Implementation of Low Power Scalable Encryption Algorithm

Size: px
Start display at page:

Download "Implementation of Low Power Scalable Encryption Algorithm"

Transcription

1 Iteratioal Joural of Computer Applicatios ( ) o of Low Power Scalable Ecryptio Algorithm K.J. Jegadish Kumar Assistat Professor SSN College of Egieerig Kalavakkam Cheai, Idia S. Salivahaa Pricipal SSN College of Egieerig Kalavakkam Cheai, Idia K. Chea Kesava Reddy Pricipal Jyothismathi College of Egieerig ad Techology Shamirpet , Idia ABSTRACT SEA Scalable Ecryptio Algorithm is a block cipher based symmetric ecryptio scheme, particularly iteded for resource costraied devices. SEA proposes low computatioal cipher schemes, that is, miiaturized code size, memory ad power, developed for processors with a restricted istructio set. SEA is parametric with plai-text, key ad microprocessor size, ad foud to be powerful with the groupig of eciphermet or deciphermet ad derivatio of the keys. SEA was primarily meat for software implemetatios i microcotrollers, smart cards ad small embedded systems. I this article, we look ito the performace ivestigatio of modified SEA with efficiet modular adder i a Field programmable gate array (FPGA) device. For this reaso, a loop based iterative desig of the block cipher is realized o FPGA. Apart from its miimum cost, the proposed modified desig is etirely flexible with ay parameters ad acquires advatage of geeric VHDL codig. The efficiet modular adders implemetatio based modificatio i SEA achieves lower area, power cosumptio ad cosiderably higher throughputs o the target platform VIRTEX-4, xc4vl25 ad SPARTAN-3, xc3s1400. Keywords: Block ciphers, costraied applicatios, FPGA implemetatio. 1. INTRODUCTION Symmetric ecryptio schemes desiged for resource costraied devices have oly a limited history. Tiy Ecryptio Algorithm (TEA) is a example of cipher desiged especially for resource costraied devices. TEA is commoly kow as Yuval's proposal [1,2]. Earlier cipher does ot give efficiet resistace to differetial ad liear cryptaalysis attacks. Block ciphers i recet days, like the Rijdael Advaced Ecryptio Stadard (AES) cocetrates o decidig a trade-off i iformatio security, hardware/software complexity, ad overall efficiecy. Cosequetly, there arises a requiremet for a ew cryptosystem that edows with apt solutio for resource costraied systems. Embedded applicatios that are basic buildig structures posses importat features ad a challege for ew cryptosystem like Scalable Ecryptio Algorithm (SEA) [1,2]. 1.1 SEA: A Overview The purpose for SEA [1, 2] is to implemet i restricted resources; the architecture proposed is parametric with respect to plai-text, cipher-text, key ad the processor size. Sice the architecture is parametric i ature, it has flexibility ad ca be implemeted i all platforms with miimum code chage. Most algorithms perform differetly o differet platforms but SEA is a exceptio as it allows obtaiig a optimal method of cipherig that suits ay give microprocessor ad the security of this cipher is tailored accordig to its key size [2]. Sice it operates o a limited resource processor, it oly does some basic operatios (i.e. XOR, AND, OR, mod 2 b additio). 1.2 Literature Survey Though there are may cryptographic algorithms, most of them require high or moderate processig power, like Advaced Ecryptio Stadards (AES) [3-6], Data Ecryptio Stadard (DES) [7], Tiy Ecryptio Algorithm (TEA) [8,9], Exteded TEA (XTEA) [10]. But these ecryptio algorithms caot be implemeted i a resource costraied system due to various complexities ivolved like i.e. No Scalability, Processor Itesive, ad Security Level. AES (Rijdael) [3-6] comprises three block ciphers, all the block ciphers vary depedig o the umber of bits. AES is a predetermied block cipher havig 128 bits. It has differet key size of 128, 192 ad 256 bits. AES requires four 256 etry, 32 bit tables, so totally 4096 of memory which equals 1kilo byte for each table. AES is more processor itesive ad is o scalable, so it caot be implemeted o costraied systems. Though there are efficiet implemetatios of AES, there are still oscalable for eed of ay processig platform. DES [7] is based o symmetric key algorithms of bit size 56. DES is the classic symmetric key ecryptio algorithm that receives a predetermied legth sequece of plai-text bits ad alters through a sequece of complex tasks performed i a differet bit strig kow as cipher-text bits usig the same key. Though DES is ot a secured ecryptio, it is widely used i a mode of operatio as per Federal Iformatio Processig Stadard (FIPS-81). DES is more processor itesive, o scalable ad is breakable by Liear Cryptaalysis. TEA [8] or Yuval s proposal [9] is otable for its simplicity ad implemetable o various platforms (scalability) ad works o block size of 64 bits with a key size of 128 bit. Whe crypt aalyzed with equivalet key, each key gives three other keys. So i terms of security TEA is isecure. XTEA [10] was a advaced versio of TEA, maily aimed at improvig all the security glitches. XTEA has complex key schedulig ad rearragemet of Shift XOR ad additio operatios. XTEA is vulerable to related key differetial attack. Like SEA, HIGHT 14

