Implementation of Low Power Scalable Encryption Algorithm
|
|
|
- Norman Patrick
- 10 years ago
- Views:
Transcription
1 Iteratioal Joural of Computer Applicatios ( ) o of Low Power Scalable Ecryptio Algorithm K.J. Jegadish Kumar Assistat Professor SSN College of Egieerig Kalavakkam Cheai, Idia S. Salivahaa Pricipal SSN College of Egieerig Kalavakkam Cheai, Idia K. Chea Kesava Reddy Pricipal Jyothismathi College of Egieerig ad Techology Shamirpet , Idia ABSTRACT SEA Scalable Ecryptio Algorithm is a block cipher based symmetric ecryptio scheme, particularly iteded for resource costraied devices. SEA proposes low computatioal cipher schemes, that is, miiaturized code size, memory ad power, developed for processors with a restricted istructio set. SEA is parametric with plai-text, key ad microprocessor size, ad foud to be powerful with the groupig of eciphermet or deciphermet ad derivatio of the keys. SEA was primarily meat for software implemetatios i microcotrollers, smart cards ad small embedded systems. I this article, we look ito the performace ivestigatio of modified SEA with efficiet modular adder i a Field programmable gate array (FPGA) device. For this reaso, a loop based iterative desig of the block cipher is realized o FPGA. Apart from its miimum cost, the proposed modified desig is etirely flexible with ay parameters ad acquires advatage of geeric VHDL codig. The efficiet modular adders implemetatio based modificatio i SEA achieves lower area, power cosumptio ad cosiderably higher throughputs o the target platform VIRTEX-4, xc4vl25 ad SPARTAN-3, xc3s1400. Keywords: Block ciphers, costraied applicatios, FPGA implemetatio. 1. INTRODUCTION Symmetric ecryptio schemes desiged for resource costraied devices have oly a limited history. Tiy Ecryptio Algorithm (TEA) is a example of cipher desiged especially for resource costraied devices. TEA is commoly kow as Yuval's proposal [1,2]. Earlier cipher does ot give efficiet resistace to differetial ad liear cryptaalysis attacks. Block ciphers i recet days, like the Rijdael Advaced Ecryptio Stadard (AES) cocetrates o decidig a trade-off i iformatio security, hardware/software complexity, ad overall efficiecy. Cosequetly, there arises a requiremet for a ew cryptosystem that edows with apt solutio for resource costraied systems. Embedded applicatios that are basic buildig structures posses importat features ad a challege for ew cryptosystem like Scalable Ecryptio Algorithm (SEA) [1,2]. 1.1 SEA: A Overview The purpose for SEA [1, 2] is to implemet i restricted resources; the architecture proposed is parametric with respect to plai-text, cipher-text, key ad the processor size. Sice the architecture is parametric i ature, it has flexibility ad ca be implemeted i all platforms with miimum code chage. Most algorithms perform differetly o differet platforms but SEA is a exceptio as it allows obtaiig a optimal method of cipherig that suits ay give microprocessor ad the security of this cipher is tailored accordig to its key size [2]. Sice it operates o a limited resource processor, it oly does some basic operatios (i.e. XOR, AND, OR, mod 2 b additio). 1.2 Literature Survey Though there are may cryptographic algorithms, most of them require high or moderate processig power, like Advaced Ecryptio Stadards (AES) [3-6], Data Ecryptio Stadard (DES) [7], Tiy Ecryptio Algorithm (TEA) [8,9], Exteded TEA (XTEA) [10]. But these ecryptio algorithms caot be implemeted i a resource costraied system due to various complexities ivolved like i.e. No Scalability, Processor Itesive, ad Security Level. AES (Rijdael) [3-6] comprises three block ciphers, all the block ciphers vary depedig o the umber of bits. AES is a predetermied block cipher havig 128 bits. It has differet key size of 128, 192 ad 256 bits. AES requires four 256 etry, 32 bit tables, so totally 4096 of memory which equals 1kilo byte for each table. AES is more processor itesive ad is o scalable, so it caot be implemeted o costraied systems. Though there are efficiet