A Novel Lightweight Algorithm for Secure Network Coding

Size: px
Start display at page:

Download "A Novel Lightweight Algorithm for Secure Network Coding"

Transcription

1 A Novel Lghtweght Algothm fo Secue Netwok Codng A Novel Lghtweght Algothm fo Secue Netwok Codng State Key Laboatoy of Integated Sevce Netwoks, Xdan Unvesty, X an, Chna, E-mal: {wangxaoxao,wangmeguo}@mal.xdan.edu.cn Abstact In the pactcal netwok codng scenao, the advesay usually has full eavesdoppng abltes. Hence, lghtweght secue netwok codng s moe sutable than the nfomaton-theoetc appoach. We popose a novel codng scheme aganst a global eavesdoppe n ths pape. In ou scheme, we utlze mappng values to andomze ognal packets nstead of locked coeffcents. It means that only one encypted symbol s eued fo a packet, whch apdly educes space ovehead and encypton volume. Meanwhle, thee s no addtonal euement at ntemedate nodes. Compaed to the exstng schemes, ou scheme s moe effcent n space ovehead and encypton volume wth appopate computatonal complexty.. Intoducton Keywods: Netwok Codng, Lghtweght Secue, Eavesdoppng Attacks Netwok codng [] allows ntemedate nodes to mx the ncomng packets befoe sendng out, whch s dffeent fom the tadtonal stoe-fowad mechansm. Lnea netwok codng [2] showed that t could acheve the multcast capacty n a suffcent lage feld. Fo the opeaton convenence and smple algebac stuctue, much of the eseach focuses on the lnea netwok codng. Moeove, when the feld sze s lage than 2 8 o 2 6, andom lnea netwok codng (RLNC) [3] could also acheve the multcast capacty wth pobablty exponental appoachng wth code length. In RLNC, the ntemedate nodes ndependently select codng coeffcents andomly ove fnte feld, whch s a decentalzed mechansm, and easy to mplemented n pactce. Koette and Medad [4] poposed the algebac famewok fo netwok codng and gave an algebac chaactezaton of the multcast poblem. Netwok codng had many applcatons, such as weless mesh netwok [5-6] and coopeatve communcaton [7] etc. Secue netwok codng was fst consdeed n [8] to acheve pefect nfomaton-theoetc secuty, whch s aganst that advesaes could only wetap a lmted numbe of netwok lnks. Feldman et al. [9] showed that makng a secue lnea netwok code s euvalent to fndng a lnea code wth genealzed dstance popetes and ponted that f we gve up a small amount of oveall capacty, then a andom code acheves secuty by usng a much smalle feld. Rouayheb et al. [] pesented a constucton of secue netwok codes by usng secue codes fo wetap channel Ⅱ.Nga et al. [] extended the genealzed Hammng weght [2] fo lnea eo coecton codes to lnea netwok codes. Weakly secue netwok codng was poposed n [3] such that advesay s unable to get any meanngful nfomaton about the souce messages, ths s moe pactce than the pefect nfomaton-theoetc secuty. Stongly secue lnea netwok codng s poposed by Haada and Yamamoto [4], they showed that stong secuty n fact contans weak secuty as a specal case. Unvesal secue netwok codng was poposed n [5] based on ank-metc codes, and t has the unvesal popety that can be appled on top of any netwok wthout po knowledge o any modfcatons on the lnea netwok code. Jan [6] studed the elaton between secuty and netwok topology. A necessay and suffcent condton was deved unde whch souce messages can be tansmtted wth pefect secuty. In eal scenaos, the wetap capablty s unlmted and computatonally bounded. Moeove, netwok capacty and compute esouce ae pecous. To solve the poblem, the moe pactcal scheme was poposed n [7-9] that combnes cyptogaphc appoaches wth netwok codng to aganst global eavesdoppe and keeps andom netwok codng unchanged at ntemedate nodes. A mnmum ovehead scheme (MOS) was poposed n [7] to acheve pefect secuty, but wth hgh encypton volume because the whole message s encypted. The scheme n [8] (P-Codng) utlzed pemutaton encypton functon to aganst eavesdoppng attacks wthout ovehead, but t s also wth hgh Advances n nfomaton Scences and Sevce Scences(AISS) Volume4, Numbe2, Nov 22 do:.456/aiss.vol4.ssue

