Medical Algorithms of an Elliptical Portfolio
|
|
- Jonas Austen Patterson
- 3 years ago
- Views:
Transcription
1 Coputers an Electrical Engineering 35 (29) Contents lists available at ScienceDirect Coputers an Electrical Engineering journal hoepage: An area/perforance trae-off analysis of a GF(2 ) ultiplier architecture for elliptic curve cryptography Miguel Morales-Sanoval, Clauia Feregrino-Uribe, René Cuplio *, Ignacio Algreo-Baillo Coputer Science Departent, National Institute for Astrophysics, Optics an Electronics, Luis Enrique Erro No. 1, Tonantzintla, Pue. 7284, Mexico article info abstract Article history: Receive 24 January 27 Receive in revise for 26 Noveber 27 Accepte 27 May 28 Available online 31 August 28 A harware architecture for GF(2 ) ultiplication an its evaluation in a harware architecture for elliptic curve scalar ultiplication is presente. The architecture is a paraeterizable igit-serial ipleentation for any fiel orer. Area/perforance trae-off results of the harware ipleentation of the ultiplier in an FPGA are presente an iscusse. Ó 28 Elsevier Lt. All rights reserve. 1. Introuction Finite fiels like the binary GF(2 ) an the prie GF(p) have been use successfully in error correction coes an cryptographic algoriths. In elliptic curve cryptography (ECC), the overall perforance of cryptographic ECC schees is harly eterine by arithetic in GF(2 ), being inversion an ultiplication the ost tie consuing operations. Accoring to the literature, arithetic in GF(2 ) binary fiels using polynoial basis leas to efficient harware ipleentations of ECC. Soe works relate to harware ipleentation of ECC have reporte paraeterizable GF(2 ) arithetic units to copute the ost tie consuing operation in elliptic curve cryptography, the scalar ultiplication. Those architectures are base on a iversity of ultiplication algoriths, for exaple: Massey Oura ultipliers [1], linear feeback shift registers ultipliers [2], Karatsuba [3,4], an igit-serial ultipliers [5]. Other works have stuie an ipleente GF(2 ) ultipliers using polynoial basis like [8,9]. Others have use ifferent algoriths, like the Montgoery ultiplication [1,11]. Although, fro the architectural point of view, it is well known that the arithetic unit has a big ipact in the tiing an area of harware for scalar ultiplication, it is not clear whether the architecture perforance is ue to the parallelis in the ultipliers, the nuber of ultipliers, or the kin of ultipliers use. This technical counication presents the harware architecture of a GF(2 ) igit-serial ultiplier an evaluates the area/perforance trae off, consiering various igit sizes an finite fiel orers. 2. GF(2 ) ultiplication architecture Multiplication in GF(2 ) in polynoial basis is the operation A(x) B(x) o F(x), that can be copute using a variety of propose algoriths in the literature. On the one han, serial or bit-serial algoriths, consier each iniviual bit of the operan B(x) which iplies a latency for ultiplication of clock cycles. On the other han, igit-serial ultipliers consier a group of bits of operan B(x) at tie an perfor the ultiplication in / cycles. However, it is not clear which is the * Corresponing author. Tel.: ; fax: E-ail aress: rcuplio@inaoep.x (R. Cuplio) /$ - see front atter Ó 28 Elsevier Lt. All rights reserve. oi:1.116/j.copeleceng
