The Digital Signature Scheme MQQ-SIG
|
|
- Cory Manning
- 8 years ago
- Views:
Transcription
1 The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese 2 ad Ludovc Perret 4 ad Jea-Charles Faugère 5 ad Sve Joha Kapskog 2 ad Smle Markovsk 3 1 Departmet of Telematcs, Faculty of Iformato Techology, Mathematcs ad Electrcal Egeerg, The Norwega Uversty of Scece ad Techology (NTNU), O.S.Bragstads plass 2E, N-7491 Trodhem, NORWAY, dalog@tem.tu.o 2 Norwega Uversty of Scece ad Techology Cetre for Quatfable Qualty of Servce Commucato Systems. O.S. Bragstads plass 2E, N-7491 Trodhem, NORWAY, kapskog@q2s.tu.o, rue.odegard@q2s.tu.o, rueerle@stud.tu.o 3 Ss Cyrl ad Methodus Uversty, Faculty of Natural Sceces ad Mathematcs, Isttute of Iformatcs, P.O.Box 162, 1000 Skopje, MACEDONIA, smle@.edu.mk 4 Perre ad Mare Cure Uversty - Pars, Laboratory of Computer Sceces, Pars 6, 104 aveue du Présdet Keedy Pars FRANCE, ludovc.perret@lp6.fr 5 UPMC, Uversté Pars 06, LIP6 INRIA, Cetre Pars-Rocquecourt, SALSA Project-team CNRS, UMR 7606, LIP6 4, place Jusseu Pars, Cedex 5, FRANCE jea-charles.faugere@ra.fr Abstract: Ths documet cotas the Itellectual Property Statemet ad the techcal descrpto of the MQQ-SIG - a ew publc key dgtal sgature scheme. The complete scetfc publcato coverg the desg ratoale ad the securty aalyss wll be gve a separate publcato. MQQ- SIG cossts of 4 quadratc polyomals wth Boolea varables where = 160, 192, 224 or 256. Keywords: Publc Key Cryptosystems, Fast sgature geerato, Multvarate Quadratc Polyomals, Quasgroup Strg Trasformatos, Multvarate Quadratc Quasgroup 1 Itellectual Property Statemet We, the seve ames gve the ttle of ths documet ad udersged o ths statemet, the authors ad desgers of MQQ-SIG dgtal sgature scheme, do hereby agree to grat ay terested party a rrevocable, royalty free lcece to practce, mplemet ad use MQQ-SIG dgtal sgature scheme, provded our roles as authors ad desgers of the MQQ-SIG dgtal sgature scheme are recogzed by the terested party as authors ad desgers of the MQQ-SIG dgtal sgature scheme. Name Sgature Place Date 1. Dalo Glgorosk Trodhem 2. Sve Joha Kapskog Trodhem 3. Smle Markovsk Skopje 4. Rue Stesmo Ødegård Trodhem 5. Rue Erled Jese Trodhem 6. Ludovc Perret Pars 7. Jea-Charles Faugère Pars
2 2 Descrpto of the MQQ-SIG dgtal sgature scheme A geerc descrpto for our scheme ca be expressed as a 3 4 trucato of a typcal multvarate quadratc system: S P S : {0, 1} {0, 1} where S = S x + v (.e. S s a bjectve affe trasformato), S s a osgular lear trasformato, ad P s a bjectve multvarate quadratc mappg o {0, 1}. The bjectve multvarate quadratc mappg P : {0, 1} {0, 1} s defed Table 1. Bjectve multvarate quadratc mappg P (x) Iput: A vector x = (f 1,..., f ) of lear Boolea fuctos of varables. We mplctly suppose that a multvarate quadratc quasgroup s prevously defed, ad that = 32k, k {5, 6, 7, } s also prevously determed. Output: lear expressos P (x 1,..., x ), = 1,..., ad multvarate quadratc polyomals P (x 1,..., x ), = 9,..., 1. Represet a vector x = (f 1,..., f ) of lear Boolea fuctos of varables x 1,..., x, as a strg x = X 1... X where X are vectors of dmeso ; 2. Compute y = Y 1... Y where: Y 1 = X 1, Y j+1 = X j X j+1, for eve j = 2, 4,..., ad Y j+1 = X j+1 X j, for odd j = 3, 5, Output: y. Table 1. Defto of the bjectve multvarate quadratc mappg P : {0, 1} {0, 1} The algorthm for geeratg the publc ad prvate key s defed the Table 2. Algorthm for geeratg Publc ad Prvate key for the MQQ-SIG scheme Iput: Iteger, where = 32 k ad k {5, 6, 7, }. Output: Publc key P: 4 multvarate quadratc polyomals P(x1,..., x), = 1+ 4,...,, Prvate key: Two permutatos σ 0 0 ad σ1 0 of the umbers {1,..., }, ad 1 bytes for ecodg a quasgroup. 