2 Iteratioal Joural of Computer Applicatios ( ) [11] is also aother Block Cipher for resource costraied systems, but its o scalable ad cosumes more umber of gates ad the throughput ad operatig frequecy are much less whe compared to SEA (48, 8). So, implemetig SEA for costraied systems is a better optio. This paper is orgaized as follows. The itroductio ad literature survey are provided i sectio 1. Sectio 2 describes parameters, defiitios ad basic operatios for implemetatio of SEA. Sectio 3 illustrates hardware implemetatio strategies. I sectio 4 implemetatio results are preseted. Fially, i sectio 5 coclusios based o the results are made. 2. IMPLEMENTATION OF SEA Majority of recet private key cipher desig resulted i tradeoffs i the cost of executio ad their performaces. However, the objective is to effectively implemet o a wide rage of platforms. SEA is a differet method ad cosiders a perspective i which it has iadequate throughput ad resources. The cipher was primarily targeted as a desig to provide cost effective implemetatio ad certificatio routie for processors with a restricted istructio set [1]. I additio, opposite to block ciphers that are widely used, it cosiders the parameters such as bus sizes, key ad plai-text. Hece it ca be tailored straightly to a variety of security requiremets ad implemetatio eviromets. I cotrast, i compariso with the solutios that rus traditioal ciphers like Yuval s proposal or TEA (Tiy Ecryptio Algorithm), SEA additioally promotes a resistace to cryptaalysis [2]. Whe put ito practice, SEA was demostrated to be a proficiet aswer for microcotrollers ad related applicatios. Although, SEA is a efficiet hardware implemetatio, its performace is yet to be explored. This paper therefore proposes to ivestigate the iterest of this algorithm to be modified for area ad power i costraied applicatios. The ivestigatio begis with a exploratio of the quality of a cost effective FPGA implemetatio of SEA [1] ad our progress is to modify SEA usig efficiet modular adder i [12-14] to reduce the hardware complexities i terms of area ad power. 2.1 Algorithmic Descriptio Basic Operatios Owig to its optimality costraits, SEA,b [1,2] is based o a restricted umber of basic operatios chose for their accessibility i the give device. This ca be classified ito differet categories as give i Stadert et.al [1,2] 1. Basic XOR : Z 2 Z 2: x, y z = x y z i = x i y i, 2. S-Box: SEA,b make use of 3-bit substitutio table stated as: S T : = [0; 5; 6; 7; 4; 3; 1; 2], ad is evaluated as i followig expressios S: Z b 2 b Z b 2 b : x x = S(x) x 3i = (x 3i+2 x 3i+1 ) x 3i x 3i+1 = x 3i+2 x 3i x 3i+1 x 3i+2 = x 3i x 3i+1 x 3i+2, : bitwise AND : bitwise OR. 3. Word rotate R: For b -word vectors the word rotate is expressed as: b R: Z 2 b 4. Bit rotate r: Z b 2 b : x y = R x r: Z b 2 b Z b 2 b : x y = r x y 3i = x 3i 1 y 3i+1 = x 3i+1, y 3+2i = x 3i+2 1, where : right shifts ad : left shifts. 5. Additio modulo 2 b : : Z b 2 b Z b 2 b b : x, y z = x y Z 2 b z i = x i y i, I the followig sub-sectio, complete descriptio of the algorithm which ca be referred to [1, 2] is briefed. It starts with the vital parameters, ad the highlights its basic operatio. The the sequece of key geeratio is described Ecryptio/Decryptio ad Key Geeratio The ecrypt roud F E, decrypt roud F D ad key roud F K are defied as: Ecryptio Roud F E : L i+1, R i+1 = F E L i, R i, K i R i+1 = R L i r S R i K i, L i+1 = R i Decryptio Roud F D : L i+1, R i+1 = F D L i, R i, K i R i+1 = R 1 L i r S R i K i, L i+1 = R i 15