2 A Novel Lghtweght Algothm fo Secue Netwok Codng encypton volume. Lghtweght secue scheme (SPOC) was pesented n [9], whch only encypts a much shote exta codng vecto nstead of the whole packet, so t educed encypton volume but nceased capacty ovehead. In ths pape, we popose a moe effcent scheme aganst global eavesdoppe that acheves secuty wth mnmum ovehead and encypton volume wthout changng the mplement at the ntemedate nodes o eung a lage feld. The key dea of ou novel scheme s to utlze some mappng values to geneate a souce pecodng matx nstead of exta codng vectos, whch educe the length of the andom keys. 2. Poblem Fomulaton We epesent a communcaton netwok by an acyclc dected gaph G V, E, whee V and E denote the set of nodes and edges, espectvely. Each edge n the netwok s able to tansmt a packet ove fnte feld wthout eo. Souce node S wshes to send a lage fle M to all the eceves n a geneaton and M s spltted nto data packets by S. Each data packet s denoted by n x ( x,, xn),, whee. Intemedate nodes andomly choose codng coeffcents ove fo ts nput packets and fowad a lnea combnaton of nput packets at each outgong edge. Snk nodes can ecove M wth Gaussan elmnaton afte ecevng at least lnea ndependent packets. Thee s a global eavesdoppe n the netwok. We assume the advesay s able to choose a subset of ndependent edges, whch means that the global codng vectos of wetap edges ae ndependent. 3. Poposed Scheme In ths secton, we popose a pecodng scheme fo lghtweght secue netwok codng wth gnoed space ovehead. 3. Pecodng at Souce As descbed n the pevous secton, a lage fle M was spltted nto packets, and we choose an n appopate mappng functon h( x): fo these packets, whch maps packets to dffeent values. Then, we constuct a pecodng matx P by mappng values h( x ),. h( x) h( x2) h( x ) h( x) h( x2) h( x ) P h( x) h( x2) h( x ) () Obvously, matx P s a Vandemonde matx and t s an nvetble matx that could be used to pe-encode ognal packets x, x. x x x2 x2 P x x n n (2) Then souce S concatenates packet x ( x,, xn, h( x)). x wth coespondng mappng value h( x ) to be a pe-encoded 676

3 A Novel Lghtweght Algothm fo Secue Netwok Codng Fo secuty, S must hde the last symbol h( x ) of x fom advesay, so that the advesay can not get nfomaton about ognal packet by wetappng attacks. We encypt h( x ) usng AES cyptosystem and obtan Ehx ( ( )). Then we get a new packet x ( x,, xn, E( h( x))). Afte that, S ceates an augmented packet as follow, new m (,,,,,,, x ) ( n),,,. At last, the augmented packets ae tansmtted nto the netwok and the ntemedate nodes employee RLNC. 3.2 Decodng at Snks When a snk node eceves at least ndependent message packets, t can begn to decode as follows. new new T Step : Usng Gaussan elmnaton to ecove the new message packets [ x,, x ]. new new T Step 2: We decypt the last column of [ x,, x ] wth AES to get [ x,, x ] T and h( x ). Step 3: Constuct the pecodng matx P by h( x ),,,. Compute the nvese matx P, and emove h( x ),, h( x ) T fom [ x,, x ] T to obtan [ x,, x ] T. T T Step 4: At last, we obtan the ogn data packets by [ x,, x ] P [ x,, x ]. 3.3 Secuty Analyss new We assume the advesay has full knowledge about the stuctual chaactestcs of P, and mappng functon h() s also known to t. Howeve, t s computatonally bounded, whch means that gven a ha mappng value b, t s computatonally nfeasble to fnd nput a such that b. The element of P s keep secet to advesay, snce we andomze the ognal packets x, by P. Euvalently, the ognal packets ae encypted by P. Theefoe, the advesay only gets the new lnea combnaton of x,. Futhemoe, the advesay s able to eavesdop at least ndependent edges to decode new new x,, x. The subset of wetap edges s denoted by W, and R {( h x ),,} denotes new new mappng value set. The advesay tes to obtan the ogn packets x,, x fom x,, x by the followng euaton system, h( x) xh( x2) x2 h( x) x x h( x) xj h( x2) x2j h( x) xj xj (4) h( x) xn h( x2) x2n h( x) xn xn thee ae ( n ) euatons wth ( n ) unknown vaables x,, xn and h( x),, h( x ) n (4). It s easly known that h( x ),, h( x ) has P possbltes, because h( x ), has possbltes. So the numbe of total possbltes s ( ) ( 2) ( ) P. Theefoe, the soluton to (4) s an affne subspace wth cadnalty as follow, That means, ( n) P ( n) P (3) 677

