the sae algorith use for the work reporte in [5], an show the ifferent area/tie results when the igit size is varie. This will help esigners to select suitable paraeters when ipleenting architectures for high level applications like cryptographic algoriths or error correction coe algoriths. Algorith 1. Digit-serial ultiplication: ultiplication in GF(2 ) Require: A(x), B(x) in GF(2 ), F(x) the + 1 grae irreucible polynoial Ensure: C(x)=A(x) * B (x) o F(x) 1: C(x) B s 1 (x)a(x) o F(x) 2: for k fro s 2 own to o C(x) x C(x) C(x) C(x)+B k (x)a(x) o F(x) en for Being B(x) an eleent in GF(2 ) using polynoial basis, this is viewe as the polynoial b 1 x 1 + b 2 x b 1 x + b. For a positive igit nuber <, the polynoial B(x) can be groupe so that it can be expresse as B(x)=x (s 1) B s 1 (x)+x (s 2) B s 2 (x)++ x B 1 (x)+b (x), where s = /e an each wor B i (x) is efine as follows: 8 P 1 >< b iþj x j if 6 i < s 1; B i ðxþ ¼ >: j¼ ð%þ 1 P j¼ b iþj x j if i ¼ s 1: If x is factore fro the groupe representation of B(x), the resulting expression is BðxÞ ¼x ðx ð ðx ðx B s 1 ðxþþb s 2 ðxþþþþþb 1 ÞþB Þ: This last representation of operan B(x) is use in Algorith 1 to copute the fiel ultiplication. That is, A(x)B(x) o F(x)=x (x ((x (x B s 1 (x)a(x)+b s 2 (x)a(x)) +)+ B 1 A(x)) + B A(x)) o F(x). At each iteration, the accuulator C(x) is ultiplie by x an the result is ae to the ultiplication of A(x) by each wor B i (x) ofb(x). The partial result C(x) is reuce oulo F(x). CðxÞ ¼B s 1 ðxþaðxþ o FðxÞ Initialization CðxÞ ¼x CðxÞ o FðxÞ ¼x B s 1 ðxþaðxþ o FðxÞ Iteration s 2 CðxÞ ¼x B s 1 ðxþaðxþþb s 2 ðxþaðxþ o FðxÞ CðxÞ ¼x CðxÞ o FðxÞ ¼x ðx B s 1 ðxþaðxþþb s 2 ðxþaðxþþ o FðxÞ Iteration s 3 CðxÞ ¼x ðx B s 1 ðxþaðxþþb s 2 ðxþaðxþþ þ B s 3 ðxþaðxþ o FðxÞ The propose architecture for Algorith 1 is shown In the left sie of Fig. 1. A finite state achine controls the ata flow executing the loop in Algorith 1. At each iteration, a new igit of bits fro B(x) is processe so the operation is perfore in /e cycles. The operations x C(x) an B i (x)a(x) are copute using parallel cobinatorial ultipliers, that ultiplies a 1 grae polynoial with a 1 grae polynoial. Being U(x) a 1 grae polynoial u 1 x 1 + u 2 x u 1 x + u, an A(x) a 1 grae polynoial, the parallel ultiplication is UðxÞAðxÞ o FðxÞ ¼u 1 x 1 AðxÞ o FðxÞ þ u 2 x 2 AðxÞ o FðxÞ þ þ u 1 xaðxþ o FðxÞ þ u AðxÞ o FðxÞ: The operation xa(x) o F(x) is a shift to the left operation of A(x) together a reuction of F(x). Thus, the value x i A(x) o F(x) is the shifte an reuce version of x i 1 A(x) o F(x). So each value x i A(x) o F(x) can be generate sequentially starting with x A(x). Finally, each x i A(x) o F(x) value is ae epening on the bit value of u i. These operations are execute by the parallel ultiplier shown in the right sie of Fig. 1.