2 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) best size of for this kin of ultiplier to achieve an appropriate perforance that eets the constraints for a specific application. Varying the size of the igit allows to explore the cost in area an perforance iproveents fro a serial ipleentation up to a parallel ultiplication architecture. At each iteration, the operan A(x) is ultiplie by a group of bits of operan B(x) an the result is reuce oulo F(x). The result is ae accuulatively to the result of the next iteration, consiering the following bits of B(x) until all B(x) bits are processe. The reuction in the operation latency coes with an increent in the coplexity at each step of the ultiplication. For our ipleentation, we consier the igit serial Algorith 1 [6], the sae algorith use for the work reporte in [5], an show the ifferent area/tie results when the igit size is varie. This will help esigners to select suitable paraeters when ipleenting architectures for high level applications like cryptographic algoriths or error correction coe algoriths. Algorith 1. Digit-serial ultiplication: ultiplication in GF(2 ) Require: A(x), B(x) in GF(2 ), F(x) the + 1 grae irreucible polynoial Ensure: C(x)=A(x) * B (x) o F(x) 1: C(x) B s 1 (x)a(x) o F(x) 2: for k fro s 2 own to o C(x) x C(x) C(x) C(x)+B k (x)a(x) o F(x) en for Being B(x) an eleent in GF(2 ) using polynoial basis, this is viewe as the polynoial b 1 x 1 + b 2 x b 1 x + b. For a positive igit nuber <, the polynoial B(x) can be groupe so that it can be expresse as B(x)=x (s 1) B s 1 (x)+x (s 2) B s 2 (x)++ x B 1 (x)+b (x), where s = /e an each wor B i (x) is efine as follows: 8 P 1 >< b iþj x j if 6 i < s 1; B i ðxþ ¼ >: j¼ ð%þ 1 P j¼ b iþj x j if i ¼ s 1: If x is factore fro the groupe representation of B(x), the resulting expression is BðxÞ ¼x ðx ð ðx ðx B s 1 ðxþþb s 2 ðxþþþþþb 1 ÞþB Þ: This last representation of operan B(x) is use in Algorith 1 to copute the fiel ultiplication. That is, A(x)B(x) o F(x)=x (x ((x (x B s 1 (x)a(x)+b s 2 (x)a(x)) +)+ B 1 A(x)) + B A(x)) o F(x). At each iteration, the accuulator C(x) is ultiplie by x an the result is ae to the ultiplication of A(x) by each wor B i (x) ofb(x). The partial result C(x) is reuce oulo F(x). CðxÞ ¼B s 1 ðxþaðxþ o FðxÞ Initialization CðxÞ ¼x CðxÞ o FðxÞ ¼x B s 1 ðxþaðxþ o FðxÞ Iteration s 2 CðxÞ ¼x B s 1 ðxþaðxþþb s 2 ðxþaðxþ o FðxÞ CðxÞ ¼x CðxÞ o FðxÞ ¼x ðx B s 1 ðxþaðxþþb s 2 ðxþaðxþþ o FðxÞ Iteration s 3 CðxÞ ¼x ðx B s 1 ðxþaðxþþb s 2 ðxþaðxþþ þ B s 3 ðxþaðxþ o FðxÞ The propose architecture for Algorith 1 is shown In the left sie of Fig. 1. A finite state achine controls the ata flow executing the loop in Algorith 1. At each iteration, a new igit of bits fro B(x) is processe so the operation is perfore in /e cycles. The operations x C(x) an B i (x)a(x) are copute using parallel cobinatorial ultipliers, that ultiplies a 1 grae polynoial with a 1 grae polynoial. Being U(x) a 1 grae polynoial u 1 x 1 + u 2 x u 1 x + u, an A(x) a 1 grae polynoial, the parallel ultiplication is UðxÞAðxÞ o FðxÞ ¼u 1 x 1 AðxÞ o FðxÞ þ u 2 x 2 AðxÞ o FðxÞ þ þ u 1 xaðxþ o FðxÞ þ u AðxÞ o FðxÞ: The operation xa(x) o F(x) is a shift to the left operation of A(x) together a reuction of F(x). Thus, the value x i A(x) o F(x) is the shifte an reuce version of x i 1 A(x) o F(x). So each value x i A(x) o F(x) can be generate sequentially starting with x A(x). Finally, each x i A(x) o F(x) value is ae epening on the bit value of u i. These operations are execute by the parallel ultiplier shown in the right sie of Fig. 1.