4 A Novel Lghtweght Algothm fo Secue Netwok Codng P x,, xyw (5) P whee Y W denotes the message packets whch ae caed n W. Hence, the advesay cannot ecove x,, x wthout h( x),, h( x ). That s, the ogn data packets ae secue. 3.4 Compason In ou scheme, thee ae ogn data packets n a geneaton whch ae n -length, and get n - length pe-encoded packets afte souce codng. That means the space ovehead of one packet s. The last symbol of the pe-encoded packet s used to constuct the locked coeffcent, so that only one symbol s needed to be encypted. As mentoned pevously, the space ovehead and encypton volume ae ndependent of the packets, whch ae sgnfcant educed by ou scheme. Howeve, SPOC encypts n -length ogn data packets wth -length global encodng vectos. These global encodng vectos ae encypted by shaed keys and placed n the heade of the coespondng peencoded packets, whch ae called locked coeffcents. 8 In ode to gve a smple compason, we consde a feld wth sze 2, and thee ae 2 packets n a geneaton. The maxmum packet sze s 5 bytes as [9] mentoned. Ou scheme esults n a space ovehead ato of.667%, because of only one symbol s placed n the heade of a packet. Howeve, thee s 2-length locked coeffcent placed n the heade by SPOC, so that the space ovehead ato s 3.3% fo SPOC. Futhemoe, ou scheme yelds encypton volume of 2 bytes n a geneaton and coespondng to 4 bytes by SPOC. Table. Compason wth othe schemes Schemes Encypton Volume Space Ovehead Computaton Cost Adel [7] n Zhang [8] Vlela [9] Ous n 3 ( ) 3 ( ) The compason between ou scheme and othe schemes s gven n Table. and Fgue, the ed cuve n Fgue s ou esult. And the blue cuve s ovelappng to the puple cuve, whch means the encypton volume geneated by Vlela scheme s almost same as tadtonal scheme. We can see fom Table. that ou scheme causes a tny space ovehead and Fgue shows that ou scheme sgnfcantly educes the encypton volume compaed to othes. In addton, the computatonal cost of ou scheme s 3 ( ), whch s the same as SPOC. The man computatonal cost conssts of the nvese of pecodng matx P and othe matx opeaton. The scheme poposed n ths pape s an effcent algothm whch has smalle space ovehead and lowe encypton volume wth appopate computaton cost. 678

5 A Novel Lghtweght Algothm fo Secue Netwok Codng Tadtonal Vlela Ou Zhang Adel Encypton volume Data sze Fgue. The compason of encypton volume 4. Concluson We poposed a novel lghtweght scheme aganst eavesdoppng attacks based on computatonal secuty n ths pape. The basc dea of ths scheme s to utlze keys, whch ae espectve to ogn data packets, to geneate a Vandemonde matx as pecodng matx. Snce encypted mappng value s embedded at the end of pe-encoded packets and then tansmtted ove the netwok, the space ovehead s mnmzed, and the encypton volume s educed as well. The secuty analyss shows that fo the same secuty euement, ou scheme s moe effcent. 5. Acknowledgements Ths wok s suppoted by the Natonal Natual Foundaton of Chna unde Gants No.6832 and The authos also would lke to thank all the evewes fo the had woks. 6. Refeences [] Rudolf Ahlswede, Nng Ca, Shuo-Yen Robet L, and Raymond W. Yeung, Netwok nfomaton flow, IEEE Tans. Inf. Theoy, Vol. 46, No.4, pp , July. 2. [2] Shuo-Yen Robet L, Raymond W. Yeung and Nng Ca, Lnea netwok codng, IEEE Tans. Inf. Theoy, Vol. 49, No. 2, pp , Feb. 23. [3] Tacey Ho, Muel Medad, Ralf Koette, Davd R. Kage, Mchelle Effos, Jun Sh and Ben Leong, A andom lnea netwok codng appoach to multcaost, IEEE Tans. Inf. Theoy, Vol. 52, No., pp , Oct. 26. [4] Ralf Koette and Muel Medad, An algebac appoach to netwok codng, IEEE/ACM Tansactons on Netwokng, Vol., No. 5, pp , Oct. 23. [5] Jn Q,, Shuny Zhang, Shujng L,, Lu Cao, "A Random Lnea Codng Algothm fo Cogntve Weless Mesh Netwoks", JCIT, Vol. 7, No. 6, pp. 2-2, 22. [6] Yafe Hu, Fangmn L, Xnhua Lu, "On Netwok Codng fo Qos Impovement n Weless Mesh Netwoks", AISS, Vol. 4, No. 7, pp. -3,

