Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Size: px
Start display at page:

Download "Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking"

Transcription

1 Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding autho jschou@mail.nhu.edu.tw Tel: 886+ (0) ext Institute of infomation systems and applications, National Tsing Hua Univesity d949702@oz.nthu.edu.tw Tel: 886+(0) Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C chanchungju@gmail.com Tel: 886+ (0) ext.207 Abstact In 2005, Hwang et al. [7] poposed a time-stamping potocol fo digit watemaking. They claimed that thei scheme is secue against attacks. Howeve, in this aticle, we will show that thei scheme is not secue enough fo that when the owne of the image sends both the encypted session key and image to the TSS, the attacke can intecept these tansmitted data. Then, he can launch an off-line attack to analyze these intecepted data. We will descibe the attacke s action in this aticle. Afte that, we popose an impoved scheme to pevent this off-line attack. Keywods: Digital watemaks; Copyight potection; Time-stamping. Intoduction Since the concept of watemaking was put fowad in the ealy 990s, many eseaches have paid much attention to it, such as [-8]. Each scheme intends to become an effective appoach in this aea. Geneally speaking, a well constucted watemak can be embedded into the oiginal data unde the equiement that the oiginal data quality degadation is impeceptible. Also, it should be able to be detected when the watemaked data had been tampeed. Besides, a good watemaking scheme should possess the following popeties. () Robustness: since watemaking is designed as a

2 way to authenticate the copyight of the input data, it must be able to esist against diffeent kinds of intentional attacks. (2)Impeceptibility: watemaked data should be accepted with impeceptible quality degadation. (3)Secuity: in watemak pocessing, only the authoized use can execute the coesponding secuity measuements. Thee ae two main categoies in the study of watemaking: the fist is the wave watemaking and the second is the spatial domain watemaking. Although in 998, wave watemaking technique concentating on spatial domain [9] claimed that thei scheme is obust against the geneal signal pocessing attack. Howeve, in 999 and 2000, Peeia et al. found that thei scheme can be boken by two diffeent attacking algoithms as listed in [] and [0] by using geometic attack. Besides, in [] and [0], they also poposed two impovements, espectively. In thei two impovements, each incopoates a signal analysis scheme to stengthen the obustness against the geometic attack. Nevetheless, in 200, Heigel et al. [] found the same weakness as stated in [9] in thei two impovements, [] and [0]. As fo the second kind of watemaking technique, the spatial domain watemaking, thee has been seveal papes poposed in this aea, such as [2, 3, 4, 5, 6, 8]. Howeve, in 2005, Hwang et al. [7] pointed out that all the above-mentioned watemaking schemes ae not secue enough, because thee still exists some beaking methods to the oiginal o embedded image, such as JPEG compession, filteing, noise addition, scaling, otation and geometic distotions, and so on. Thus, they poposed a time-stamping potocol intending to pevent malicious attacks. They claimed that thei scheme is secue. Howeve, afte ou analysis, we find that thei scheme suffes fom the off-line attack. The oganization of this aticle is as follows: in Section 2, we biefly eview Hwang et al.s scheme. In Section 3, we descibe the eason why thei scheme is not secue enough. In Section 4, we show the impovement of thei scheme. Finally, a conclusion is given in Section Review of the Hwang-Chang s scheme In this section, we fist ewite the notations used in Hwang et al.s potocol [7] in Section 2. to make thei scheme moe eadable, then in Section 2.2, we biefly intoduce 2

3 thei potocol. 2. Rewiting the notations and definitions used in Hwang et al.s potocol The following notations ae the eplacements of the ones used in Hwang et al.s scheme. X, Y: Denote two stings. Sign K (X): Denotes the signatue on X using key K. Ve K (Y): Denotes the veification of Y using key K. [X, Y]: Denotes a sting consisted of sting X concatenated with sting Y. H(X): Denotes the hash value of sting X. E K (X): Denotes the encyption of sting X using key K. D K (Y): Denotes the decyption of sting Y using key K. t: Denotes the timestamp. 2.2 Hwang-Chang s potocol Hwang- Chang s time stamping watemaking scheme mainly consists of thee phases: () the setup phase (2) time-stamp signing phase and (3) time-stamp veifying phase. In the time stamp veifying phase, eveyone can use the TSS public key to veify the embedded watemak at any time. In this section, we only delineate () the setup phase and (2) the time-stamp signing phase as follows: () Setup phase: The system is initialized with each paticipant having a public key P u and a pivate key S u. All paticipants must be authenticated by a tusted cetificated authoity in advance and thee is a secue one-way hash function known to all paticipants. The owne of the oiginal host media X chooses a andom session key in the potocol. (2) Signing phase: The details fo thei watemaking time-stamping potocol in the signing phase ae shown in figue and descibed as follows: Step. Owne i andomly chooses a numbe and encypts it using 3