implemetatios of AES, there are still oscalable for eed of ay processig platform. DES [7] is based o symmetric key algorithms of bit size 56. DES is the classic symmetric key ecryptio algorithm that receives a predetermied legth sequece of plai-text bits ad alters through a sequece of complex tasks performed i a differet bit strig kow as cipher-text bits usig the same key. Though DES is ot a secured ecryptio, it is widely used i a mode of operatio as per Federal Iformatio Processig Stadard (FIPS-81). DES is more processor itesive, o scalable ad is breakable by Liear Cryptaalysis. TEA [8] or Yuval s proposal [9] is otable for its simplicity ad implemetable o various platforms (scalability) ad works o block size of 64 bits with a key size of 128 bit. Whe crypt aalyzed with equivalet key, each key gives three other keys. So i terms of security TEA is isecure. XTEA [10] was a advaced versio of TEA, maily aimed at improvig all the security glitches. XTEA has complex key schedulig ad rearragemet of Shift XOR ad additio operatios. XTEA is vulerable to related key differetial attack. Like SEA, HIGHT 14
2 Iteratioal Joural of Computer Applicatios ( ) [11] is also aother Block Cipher for resource costraied systems, but its o scalable ad cosumes more umber of gates ad the throughput ad operatig frequecy are much less whe compared to SEA (48, 8). So, implemetig SEA for costraied systems is a better optio. This paper is orgaized as follows. The itroductio ad literature survey are provided i sectio 1. Sectio 2 describes parameters, defiitios ad basic operatios for implemetatio of SEA. Sectio 3 illustrates hardware implemetatio strategies. I sectio 4 implemetatio results are preseted. Fially, i sectio 5 coclusios based o the results are made. 2. IMPLEMENTATION OF SEA Majority of recet private key cipher desig resulted i tradeoffs i the cost of executio ad their performaces. However, the objective is to effectively implemet o a wide rage of platforms. SEA is a differet method ad cosiders a perspective i which it has iadequate throughput ad resources. The cipher was primarily targeted as a desig to provide cost effective implemetatio ad certificatio routie for processors with a restricted istructio set [1]. I additio, opposite to block ciphers that are widely used, it cosiders the parameters such as bus sizes, key ad plai-text. Hece it ca be tailored straightly to a variety of security requiremets ad implemetatio eviromets. I cotrast, i compariso with the solutios that rus traditioal ciphers like Yuval s proposal or TEA (Tiy Ecryptio Algorithm), SEA additioally promotes a resistace to cryptaalysis [2]. Whe put ito practice, SEA was demostrated to be a proficiet aswer for microcotrollers ad related applicatios. Although, SEA is a efficiet hardware implemetatio, its performace is yet to be explored. This paper therefore proposes to ivestigate the iterest of this algorithm to be modified for area ad power i costraied applicatios. The ivestigatio begis with a exploratio of the quality of a cost effective FPGA implemetatio of SEA [1] ad our progress is to modify SEA usig efficiet modular adder i [12-14] to reduce the hardware complexities i terms of area ad power. 2.1 Algorithmic Descriptio Basic Operatios Owig to its optimality costraits, SEA,b [1,2] is based o a restricted umber of basic operatios chose for their accessibility i the give device. This ca be classified ito differet categories as give i Stadert et.al [1,2] 1. Basic XOR : Z 2 Z 2: x, y z = x y z i = x i y i, 2. S-Box: SEA,b make use of 3-bit substitutio table stated as: S T : = [0; 5; 6; 7; 4; 3; 1; 2], ad is evaluated as i followig expressios S: Z b 2 b Z b 2 b : x x = S(x) x 3i = (x 3i+2 x 3i+1 ) x 3i x 3i+1 = x 3i+2 x 3i x 3i+1 x 3i+2 = x 3i x 3i+1 x 3i+2, : bitwise AND : bitwise OR. 3. Word rotate R: For b -word vectors the word rotate is expressed as: b R: Z 2 b 4. Bit rotate r: Z b 2 b : x y = R x r: Z b 2 b Z b 2 b : x y = r x y 3i = x 3i 1 y 3i+1 = x 3i+1, y 3+2i = x 3i+2 1, where : right shifts ad : left shifts. 