6 A Novel Lghtweght Algothm fo Secue Netwok Codng [7] Mngfeng Zhao, Yajan Zhou,, Yxan Yang, Wen Song, "An Impoved Analog Netwok Codng Scheme fo Coopeatve Communcaton Systems", JCIT, Vol. 6, No. 9, pp. 2-29, 2. [8] Nng Ca and Raymond W. Yeung, Secue netwok codng, n Poc. IEEE ISIT 2, Lausanne, Swtzeland, July 22, pp [9] Jon Feldman, Tal Malkn, Clff Sten, and Rocco A. Sevedo, On the capacty of secue netwok codng, n Poc. 42nd Annual Alleton Conf. Commun., Contol and Comput., Sep. 24. [] Salm El Rouayheb, Emna Soljann, and Alex Spntson, Secue netwok codng fo wetap netwoks of type Ⅱ, IEEE Tansactons on Infomaton Theoy, Vol. 58, No. 3, pp Ma. 22. [] Ch-Kn. Nga, Raymond W. Yeung and Zhxue Zhang, Netwok genealzed hammng weght, n Poc. Wokshop on Netwok Codng Theoy and Applcaton., Lausanne, Swtzeland, 29, pp [2] Vcto K. We, Genealzed hammng weght fo lnea codes, IEEE Tans. Inf. Theoy, Vol. 37, No. 5, pp , Sep. 99. [3] Kapl Bhattad and Kshna R. Naayanan, Weakly secue netwok codng, n Poc. NETCOD 5, Rva del Gada, Italy, Ap. 25. [4] Kunhko Haada and Hosuke Yamamoto, Stongly secue lnea netwok codng, IEICE Tans. Fund., Vol. E9-A, No., pp , Oct. 28. [5] Danlo Slva and Fank R. Kschschang, Unvesal secue netwok codng va ank-metc codes, IEEE Tans. Inf. Theoy, Vol. 57, No. 2, pp , Feb. 2. [6] Kamal Jan, Secuty based on netwok topology aganst the wetappng attack, IEEE Weless Commun., Vol., No., pp. 68-7, Feb. 24. [7] Majd Adel and Huapng Lu, Secue netwok codng wth mnmum ovehead based on hash functons, IEEE Commun. Lett., Vol. 3, No 2, pp , Dec. 29. [8] Peng Zhang, Ynxn Jang, Chuang Ln, Yanfe Fan and Xuemn Shen, P-Codng: secue netwok codng aganst eavesdoppng attacks, n Poc. IEEE INFOCOM 2, San Dego, CA, USA, Ma. 2, pp. -9. [9] Joao P. Vlela, Lusa Lma and Joao Baos, Lghtweght secuty fo netwok codng, n Poc. IEEE ICC8, Bejng, Chna, pp , May

Additional File 1 - A model-based circular binary segmentation algorithm for the analysis of array CGH data

Additional File 1 - A model-based circular binary segmentation algorithm for the analysis of array CGH data 1 Addtonal Fle 1 - A model-based ccula bnay segmentaton algothm fo the analyss of aay CGH data Fang-Han Hsu 1, Hung-I H Chen, Mong-Hsun Tsa, Lang-Chuan La 5, Ch-Cheng Huang 1,6, Shh-Hsn Tu 6, Ec Y Chuang*

More information

An Algorithm For Factoring Integers

An Algorithm For Factoring Integers An Algothm Fo Factong Integes Yngpu Deng and Yanbn Pan Key Laboatoy of Mathematcs Mechanzaton, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng 100190, People s Republc of Chna

More information

AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE

AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL MODEL OF BUILDING BLOCKAGE Radoengneeng Aea Coveage Smulatons fo Mllmete Pont-to-Multpont Systems Usng Buldng Blockage 43 Vol. 11, No. 4, Decembe AREA COVERAGE SIMULATIONS FOR MILLIMETER POINT-TO-MULTIPOINT SYSTEMS USING STATISTICAL

More information

Keywords: Transportation network, Hazardous materials, Risk index, Routing, Network optimization.