3 56 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) A(x) B(x) 1 Shift Digit B(x)-register A(x) F(x) Cobinatorial Multiplier S&R S&R S&R S&R Cobinatorial Multiplier U(x) u u 1 u 2 u -2 u -1 Q 1 (x) Q 2 (x) XOR C(x)-register S&R = A(x)x o F(x) - A(x) U(x) o F(x) C(x) = A(x) B(x) o F(x) GF(2 ) igit ultiplier architecture Parallel Cobinatorial ultiplier Fig. 1. Harware architecture for igit serial finite fiel ultiplication. The operation x C(x) o F(x) is copute in two steps. Using the polynoial representation of C(x), x CðxÞ o FðxÞ ¼x ðc 1 x 1 þ c 2 x 2 þþc x þ c 1 x 1 þþc 1 x þ c Þ o FðxÞ ¼ x ðc 1 x 1 þ c 2 x 2 þþc x Þ o FðxÞþx ðc 1 x 1 þþc 1 x þ c Þ o FðxÞ ¼ðc 1 x þ-1 þ c 2 x þ 2 þþc x Þ o FðxÞþðc 1 x 1 þþc 1 x þ1 þ c x Þ o FðxÞ ¼ Q 1 ðxþ o FðxÞþQ 2 ðxþ o FðxÞ: Q 2 (x)isa 1 grae polynoial, corresponing to the least significant bits of C(x) shifte positions to the left. Q 2 (x) oes not nee to be reuce. By factoring x fro Q 1 (x), it is obtaine Q 1 (x)=x (c 1 x 1 + c 2 x c ). In this case, being F(x) a + 1 trinoial or pentanoial of the for F(x)=x + g(x), where g(x) is a polynoial with grae g, the equivalence x g(x) can be use. In this case, g(x) correspons to all bits of F(x) except the -bit. Thus, Q 1 (x) o F(x)=g(x)(c 1 x 1 + c 2 x 2 ++ c ). That is, the operation is a ultiplication of g(x) of grae g, an a polynoial of grae, corresponing to the ost significant bits of C(x). The resulting polynoial is of grae g +. In all the cases the polynoial F(x) use in the tests for the finite fiels 2 {163,233,283,49,571}, an igits {1,4,8,16,32}, the value g +, so no reuction is necessary. The polynoial g(x) is expane to a 1 grae polynoial so Q 1 (x) o F(x) be copute using the parallel cobinatorial ultiplier. All these coputations are perfore by the oules in the architecture for the ultipliers, which inclues the parallel ultipliers, a shift to the left oule of -bits, two registers an a 3-input xor gate. 3. Ipleentation an results The architecture was esigne in VHDL, siulate an valiate using Active-HDL an a test progra in C. The architecture is paraetrizable in the file orer for any value. The average syste throughput of the architecture was obtaine by synthesizing it to several finite fiel orers for the reconfigurable evice xc2v2 FPGA, using Xilinx s tools. The ultiplier was ipleente for the fiel orers = 163, 233, 283, 49 an 571 recoene by NIST [7] for elliptic curve cryptography, an for the fiel = 277 recoene by IPSec. Due the large nuber of I/O pins in the architecture, the GF(2 ) ultiplier was ipleente together an I/O interface. This is a finite state achine that gets the input paraeters A(x) an B(x) as 32-bit wors an once the operation is copute, it elivers the results in several 32-bit wors. The results presente in figures inclue the I/O interface. We also investigate the perforance of the ultiplier consiering the processing tie. Fig. 2 shows the processing tie for specific finite fiels an igit sizes an Fig. 3 shows the area resources require for each one of these finite fiels an igit sizes. Fro these figures, it can be observe that the bigger the igit, the better the perforance, but the higher area requireents. Latency of the ultiplier is ainly reuce by the size of the igit. Fro Fig. 2, it is seen that the ifference in tiing between the igit size 16 an 32 bits is not significant, thus the extra cost in ters of area for igit sizes greater that 32 bits is not justifie.
4 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) Tie (us) igit = 1 igit = 4 igit = 8 igit = 16 igit = (fiel orer) Fig. 2. Tie (us) to copute GF(2 ) ultiplication using ifferent parallelis grae an finite fiel orers. 12 Area (Slices) igit = 1 igit = 4 igit = 8 igit = 16 igit = (fiel orer) Fig. 3. Area (slices) resources for ifferent parallelis grae an finite fiel orers. The application constraints will guie the selection of the best ipleentation paraeters. As an exaple of an application, consier a reconfigurable architecture for scalar ultiplication in elliptic curve cryptography that anages several finite fiel orers, but only assigns fixe space for the fiel ultiplier. For each specific finite fiel orer, there is a igit size that axiizes the perforance of the ultiplier for a fixe area. For exaple, with 4 K gates the best perforer is a 4- igit fiel ultiplier for the fiel = 571. In this area, we coul also ipleent a 8-igit or a 16-igit ultiplier for the fiels = 49 an = 277, respectively, an so on. It is worth to ention that the results presente in this technical counication were obtaine fro place an route optiize for spee an without keeping the hierarchical structure of the esign. Finally, Table 1 shows a coparison of the area results an perforance achieve in this work against the results presente in [8] for several kins of parallel ultipliers, using the fiel = 233 an the sae technology, a virtex2 FPGA xc2v6-4. In this coparison, the I/O interface was not use. The results show that the igit serial solution requires less area, 1 ties lower for = 32 copare to the parallel ipleentation of the classical ultiplier at the cost of six ore clock cycles. In all the cases, the igit-serial ultiplier has greater frequency which iplies this oule can be integrate to other esigns working at high frequencies. The ultiplier using = 1 achieves better tiing (269 MHz,.6us) copare with the bit-serial ipleentation in [9] (42 MHz, 7.4 us) for the finite fiel = 163. Other works have ipleente finite fiel ultipliers an use the in elliptic curve coprocessors or processors [1 5] but the results for the stanalone ultiplier are not available. Others have ipleente the ultiplier for the GF(p) finite fiel so a irect coparison is not possible [1,11].