5. Additio modulo 2 b : : Z b 2 b Z b 2 b b : x, y z = x y Z 2 b z i = x i y i, I the followig sub-sectio, complete descriptio of the algorithm which ca be referred to [1, 2] is briefed. It starts with the vital parameters, ad the highlights its basic operatio. The the sequece of key geeratio is described Ecryptio/Decryptio ad Key Geeratio The ecrypt roud F E, decrypt roud F D ad key roud F K are defied as: Ecryptio Roud F E : L i+1, R i+1 = F E L i, R i, K i R i+1 = R L i r S R i K i, L i+1 = R i Decryptio Roud F D : L i+1, R i+1 = F D L i, R i, K i R i+1 = R 1 L i r S R i K i, L i+1 = R i 15
3 Iteratioal Joural of Computer Applicatios ( ) Figure.2.1. Ecryptio ad decryptio ad key schedulig [1, 2] Key Schedulig Roud F K : KL i+1, KR i+1 = F K KL i, KR i, C i KR i+1 = KL i R r S KR i C i, KL i+1 = KR i Cipher Descriptio This cipherig is based o the umber of rouds r ad uses iterative based loop desig. The pseudo code give i Figure 2.2 illustrates the ecessary steps for ecryptig a plai-text. where, P: Plai-text, C: Cipher-text K: Key ad all these three are parameterized by bit size. Takig ito accout the parametric b-bit words, the operatios are doe i the cipher. Sice r is odd, referrig to Figure 2.2 for key schedulig ad ecryptio, the value of r must be rouded up or dow. Roudig up or ceil is deoted as ad roudig dow or floor is deoted as. Figure 2.2: Pseudo Code descriptio [1, 2] Recommeded Number of rouds The expressio r = [3(/4) + 2((/2b )+ b/2)] evaluates the umber of rouds, r, required to sufficietly secure agaist covetioal attacks. i.e, calculatio of r is related to resist either differetial or liear attacks addig to twice the umber of rouds to get absolute diffusio. Cosecutively, it prevets statistical ad structural attacks. The value of r must be always odd, if ot, 1 must be added to make it odd [1,2]. 3. HARDWARE IMPLEMENTATION 3.1 o Descriptio The first ivestigatio step to the [1] hardware implemetatio of SEA proposes to take a look at a straightforward implemetatio of the algorithm o a FPGA platform, achievig a roud/clock cycle ad deoted as the loop implemetatio. It is kow that the S-boxes ad the mod 2 b adder are the operators that cost more i hardware implemetatio; but the operators like Word Rotate ad Bit Rotate blocks i the cipher are realized by swappig wires. As per the specificatios of SEA [1], the key geeratios cosist of two multiplexers to switch the right ad left part of the key whe the algorithm reaches half. The executio is doe by the suitable cotrol sigal called Swap. The switch cotrolled multiplexer supplies the loopig fuctio with the right part of the key durig the executio of first half of roud ad pass o its left part after the switch. The Geeric Loop Architecture is simple ad oly chages i the locatio of the R ad R -1 Block. I this paper, we maily focus to describe [12] a light weight Modular adders to modify modulo 2 b additio operator i SEA so as to achieve cosiderable low power optimizatio at the sythesizable VHDL desig level. 16
4 No: of Slices Iteratioal Joural of Computer Applicatios ( ) 3.2 o of Modified SEA with efficiet Modular adders Additio modulo m of x ad y {0,1,2,..m-1} is give by the equatio: (x + y) mod m = x + y, if x + y < m, ad = x + y m, if x + y m, (3.1) which ca be simply realized usig a suitable basic arithmetic operators. But, their implemetatio is complex, as they require more space ad speed. The algorithm described allows to liberate the implemetatio cost ad thus results i powerful hardware operators. Here, the equatio k = [log 2 m]+1 desigates the umber of bits which are essetial to predetermie output ad iputs of a modulo m adder. Fudametally a additio modulo m ca be performed by three methods [12]: 1. Table based operator method 2. Hybrid based operator method 3. Adder-Based operator method. Adder-Based Operators: Implemetig Equatio (3.1) ad illustrated by Algorithm 3.1 directs to attai architectures i Figure 3.1 ad [12] delivers i detail the proof of validatio of this method. This algorithm