1. Geerate a MQQ accordg to equatos (1)... (4). 2. Geerate a osgular Boolea matrx S ad affe trasformato S accordg to equatos (5),..., (). 3. Compute y = S(P (S (x))), where x = (x 1,..., x ). 4. Output: The publc key s y as 4 multvarate quadratc polyomals P (x 1,..., x ) = 1 + 4,...,, ad the prvate key s the tuple (σ0 0, σ1 0, ). Table 2. Geeratg the publc ad prvate key The algorthm for sgg by the prvate key (σ 0 0, σ 1 0, ) s defed Table 3. Algorthm for dgtal sgature wth the prvate key (σ 0 0, σ1 0, ) Iput: A documet M to be sged. Output: A sgature sg = (x 1,..., x ). 1. Compute y = (y 1,..., y ) = H(M), where M s the message to be sged, H() s a stadardzed cryptographc hash fucto such as SHA-1, or SHA-2, wth a hash output of ot less tha bts. The otato H(M) deotes the least sgfcat bts from the hash output H(M). 2. Set y = S 1 (y). 3. Represet y as y = Y 1... Y where Y are Boolea vectors of dmeso. 4. By usg the left ad rght parastrophes \ ad / of the quasgroup compute x = X 1... X, such that: X 1 = Y 1, X j = X j 1 \Y j, for eve j = 2, 4,..., ad X j = Y j/x j 1, for odd j = 3, 5, Compute x = S 1 (x ) + v = (x 1,..., x ). 6. The MQQ-SIG dgtal sgature of the documet M s the vector sg = (x 1,..., x ). Table 3. Dgtal sgg
3 The algorthm for sgature verfcato wth the publc key P = {P (x 1,..., x ) = 1+ 4,..., } s gve Table 4. Algorthm for sgature verfcato wth a publc key P = {P (x 1,..., x ) = 1 + 4,..., } Iput: A documet M ad ts sgature sg = (x 1,..., x ). Output: TRUE or FALSE. 1. Compute y = (y 1+,..., y ) = H(M), where M s the sged message, H() s a stadardzed 4 4 cryptographc hash fucto such as SHA-1, or SHA-2, wth a hash output of ot less tha bts, ad the otato H(M) 4 deotes the least sgfcat 4 bts from the hash output H(M). 2. Compute z = (z 1+,..., z 4 ) = P(sg). 3. If z = y the retur TRUE, else retur FALSE. Table 4. Dgtal verfcato 3 Multvarate Quadratc Quasgroups A Multvarate Quadratc Quasgroup (MQQ) of order 2 d used ths verso of MQQ-SIG ca be descrbed shortly by the followg expresso: x y B U(x) A 2 y + B A 1 x + c (1) where x = (x 1,..., x d ), y = (y 1,..., y d ), the matrces A 1, A 2 ad B are osgular GF (2), of sze d d, the vector c s a radom d-dmesoal vector wth elemets GF (2) ad all of them are geerated by a uformly radom process. The matrx U(x) s a upper tragular matrx wth all dagoal elemets equal to 1, ad the elemets above the ma dagoal are lear expressos of the varables of x = (x 1,..., x d ). It s computed by the followg expresso: d 1 U(x) = I + U A 1 x, (2) =1 where the matrces U have all elemets 0 except the elemets the rows from {1,..., } that are strctly above the ma dagoal. Those elemets ca be ether 0 or 1. Oce we have a multvarate quadratc quasgroup vv (x 1,..., x d, y 1,..., y d ) = (f 1 (x 1,..., x d, y 1,..., y d ),..., f d (x 1,..., x d, y 1,..., y d )) we wll be terested those quasgroups that wll satsfy the followg codtos: {1,..., d}, Rak(B f ) 2d 4, (3a) j {1,..., d}, Rak(B fj ) = 2d 2 (3b) where matrces B f are 2d 2d Boolea matrces defed from the expressos f as B f = [b j,k ], b j,d+k = b d+k,j = 1, ff x j y k s a term f. (4) Proposto 1. For d =, a multvarate quadratc quasgroup that satsfes the codtos (1),..., (4) ca be ecoded a uque way wth 1 bytes.