3 Iteratioal Joural of Computer Applicatios ( ) Figure.2.1. Ecryptio ad decryptio ad key schedulig [1, 2] Key Schedulig Roud F K : KL i+1, KR i+1 = F K KL i, KR i, C i KR i+1 = KL i R r S KR i C i, KL i+1 = KR i Cipher Descriptio This cipherig is based o the umber of rouds r ad uses iterative based loop desig. The pseudo code give i Figure 2.2 illustrates the ecessary steps for ecryptig a plai-text. where, P: Plai-text, C: Cipher-text K: Key ad all these three are parameterized by bit size. Takig ito accout the parametric b-bit words, the operatios are doe i the cipher. Sice r is odd, referrig to Figure 2.2 for key schedulig ad ecryptio, the value of r must be rouded up or dow. Roudig up or ceil is deoted as ad roudig dow or floor is deoted as. Figure 2.2: Pseudo Code descriptio [1, 2] Recommeded Number of rouds The expressio r = [3(/4) + 2((/2b )+ b/2)] evaluates the umber of rouds, r, required to sufficietly secure agaist covetioal attacks. i.e, calculatio of r is related to resist either differetial or liear attacks addig to twice the umber of rouds to get absolute diffusio. Cosecutively, it prevets statistical ad structural attacks. The value of r must be always odd, if ot, 1 must be added to make it odd [1,2]. 3. HARDWARE IMPLEMENTATION 3.1 o Descriptio The first ivestigatio step to the [1] hardware implemetatio of SEA proposes to take a look at a straightforward implemetatio of the algorithm o a FPGA platform, achievig a roud/clock cycle ad deoted as the loop implemetatio. It is kow that the S-boxes ad the mod 2 b adder are the operators that cost more i hardware implemetatio; but the operators like Word Rotate ad Bit Rotate blocks i the cipher are realized by swappig wires. As per the specificatios of SEA [1], the key geeratios cosist of two multiplexers to switch the right ad left part of the key whe the algorithm reaches half. The executio is doe by the suitable cotrol sigal called Swap. The switch cotrolled multiplexer supplies the loopig fuctio with the right part of the key durig the executio of first half of roud ad pass o its left part after the switch. The Geeric Loop Architecture is simple ad oly chages i the locatio of the R ad R -1 Block. I this paper, we maily focus to describe [12] a light weight Modular adders to modify modulo 2 b additio operator i SEA so as to achieve cosiderable low power optimizatio at the sythesizable VHDL desig level. 16

4 No: of Slices Iteratioal Joural of Computer Applicatios ( ) 3.2 o of Modified SEA with efficiet Modular adders Additio modulo m of x ad y {0,1,2,..m-1} is give by the equatio: (x + y) mod m = x + y, if x + y < m, ad = x + y m, if x + y m, (3.1) which ca be simply realized usig a suitable basic arithmetic operators. But, their implemetatio is complex, as they require more space ad speed. The algorithm described allows to liberate the implemetatio cost ad thus results i powerful hardware operators. Here, the equatio k = [log 2 m]+1 desigates the umber of bits which are essetial to predetermie output ad iputs of a modulo m adder. Fudametally a additio modulo m ca be performed by three methods [12]: 1. Table based operator method 2. Hybrid based operator method 3. Adder-Based operator method. Adder-Based Operators: Implemetig Equatio (3.1) ad illustrated by Algorithm 3.1 directs to attai architectures i Figure 3.1 ad [12] delivers i detail the proof of validatio of this method. This algorithm implemetatio resulted i use of two carry-propagate adders ad a Multiplexer ad is cosidered to be appropriate for FPGAs. Algorithm 3.1 Additio Modulo m. Determie k 2 k-1 < m < 2 k Assig s0 x + y Assig s1 (s0 mod 2 k ) + 2 k m if the carry-out bit of s0 or s1 is oe the (x + y) mod m s1 mod 2 k else (x + y) mod m s0 mod 2 k ed if The architecture of implemeted algorithm 3.1 is portrayed i Figure 3.1. proposed modulo additio algorithm leads to smallest circuits, i tur reduced overall circuit complexity of SEA. Figure IMPLEMENTATION RESULTS The results were derived by sythesizig the algorithm usig Xilix ISE 9.2i tool o VIRTEX-4 platform device XC4VLX25 with speed grade-12 ad XC3S1400, SPARTAN-3 platform with speed grade -4. XPower Aalyzer tool was used to aalyze the power cosumptio of the implemetatio. The implemetatio was doe for variats bit data () ad a processor word size (b). We achieved reductio i umber of slices (Figure 4.1), high throughputs (Figure 4.2) ad icrease i work frequecy (Figure 4.3) i implemetatio compared to implemetatio of [1]. Throughput /Area ratios are also show i Figure 4.4. implemetatio of SEA exhibited cosumptio of small area ad move toward at the cost of icreased throughput ad reduced power cosumptio as i Figure 4.5. As a result, it ca be well thought-out as the attractive substitute for costraied devices. No: of slices vs Data ,8 72,12 96,8 o o[1] Data Size, Word Size i bits Figure