implemetatio resulted i use of two carry-propagate adders ad a Multiplexer ad is cosidered to be appropriate for FPGAs. Algorithm 3.1 Additio Modulo m. Determie k 2 k-1 < m < 2 k Assig s0 x + y Assig s1 (s0 mod 2 k ) + 2 k m if the carry-out bit of s0 or s1 is oe the (x + y) mod m s1 mod 2 k else (x + y) mod m s0 mod 2 k ed if The architecture of implemeted algorithm 3.1 is portrayed i Figure 3.1. proposed modulo additio algorithm leads to smallest circuits, i tur reduced overall circuit complexity of SEA. Figure IMPLEMENTATION RESULTS The results were derived by sythesizig the algorithm usig Xilix ISE 9.2i tool o VIRTEX-4 platform device XC4VLX25 with speed grade-12 ad XC3S1400, SPARTAN-3 platform with speed grade -4. XPower Aalyzer tool was used to aalyze the power cosumptio of the implemetatio. The implemetatio was doe for variats bit data () ad a processor word size (b). We achieved reductio i umber of slices (Figure 4.1), high throughputs (Figure 4.2) ad icrease i work frequecy (Figure 4.3) i implemetatio compared to implemetatio of [1]. Throughput /Area ratios are also show i Figure 4.4. implemetatio of SEA exhibited cosumptio of small area ad move toward at the cost of icreased throughput ad reduced power cosumptio as i Figure 4.5. As a result, it ca be well thought-out as the attractive substitute for costraied devices. No: of slices vs Data ,8 72,12 96,8 o o[1] Data Size, Word Size i bits Figure
5 Throughput/Area Ratio Frequecy i MHz Throughput i Mbps Total Power Cosumptio i mw Iteratioal Joural of Computer Applicatios ( ) Throughput vs Data ,8 72,12 96,8 o o [1] Power Cosumptio of our Modified SEA Data Size, Word Size i Bits Data Size, Word Size i bits Figure 4.2 Frequecy vs Data ,8 72,12 96,8 Data Size, Word Size i bits Figure 4.3 o o[1] Throughput/Area Ratio vs Data Figure CONCLUSION SEA was origially proposed for efficiet implemetatio i software. Cosiderig the eed for efficiet implemetatio i hardware, with the ew desig criteria, it was foud to have better solutios as compared to software implemetatio. Through the hardware ivestigatio of the SEA, we show that this modular symmetric algorithm, targeted for low-resources software solutios, ca iterestigly respod to costraied hardware eeds. We first demostrated that the scalability of this algorithm ca be kept i the hardware descriptio laguage(vhdl). The simple iterative loop desig achieves iterestig performace i area ad power reductio, improvise throughputs i FPGA. I additio, we aalysed the power cosumed by the SEA module for differet variats i data block ad word size. It is also sigificat to highlight a umber of merits i SEA compared to recet block ciphers, specifically its simplicity, scalability(re-implemetig SEA for a ew block size does ot ecessitate to re-write code), ad beig a spledid desig of ecryptio ad decryptio. 6. ACKNOWLEDGEMENT We are grateful to the experts who have cotributed towards developmet of our work. We ackowledge Shakar Kuha, Thirumuruga ad Pravee V for all their help durig the desig phase Data Size, Word Size i bits Figure 4.4 o o[1] 7. REFERENCES [1] F.Mace, F.X Stadert, J J Quisquater FPGA implemetatio(s) of a Scalable Ecryptio algorithm IEEE Trasactios o VLSI Systems, Vol.16, 2008, pp [2] Fracois-Xavier Stadaert, Gilles Piret, Neil Gershefeld, Jea-Jacques Quisquater SEA a Scalable Ecryptio Algorithm for Small Embedded Applicatios i Proc. CARDIS, 2006, pp [3] J. Daeme ad V. Rijme, The Desig of Rijdael. New York: Spriger-Verlag, [4] Advaced Ecryptio Stadard, FIPS PUB 197, Nov