4 TSS s public key to obtain the value c. Meanwhile, he also encypts X using as the session key to obtain CX. Then he sends both c and CX to TSS. Step2. Afte eceiving c and CX, TSS decypts c using his pivate key S TSS to obtain. Then, using to decypt CX, he can deduce the value X. Then, TSS uses secue one-way hash function H to compute the hash value of the eceived CX, obtaining d. Then, he concatenates a time stamp t to d and signs on this concatenation using his pivate key S TSS, obtaining s. Finally, TSS uses to encypts the concatenation sting [t, s ], obtaining T. That is, TTS computes s = Signs TSS ([t, H (CX)]) and T = E ([t, s ]), whee t is the timestamp. Afte that, TSS sends T to owne i. Step3. Afte eceiving T, owne i uses the session key to decypt it and obtains t and the TSS s signatue s. Then, befoe embedding the watemak, owne i checks to see if s valid by the following equation. Ve P TSS (s ) = [t, H (CX)] (). If it is valid, owne i then embeds the watemak m to the oiginal media X, getting [X, m]. Afte that, he fist encypts s using session key, obtaining ES, then using ES as the encyption key to encypt [X, m], obtaining X W. That is, he computes X W = E ES ([X, m]). Finally, he sends X W to TSS. is Step4. Afte eceiving X W, TSS also computes ES and uses ES as the decyption key to decypt, obtaining [X, m]. He then extacts X and compaes it with the ealie computed X obtained in step2 to see if these two values ae equal. If it 4

5 so, TSS signs on [s, H (X W )] to get s 2 (=Signs TSS ( [s, H(X W )])). He then encypts s 2 using session key and sends the esult E (s 2 ) to owne i. Finally, TSS destoys X,, s, s 2 and X W. Step5. Afte eceiving E (s 2 ), owne i fist decypts it and then checks to see if s 2 equation. is signed by TSS by the following Ve P TSS (s 2 ) = [s, H (X W )] (2). When all of the above steps wee done, the time stamp watemak signing phase is completed. The time-stamped signatues s, s 2, and the session key all must be kept secet by the owne. Afte that, when a notay equests owne i to veify the time stamp t of a watemaked medium X W, owne i must send (t, s, s 2, CX) to the notay, the notay then can veify the time-stamped signatues s and s 2 using Eqs. () and (2). Owne i TSS Owne i chooses c E D (T) [t, s ] Veify Ve ES E (s ) X W Ve PTSS Veify (s ) [t, H(CX)] E ES ([X,m]) s D (E (s )) 2 P TSS CX E () (X) (s ) [s, H(X PTSS 2 2 W )] c, CX T X W E (s 2 ) D X D (CX) d H(CX) s STSS Sign (c) T E ([ t, s ]) computes s S TSS Sign ([ t, d ]) Checks X in the decypted X the ealie computed X ( D (CX)) 2 ( [s, H(X S TSS W with W )] ), X, X W, s, s 2 wee destoyed Fig.. Hwang-Chang s time stamp potocol fo watemaking. 5