Keywords: Transportation network, Hazardous materials, Risk index, Routing, Network optimization. IUST Intenatonal Jounal of Engneeng Scence, Vol. 19, No.3, 2008, Page 57-65 Chemcal & Cvl Engneeng, Specal Issue A ROUTING METHODOLOGY FOR HAARDOUS MATIALS TRANSPORTATION TO REDUCE THE RISK OF ROAD NETWORK

More information

Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments

Joint Virtual Machine and Bandwidth Allocation in Software Defined Network (SDN) and Cloud Computing Environments IEEE ICC 2014 - Next-Geneaton Netwokng Symposum 1 Jont Vtual Machne and Bandwdth Allocaton n Softwae Defned Netwok (SDN) and Cloud Computng Envonments Jonathan Chase, Rakpong Kaewpuang, Wen Yonggang, and

More information

TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS

TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS TRUCK ROUTE PLANNING IN NON- STATIONARY STOCHASTIC NETWORKS WITH TIME-WINDOWS AT CUSTOMER LOCATIONS Hossen Jula α, Maged Dessouky β, and Petos Ioannou γ α School of Scence, Engneeng and Technology, Pennsylvana

More information

Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction

Efficient Evolutionary Data Mining Algorithms Applied to the Insurance Fraud Prediction Intenatonal Jounal of Machne Leanng and Computng, Vol. 2, No. 3, June 202 Effcent Evolutonay Data Mnng Algothms Appled to the Insuance Faud Pedcton Jenn-Long Lu, Chen-Lang Chen, and Hsng-Hu Yang Abstact

More information

Perturbation Theory and Celestial Mechanics

Perturbation Theory and Celestial Mechanics Copyght 004 9 Petubaton Theoy and Celestal Mechancs In ths last chapte we shall sketch some aspects of petubaton theoy and descbe a few of ts applcatons to celestal mechancs. Petubaton theoy s a vey boad

More information

PCA vs. Varimax rotation

PCA vs. Varimax rotation PCA vs. Vamax otaton The goal of the otaton/tansfomaton n PCA s to maxmze the vaance of the new SNP (egensnp), whle mnmzng the vaance aound the egensnp. Theefoe the dffeence between the vaances captued

More information

A New Estimation Model for Small Organic Software Project

A New Estimation Model for Small Organic Software Project 8 03 ACADEMY PUBLISHER A New Estmaton Model o Small Oganc Sotwae Poject Wan-Jang Han, Tan-Bo Lu, and Xao-Yan Zhang School O Sotwae Engneeng, Bejng Unvesty o Posts and Telecommuncaton, Bejng, Chna Emal:

More information

Mixed Task Scheduling and Resource Allocation Problems

Mixed Task Scheduling and Resource Allocation Problems Task schedulng and esouce allocaton 1 Mxed Task Schedulng and Resouce Allocaton Poblems Mae-José Huguet 1,2 and Pee Lopez 1 1 LAAS-CNRS, 7 av. du Colonel Roche F-31077 Toulouse cedex 4, Fance {huguet,lopez}@laas.f

More information

Gravitation. Definition of Weight Revisited. Newton s Law of Universal Gravitation. Newton s Law of Universal Gravitation. Gravitational Field

Gravitation. Definition of Weight Revisited. Newton s Law of Universal Gravitation. Newton s Law of Universal Gravitation. Gravitational Field Defnton of Weght evsted Gavtaton The weght of an object on o above the eath s the gavtatonal foce that the eath exets on the object. The weght always ponts towad the cente of mass of the eath. On o above

More information

A Coverage Gap Filling Algorithm in Hybrid Sensor Network

A Coverage Gap Filling Algorithm in Hybrid Sensor Network A Coveage Ga Fllng Algothm n Hybd Senso Netwok Tan L, Yang Mnghua, Yu Chongchong, L Xuanya, Cheng Bn A Coveage Ga Fllng Algothm n Hybd Senso Netwok 1 Tan L, 2 Yang Mnghua, 3 Yu Chongchong, 4 L Xuanya,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand

A New replenishment Policy in a Two-echelon Inventory System with Stochastic Demand A ew eplenshment Polcy n a wo-echelon Inventoy System wth Stochastc Demand Rasoul Haj, Mohammadal Payesh eghab 2, Amand Babol 3,2 Industal Engneeng Dept, Shaf Unvesty of echnology, ehan, Ian ([email protected],

More information

LINES ON BRIESKORN-PHAM SURFACES

LINES ON BRIESKORN-PHAM SURFACES LIN ON BRIKORN-PHAM URFAC GUANGFNG JIANG, MUTUO OKA, DUC TAI PHO, AND DIRK IRMA Abstact By usng toc modfcatons and a esult of Gonzalez-pnbeg and Lejeune- Jalabet, we answe the followng questons completely

More information

(Semi)Parametric Models vs Nonparametric Models

(Semi)Parametric Models vs Nonparametric Models buay, 2003 Pobablty Models (Sem)Paametc Models vs Nonpaametc Models I defne paametc, sempaametc, and nonpaametc models n the two sample settng My defnton of sempaametc models s a lttle stonge than some

