Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Size: px
Start display at page:

Download "Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption"

Transcription

1 Journal of Electronic Teting (2018) 34: Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar Janković 1 Muheer Ahmad 2 Received: 8 July 2018 / Accepted: 4 November 2018 / Publihed online: 8 November 2018 Springer Science+Buine Media, LLC, part of Springer Nature 2018 Abtract Recently, chao baed peudo-random number generator (PRNG) for video encryption wa propoed. Security analyi preented in thi paper reveal eriou problem. Chaotic map ued in analyzed PRNG do not enhance it ecurity due to a coniderable number of initial value that lead to fixed point. Alo, baed on 6 known iteration, an attacker can recontruct a ecret key ued in the working tage of the analyzed PRNG baed on attack whoe complexity i much maller than the etimated key pace. Therefore, ecurity of the analyzed PRNG i much lower than expected and it hould be ued with caution. Some potential improvement of the analyzed PRNG are propoed which could eliminate perceived hortcoming of the original verion. Keyword Chao Video encryption Peudo-random number generator Cryptanalyi Cryptography 1 Introduction A recently recognized, multimedia data i frequently being tranmitted through variou unafe channel. For thi reaon, ecurity of multimedia data uch a video file i attracting more and more attention. Some feature of video encryption uch a huge amount of data and higher requirement of real-time capacity are not completely upported by conventional cipher primarily intended for encryption of textual data [18]. Hence video encryption Reponible Editor: S. Bhunia Dragan Lambić dragan.lambic@pef.un.ac.r Alekandar Janković alekjankovic@gmail.com Muheer Ahmad muheer.ce@gmail.com 1 Faculty of Education, Univerity of Novi Sad, Podgorička 4, Sombor, Serbia 2 Department of Computer Engineering, Jamia Millia Ilamia, New Delhi, , India algorithm have been developed in recent year which are intended to protect the video content from unauthorized acce [7, 8, 18]. Security of cryptographic ytem developed for encryption of image and video file depend largely on feature of random number generator ued in thee ytem [9, 17]. There are two type of random number generator, truerandom number generator (TRNG) and peudo-random number generator (PRNG). TRNG are baed on nondeterminitic phyical procee and ome of them can achieve high peed but they are conidered unpredictable and uceptible to failure due to external fluctuation [12, 15]. On the other hand, PRNG are baed on digital algorithm which can provide random-like behaviour. Main diadvantage of PRNG i that they are necearily periodic [2], but on the other ide they are flexible, practical and can be ued at low cot [12]. Chao ha been widely ued in PRNG deign [4, 6, 12] due to it high enitivity to initial value, mixing, random-like behavior and ergodic behavior which are conidered a deirable propertie in cryptography. In recent year, variou chaotic map were ued a a ource of randomne in PRNG. For example, logitic map and it variation uch a quantum logitic map and piecewie logitic map have been ued in a ignificant number of PRNG [2, 5]. Chaotic map uch a piecewie-linear one-

2 710 J Electron Tet (2018) 34: dimenional map, multi-modal map, tinkerbell map, etc. arealowidelyuedinprng[6, 15, 16]. Many of the propoed cryptographic ytem and PRNG baed on chao uffer from eriou ecurity problem caued by inadequate election and application of chaotic map [1, 19, 20]. For example, initial value of multi-modal map are ued a a ecret key of peudo-random bit generator but ome feature of the ued multi-modal map caued exitence of certain number of weak key [11]. Alo, 99 percent of the key pace of PRNG baed on quantum chaotic map i compoed of weak key due to inadequate election of interval for control parameter of chaotic map [10]. Another caue of low ecurity, which i not directly connected to the feature of ued chaotic map, i inadequate deign of PRNG. For example, inadequate deign of PRNG baed on peudorandomly enhanced logitic map enabled ituation in which approximately 2 50 different ecret key produce the ame initial condition and control parameter of enhanced logitic map. Such deign error ignificantly reduce key pace, making thi PRNG non-reitant to brute-force attack [9]. Such ecurity problem can enable attacker to fully break analyzed cryptoytem and obtain ecret data and ecret key or can lead to partial reduction of ecurity which attacker cannot exploit to full extent with technological reource available today. In any cae, identification of uch ecurity iue i very important becaue level of ecurity of uch cryptoytem i far lower than expected. For that reaon, even cryptoytem with partially reduced ecurity are conidered broken [14]. Due to contant development of technological reource and cryptanalyi technique, uer mut be aware of reduced ecurity level which can lead to total break in the future. In [18] a novel peudo-random number generator i propoed, which i ued in a video encryption cheme. Thi PRNG i partially baed on two one-dimenional chaotic map. Due to it unuually large key, it can function properly and provide ufficient level of ecurity without thee two chaotic map. Unfortunately, ecurity analyi preented in thi paper indicate that chaotic map ued in analyzed PRNG often exhibit non-chaotic behavior which can lead to lower level of ecurity. Alo, baed on everal known iteration of thi PRNG, attacker can calculate all ubequent output value with complexity which i le than the etimated ecurity level. The ret of thi paper i organized a follow. In Section 2, the analyzed PRNG i decribed. Analyiof two chaotic map and cryptanalyi of the analyzed PRNG are preented in Section 3. In Section 4 the potential ecurityenhancement cheme i preented. Concluion are drawn in Section 5. 2 Decription of the Analyzed PRNG 2.1 Chaotic Map Analyzed PRNG [18] ue two chaotic map: x n+1 = 2xn 2 1 (1) y n+1 = 4yn 3 3y n (2) where x,y [ 1, 1]. In paper [18] x and y are decribed a real number from interval [ 1, 1] and key pace for each of them i etimated at = It i not clear how thee number hould be implemented becaue none of the two mot ued computer number format for toring real number have thi preciion. Single-preciion floatingpoint format ha 32 bit but 9 bit are ued for toring ign and exponent, therefore key pace of only 2 24 i available in thi format. Double-preciion floating-point format ha 64 bit and preciion of 2 52 which i higher than etimated key pace for x and y. 2.2 The Structure of the Analyzed PRNG Analyzed PRNG ha two tage, initialization tage and working tage. Initialization tage i ued only to etup initial tate of the analyzed PRNG K baed on ecret key K. BearinginmindthatK and K have ame number of bit and repreent ame parameter of the analyzed PRNG, attacker can ue K intead of K to obtain complete equence produced by the analyzed PRNG. For thi reaon initialization tage i not of interet to the attacker and therefore decription of analyzed PRNG will focu only on working tage. In the decription of the analyzed PRNG following notation i ued: the bitwie excluive OR operation, the modulo 2 32 addition, a L the leftmot 16 bit of integer a, a R the rightmot 16 bit of integer a, a b the concatenation of tring a and b. The ecret key of the analyzed PRNG conit of following parameter: 16 integer ( 0,..., 15 ), each repreented by 31 bit, two 32-bit integer R 1 and R 2 and two real number x 0 and y 0 from interval [ 1, 1] which are repreented by 33 bit each in paper [18]. In total, ecret key conit of 626 bit which i a very large number of bit compared to current required level of afety of 128 bit [3]. Secret key of uch length i more complicated for generation, ue and afe keeping but on the other hand it offer very high level of ecurity even if PRNG i partially broken. Secret key K