3 56 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) A(x) B(x) 1 Shift Digit B(x)-register A(x) F(x) Cobinatorial Multiplier S&R S&R S&R S&R Cobinatorial Multiplier U(x) u u 1 u 2 u -2 u -1 Q 1 (x) Q 2 (x) XOR C(x)-register S&R = A(x)x o F(x) - A(x) U(x) o F(x) C(x) = A(x) B(x) o F(x) GF(2 ) igit ultiplier architecture Parallel Cobinatorial ultiplier Fig. 1. Harware architecture for igit serial finite fiel ultiplication. The operation x C(x) o F(x) is copute in two steps. Using the polynoial representation of C(x), x CðxÞ o FðxÞ ¼x ðc 1 x 1 þ c 2 x 2 þþc x þ c 1 x 1 þþc 1 x þ c Þ o FðxÞ ¼ x ðc 1 x 1 þ c 2 x 2 þþc x Þ o FðxÞþx ðc 1 x 1 þþc 1 x þ c Þ o FðxÞ ¼ðc 1 x þ-1 þ c 2 x þ 2 þþc x Þ o FðxÞþðc 1 x 1 þþc 1 x þ1 þ c x Þ o FðxÞ ¼ Q 1 ðxþ o FðxÞþQ 2 ðxþ o FðxÞ: Q 2 (x)isa 1 grae polynoial, corresponing to the least significant bits of C(x) shifte positions to the left. Q 2 (x) oes not nee to be reuce. By factoring x fro Q 1 (x), it is obtaine Q 1 (x)=x (c 1 x 1 + c 2 x c ). In this case, being F(x) a + 1 trinoial or pentanoial of the for F(x)=x + g(x), where g(x) is a polynoial with grae g, the equivalence x g(x) can be use. In this case, g(x) correspons to all bits of F(x) except the -bit. Thus, Q 1 (x) o F(x)=g(x)(c 1 x 1 + c 2 x 2 ++ c ). That is, the operation is a ultiplication of g(x) of grae g, an a polynoial of grae, corresponing to the ost significant bits of C(x). The resulting polynoial is of grae g +. In all the cases the polynoial F(x) use in the tests for the finite fiels 2 {163,233,283,49,571}, an igits {1,4,8,16,32}, the value g +, so no reuction is necessary. The polynoial g(x) is expane to a 1 grae polynoial so Q 1 (x) o F(x) be copute using the parallel cobinatorial ultiplier. All these coputations are perfore by the oules in the architecture for the ultipliers, which inclues the parallel ultipliers, a shift to the left oule of -bits, two registers an a 3-input xor gate. 3. Ipleentation an results The architecture was esigne in VHDL, siulate an valiate using Active-HDL an a test progra in C. The architecture is paraetrizable in the file orer for any value. The average syste throughput of the architecture was obtaine by synthesizing it to several finite fiel orers for the reconfigurable evice xc2v2 FPGA, using Xilinx s tools. The ultiplier was ipleente for the fiel orers = 163, 233, 283, 49 an 571 recoene by NIST [7] for elliptic curve cryptography, an for the fiel = 277 recoene by IPSec. Due the large nuber of I/O pins in the architecture, the GF(2 ) ultiplier was ipleente together an I/O interface. This is a finite state achine that gets the input paraeters A(x) an B(x) as 32-bit wors an once the operation is copute, it elivers the results in several 32-bit wors. The results presente in figures inclue the I/O interface. We also investigate the perforance of the ultiplier consiering the processing tie. Fig. 2 shows the processing tie for specific finite fiels an igit sizes an Fig. 3 shows the area resources require for each one of these finite fiels an igit sizes. Fro these figures, it can be observe that the bigger the igit, the better the perforance, but the higher area requireents. Latency of the ultiplier is ainly reuce by the size of the igit. Fro Fig. 2, it is seen that the ifference in tiing between the igit size 16 an 32 bits is not significant, thus the extra cost in ters of area for igit sizes greater that 32 bits is not justifie.

