ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES

Size: px
Start display at page:

Download "ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES"

Transcription

1 U.P.B. Sci. Bull., Seies C, Vol. 7, Iss. 3, 00 ISSN x ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES Bogdan TUDOR În acest mateial se abodează potocoalele de tip cunoastee zeo în pespectiva cubelo eliptice. Elementele oiginale sunt optimizaea algoitmilo, alegeea paametilo cubelo eliptice şi calculaea împeecheii Tate. Algoitmii se încadează înt- un cadu de dezvoltae şi împeună cu funcţiile de distosiune se pot aplica pentu oice împeechee. In this pape zeo-knowledge potocols ae teated in the elliptic cuves pespective. The oiginal elementes ae the optimization of the algoithms, elliptic cuves paametes and the Tate paiing calculus. The algoithms can be teated as a famewok and though the distotion maps they can be applied on evey elliptic cuve paiing. Keywods: elliptic cuve, Tate paiin zeo-knowledge, distotion maps. Intoduction Zeo-knowledge potocols play an impotant ole in the data tansfe systems nowdays. In the case of the wieless netwoks these potocols ae being moe impotant because of the popagation medium. In this moment, confoming to the latest standads the authentication infomation is potected though the best methods available but despite to these potections thee ae always posibilities to an vitual oponent to decypt the the data though some kinds of cyptogaphic attacks [0]. The zeo-knowledge potocols solve in pat this kind of teat because the sensitive infomation is not even tansmitted to the veifie. The new cyptogaphic famewok intoduced in paagaph 3 and the new paametes computed in paagaph 5 ae the oiginal contibutions of this pape.. Potocols with paiing In the beginning of the communication setup, is the asymmetic cyptogaphic pat. The majoity of the potocols use the Diffie-Hellman o RSA methods. Using the elliptic cuves paiings is a elatively new pespective [4]. Thee of the paiings ae mostly used: Weil, Tate and Ate (a shot vesion of Tate). These paiings ae though definition bilinea mappings fo elliptic cuves. Eng., Advanced Technology Institute, Buchaest, Romania, bogdantudo74@yahoo.com

2 0 Tudo Bogdan In the pesent case two kinds of paiings ae being used: symmetic and asymmetic. The main diffeence between them is about the definition domains. Evey bilinea paiing used in cyptogaphy fo an elliptic cuve G satisfies the following popeties: ab - bilinea: e ( a bh) h) fo evey h G and b Z, in the multiplicative fom (can be witten as exponentials). - non-degeneate: fo evey geneato element g and h fom G with e(h), in this point is impotant to note that most of this pape esults ae based on Tate paiin whee e ( - computability: thee is an efficient algoithm fo calculating e ( h) An admissible map is defined as a function e : G G G whee G is an subgoup fom E(F p ) and G fom E( F ). These goups have the same ode q p and we choose g as geneato element fom G. The G goup is chosen fom the condition that the Gap Diffie-Hellman poblem is intactable (if we know the values a bg calculate the element abg in multiplicative fom). The Hufschmitt scheme [6] is a zeo-knowledge one though the value of abg obtained in l iteations compising thee steps as below. In this algoithm public paametes ae ( a b e(, v=e( ab ) and pivate key is S = abg. The public key is (a b v), who is calculated only once. The poposed scheme is backed by the following equation: + abc ab c c e ( Y ) g c( abg ) ) ( e( ) = W v Table The Hufschmitt algoithm Pove Veifie choose [ 0, q] calculate W send W to the veifie veify that c [0, k ] computes Y = g S Send Y to the veifie c choose c [0, k ] send c to the Pove Veify that e ( Y ) = W v c The pobability of guessing the c value is afte l ounds lk.