6 3. Why thei scheme is not secue enough In this section, we point out why thei scheme is not secue enough. Fo, in thei scheme, the owne sends all the messages, CX, T, E (s 2 ) encypted using the same key, except fo the values c which is encypted using TSS s public key. This would be a weakness since the attacke can launch an off-line attack due to the ability of today s compute computing coopeation though netwok, i.e., the collision finding of hash function MD5 is unde such a computation coopeation [9]. Especially, the ciphetext T is the encyption of the concatenation of timestamp t and s using key. Fo t is usually an easily ecognizable paamete, the attacke has the ight, once he has seen the ecognizable timestamp t in the decyption esult. And afte this, the attacke has obtained the session key, he can get s 2 and theefoe s. Fom s and, he can compute ES and hencefoth obtains [X, m] fom X W. Also, he can get X fom CX. Besides, except fo the above-mentioned weakness, in thei scheme, TTS destoys the paametes,, X, X W, s and s 2 finally. This would incu the situation whee owne i claims that the idea X belongs to him but the attacke can pove to the thid paty that he owns the idea X as well fo he has s and s 2 afte he has the session key. The notay can not identify which one is the eal owne of the copyight X. This second weakness is fom the fact that ID is not bound to the idea X of the eal owne. Hence, we popose an impovement to enhance its secuity. 4. Impovement of thei scheme In this section, we pesent an impovement on both the secuity and efficiency in thei scheme. We descibe ou method in Section 4., and in Section 4.2, the signing phase and the veification phase, espectively. In ou impovement, we denote ID i as owne i s ID, T p as the TSS s public key and T s as the TSS s secet key. Ou scheme just uns in two passes which is fa moe efficient and secue than Hwang-Chang s scheme. 4. The signing phase The pocedue fo ou watemaking time-stamping potocol in signing phase ae shown in figue 2 and also descibed as follows: 6

7 Step. Owne i andomly chooses a numbe as the session key. He encypts the oiginal image X, the watemak m, his ID i and using TSS s public key T p to obtain the value c( E ( X, m, ID, )) T p i and then sends to TSS. Step2. TSS decypts c using his pivate key T s to obtain X, m, ID i and. Then, TSS uses the one-way hash function H to compute the hash value of X, m, ID i and a timestamp t, obtaining d. Afte that, he signs on d using his pivate key, obtaining s. Finally, TSS uses session key to encypt s, obtaining T and at last he sends the timestamp t and T to owne i. Step3. Afte eceiving t and T, owne i uses to decypt T and obtains the TSS s signatue s. Then, owne i veify to see if s is valid and checks to see whethe the esult of equals to H(X, m, ID i, t) by the following equation. Ve Tp (s ) = d = H (X, m, ID i, t). (3). Owne i TSS Owne i chooise c E Tp (X, m, ID, ) (s ) D (T ) ve (s ) d TP checks d? H(X, m, ID, t) i i c t, T (X,m, ID, ) D d H(X, m, ID, t) s Signs (d) T E (s ) i Ts i TS (c), X, m, s wee destoyed Fig.2. the signing phase of ou poposed time-stamping watemaking. 4.2 The veification phase The time-stamping veification phase is descibed as follows: Step. The notay equests owne i to veify the time-stamp of a medium X and the coesponding watemak m. 7

8 Step2. The owne i sends (X, m, ID i, t, s ) to the notay. Step3. The notay veifies s, obtaining d and compaes d to the computed H(X, m, ID i, t) in Eq (3). 5. Secuity analysis The impovement we poposed is that we embed the owne s ID, a timestamp t, and the watemak m to the copyight X to be hashed by TSS. Ou method can get id of the situation whee the notay can not identify which one, the eal owne i o the succeeded off-line attacke is the eal owne of the copyight of X as mentioned in Section 3. Fo, using ou attack, if an attacke intecepts the value c, he can not decypt it because he does not know the TSS s secet key. Besides, ou method also avoid the situation whee the easily ecognizable timestamp t is diectly encypted by. If T is boken, the attacke still can not obtain X and m fo they ae hashed by a secue one way function. This makes ou impovement moe obust than Hwang-Chang s scheme. 6. Conclusion This aticle shows that Hwang et al.s scheme is not secue enough. Fo, in thei scheme, most tansmitted data ae encypted using the same key, thus making an attacke can launch an off-line attack to analyze the encypted data. We have poposed an impoved scheme to enhance thei secuity and afte ou analysis in Section 5, we conclude that ou scheme is moe obust than theis. Refeences [] S. Peeia, J.J.K.O. Ruanaidh, F. Deguillaume, G. Csuka, T. Pun, Template based ecovey of fouie-based watemaks using log pola and log log maps, Poc. IEEE Int. Conf. Computing and Systems, vol., 999, pp [2] C.-W. Tang, H.-M. Hang, A featue-based obust digital image watemaking scheme, IEEE Tans. Signal Pocess. 5 (4) (2003) [3] M. Kutte, S.K. Bhattachajee, T. Ebahimi, Towads second geneation watemaking schemes, Poc. IEEE Int. Conf. Image Pocess., vol., 999, pp