4 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) Tie (us) igit = 1 igit = 4 igit = 8 igit = 16 igit = (fiel orer) Fig. 2. Tie (us) to copute GF(2 ) ultiplication using ifferent parallelis grae an finite fiel orers. 12 Area (Slices) igit = 1 igit = 4 igit = 8 igit = 16 igit = (fiel orer) Fig. 3. Area (slices) resources for ifferent parallelis grae an finite fiel orers. The application constraints will guie the selection of the best ipleentation paraeters. As an exaple of an application, consier a reconfigurable architecture for scalar ultiplication in elliptic curve cryptography that anages several finite fiel orers, but only assigns fixe space for the fiel ultiplier. For each specific finite fiel orer, there is a igit size that axiizes the perforance of the ultiplier for a fixe area. For exaple, with 4 K gates the best perforer is a 4- igit fiel ultiplier for the fiel = 571. In this area, we coul also ipleent a 8-igit or a 16-igit ultiplier for the fiels = 49 an = 277, respectively, an so on. It is worth to ention that the results presente in this technical counication were obtaine fro place an route optiize for spee an without keeping the hierarchical structure of the esign. Finally, Table 1 shows a coparison of the area results an perforance achieve in this work against the results presente in [8] for several kins of parallel ultipliers, using the fiel = 233 an the sae technology, a virtex2 FPGA xc2v6-4. In this coparison, the I/O interface was not use. The results show that the igit serial solution requires less area, 1 ties lower for = 32 copare to the parallel ipleentation of the classical ultiplier at the cost of six ore clock cycles. In all the cases, the igit-serial ultiplier has greater frequency which iplies this oule can be integrate to other esigns working at high frequencies. The ultiplier using = 1 achieves better tiing (269 MHz,.6us) copare with the bit-serial ipleentation in [9] (42 MHz, 7.4 us) for the finite fiel = 163. Other works have ipleente finite fiel ultipliers an use the in elliptic curve coprocessors or processors [1 5] but the results for the stanalone ultiplier are not available. Others have ipleente the ultiplier for the GF(p) finite fiel so a irect coparison is not possible [1,11].

5 58 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) Table 1 Area an tie coparison results Ref. Multiplier LUT/FF Slices Gate count Clock perio (ns) Frequency (MHz) [8] Classical (est.) 37,296/37, , [8] HybriKaratsuba 11,746/13, , [8] MasseyOura 36,857/8, , [8] SunarKoc 45,435/41,942 68, This work ( = 1) 484/ This work ( = 4) 1188/ , This work ( = 8) 2115/ , This work ( = 16) 44/ , This work ( = 32) 711/ , Conclusions An area/perforance trae off analysis for a igit-serial GF(2 ) finite fiel ultiplication was presente. The size of the igit to use in an application of the propose ultiplier architecture will be guie by the area assigne to the ultiplier. Also, the require processing tie an which other igits can be use to axiize the perforance for other fiel orer using greater igits shoul be taken into account. Acknowlegents First author thanks the National Council for Science an Technology fro Mexico (CONACyT) for financial support through the scholarship nuber References [1] Ernest M, Klupsch S, Hauck O, Huss SA. Rapi prototyping for harware accelerate elliptic curve public key cryptosystes. In: Proceeings of 12th IEEE workshop on rapi syste prototyping, RSP 21, Monterey, CA; June 21, p [2] Benara M, Dalrup M, Gathen J, Shokrollahi J, Teich J. Reconfigurable ipleentation of elliptic curve crypto algoriths. In: IPDPS 2: Proceeings of the 16th international parallel an istribute processing syposiu. Washington, DC, USA: IEEE Coputer Society; 22. p [3] Ernest M, Jung M, Malener F, Huss S, Blüel R. A reconfigurable syste on chip ipleentation for elliptic curve cryptographyover GF(2 ). In: Proceeings of the 4th international workshop on cryptographic harware an ebee systes CHES 22. Lecture notes in coputer science, vol Rewoo Shores, CA: Springer; 22. p [4] Saquib N, Roriguez F, Diaz A. A parallel architecture for fast coputation of elliptic curve scalar ultiplication over GF(2 ). In: Proceeings of 11th reconfigurable architectures workshop, RAW 4, Sta. Fe, USA; April 24. p [5] Lutz J, Hasan A. High perforance FPGA base elliptic curve cryptographic co-processor. ITCC 4: international conference on inforation technology: coing an coputing, vol. 2. IEEE Society Press; 24. p [6] Lutz Jonathan. High perforance elliptic curve cryptographic co-processor. Master s thesis, University of Waterloo; 23. [7] NIST. Recoene elliptic curves for feeral governent use. < [8] Grabbe C, Benara M, Teich J, von zur Gathen J, Shokrollahi J. FPGA esigns of parallel high perforance GF(2 233 ) ultipliers. In: Proceeings of IEEE ISCAS 3, vol. II; 23. p [9] Kitsos P, Theooriis G, Koufopavlou O. An efficient reconfigurable ultiplier architecture for galois fiel GF(2 ). Microelectron J 23;34(1). [1] Savasß E, Tenca AF, Koç ÇK. A scalable an unifie ultiplier architecture for finite fiels GF(p) an GF(2 ). Cryptographic harware an ebee systes, LNCS no. 1965; August 2. p [11] Tenca AF, Koc Cetin K. A scalable architecture for oular ultiplication base on Montgoery s algorith. IEEE Trans Coput 23;52(9):