3 Zeo-knowledge potocols implemented with elliptic cuves The scheme poposed by Shao, Lu and Cao [3] is based on the secuity of the Diffie-Hellman algoithm. The public paametes ae e( and the pivate key is s ( 0, q]. The public key is v = sg. Table The Shao algoithm Pove Veifie choose [ 0, q] Calculate W = g Send W to the veifie + sβ Calculate Y = g Send Y to the veifie Choose β ( 0, q] Send β to the pove β Veifies that e ( Y, v W ) This scheme is moe efficient than those of Kim and Kim o Yao and Wang [3]. Below is a compaison between the two algoithms pesented above. Compaison between Hufschmitt and Shao algoithms Hufschmitt Shao N of exp fo pove + ε N of paiings fo pove 0 0 N of exp fo veifie ε N of paiings fo veifie Table 3 These two algoithms ae almost equals fom the calculus point of view. Balancing the calculus powe between the pove and the veifie is done based on the usage conditions. In the case of client-seve implementations (the most used case) it is an advantage in Hufschmitt algoithm. In othe applications (like smat devices) the Shao implementation is supeio. The ε numbe fom the evaluations is fom the fact that the exponent of the final veification v c is smalle than q, having only k bits. The initial calculus of e( is done only once and is possible to be done outside the system, subsequent values will be calculated based on this esult. This is the eason that numbe of paiings fo the pove is 0. As it can be seen fom the above compaison the numbe of the equied computations of paiings is, a minimum value fo the algoithms. The only opeation that can be moved fom one pat to anothe is the exponentiation one. The sum is 3 fo Shao and +ε fo Hufschmitt.

4 Tudo Bogdan Anothe pespective fo using paiings in these kinds of potocols is pesented by Zhang and Kim in [7] and has its oots in DVB (Digital Video Boadcastin. In that case is mandatoy the pesence of the thid tusted paty. That entity geneates a use s signatue and put it in the use s hadwae (usually an smat-cad). In the oiginal scheme, poposed by the Boneh and Fanklin exist a diffeence in the calculus powe needed between the use and the povide. This is the main eason of the following scheme. In the beginning the system geneates S ID =s*h(id), whee s is a secet andom paamete. The public key is P pub =sp. Pove Has ID, S ID Tansmit ID to the veifie Choose a at andom Calculate A=aP, C=H (S ID +a R Tansmit A, C to the veifie Zhang and Kim algoithm Veifie Calculate Q ID = h(id) Choose andom and R=P Tansmit R to the pove Table 4 H e ( C, P) QID, Ppub ) ( e( A, The final step (veification) is done based on the equality: e( C, P) H( S ID + a R, P) H( S ID, P) e( ar, ap) = H ( e( H( QID, sp) e( ap, ap) QID, Ppub ) e( A, Hee H is a hash function defined on R and H is a function defined on the image of the elliptic cuve with esults in R. In this context we can obseve that filteing the values of points R (fom C one cannot compute S ID ) we can dop the H ( tem which helps in diffusion of infomation. In that case: C = S ID + a R and e ( C, P) QID, Ppub ) e( A, In this way it s possible to intoduce supplementay opeations in the netwok, but the numbe of mathematical opeations needed is deceased. The same is also in the case of e ( A,, whee we can use e ( A, R) though C = S ID + a R, which educes an exponentiation fom the client and seve pat. These impovements do not affect the oveall scheme secuity, but educes the implementation effot. In a pesentation made by Xavie Boyen (A Roadmap of IBE Systems and thei applications) on NIST wokshop in 008 he teats the Shao-like algoithm as bilinea DH invesion and the famewoks deived fom it as Exponent Invesion.

5 Zeo-knowledge potocols implemented with elliptic cuves 3 3. Cyptogaphic famewok All the pevious schemes ae following the classical thee steps potocol of zeo-knowledge potocols. The Shao ones is minimal fom the computations point of view. So optimizing futhe the scheme following the classical setup is not possible (evey anothe scheme involves a minimum paiing computations). The key in this case is to minimize the numbe of steps and the message flow the potocol equies. The scheme in this case it would be composed fom only two steps, thus equiing much lowe netwok taffic. All the algoithms below will skip the fist step fom the classical zeo-knowledge potocols (the pove fist value - witness). In the classical algoithms the veifie is equied to send only one andom (challenge) value. In the new algoithm it must tansmit andom values. In the setup, some entity geneates g and e(. The pove chooses some secet value s as pivate key and publishes g s = Y as public key. Table 5 Computes Pove Choose andom t value t s X = g, Z g tb + = Send X, Z to the veifie Fist algoithm This is backed by the following equality: Veifie Choose andom values b and and tansmit them to the pove b Veify that e( Z, Y X ) b tb+ s s tb e( Z, Y X ) g, g g ) We must to analyze the computational costs involved. Compaison between fist algoithm and Shao This scheme Shao N of exp fo pove N of paiings fo pove 0 0 N of exp fo veifie N of paiings fo veifie Table 6 Fom the table above it s easy to see that these two algoithms ae compaable fom this point of view. In fact, the logical opeations in the pove pat ae the same (the invesion of the sensitive pats). The implication of and b in the final veification excludes the possibility of fogey. If one can compute