9 [4] S. Bhattachajee, M. Kutte, Compession toleant image authentication, Poc. IEEE Int. Conf. Image Pocess., vol., 998, pp [5] B.-S. Kim, J.-G. Choi, K.-H. Pak, Image nomalization using invaiant centoid fo st invaiant digital image watemaking, IWDW (2003) [6] J.J.K. O_Ruanaidh, W.J. Dowling, F.M. Boland, Phase watemaking of digital image, Poc. IEEE Int. Conf. Image Pocess., vol. 3, 996, pp [7] M. Kutte, F. Jodan, F. Bossen, Digital signatue of colo images using amplitude modulation, J. Electon. Imaging 7 (2) (998) [8] I. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secue spead spectum watemaking fo multimedia, IEEE Tans. Image Pocess. 6 (2) (997) [9] H. Inoue, A. Miyazaki, A. Yamamoto, T. Katsua, Digital watemak based on the wavelet tansfom and its obustness on image compession, Poc. IEEE Int. Conf. Image Pocess., vol. 2, 998, pp [0] S. Peeia, T. Pun, Robust template matching fo affine esistant image watemaks, IEEE Tans. Image Pocess. 9 (6) (2000) [] A. Heigel, S. Voloshynovskiy, Y. Rytsa, The watemak template attack, Poc. SPIE, vol. 434, 200, pp [2] J. O Ruanaidh, T. Pun, Rotation, scale and tanslation invaiant spead spectum digital image watemaking, Signal Pocess 66 (3) (998) [3] D. Zheng, J. Zhao, A.E. Saddik, Rst-invaiant digital image watemaking based on log pola mapping and phase coelation, IEEE Tans. Cicuits Syst. Video Technol. 3 (8) (2003) [4] V. Solachidis, I. Pitas, Ciculaly symmetic watemak embedding in 2-D DFT domain, IEEE Tans. Image Pocess. 0 () (200) [5] M. Kutte, Watemaking esisting to tanslation, otation and scaling, Poc. SPIE, vol. 3528, pp [6] F. Sebe, J. Domingo-Fee, J. Heea, Spatial-domain image watemaking obust against compession, filteing, copping, and scaling, ISW 2000, Belin, LNCS, vol. 975, Spinge-Velag, Belin, 2000, pp [7] M.S. Hwang, K.F. Hwang, C.C. Chang, A time-stamping potocol fo digital watemaking, Applied Mathematics and Computation 69, 2005,

10 [8] W. Lu, H. Lu, F.L. Chung, Featue based watemaking using watemak template match, Applied Mathematics and Computation [9] Eic Thompson, MD5 collisions and the impact on compute foensics, Digital investigation 2005, pp

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Shape Matching / Object Recognition

Shape Matching / Object Recognition Image Pocessing - Lesson 4 Poduction Line object classification Object Recognition Shape Repesentation Coelation Methods Nomalized Coelation Local Methods Featue Matching Coespondence Poblem Alignment

More information

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication JPEG 000 Wieless Image Tansmission System using Encyption Domain Authentication Ryo Ito*, Muneaki Matsuo*, Yuya Miyaoka*, Koji Inoue**, Shoma Eguchi**, Masayuki Kuosaki*, Hioshi Ochi*, Yoshimitsu Kuoki**,

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... )

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... ) M-RSA igital Signatue Scheme with one Public Key and one Pivate Key 1 K.Suesh Kuma Reddy, 2 E.Madhusudhana Reddy, 3 M.Padmavathamma 1,3 ept.of Compute Science, S.V.Univesity, Tiupati, A.P, India. 2, ept.of

More information

I.J.E.M.S., VOL. 1(1): ISSN X

I.J.E.M.S., VOL. 1(1): ISSN X I.J.E.M.S., VOL. 1(1): 34-41 ISSN 2229-600X NEW VARIANT MJ2 RSA CRYPTOSYSTEM WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS *K. Suesh Kuma Reddy & M. Padmavathamma Depatment of Compute Science, S.V.Univesity,

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS

DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS I.J.E.M.S., VOL. 1(1): 18-25 ISSN 2229-600X DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS A. Ravi Pasad, M. Padmavathamma Depatment of Compute Science,