6 Iteratioal Joural of Computer Applicatios ( ) [5] N. Pramstaller ad J. Wolkerstorfer, A uiversal ad efficiet AES co-processor for field programmable logic arrays, i Proc. FPL, 2004, pp [6] Fracisco Rodriguez-Heriquez, N.A. Saqib, A. Diaz- Perez, Ceti Kaya K09, Cryptographic Algorithms o Recofigurable Hardware, Spriger Series o Sigals ad Commuicatio Techology, [7] Data Ecryptio Stadard, FIPS PUB 46-3, Oct [8] D.J. Wheeler, R. Needham, TEA, a Tiy Ecryptio Algorithm, proceedigs of FSE 1994, Lecture Notes i Computer Sciece, Vol 1008, pp , Leuve, Belgium, December 1994, Spriger-Verlag. [9] G. Yuval, Reivetig the travois: Ecryptio/MAC i 30 ROM bytes, i Proc. Fast Softw. Ecryptio (FSE), 1997, pp [10] J.P. Kaps, Chai-Tea, Cryptographic Hardware os of XTEA, The 9th Iteratioal Coferece o Cryptology i Idia INDOCRYPT 2008, LNCS 5356, pp , [11] D. Hog et al., HIGHT: A New Block Cipher Suitable for Low-Resource Device, Proceedigs of CHES 2006, Lecture Notes i Computer Sciece, Vol. 4249, pp , Yokohama, Japa, October [12] Beuchat, J.-L.; Lab. De l'ifoatique du Parallelisme, Some Modular adders ad multipliers for Field programmable Gate arrays, i Proc. Parallel ad Distributed processig symposium [13] J.-L. Beuchat. Modular Multiplicatio for FPGA o of the IDEA Block Cipher, Techical Report , Laboratoire de l Iformatique du Parall elisme, Ecole NormaleSup erieure de Lyo, 46 All ee d Italie, LyoCedex 07, Sept [14] J.-L. Beuchat ad A. Tisserad. Small Multiplier-based Multiplicatio ad Divisio Operators for Virtex-II Devices.I M. Gleser, P. Zipf, ad M. Reovell, editors, Field-Programmable Logic ad Applicatios Recofigurable Computig Is Goig Maistream, umber 2438 i Lecture Notes i Computer Sciece, pages Spriger,
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Faulty Clock Detectio for Crypto Circuits Agaist Differetial Fault Aalysis Attack Pei uo ad Yusi Fei Email:[email protected], [email protected] Departmet of Electrical ad Computer Egieerig Northeaster
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..
(IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
Multiplexers and Demultiplexers
I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction
THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,
Systems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised
Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean
1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.
Research Article Sign Data Derivative Recovery
Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov
A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length
Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece
Soving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
Overview on S-Box Design Principles
Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea
Incremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8
CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive
CHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
Convention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
Chapter 10 Computer Design Basics
Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview
CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations
CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
On Formula to Compute Primes. and the n th Prime
Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao [email protected] amih Abdul-Nabi
NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,
NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
Capacity of Wireless Networks with Heterogeneous Traffic
Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
CS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
Engineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
Software Engineering Guest Lecture, University of Toronto
Summary Beyod Software Egieerig Guest Lecture, Uiversity of Toroto Software egieerig is a ew ad fast growig field, which has grappled with its idetity: from usig the word egieerig to defiitio of the term,
Study on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
How to read A Mutual Fund shareholder report
Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.
Electrostatic solutions for better efficiency
Electrostatic solutios for better efficiecy idustry for egieers, professioals ad techicias i developmet, productio ad istallatio. www.kerste.de/e Electrostatic solutios kerste has bee the leadig supplier
INVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
Infinite Sequences and Series
CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...