6 4 Tudo Bogdan some values X, Z with the desied popeties, he could solve the Y b equation and thus find the secet value. The poposed algoithm is vey useful in the wieless aea, whee netwok tansmissions ae expensive. Fom X and Z the veifie cannot lean anything about t and, except fo public infomation. The exta exponentiation in the veifie pat is a little exta cost fo dopping the witness value tansmission. This scheme balances the netwok load with veifie s computations. An analog scheme exists fo identification with some cedential (ID). Table 7 ID-based algoithm Pove Veifie Calculate ID h( ID) Fq Choose s secet key h(id) s Calculate Z = g, Y = g Tansmit ID, Z Calculate ID h( ID) Fq h(id) Calculate Z = g Send thee andom values a, b, c Choose t andom value and compute t X = g a* h( ID) + b* s+ c* t T = g Send X, T to veifie Veifies that c b a e( X Y Z, T ) The equality is evident and the system could be extended to moe infomations (in this case thee ae two infomations: secet key s and ID value). Fo evey piece of sensitive infomation the veifie must geneate a andom numbe. If k is the numbe of valuable infomations (like pivate key), the numbe of andom vaiables must be k+. Of couse if the numbe inceases, exta cae must be put in andom values geneation in the veifie pat. This condition appeas fom the fact that infomation must be andomized though multiplying. This completes this kind of authentication potocols with something like a famewok. Fo cuent case it is impotant to compae the numbe of opeations equied:

7 Zeo-knowledge potocols implemented with elliptic cuves 5 Table 8 Compaison between pevious ID algoithm and Zhang s one ID scheme Zhang scheme Pove expon 4 3 Pove paiings 0 0 Veifie expon 4 Veifie paiings 3 Fom the table above we see the diffeence in numbe of paiings (an opeation who is fa moe time consuming than exponentiation). Fo evey supplementay paamete we can add an exta exponentiation fo veifie. Unlike the pevious scheme the computations ae moe balanced between the pove and veifie. The schema with only two andom numbes is the same with c=0. Fom these examples we can wite the geneal case: Table 9 Genealized vesion Pove Veifie In the setup, it chooses m secet values ni n i, i = 0... m. Publish X = g, i = 0... m Computes Y = g i aibi ni and send a i Geneates m andom values Geneates an binay vecto of length m b i with b i = 0, Sends them to the pove b ai i i = Veifies e( Y, X ) e( Though the judicious use of binay vecto b i who selects what secet values ae used in veification (the exponentiation in the end of the final fomula is tivial when b i =0) the veifie can use a single step instead of using multiple steps fo minimizing the fogey pobability. This pobability is ( bi p ) whee i p i is the pobability of guessing a secet numbe n i and we omit the influence of a i paametes. When the Hamming weight of the b i vecto is sufficiently high, this pobability is not an issue. This can be seen as an analogue of genealized Feige- Fiat-Shami potocol [0] in the elliptic cuve domain. 4. Paiing computation The main pat of the algoithms consists in paiing s computation. The Tate paiing seems to be much faste and appopiate than othe paiings fo cyptogaphic applications. It is based on the degee 0 divisos fom E F ) ( q

8 6 Tudo Bogdan epesented by P P with P E( F q ). The calculus is done based on the obsevation that if we choose two points P and P ' fom E ( F q ) we can find anothe point fom the cuve B and a function G with P + P' B P = div( G). G is the equation of line though the two points and B is the negative of the sum. If we note L the above line and L the vetical line though B we can wite the following equations: div( L ) = P + P' + C 3P div( L ) = C + B P div ( L / L ) = P + P' B P = div( G) Y λ( X x ) y The G line has G = whee λ is the angle of the line X + ( x + x ) λ though P and P (o the tangent if that two points ae equal). Fo some kinds of paiings (like Weil) the esult is tivial if the points ae dependent of each othe. This situation is solved in [5] though distotion functions. In this case the paiings ae called modified paiings. The distotion function is an endomophism who tansfom an point P with ode l in anothe point of ode l but fom E ( F q k ), whee k is the embedding degee: φ ( P) E( F q k ). The advantage in using supesingula elliptic cuves is that the distotion function always exists in this case and fo egula ones does not exist (with some mino exceptions). The modified paiing can be defined in this way: ' e l ( P, Q) = el ( P, φ( Q)) Examples of distotion functions ae: Table 0 Distotion functions Chaacteistic Cuve Embedding degee φ p > 3 and p mod3 p > 3 and p 3mod 4 y = x 3 + a y = x 3 + ax Coesponding distotion functions: φ ( x, y) = ( ξx, ) whee ξ + ξ + = 0 y φ ( x, y) = ( x, iy) whee i + = 0 The definition field does the secuity level of the opeations. φ φ