5 Throughput/Area Ratio Frequecy i MHz Throughput i Mbps Total Power Cosumptio i mw Iteratioal Joural of Computer Applicatios ( ) Throughput vs Data ,8 72,12 96,8 o o [1] Power Cosumptio of our Modified SEA Data Size, Word Size i Bits Data Size, Word Size i bits Figure 4.2 Frequecy vs Data ,8 72,12 96,8 Data Size, Word Size i bits Figure 4.3 o o[1] Throughput/Area Ratio vs Data Figure CONCLUSION SEA was origially proposed for efficiet implemetatio i software. Cosiderig the eed for efficiet implemetatio i hardware, with the ew desig criteria, it was foud to have better solutios as compared to software implemetatio. Through the hardware ivestigatio of the SEA, we show that this modular symmetric algorithm, targeted for low-resources software solutios, ca iterestigly respod to costraied hardware eeds. We first demostrated that the scalability of this algorithm ca be kept i the hardware descriptio laguage(vhdl). The simple iterative loop desig achieves iterestig performace i area ad power reductio, improvise throughputs i FPGA. I additio, we aalysed the power cosumed by the SEA module for differet variats i data block ad word size. It is also sigificat to highlight a umber of merits i SEA compared to recet block ciphers, specifically its simplicity, scalability(re-implemetig SEA for a ew block size does ot ecessitate to re-write code), ad beig a spledid desig of ecryptio ad decryptio. 6. ACKNOWLEDGEMENT We are grateful to the experts who have cotributed towards developmet of our work. We ackowledge Shakar Kuha, Thirumuruga ad Pravee V for all their help durig the desig phase Data Size, Word Size i bits Figure 4.4 o o[1] 7. REFERENCES [1] F.Mace, F.X Stadert, J J Quisquater FPGA implemetatio(s) of a Scalable Ecryptio algorithm IEEE Trasactios o VLSI Systems, Vol.16, 2008, pp [2] Fracois-Xavier Stadaert, Gilles Piret, Neil Gershefeld, Jea-Jacques Quisquater SEA a Scalable Ecryptio Algorithm for Small Embedded Applicatios i Proc. CARDIS, 2006, pp [3] J. Daeme ad V. Rijme, The Desig of Rijdael. New York: Spriger-Verlag, [4] Advaced Ecryptio Stadard, FIPS PUB 197, Nov

6 Iteratioal Joural of Computer Applicatios ( ) [5] N. Pramstaller ad J. Wolkerstorfer, A uiversal ad efficiet AES co-processor for field programmable logic arrays, i Proc. FPL, 2004, pp [6] Fracisco Rodriguez-Heriquez, N.A. Saqib, A. Diaz- Perez, Ceti Kaya K09, Cryptographic Algorithms o Recofigurable Hardware, Spriger Series o Sigals ad Commuicatio Techology, [7] Data Ecryptio Stadard, FIPS PUB 46-3, Oct [8] D.J. Wheeler, R. Needham, TEA, a Tiy Ecryptio Algorithm, proceedigs of FSE 1994, Lecture Notes i Computer Sciece, Vol 1008, pp , Leuve, Belgium, December 1994, Spriger-Verlag. [9] G. Yuval, Reivetig the travois: Ecryptio/MAC i 30 ROM bytes, i Proc. Fast Softw. Ecryptio (FSE), 1997, pp [10] J.P. Kaps, Chai-Tea, Cryptographic Hardware os of XTEA, The 9th Iteratioal Coferece o Cryptology i Idia INDOCRYPT 2008, LNCS 5356, pp , [11] D. Hog et al., HIGHT: A New Block Cipher Suitable for Low-Resource Device, Proceedigs of CHES 2006, Lecture Notes i Computer Sciece, Vol. 4249, pp , Yokohama, Japa, October [12] Beuchat, J.-L.; Lab. De l'ifoatique du Parallelisme, Some Modular adders ad multipliers for Field programmable Gate arrays, i Proc. Parallel ad Distributed processig symposium [13] J.-L. Beuchat. Modular Multiplicatio for FPGA o of the IDEA Block Cipher, Techical Report , Laboratoire de l Iformatique du Parall elisme, Ecole NormaleSup erieure de Lyo, 46 All ee d Italie, LyoCedex 07, Sept [14] J.-L. Beuchat ad A. Tisserad. Small Multiplier-based Multiplicatio ad Divisio Operators for Virtex-II Devices.I M. Gleser, P. Zipf, ad M. Reovell, editors, Field-Programmable Logic ad Applicatios Recofigurable Computig Is Goig Maistream, umber 2438 i Lecture Notes i Computer Sciece, pages Spriger,