A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:
A Secure Implementation of Java Inner Classes
A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio
The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
Repeating Decimals are decimal numbers that have number(s) after the decimal point that repeat in a pattern.
5.5 Fractios ad Decimals Steps for Chagig a Fractio to a Decimal. Simplify the fractio, if possible. 2. Divide the umerator by the deomiator. d d Repeatig Decimals Repeatig Decimals are decimal umbers
Hypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
Theorems About Power Series
Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius
Sequences and Series
CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their
Locating Performance Monitoring Mobile Agents in Scalable Active Networks
Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira [email protected], {dehgha,
Estimating Probability Distributions by Observing Betting Practices
5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,
Chapter 5: Inner Product Spaces
Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples
Designing Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied
Entropy of bi-capacities
Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace [email protected] Jea-Luc Marichal Applied Mathematics
Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System
Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,
Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
Department of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
Integer Factorization Algorithms
Iteger Factorizatio Algorithms Coelly Bares Departmet of Physics, Orego State Uiversity December 7, 004 This documet has bee placed i the public domai. Cotets I. Itroductio 3 1. Termiology 3. Fudametal
Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.
18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The
Analyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
CHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
RUT - development handbook 1.3 The Spiral Model v 4.0
2007-01-16 LiTH RUT - developmet hadbook 1.3 The Spiral Model v 4.0 Fredrik Herbertsso ABSTRACT The idea behid the spiral model is to do system developmet icremetally while usig aother developmet model,
An Efficient Implementation of Automatic Cloud Cover Assessment (ACCA) on a Reconfigurable Computer
A Efficiet Implemetatio of Automatic Cloud Cover Assessmet (ACCA) o a Recofigurable Computer Esam El-Araby Mohamed Taher Tarek El-Ghazawi Jacquelie Le Moige Washigto Uiversity Washigto Uiversity Washigto
DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
Confidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13
EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may
Automatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
Spam Detection. A Bayesian approach to filtering spam
Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it
MARTINGALES AND A BASIC APPLICATION
MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this
Convexity, Inequalities, and Norms
Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for
The Role of Latin Square in Cipher Systems: A Matrix Approach to Model Encryption Modes of Operation
UCLA COPUTR SCINC DPARTNT TCHNICAL RPORT 030038 1 The Role of Lati Square i Cipher Systems: A atrix Approach to odel cryptio odes of Operatio Jieju og Computer Sciece Departmet Uiversity of Califoria,
Building Blocks Problem Related to Harmonic Series
TMME, vol3, o, p.76 Buildig Blocks Problem Related to Harmoic Series Yutaka Nishiyama Osaka Uiversity of Ecoomics, Japa Abstract: I this discussio I give a eplaatio of the divergece ad covergece of ifiite
THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n
We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
A Guide to the Pricing Conventions of SFE Interest Rate Products
A Guide to the Pricig Covetios of SFE Iterest Rate Products SFE 30 Day Iterbak Cash Rate Futures Physical 90 Day Bak Bills SFE 90 Day Bak Bill Futures SFE 90 Day Bak Bill Futures Tick Value Calculatios
On the Capacity of Hybrid Wireless Networks
O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,
Escola Federal de Engenharia de Itajubá
Escola Federal de Egeharia de Itajubá Departameto de Egeharia Mecâica Pós-Graduação em Egeharia Mecâica MPF04 ANÁLISE DE SINAIS E AQUISÇÃO DE DADOS SINAIS E SISTEMAS Trabalho 02 (MATLAB) Prof. Dr. José
Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley
Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these
E-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
Vulnerability test system for SIP network elements
Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic
Chapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
Research Method (I) --Knowledge on Sampling (Simple Random Sampling)
Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
Evaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
Patentability of Computer Software and Business Methods
WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet
A probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic
Paper Performace Evaluatio of the MSMPS Algorithm uder Differet Distributio Traffic Grzegorz Dailewicz ad Marci Dziuba Faculty of Electroics ad Telecommuicatios, Poza Uiversity of Techology, Poza, Polad