9 Zeo-knowledge potocols implemented with elliptic cuves 7 5. Choosing the paametes We choose the second example whee p 3mod 4. It is possible to show that the cuve is supesingula and u = # E( Fp ) = p + = lc, whee l is the point ode and c epesents the cofacto. Because of the natue of the chosen cuve, the MOV attack is possible so the discete logaithm poblem must be defined ove a minimum field of 048 bits (a level equied by today s computing possibilities). That field is defined by F, so p must be a pime numbe of 04 bits. Fom the p pevious woks, the point ode must be at a minimum of 30 bits and the cofacto must fill the est. Fom the fact that l must be a pime numbe, follows c 0mod 4. The main citeion in choosing these paametes is the Hamming weight who has to be as low as possible. The final Hamming weight is a combination between all the paamete s weights. To find the paametes is sufficient to build a pedefined model fo seaching numbes: x y c = +, with x [ 05 l,04] and x > y > this model esults fom the condition that c is a multiple of 4. Thee ae multiple possibilities fo l but we ty the lowest Hamming: = x x y l + and l = + + whee x [ 05 l,04] and x > y > Tying all the possibilities between chosen anges pefoms seaching. The fist model cannot eveal any numbe who satisfies all the equiements. Because the tem y fom c epesentation has the main influence in final weight, it has to be as low as possible. We fix x = 704 in c epesentation and the esults fo x c 704 y z = + and l = + + ae: Table Paametes fo low Hamming weight X y z Hamming p It s obvious that lowe than 7 we cannot obtain valid Hamming weights (fo x=). So the values with 7 ae optimum values. Simila esult indicates Hamming weights of aound 0 fo 04 bits secuity [3]. The pimality tests used ae not pseudo-pimality tests, but combinations of Pocklington-Lehme and APRCL tests, which slows down entie seach pocess. These paametes ae being computed only once, so the computing time is not impotant.

10 8 Tudo Bogdan It is possible to compute f Q ( φ ( R)) instead of fφ ( Q) ( R) whee R is the andom point used in paiings. These bing the equied opeations fom the field extension in base field opeations [3]. An impotant point is finding and epesenting the tosion goup. The multiplication can be done though division polynomials, but this is slow. Instead we can use the fact that the tosion goup is geneated by at most two independent points. This goup is athe cyclic. In ou case is sufficient to take some andom points fom the cuve and multiply them with c. If the esults ae non-zeo, the points ae fom tosion goup of ode l (because lc=p+ ). We can use the fact that all the points kp with k < l ae fom the same tosion goup. Fo finding tosion points we can use thee methods [4], but in this case the useful one is that who utilizes goup stuctue. The goup c < E( F ) > * q contains all the l tosion points and the c tosion points. An algoithm fo geneating a tosion point of ode l fo a given cuve:. we choose a andom point x Fq. veifies if the cuve s equation has solutions in F q 3. compute Q = cp E( F q ) whee P = ( x, y) E( Fq ) 4. if Q = (0,,0 ) we oll back to step, if not we step out to step 5 5. Q is the l tosion point In this case, the pobability of choosing in step an element that is not on the definition field of the cuve is. If we conside the pobability of tosion l points, the final pobability in succeeding is. The second model bings us ( l + c) multiple choices fo paametes, and we choose the lowest values: 704 c = l = + + p = l * c Value of p is a pime numbe, which can be veified though moe specialized pogams. The numbe of nonzeo bits in this epesentation is minimum. That s why the numbe of computations equied by the Tate paiing is educed. In the pocess to find out points on this cuve, we can ty all the natual numbes:,, and 3. We find that 3 is a point on the cuve with coodinates: (3 : : )