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Fault Aalysis Attack Pei uo ad Yusi Fei Email:[email protected], [email protected] Departmet of Electrical ad Computer Egieerig Northeaster

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Multiplexers and Demultiplexers

Multiplexers and Demultiplexers I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Chapter 10 Computer Design Basics

Chapter 10 Computer Design Basics Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao [email protected] amih Abdul-Nabi

More information

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff, NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Software Engineering Guest Lecture, University of Toronto

Software Engineering Guest Lecture, University of Toronto Summary Beyod Software Egieerig Guest Lecture, Uiversity of Toroto Software egieerig is a ew ad fast growig field, which has grappled with its idetity: from usig the word egieerig to defiitio of the term,

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Electrostatic solutions for better efficiency

Electrostatic solutions for better efficiency Electrostatic solutios for better efficiecy idustry for egieers, professioals ad techicias i developmet, productio ad istallatio. www.kerste.de/e Electrostatic solutios kerste has bee the leadig supplier

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.

Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern. 5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Locating Performance Monitoring Mobile Agents in Scalable Active Networks

Locating Performance Monitoring Mobile Agents in Scalable Active Networks Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira [email protected], {dehgha,

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace [email protected] Jea-Luc Marichal Applied Mathematics

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Integer Factorization Algorithms

Integer Factorization Algorithms Iteger Factorizatio Algorithms Coelly Bares Departmet of Physics, Orego State Uiversity December 7, 004 This documet has bee placed i the public domai. Cotets I. Itroductio 3 1. Termiology 3. Fudametal

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k. 18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

RUT - development handbook 1.3 The Spiral Model v 4.0

RUT - development handbook 1.3 The Spiral Model v 4.0 2007-01-16 LiTH RUT - developmet hadbook 1.3 The Spiral Model v 4.0 Fredrik Herbertsso ABSTRACT The idea behid the spiral model is to do system developmet icremetally while usig aother developmet model,

More information

An Efficient Implementation of Automatic Cloud Cover Assessment (ACCA) on a Reconfigurable Computer

An Efficient Implementation of Automatic Cloud Cover Assessment (ACCA) on a Reconfigurable Computer A Efficiet Implemetatio of Automatic Cloud Cover Assessmet (ACCA) o a Recofigurable Computer Esam El-Araby Mohamed Taher Tarek El-Ghazawi Jacquelie Le Moige Washigto Uiversity Washigto Uiversity Washigto

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Spam Detection. A Bayesian approach to filtering spam

Spam Detection. A Bayesian approach to filtering spam Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation

The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT 030038 1 The Role of Lati Square i Cipher Systems: A atrix Approach to odel cryptio odes of Operatio Jieju og Computer Sciece Departmet Uiversity of Califoria,

More information

Building Blocks Problem Related to Harmonic Series

Building Blocks Problem Related to Harmonic Series TMME, vol3, o, p.76 Buildig Blocks Problem Related to Harmoic Series Yutaka Nishiyama Osaka Uiversity of Ecoomics, Japa Abstract: I this discussio I give a eplaatio of the divergece ad covergece of ifiite

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

A Guide to the Pricing Conventions of SFE Interest Rate Products

A Guide to the Pricing Conventions of SFE Interest Rate Products A Guide to the Pricig Covetios of SFE Iterest Rate Products SFE 30 Day Iterbak Cash Rate Futures Physical 90 Day Bak Bills SFE 90 Day Bak Bill Futures SFE 90 Day Bak Bill Futures Tick Value Calculatios

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Escola Federal de Engenharia de Itajubá

Escola Federal de Engenharia de Itajubá Escola Federal de Egeharia de Itajubá Departameto de Egeharia Mecâica Pós-Graduação em Egeharia Mecâica MPF04 ANÁLISE DE SINAIS E AQUISÇÃO DE DADOS SINAIS E SISTEMAS Trabalho 02 (MATLAB) Prof. Dr. José

More information

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Patentability of Computer Software and Business Methods

Patentability of Computer Software and Business Methods WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic Paper Performace Evaluatio of the MSMPS Algorithm uder Differet Distributio Traffic Grzegorz Dailewicz ad Marci Dziuba Faculty of Electroics ad Telecommuicatios, Poza Uiversity of Techology, Poza, Polad

More information