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional

More information

Mobile Code Security

Mobile Code Security Mobile Code Secuity Segio Loueio, Refik Molva, Yves Roudie {loueio molva oudie}@euecom.f Institut Euécom 2229 Route des Cêtes Sophia-Antipolis 06560 Valbonne - Fance Abstact: this aticle pesents two aspects

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Hybrid DWT-SVD Image-Coding System (HDWTSVD) for Color Images

A Hybrid DWT-SVD Image-Coding System (HDWTSVD) for Color Images A Hybid DWT-SVD Image-Coding System (HDWTSVD) fo Colo Images Humbeto Ochoa a,b, K.R. Rao a a Univesity of Texas at Alington, Box 906 46 ates Steet, Neddeman Hall, Rm 530 Alington, TX 7609 hdo594@exchange.uta.edu

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Attacking an Obfuscated Cipher by Injecting Faults

Attacking an Obfuscated Cipher by Injecting Faults Attacking an Obfuscated Ciphe by Injecting Faults Matthias Jacob 1, Dan Boneh 2, and Edwad Felten 1 1 Pinceton Univesity {mjacob,felten}@cs.pinceton.edu 2 Stanfod Univesity dabo@cs.stanfod.edu Abstact.

More information

COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE

COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE Slawo Wesolkowski Systems Design Engineeing Univesity of Wateloo Wateloo (Ont.), Canada, NL 3G s.wesolkowski@ieee.og Ed Jenigan

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION

MULTI-TEMPORAL AND MULTI-SENSOR IMAGE MATCHING BASED ON LOCAL FREQUENCY INFORMATION Intenational Achives of the Photogammety Remote Sensing and Spatial Infomation Sciences Volume XXXIX-B3 2012 XXII ISPRS Congess 25 August 01 Septembe 2012 Melboune Austalia MULTI-TEMPORAL AND MULTI-SENSOR

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES

ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES U.P.B. Sci. Bull., Seies C, Vol. 7, Iss. 3, 00 ISSN 454-34x ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES Bogdan TUDOR În acest mateial se abodează potocoalele de tip cunoastee zeo în pespectiva

More information

Research Article. Regularization Rotational motion image Blur Restoration

Research Article. Regularization Rotational motion image Blur Restoration Available online www.jocp.com Jounal of Chemical and Phamaceutical Reseach, 6, 8(6):47-476 Reseach Aticle ISSN : 975-7384 CODEN(USA) : JCPRC5 Regulaization Rotational motion image Blu Restoation Zhen Chen

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

AN ARTIFICIAL NEURAL NETWORK -BASED ROTATION CORRECTION METHOD FOR 3D-MEASUREMENT USING A SINGLE PERSPECTIVE VIEW

AN ARTIFICIAL NEURAL NETWORK -BASED ROTATION CORRECTION METHOD FOR 3D-MEASUREMENT USING A SINGLE PERSPECTIVE VIEW Ma 8, 9 and 30, 1997 Le Ceusot, Bougogne, FRANCE AN ARIFICIAL NEURAL NEWORK -BASED ROAION CORRECION MEHOD FOR 3D-MEASUREMEN USING A SINGLE PERSPECIVE VIEW Kauko Väinämö, Juha Röning Depatment of Electical

More information

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING

COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING COMPARISON OF CHIRP SCALING AND WAVENUMBER DOMAIN ALGORITHMS FOR AIRBORNE LOW FREQUENCY SAR DATA PROCESSING A. Potsis a, A. Reigbe b, E. Alivisatos a, A. Moeia c,and N. Uzunoglu a a National Technical

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Coordinate Systems. Ioannis Rekleitis

Coordinate Systems. Ioannis Rekleitis Coodinate Systems Ioannis ekleitis Position epesentation Position epesentation is: P p p p x y z P CS-417 Intoduction to obotics and Intelligent Systems Oientation epesentations Descibes the otation of

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

3D Reconstruction from 360 x 360 Mosaics 1

3D Reconstruction from 360 x 360 Mosaics 1 CENTER FOR MACHINE PERCEPTION 3D Reconstuction fom 36 x 36 Mosaics CZECH TECHNICAL UNIVERSITY {bakstein, pajdla}@cmp.felk.cvut.cz REPRINT Hynek Bakstein and Tomáš Pajdla, 3D Reconstuction fom 36 x 36 Mosaics,

More information