11 Zeo-knowledge potocols implemented with elliptic cuves 9 Multiplying this point with c facto gives us a point of ode l fom the cuve: ( : : ) This is the point equied by the algoithms. If the pefeed epesentations of the paametes ae not these, choosing an addition/subtaction chain instead of binay chain pesented by the classical Mille algoithm can do impoving the computing speed. Thee ae many possibilities [9], among these we efe to: - Moain and Olivo s methods (based on Booth epesentations) [] - window methods by Downey and Schonhage - Koyama methods - Lee and Kim sliding method In a paticula case a method o anothe can be the best choice, but fom statistical point of view fo numbes with 5 bits the aveage chain lengths ae: Table Chain s lengths fo diffeent methods Algoithm Length binay modified binay 68.7 window methods ~606 Koyama 60.6 sliding window Fo cuent case these methods (that woks in geneal setup) cannot be applied because the numbe of the bits equal to is minimal by the selection of paametes. The effot is moved on finding paametes. That s why it is pefeed to make the effot to find optimal paametes only once in the setup stage of the algoithm instead of applying the methods above. 5. Conclusions The poposed algoithms can be seen as a famewok and intoduces the oiginal idea of skipping the fist step of potocol though an additional andom challenge. The elliptic cuve paametes ae selected fo minimum Hamming weight, thus the paiing implementation does not equie sophisticated addition/subtaction chains and it s calculus is optimal. The Hamming weight

12 0 Tudo Bogdan value of 7 obtained in table is the minimum one fo the equiements. That value is bette fom computations point of view than those found in cuent liteatue. R E F E R E N C E S. P.S.L.M. Baeto, B. Lynn, M. Scott, Constucting elliptic cuves with pescibed embedding degees, SCN, LNCS 576, pp.57 67, Spinge-Vela 00. Daniel J. Benstein, Tanja Lange, Faste addition and doubling on elliptic cuves, Pages in Advances in cyptology---asiacrypt 007, 3th intenational confeence, Decembe --6, 007 Lectue Notes in Compute Science 4833, Spinge, G. Betoni, L. Chen, P. Fagneto, K. Haison, G. Pelosi, Computing Tate Paiing on Smatcads, White Pape STMicoelectonics, D. Boneh, M. Fanklin, Identity-based encyption fom the Weil paiin SIAM J. of Computin vol. 3, No. 3, pp , 003 Extended abstact in Cypto 00, LNCS 39, pp. 3-9, T. Hadano, Elliptic cuves with a tosion point, Nagoya Math. J 66. (977) E.Hufschmitt, A zeo-knowledge identification scheme in Gap Diffie-Hellman goups, Westen Euopean Wokshop on Reseach in Cyptogaphy Wokshop Recod (005) 7. J.-S. Hwu, R.-J. Chen, Y.-B. Lin, An Efficient Identity-based Cyptosystem fo End-toend Mobile Secuity, Accepted and to appea in IEEE Tansactions on Wieless Communications 8. M.Kim, K.Kim, A new identification scheme based on the bilinea Diffie-Hellman poblem, Spinge-Velag Y. Lee, H. Kim, Expansion of sliding window method fo finding shote additionsubtaction chains, Intenational Jounal of Netwok Secuity, vol., No., pp.54-60, A.Menezes, Handbook of applied cyptogaphy, CRC Pess 996. F. Moain, J. Olivos, Speeding up computations on an elliptic cuve using additionsubtaction chains, Infom.TheoyAppl.4(90), p M. Scott, Computing the Tate paiin CT-RSA, vol of Lectue Notes in Compute Science, pages , Spinge-Vela J. Shao, R. Lu, Z. Cao, A new efficient identification scheme based on the stong Diffie- Hellman assumption, Intenational Symposium on Futue Softwae Technology 004x 4. J. Shikata, Y. Zhen Optimizing MOV algoithm fo non-supesingula elliptic cuves, Lectue Note on Compute Science, Asiacypt 99, E. Veheul, Evidence that XTR is moe secue than supesingula elliptic cuve cyptosystems, Jounal of Cyptology, vol. 7, Numbe 4, Septembe 004, pp (0),Spinge-Velag 6. G.Yao, G. Wang, Y.Wan An impoved identification scheme, Bekhause- Velag F. Zhan K. Kim, Signatue-Masked Authentication Using the Bilinea Paiings, Cyptology & Infomation Secuity Laboatoy (CAIS), Infomation and Communications Univesity, technical epot, 00.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

I.J.E.M.S., VOL. 1(1): ISSN X

I.J.E.M.S., VOL. 1(1): ISSN X I.J.E.M.S., VOL. 1(1): 34-41 ISSN 2229-600X NEW VARIANT MJ2 RSA CRYPTOSYSTEM WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS *K. Suesh Kuma Reddy & M. Padmavathamma Depatment of Compute Science, S.V.Univesity,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... )