4 4 Nosgular Boolea matrces MQQ-SIG I MQQ-SIG the osgular matrces S are defed by the followg expresso: 16 S 1 = =0 I σ I σ 1, (5) =0 where I σ 0, = {0, 1, 2,..., 16 } ad I σ 1, = {0, 1, 2,..., } are permutato matrces of sze, the operato s a btwse exclusve or of the elemets the permutato matrces ad permutatos σ 0 ad σ1 are permutatos o elemets. They are defed by the followg expressos: σ0 0 radom permutato o {1, 2,... }, σ 0 = RotateLeft(σ0 1, ), for = 1,..., 16, σ0 1 (6) radom permutato o {1, 2,... }, σ 1 = RotateLeft(σ1 1, ), for = 1,..., , We chose the permutatos σ 0 0 ad σ 1 0 utl we obta a o-sgular matrx S 1. Oce we have a osgular matrx S 1 we wll compute ts verse obtag S = (S 1 ) 1 ad from there we wll obta the affe trasformato S (x) = S x + v, (7) where the vector v s dmesoal Boolea vector defed from the values of the permutato σ 1 0 = (s 1, s 2,..., s ) by the followg expresso: v = (v 1, v 2,..., v ), where v = (( s 1+ 1 ) 2 ( ) mod ) mod ( s65+ ) 1 2 ( ) mod mod 2. () I words: we costruct the bts of the vector v by costructg two arrays. The frst array s costructed by takg the four least sgfcat bts of the values s 1,..., s ad each of them s shfted by four postos to the left. The secod array s just smple extracto of the values s 65,..., s 65+. Fally we XOR correspodgly those two arrays of values order to produce the vector v of bts. Proposto 2. The lear trasformato S 1 ca be ecoded a uque way wth 2 bytes. 5 Characterstcs of the MQQ-SIG dgtal sgature scheme The ma characterstcs of our MQQ-SIG dgtal sgature scheme ca be brefly summarzed as follows: there s o message expaso; the legth of the sgature s bts where ( = 160, 192, 224 or 256); ts cojectured securty level s 2 2 ; ts verfcato speed s comparable to the speed of other multvarate quadratc PKCs; software ts sgg speed s the rage of 300 7,000 tmes faster tha RSA ad ECC schemes; hardware ts sgg or verfcato speed s more tha 10,000 tmes faster tha RSA ad ECC schemes; t s also well suted for producg short sgatures smart cards ad RFIDs;
5 5.1 The sze of the publc ad the prvate key The sze of the publc key s 0.75 (1 + (+1) 2 ) bts. The prvate key of our scheme s the tuple (σ 0 0, σ 1 0, ). The correspodg memory sze eeded for storage of the prvate key s bytes. I Table 5 we gve the sze of the publc key ( KBytes) ad the sze of the prvate key ( bytes) for {160, 192, 224, 256}. Sze of the Sze of the publc key (KBytes) prvate key (bytes) Table 5. Memory sze KBytes for the publc key ad bytes for the prvate key 5.2 Performace of the software ad hardware mplemetato of the MQQ-SIG algorthm We have mplemeted MQQ-SIG C for the SUPERCOP bechmarkg system yp.to/supercop.html ad tested t together wth the correspodg RSA ad ECC. I Table 6 we gve the comparso of MQQ-SIG wth RSA ad ECC 64-bt mode of operato o Itel Core 7 920X mache rug at 2 GHz. The umbers the table represet CPU cycles. Although, our C code s ot yet optmzed for the key geerato part, we expect that the performace of key geerato part would be the most tme cosumg part of our algorthm. O the other had, from the Table 6 t s clear that sgg of 59 bytes MQQ-SIG s faster tha RSA the rage from 565 up to 636 tmes, ad s faster tha ECC the rage from 325 up to 517 tmes. The verfcato speed our code s ot so dstctvely faster tha the correspodg RSA ad ECC sce t s programmed for oe core. We expect that the hgh parallelzable ature of MQQ-SIG ca be used to acheve much hgher speeds multcore systems (CPUs or GPUs). Securty bts Algorthm KeyGe Sgg of 59 bytes Verfcato of a sgature of 59 bytes RSA ,69,553 2,230,4 61,116 0 ECC160 1,201,1 1,24,00 1,476,196 MQQSIG160 1,062,12,500 3,440 97,644 RSA ,324,721 7,346, , ECC192 1,799,24 1,95,752 2,242,9 MQQSIG192 1,2,301,276 4,260 72,60 RSA204 76,466,59 14,15, , ECC224 2,022,96 2,10,556 2,501,10 MQQSIG224 2,539,322,544 4,160 92,960 RSA3072 2,719,353,53 31,941, , ECC256 2,296,976 2,41,96 2,33,56 MQQSIG256 4,96,642,44 4,932 13,14 Table 6. Comparso betwee performace of RSA, ECC ad MQQ-SIG CPU cycles 64-bt mode of operato o Itel Core 7 920X mache rug at 2 GHz.