More information

On the Efficiency of Equilibria in Generalized Second Price Auctions

On the Efficiency of Equilibria in Generalized Second Price Auctions On the Effcency of Equlba n Genealzed Second Pce Auctons Ioanns Caaganns Panagots Kanellopoulos Chstos Kaklamans Maa Kyopoulou Depatment of Compute Engneeng and Infomatcs Unvesty of Patas and RACTI, Geece

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Mathematical Model for Selecting Third-Party Reverse Logistics Providers

A Mathematical Model for Selecting Third-Party Reverse Logistics Providers A Mathematcal Model fo Selectng Thd-Pat Revese Logstcs Povdes Reza Fazpoo Saen Depatment of Industal Management, Facult of Management and Accountng, Islamc Azad Unvest - Kaaj Banch, Kaaj, Ian, P. O. Box:

More information

REAL INTERPOLATION OF SOBOLEV SPACES

REAL INTERPOLATION OF SOBOLEV SPACES REAL INTERPOLATION OF SOBOLEV SPACES NADINE BADR Abstact We pove that W p s a eal ntepolaton space between W p and W p 2 fo p > and p < p < p 2 on some classes of manfolds and geneal metc spaces, whee

More information

A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION

A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION C A N A L D E E X P E R I E N C I A S H I D R O D I N Á M I C A S, E L P A R D O Publcacón núm. 194 A PARTICLE-BASED LAGRANGIAN CFD TOOL FOR FREE-SURFACE SIMULATION POR D. MUÑOZ V. GONZÁLEZ M. BLAIN J.

More information

Orbit dynamics and kinematics with full quaternions

Orbit dynamics and kinematics with full quaternions bt dynamcs and knematcs wth full quatenons Davde Andes and Enco S. Canuto, Membe, IEEE Abstact Full quatenons consttute a compact notaton fo descbng the genec moton of a body n the space. ne of the most

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approaches

Charging the Internet Without Bandwidth Reservation: An Overview and Bibliography of Mathematical Approaches JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, -xxx (2003) Chagng the Intenet Wthout Bandwdth Resevaton: An Ovevew and Bblogaphy of Mathematcal Appoaches IRISA-INRIA Campus Unvestae de Beauleu 35042

More information

PREVENTIVE AND CORRECTIVE SECURITY MARKET MODEL

PREVENTIVE AND CORRECTIVE SECURITY MARKET MODEL REVENTIVE AND CORRECTIVE SECURITY MARKET MODEL Al Ahmad-hat Rachd Cheaou and Omd Alzadeh Mousav Ecole olytechnque Fédéale de Lausanne Lausanne Swzeland [email protected] [email protected] [email protected]

More information

A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM

A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM A SECURE CLOUD ARCHITECTURE FOR PUBLIC AUDITING BY USING SHARED MECHANISM Pavalka Mudabona 1, Bhaluda Raveendanadh Sngh 2, Akuthota Mahesh 3 1 Pusung M.Tech (CSE), 2 Pncpal, 3 Assstant Pofesso(CSE), Vsvesvaaya

More information

Electric Potential. otherwise to move the object from initial point i to final point f

Electric Potential. otherwise to move the object from initial point i to final point f PHY2061 Enched Physcs 2 Lectue Notes Electc Potental Electc Potental Dsclame: These lectue notes ae not meant to eplace the couse textbook. The content may be ncomplete. Some topcs may be unclea. These

More information

AN EQUILIBRIUM ANALYSIS OF THE INSURANCE MARKET WITH VERTICAL DIFFERENTIATION

AN EQUILIBRIUM ANALYSIS OF THE INSURANCE MARKET WITH VERTICAL DIFFERENTIATION QUIIRIUM YI OF T IUR MRKT WIT VRTI IFFRTITIO Mahto Okua Faculty of conomcs, agasak Unvesty, 4-- Katafuch, agasak, 8508506, Japan [email protected] TRT ach nsuance poduct pe se s dentcal but the nsuance

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit [email protected]

More information

Drag force acting on a bubble in a cloud of compressible spherical bubbles at large Reynolds numbers

Drag force acting on a bubble in a cloud of compressible spherical bubbles at large Reynolds numbers Euopean Jounal of Mechancs B/Fluds 24 2005 468 477 Dag foce actng on a bubble n a cloud of compessble sphecal bubbles at lage Reynolds numbes S.L. Gavlyuk a,b,,v.m.teshukov c a Laboatoe de Modélsaton en