5 58 M. Morales-Sanoval et al. / Coputers an Electrical Engineering 35 (29) Table 1 Area an tie coparison results Ref. Multiplier LUT/FF Slices Gate count Clock perio (ns) Frequency (MHz) [8] Classical (est.) 37,296/37, , [8] HybriKaratsuba 11,746/13, , [8] MasseyOura 36,857/8, , [8] SunarKoc 45,435/41,942 68, This work ( = 1) 484/ This work ( = 4) 1188/ , This work ( = 8) 2115/ , This work ( = 16) 44/ , This work ( = 32) 711/ , Conclusions An area/perforance trae off analysis for a igit-serial GF(2 ) finite fiel ultiplication was presente. The size of the igit to use in an application of the propose ultiplier architecture will be guie by the area assigne to the ultiplier. Also, the require processing tie an which other igits can be use to axiize the perforance for other fiel orer using greater igits shoul be taken into account. Acknowlegents First author thanks the National Council for Science an Technology fro Mexico (CONACyT) for financial support through the scholarship nuber References [1] Ernest M, Klupsch S, Hauck O, Huss SA. Rapi prototyping for harware accelerate elliptic curve public key cryptosystes. In: Proceeings of 12th IEEE workshop on rapi syste prototyping, RSP 21, Monterey, CA; June 21, p [2] Benara M, Dalrup M, Gathen J, Shokrollahi J, Teich J. Reconfigurable ipleentation of elliptic curve crypto algoriths. In: IPDPS 2: Proceeings of the 16th international parallel an istribute processing syposiu. Washington, DC, USA: IEEE Coputer Society; 22. p [3] Ernest M, Jung M, Malener F, Huss S, Blüel R. A reconfigurable syste on chip ipleentation for elliptic curve cryptographyover GF(2 ). In: Proceeings of the 4th international workshop on cryptographic harware an ebee systes CHES 22. Lecture notes in coputer science, vol Rewoo Shores, CA: Springer; 22. p [4] Saquib N, Roriguez F, Diaz A. A parallel architecture for fast coputation of elliptic curve scalar ultiplication over GF(2 ). In: Proceeings of 11th reconfigurable architectures workshop, RAW 4, Sta. Fe, USA; April 24. p [5] Lutz J, Hasan A. High perforance FPGA base elliptic curve cryptographic co-processor. ITCC 4: international conference on inforation technology: coing an coputing, vol. 2. IEEE Society Press; 24. p [6] Lutz Jonathan. High perforance elliptic curve cryptographic co-processor. Master s thesis, University of Waterloo; 23. [7] NIST. Recoene elliptic curves for feeral governent use. < [8] Grabbe C, Benara M, Teich J, von zur Gathen J, Shokrollahi J. FPGA esigns of parallel high perforance GF(2 233 ) ultipliers. In: Proceeings of IEEE ISCAS 3, vol. II; 23. p [9] Kitsos P, Theooriis G, Koufopavlou O. An efficient reconfigurable ultiplier architecture for galois fiel GF(2 ). Microelectron J 23;34(1). [1] Savasß E, Tenca AF, Koç ÇK. A scalable an unifie ultiplier architecture for finite fiels GF(p) an GF(2 ). Cryptographic harware an ebee systes, LNCS no. 1965; August 2. p [11] Tenca AF, Koc Cetin K. A scalable architecture for oular ultiplication base on Montgoery s algorith. IEEE Trans Coput 23;52(9):
An Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationWORKING OUT А NEW MODEL OF FORECASTING OF ROAD ACCIDENTS ON A METHOD OF CONFLICT SITUATIONS FOR CITY CONDITIONS
The 11 th International Conference RELIABILITY an STATISTICS in TRANSPORTATION an COMMUNICATION - 2011 Proceeings of the 11th International Conference Reliability an Statistics in Transportation an Counication
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More information3D Encoding/2D Decoding of Medical Data
D Encoing/D Decoing of Meical Data Gloria Menegaz, Jean-Philippe Thiran Abstract We propose a fully three-iensional wavelet-base coing syste featuring D encoing/d ecoing functionalities. A fully threeiensional
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationCooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationJON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
More informationON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationThe Path to Program Sustainability
The Path to Progra Sustainability by Karen Buck The Sustainability Conunru A New Moel for Sustainability The Path to Progra Sustainability Step 1: What exactly are we trying to sustain? Step 2: How uch
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationarxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationFuzzy TOPSIS and GP Application for Evaluation And Selection of a Suitable ERP
Australian Journal of Basic an Applie Sciences, (11): 138-136, 11 ISSN 11-8 Fuzzy TOPSIS an GP Application for Evaluation An Selection of a Suitable ERP 1 Mohaa Air Nikoo, Masou Mosaegh Khah an 3 Ali oghii
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationThe Concept of the Effective Mass Tensor in GR. The Equation of Motion
The Concept of the Effective Mass Tensor in GR The Equation of Motion Mirosław J. Kubiak Zespół Szkół Technicznych, Gruziąz, Polan Abstract: In the papers [, ] we presente the concept of the effective
More informationCLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationState of Louisiana Office of Information Technology. Change Management Plan
State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change
More informationA Scalable Application Placement Controller for Enterprise Data Centers
W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationCPU Animation. Introduction. CPU skinning. CPUSkin Scalar:
CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized
More informationAnalyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationREQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationAn Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationCalculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationReliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationMonte Carlo Analysis of Real-Time Electricity Pricing for Industrial Loads By Dr. Carl J. Spezia
Volue 25, uber 3 - July 29 through Septeber 29 Monte Carlo Analysis of Real-Tie Electricity Pricing for Inustrial oas By Dr. Carl J. Spezia Peer-Referee Applie Papers Keywor Search Electricity Energy Research
More informationEnterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationHomework 8. problems: 10.40, 10.73, 11.55, 12.43
Hoework 8 probles: 0.0, 0.7,.55,. Proble 0.0 A block of ass kg an a block of ass 6 kg are connecte by a assless strint over a pulley in the shape of a soli isk having raius R0.5 an ass M0 kg. These blocks
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More informationFactoring Dickson polynomials over finite fields
Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationInverse Trig Functions
Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that
More informationApproximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup
Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University
More informationImproving Emulation Throughput for Multi-Project SoC Designs
Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest
More informationImpact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
More informationA Universal Sensor Control Architecture Considering Robot Dynamics
International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationModels and Algorithms for Stochastic Online Scheduling 1
Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de
More informationImplementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
More informationInformation Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
More informationCapacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
More informationA Multi-Core Pipelined Architecture for Parallel Computing
Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationUSE OF MICRO TUBES AS AN ALTERNATIVE TO THE DESIGN OF DRIP IRRIGATION SYSTEM
USE OF MICRO TUBES AS AN ALTERNATIVE TO THE DESIGN OF DRIP IRRIGATION SYSTEM Muhae Bhuiyan School o Civil, Environental an Cheical Engineering, RMIT University, Melbourne, VIC 3001, Australia, Eail: uhae.bhuiyan@rit.eu.au
More informationMath 230.01, Fall 2012: HW 1 Solutions
Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The
More informationGPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *
GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationFirewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
More informationAn Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
More informationIntroduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft
Introduction to the Michael Clark Developent Manager Microsoft Agenda Why Is Sync both Interesting and Hard Sync Fraework Overview Using the Sync Fraework Future Directions Suary Why Is Sync Iportant Coputing
More information10.2 Systems of Linear Equations: Matrices
SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix
More informationPartitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?
Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA ch54@lehigh.edu Martin Taáč Industrial and
More informationAn online sulfur monitoring system can improve process balance sheets
Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental
More informationMethod of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationMarkov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationA CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
More informationResearch Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
More informationThe Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationOn Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
More informationPure Bending Determination of Stress-Strain Curves for an Aluminum Alloy
Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,
More informationIMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM
NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor
More informationOptimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
More informationModeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana
Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses
More informationLecture L25-3D Rigid Body Kinematics
J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationQuality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
More informationLoad Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
More informationINFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES
1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationBellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud
Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department
More informationSUPPORTING YOUR HIPAA COMPLIANCE EFFORTS
WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationCITY BANK AMERICAN EXPRESS CREDIT CARD APPLICATION FORM
CITY BANK AMERICAN EXPRESS CREDIT CARD APPLICATION FORM Sales & Service Center Date DSE/Eploee Coe # File Serial # Branch DST Application Coe Group Sales General Instructions: Use CAPITAL LETTERS Tick
More informationINTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
More informationPresentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
More information