arxiv:1010.3163v1 [cs.cr] 15 Oct 2010
The Digital Signature Scheme MQQ-SIG Intellectual Property Statement and Technical Description 10 October 2010 Danilo Gligoroski 1 and Svein Johan Knapskog 2 and Smile Markovski 3 and Rune Steinsmo Ødegård
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationOn formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationMDM 4U PRACTICE EXAMINATION
MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths
More informationTHE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ
SAÜ e Blmler Dergs, 5 Clt, 2 Sayı, THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES Vedat ŞİAP* *Departmet of Mathematcs, aculty of Scece ad Art, Sakarya Uversty, 5487, Serdva, Sakarya-TURKEY vedatsap@gmalcom
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationPreprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationFast, Secure Encryption for Indexing in a Column-Oriented DBMS
Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationMeaningful electronic signatures based on an automatic indexing method
Meagful electroc sgatures based o a automatc dexg method Maxme Wack, Ahmed Nat-Sd-Moh*, Sd Lamrous, Nathaael Cott Systems ad Trasports Laboratory Uversty of Techology of Belfort-Motbelard 9000 BELFORT
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationRelaxation Methods for Iterative Solution to Linear Systems of Equations
Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet gerry@me.pdx.edu Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationA Smart Machine Vision System for PCB Inspection
A Smart Mache Vso System for PCB Ispecto Te Q Che, JaX Zhag, YouNg Zhou ad Y Lu Murphey Please address all correspodece to Departmet of Electrcal ad Computer Egeerg Uversty of Mchga - Dearbor, Dearbor,
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationOne way to organize workers that lies between traditional assembly lines, where workers are specialists,
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 7, No. 2, Sprg 2005, pp. 121 129 ss 1523-4614 ess 1526-5498 05 0702 0121 forms do 10.1287/msom.1040.0059 2005 INFORMS Usg Bucket Brgades to Mgrate from
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationSHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationTESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More informationSTATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More informationBayesian Network Representation
Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationA Fast Algorithm for Computing the Deceptive Degree of an Objective Function
IJCSNS Iteratoal Joural of Computer See ad Networ Seurty, VOL6 No3B, Marh 6 A Fast Algorthm for Computg the Deeptve Degree of a Objetve Futo LI Yu-qag Eletro Tehque Isttute, Zhegzhou Iformato Egeerg Uversty,
More informationAggregation Functions and Personal Utility Functions in General Insurance
Acta Polytechca Huarca Vol. 7, No. 4, 00 Areato Fuctos ad Persoal Utlty Fuctos Geeral Isurace Jaa Šprková Departmet of Quattatve Methods ad Iformato Systems, Faculty of Ecoomcs, Matej Bel Uversty Tajovského
More informationConstrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
More informationwhere p is the centroid of the neighbors of p. Consider the eigenvector problem
Vrtual avgato of teror structures by ldar Yogja X a, Xaolg L a, Ye Dua a, Norbert Maerz b a Uversty of Mssour at Columba b Mssour Uversty of Scece ad Techology ABSTRACT I ths project, we propose to develop
More informationCHAPTER 2. Time Value of Money 6-1
CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationCIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning
CIS63 - Artfcal Itellgece Logstc regresso Vasleos Megalookoomou some materal adopted from otes b M. Hauskrecht Supervsed learg Data: D { d d.. d} a set of eamples d < > s put vector ad s desred output
More informationChapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization
Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve
More informationSTOCHASTIC approximation algorithms have several
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 10, OCTOBER 2014 6609 Trackg a Markov-Modulated Statoary Degree Dstrbuto of a Dyamc Radom Graph Mazyar Hamd, Vkram Krshamurthy, Fellow, IEEE, ad George
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationAnalysis of Multi-product Break-even with Uncertain Information*
Aalyss o Mult-product Break-eve wth Ucerta Iormato* Lazzar Lusa L. - Morñgo María Slva Facultad de Cecas Ecoómcas Uversdad de Bueos Ares 222 Córdoba Ave. 2 d loor C20AAQ Bueos Ares - Argeta lazzar@eco.uba.ar
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationA multi-layer market for vehicle-to-grid energy trading in the smart grid
A mult-layer market for vehcle-to-grd eergy tradg the smart grd Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad To cte ths verso: Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad. A mult-layer market
More informationDIRAC s BRA AND KET NOTATION. 1 From inner products to bra-kets 1
DIRAC s BRA AND KET NOTATION B. Zwebach October 7, 2013 Cotets 1 From er products to bra-kets 1 2 Operators revsted 5 2.1 Projecto Operators..................................... 6 2.2 Adjot of a lear operator.................................