More information

Statistical modelling of gambling probabilities

Statistical modelling of gambling probabilities Ttle Statstcal modellng of gamblng pobabltes Autho(s) Lo, Su-yan, Vcto.; 老 瑞 欣 Ctaton Issued Date 992 URL http://hdl.handle.net/0722/3525 Rghts The autho etans all popetay ghts, (such as patent ghts) and

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

econstor zbw www.econstor.eu

econstor zbw www.econstor.eu econsto www.econsto.eu De Open-Access-Publkatonsseve de ZBW Lebnz-Infomatonszentum Wtschaft The Open Access Publcaton Seve of the ZBW Lebnz Infomaton Cente fo Economcs Babazadeh, Reza; Razm, Jafa; Ghods,

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption Secuty of Full-State Keyed Sponge and uplex: Applcatons to Authentcated Encypton Bat Mennnk 1 Reza Reyhantaba 2 aman Vzá 2 1 ept. Electcal Engneeng, ESAT/COSIC, KU Leuven, and Mnds, Belgum [email protected]

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

UNIVERSIDAD DE LA REPÚBLICA Facultad de Ingeniería RESOURCE ALLOCATION IN NETWORKS FROM A CONNECTION-LEVEL PERSPECTIVE

UNIVERSIDAD DE LA REPÚBLICA Facultad de Ingeniería RESOURCE ALLOCATION IN NETWORKS FROM A CONNECTION-LEVEL PERSPECTIVE UNIVERSIDAD DE LA REPÚBLICA Facultad de Ingeneía Tess paa opta al Título de Docto en Ingeneía Eléctca RESOURCE ALLOCATION IN NETWORKS FROM A CONNECTION-LEVEL PERSPECTIVE (ASIGNACIÓN DE RECURSOS EN REDES

More information

Research on Cloud Computing Load Balancing Based on Virtual Machine Migration

Research on Cloud Computing Load Balancing Based on Virtual Machine Migration Send Odes fo Repnts to [email protected] 334 The Open Cybenetcs & Systecs Jounal, 205, 9, 334-340 Open Access Reseach on Cloud Coputng Load Balancng Based on Vtual Machne Mgaton Lu Kun,*, Xu Gaochao

More information

Discussion Papers. Thure Traber Claudia Kemfert

Discussion Papers. Thure Traber Claudia Kemfert Dscusson Papes Thue Tabe Clauda Kemfet Impacts of the Geman Suppot fo Renewable Enegy on Electcty Pces, Emssons and Pofts: An Analyss Based on a Euopean Electcty Maket Model Beln, July 2007 Opnons expessed

More information

Order-Degree Curves for Hypergeometric Creative Telescoping

Order-Degree Curves for Hypergeometric Creative Telescoping Ode-Degee Cuves fo Hyegeometc Ceatve Telescong ABSTRACT Shaosh Chen Deatment of Mathematcs NCSU Ralegh, NC 7695, USA schen@ncsuedu Ceatve telescong aled to a bvaate oe hyegeometc tem oduces lnea ecuence

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

REAL TIME MONITORING OF DISTRIBUTION NETWORKS USING INTERNET BASED PMU. Akanksha Eknath Pachpinde

REAL TIME MONITORING OF DISTRIBUTION NETWORKS USING INTERNET BASED PMU. Akanksha Eknath Pachpinde REAL TME MONTORNG OF DSTRBUTON NETWORKS USNG NTERNET BASED PMU by Akanksha Eknath Pachpnde A Thess submtted to the Faculty of the Gaduate School of the Unvesty at Buffalo, State Unvesty of New Yok n patal

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, [email protected] [email protected] Abstact As the amount of digital data

More information

The Can-Order Policy for One-Warehouse N-Retailer Inventory System: A Heuristic Approach

The Can-Order Policy for One-Warehouse N-Retailer Inventory System: A Heuristic Approach Atcle Te Can-Ode Polcy fo One-Waeouse N-Retale Inventoy ystem: A Heustc Appoac Vaapon Pukcanon, Paveena Caovaltongse, and Naagan Pumcus Depatment of Industal Engneeng, Faculty of Engneeng, Culalongkon

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Determinants of Borrowing Limits on Credit Cards Shubhasis Dey and Gene Mumy

Determinants of Borrowing Limits on Credit Cards Shubhasis Dey and Gene Mumy Bank of Canada Banque du Canada Wokng Pape 2005-7 / Document de taval 2005-7 Detemnants of Boowng mts on Cedt Cads by Shubhass Dey and Gene Mumy ISSN 1192-5434 Pnted n Canada on ecycled pape Bank of Canada