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

WORKING OUT А NEW MODEL OF FORECASTING OF ROAD ACCIDENTS ON A METHOD OF CONFLICT SITUATIONS FOR CITY CONDITIONS

WORKING OUT А NEW MODEL OF FORECASTING OF ROAD ACCIDENTS ON A METHOD OF CONFLICT SITUATIONS FOR CITY CONDITIONS The 11 th International Conference RELIABILITY an STATISTICS in TRANSPORTATION an COMMUNICATION - 2011 Proceeings of the 11th International Conference Reliability an Statistics in Transportation an Counication

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

3D Encoding/2D Decoding of Medical Data

3D Encoding/2D Decoding of Medical Data D Encoing/D Decoing of Meical Data Gloria Menegaz, Jean-Philippe Thiran Abstract We propose a fully three-iensional wavelet-base coing syste featuring D encoing/d ecoing functionalities. A fully threeiensional

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

The Path to Program Sustainability

The Path to Program Sustainability The Path to Progra Sustainability by Karen Buck The Sustainability Conunru A New Moel for Sustainability The Path to Progra Sustainability Step 1: What exactly are we trying to sustain? Step 2: How uch

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Fuzzy TOPSIS and GP Application for Evaluation And Selection of a Suitable ERP

Fuzzy TOPSIS and GP Application for Evaluation And Selection of a Suitable ERP Australian Journal of Basic an Applie Sciences, (11): 138-136, 11 ISSN 11-8 Fuzzy TOPSIS an GP Application for Evaluation An Selection of a Suitable ERP 1 Mohaa Air Nikoo, Masou Mosaegh Khah an 3 Ali oghii

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

The Concept of the Effective Mass Tensor in GR. The Equation of Motion

The Concept of the Effective Mass Tensor in GR. The Equation of Motion The Concept of the Effective Mass Tensor in GR The Equation of Motion Mirosław J. Kubiak Zespół Szkół Technicznych, Gruziąz, Polan Abstract: In the papers [, ] we presente the concept of the effective

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Monte Carlo Analysis of Real-Time Electricity Pricing for Industrial Loads By Dr. Carl J. Spezia

Monte Carlo Analysis of Real-Time Electricity Pricing for Industrial Loads By Dr. Carl J. Spezia Volue 25, uber 3 - July 29 through Septeber 29 Monte Carlo Analysis of Real-Tie Electricity Pricing for Inustrial oas By Dr. Carl J. Spezia Peer-Referee Applie Papers Keywor Search Electricity Energy Research

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Homework 8. problems: 10.40, 10.73, 11.55, 12.43

Homework 8. problems: 10.40, 10.73, 11.55, 12.43 Hoework 8 probles: 0.0, 0.7,.55,. Proble 0.0 A block of ass kg an a block of ass 6 kg are connecte by a assless strint over a pulley in the shape of a soli isk having raius R0.5 an ass M0 kg. These blocks

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Implementation and Design of AES S-Box on FPGA

Implementation and Design of AES S-Box on FPGA International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

USE OF MICRO TUBES AS AN ALTERNATIVE TO THE DESIGN OF DRIP IRRIGATION SYSTEM

USE OF MICRO TUBES AS AN ALTERNATIVE TO THE DESIGN OF DRIP IRRIGATION SYSTEM USE OF MICRO TUBES AS AN ALTERNATIVE TO THE DESIGN OF DRIP IRRIGATION SYSTEM Muhae Bhuiyan School o Civil, Environental an Cheical Engineering, RMIT University, Melbourne, VIC 3001, Australia, Eail: uhae.bhuiyan@rit.eu.au

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft Introduction to the Michael Clark Developent Manager Microsoft Agenda Why Is Sync both Interesting and Hard Sync Fraework Overview Using the Sync Fraework Future Directions Suary Why Is Sync Iportant Coputing

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization? Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA ch54@lehigh.edu Martin Taáč Industrial and

More information

An online sulfur monitoring system can improve process balance sheets

An online sulfur monitoring system can improve process balance sheets Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

CITY BANK AMERICAN EXPRESS CREDIT CARD APPLICATION FORM

CITY BANK AMERICAN EXPRESS CREDIT CARD APPLICATION FORM CITY BANK AMERICAN EXPRESS CREDIT CARD APPLICATION FORM Sales & Service Center Date DSE/Eploee Coe # File Serial # Branch DST Application Coe Group Sales General Instructions: Use CAPITAL LETTERS Tick

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information