More informationSession 4: Descriptive statistics and exporting Stata results
Itrduct t Stata Jrd Muñz (UAB) Sess 4: Descrptve statstcs ad exprtg Stata results I ths sess we are gg t wrk wth descrptve statstcs Stata. Frst, we preset a shrt trduct t the very basc statstcal ctets
More informationA PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING
West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh
More informationCurve Fitting and Solution of Equation
UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed
More informationUSEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT
USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk
More informationn. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.
UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.
More informationThe simple linear Regression Model
The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationStatistical Intrusion Detector with Instance-Based Learning
Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationPlastic Number: Construction and Applications
Scet f c 0 Advaced Advaced Scetfc 0 December,.. 0 Plastc Number: Costructo ad Applcatos Lua Marohć Polytechc of Zagreb, 0000 Zagreb, Croata lua.marohc@tvz.hr Thaa Strmeč Polytechc of Zagreb, 0000 Zagreb,
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More informationSimple Linear Regression
Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8
More informationFuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment
, pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationA Bayesian Networks in Intrusion Detection Systems
Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:
More informationFault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
More informationON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.
ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs
More information10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
More informationCommon p-belief: The General Case
GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators
More informationOn Savings Accounts in Semimartingale Term Structure Models
O Savgs Accouts Semmartgale Term Structure Models Frak Döberle Mart Schwezer moeyshelf.com Techsche Uverstät Berl Bockehemer Ladstraße 55 Fachberech Mathematk, MA 7 4 D 6325 Frakfurt am Ma Straße des 17.
More informationEntropy-Based Link Analysis for Mining Web Informative Structures
Etropy-Based Lk Aalyss for Mg Web Iformatve Structures Hug-Yu Kao, Sha-Hua L *, Ja-Mg Ho *, Mg-Sya Che Electrcal Egeerg Departmet Natoal Tawa Uversty Tape, Tawa, ROC E-Mal: {bobby@arbor.ee.tu.edu.tw, msche@cc.ee.tu.edu.tw}
More informationA system to extract social networks based on the processing of information obtained from Internet
A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts
More informationCS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
More informationA probabilistic part-of-speech tagger for Swedish
A probablstc part-of-speech tagger for Swedsh eter Nlsso Departmet of Computer Scece Uversty of Lud Lud, Swede dat00pe@ludat.lth.se Abstract Ths paper presets a project for mplemetg ad evaluatg a probablstc
More informationResearch on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance
Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationForecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion
2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of
More informationOPTIMAL KNOWLEDGE FLOW ON THE INTERNET
İstabul Tcaret Üverstes Fe Blmler Dergs Yıl: 5 Sayı:0 Güz 006/ s. - OPTIMAL KNOWLEDGE FLOW ON THE INTERNET Bura ORDİN *, Urfat NURİYEV ** ABSTRACT The flow roblem ad the mmum sag tree roblem are both fudametal
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More informationWe present a new approach to pricing American-style derivatives that is applicable to any Markovian setting
MANAGEMENT SCIENCE Vol. 52, No., Jauary 26, pp. 95 ss 25-99 ess 526-55 6 52 95 forms do.287/msc.5.447 26 INFORMS Prcg Amerca-Style Dervatves wth Europea Call Optos Scott B. Laprse BAE Systems, Advaced
More informationThree Dimensional Interpolation of Video Signals
Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged
More informationLoad and Resistance Factor Design (LRFD)
53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo
More information