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

International Business Cycles and Exchange Rates

International Business Cycles and Exchange Rates Revew of Intenatonal Economcs, 7(4), 682 698, 999 Intenatonal Busness Cycles and Exchange Rates Chstan Zmmemann* Abstact Models of ntenatonal eal busness cycles ae not able to account fo the hgh volatlty

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Prejudice and the Economics of Discrimination

Prejudice and the Economics of Discrimination Pelmnay Pejudce and the Economcs of Dscmnaton Kewn Kof Chales Unvesty of Chcago and NB Jonathan Guyan Unvesty of Chcago GSB and NB Novembe 17, 2006 Abstact Ths pape e-examnes the ole of employe pejudce

More information

Bending Stresses for Simple Shapes

Bending Stresses for Simple Shapes -6 Bendng Stesses fo Smple Sapes In bendng, te maxmum stess and amount of deflecton can be calculated n eac of te followng stuatons. Addtonal examples ae avalable n an engneeng andbook. Secton Modulus

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Statistical Discrimination or Prejudice? A Large Sample Field Experiment. Michael Ewens, Bryan Tomlin, and Liang Choon Wang.

Statistical Discrimination or Prejudice? A Large Sample Field Experiment. Michael Ewens, Bryan Tomlin, and Liang Choon Wang. Statstcal Dscmnaton o Pejudce? A Lage Sample Feld Expement Mchael Ewens, yan Tomln, and Lang Choon ang Abstact A model of acal dscmnaton povdes testable mplcatons fo two featues of statstcal dscmnatos:

More information

Simultaneous Detection and Estimation, False Alarm Prediction for a Continuous Family of Signals in Gaussian Noise

Simultaneous Detection and Estimation, False Alarm Prediction for a Continuous Family of Signals in Gaussian Noise Sultaneous Detecton and Estaton, False Ala Pedcton fo a Contnuous Faly of Sgnals n Gaussan Nose D Mchael Mlde, Robet G Lndgen, and Mos M Bean Abstact New pobles ase when the standad theoy of jont detecton

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Green's function integral equation methods for plasmonic nanostructures

Green's function integral equation methods for plasmonic nanostructures Geens functon ntegal equaton methods fo plasmonc nanostuctues (Ph Couse: Optcal at the Nanoscale) Thomas Søndegaad epatment of Phscs and Nanotechnolog, Aalbog Unvest, Senve 4A, K-9 Aalbog Øst, enma. Intoducton

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità

More information

Imperial College London

Imperial College London F. Fang 1, C.C. Pan 1, I.M. Navon 2, M.D. Pggott 1, G.J. Gorman 1, P.A. Allson 1 and A.J.H. Goddard 1 1 Appled Modellng and Computaton Group Department of Earth Scence and Engneerng Imperal College London,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Impact on inventory costs with consolidation of distribution centers

Impact on inventory costs with consolidation of distribution centers IIE Tansactons (2) 33, 99± Imact on nventoy costs wth consoldaton of dstbuton centes CHUNG PIAW TEO, JIHONG OU and MARK GOH Deatment of Decson Scences, Faculty of Busness Admnstaton, Natonal Unvesty of

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

I = Prt. = P(1+i) n. A = Pe rt

I = Prt. = P(1+i) n. A = Pe rt 11 Chapte 6 Matheatcs of Fnance We wll look at the atheatcs of fnance. 6.1 Sple and Copound Inteest We wll look at two ways nteest calculated on oney. If pncpal pesent value) aount P nvested at nteest

More information

Molecular Dynamics. r F. r dt. What is molecular dynamics?

Molecular Dynamics. r F. r dt. What is molecular dynamics? What s molecula dynamcs? Molecula Dynamcs Molecula dynamcs (MD) s a compute smulaton technque that allows one to pedct the tme evoluton of a system of nteactng patcles (atoms, molecules, ganules, etc.).

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

4. SHAFT SENSORLESS FORCED DYNAMICS CONTROL OF RELUCTANCE SYNCHRONOUS MOTOR DRIVES

4. SHAFT SENSORLESS FORCED DYNAMICS CONTROL OF RELUCTANCE SYNCHRONOUS MOTOR DRIVES 4. SHAFT SENSORLESS FORCED DYNAMICS CONTROL OF RELUCTANCE SYNCHRONOUS MOTOR DRIVES 4.. VECTOR CONTROLLED RELUCTANCE SYNCHRONOUS MOTOR DRIVES WITH PRESCRIBED CLOSED-LOOP SPEED DYNAMICS Abstact: A new spee

More information