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... ) M-RSA igital Signatue Scheme with one Public Key and one Pivate Key 1 K.Suesh Kuma Reddy, 2 E.Madhusudhana Reddy, 3 M.Padmavathamma 1,3 ept.of Compute Science, S.V.Univesity, Tiupati, A.P, India. 2, ept.of

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder 20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

LOSSLESS audio coding is used in such applications as

LOSSLESS audio coding is used in such applications as INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2013, VOL. 59, NO. 1, PP. 17 23 Manuscipt eceived Januay 10, 2013; evised Mach, 2013. DOI: 10.2478/eletel-2013-0002 Novel Ideas fo Lossless Audio Coding

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design

Drag Optimization on Rear Box of a Simplified Car Model by Robust Parameter Design Vol.2, Issue.3, May-June 2012 pp-1253-1259 ISSN: 2249-6645 Dag Optimization on Rea Box of a Simplified Ca Model by Robust Paamete Design Sajjad Beigmoadi 1, Asgha Ramezani 2 *(Automotive Engineeing Depatment,

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS

DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS I.J.E.M.S., VOL. 1(1): 18-25 ISSN 2229-600X DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS A. Ravi Pasad, M. Padmavathamma Depatment of Compute Science,

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *

A Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

Coordinate Systems. Ioannis Rekleitis

Coordinate Systems. Ioannis Rekleitis Coodinate Systems Ioannis ekleitis Position epesentation Position epesentation is: P p p p x y z P CS-417 Intoduction to obotics and Intelligent Systems Oientation epesentations Descibes the otation of

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication JPEG 000 Wieless Image Tansmission System using Encyption Domain Authentication Ryo Ito*, Muneaki Matsuo*, Yuya Miyaoka*, Koji Inoue**, Shoma Eguchi**, Masayuki Kuosaki*, Hioshi Ochi*, Yoshimitsu Kuoki**,

More information

Elliptic Generation Systems

Elliptic Generation Systems 4 Elliptic Geneation Systems Stefan P. Spekeijse 4.1 Intoduction 4.1 Intoduction 4.2 Two-Dimensional Gid Geneation Hamonic Maps, Gid Contol Maps, and Poisson Systems Discetization and Solution Method Constuction

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays 00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Prof. Feng Liu. Fall /17/2016

Prof. Feng Liu. Fall /17/2016 Pof. Feng Liu Fall 26 http://www.cs.pdx.edu/~fliu/couses/cs447/ /7/26 Last time Compositing NPR 3D Gaphics Toolkits Tansfomations 2 Today 3D Tansfomations The Viewing Pipeline Mid-tem: in class, Nov. 2

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

2D Transformations. Why Transformations. Translation 4/17/2009

2D Transformations. Why Transformations. Translation 4/17/2009 4/7/9 D Tansfomations Wh Tansfomations Coodinate sstem tansfomations Placing objects in the wold Move/animate the camea fo navigation Dawing hieachical chaactes Animation Tanslation + d 5,4 + d,3 d 4,

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Multiview plus depth video coding with temporal prediction view synthesis

Multiview plus depth video coding with temporal prediction view synthesis 1 Multiview plus depth video coding with tempoal pediction view synthesis Andei I. Puica, Elie G. Moa, Beatice Pesquet-Popescu, Fellow, IEEE, Maco Cagnazzo, Senio Membe, IEEE and Bogdan Ionescu, Senio

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Modeling Spatially Correlated Data in Sensor Networks

Modeling Spatially Correlated Data in Sensor Networks Modeling Spatially Coelated Data in Senso Netwoks Apoova Jindal and Konstantinos Psounis Univesity of Southen Califonia The physical phenomena monitoed by senso netwoks, e.g. foest tempeatue, wate contamination,

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

A comparative study of multiple-objective metaheuristics on the bi-objective set covering problem and the Pareto memetic algorithm

A comparative study of multiple-objective metaheuristics on the bi-objective set covering problem and the Pareto memetic algorithm A compaative study of multiple-obective metaheuistics on the bi-obective set coveing poblem and the Paeto memetic algoithm Andze Jaszkiewicz * Woking pape RA-003/0 Septembe 200 * Institute of Computing

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

SHA-3 and The Hash Function Keccak

SHA-3 and The Hash Function Keccak Chistof Paa Jan Pelzl SHA-3 and The Hash Function Keccak An extension chapte fo Undestanding Cyptogaphy A Textbook fo Students and Pactitiones www.cypto-textbook.com Spinge 2 Table of Contents 1 The Hash

More information