3 J Electron Tet (2018) 34: i ued in initialization tage a initial value of parameter which are after 32 iteration of thi tage tranformed into K which i ued a initial value of parameter in working tage. Working tage of the analyzed PRNG ue bit reorganiation function and function F(X 0,X 1,X 2 ). Bit reorganiation() {X 0 = 15L 14R ; X 1 = 11R 9L ; X 2 = 7L 5R ; X 3 = 2R 0L } F(X 0,X 1,X 2 ) {D = (X 0 R 1 ) R 2 ; D 1 = R 1 X 1 ; D 2 = R 2 X 2 ; R 1 = D 1 INTx i ; R 2 = D 2 INTy i ;} where INTx i and INTy i are 32-bit nonnegative binary integer repreentation of x i and y i, i i index of iteration and D i 32-bit output of function F(X 0,X 1,X 2 ). 2.3 The Execution Procedure of the Analyzed PRNG In the initialization tage of the analyzed PRNG, whoe detailed decription can be found in paper [18], ecret key K i tranformed to the input of the working tage K which can be alo conidered a a ecret key. Baed on K, attacker can obtain complete equence produced by analyzed PRNG. Let K i = ( 0,i,..., 15,i, R 1,i,R 2,i,x i,y i ) be the input of each iteration i of the working tage and 32-bit word Z i output of each iteration of the working tage, where K 0 = K. In each iteration of working tage following algorithm i ued: { Bit reorganiation(); Z = F(X 0,X 1,X 2 ) X 3 ; 16,i = ,i ,i ,i ,i + ( ) 0,i mod (231 1); If 16,i = 0thenet 16,i = 231 1; For each 0 j<16 et j,i+1 = j+1,i ; } Firt 100 output Z i are dicarded and ubequent value of Z i for i 100 are ued. 3 Security Analyi 3.1 Chaotic Map Analyi Analyzed PRNG ue two chaotic map. Firt map (Eq. 1) ha two fixed point x = 1andx = 1 2 and great number of value of x which after certain number of iteration lead to one of thee two fixed point. In paper [13] itihownthat 89 percent of initial point of thi chaotic map, implemented in digital computer, lead to fixed point. For thi reaon there i a high probability that thi chaotic map will produce ame value after certain number of iteration. Second map (Eq. 2) ha three fixed point y = 1, y = 1 and y = 0 and great number of value of y which after certain number of iteration lead to one of thee fixed point. Becaue econd chaotic map i cubic function, each of thee three fixed point can be obtained on the bai of three value, each of thee three value can be obtained on the bai of another three value and o on. For thi reaon, if we conider i iteration of thi chaotic map, there i 3 i value of y 0 which lead to ome of thee three fixed point. However, becaue y i repreented with 32 bit plu one bit for ign in paper [18], the vat majority of thee value will be found in the ame interval of length 1 and therefore a 2 32 greater number of real value will be repreented with the ame dicretized value. Becaue none of the two mot ued computer number format for toring real number have preciion of 32 bit, experiment with ingle-preciion (24 bit preciion) and double-preciion (52 bit preciion) floating-point format are performed in order to prove exitence of initial value which lead to fixed point. When ingle-preciion floatingpoint format i ued for implementation of the analyzed PRNG, about 0.86 percent of initial point lead to one of the fixed point in le than 100 iteration of the analyzed PRNG. Even 7.86 percent of initial point lead to one of the fixed point in le than 1000 iteration of the analyzed PRNG, which repreent very large part of key pace for uch a mall number of iteration. We mut have in mind that in ingle-preciion floating-point format only 24 bit are ued, therefore key pace of only 2 24 i available in thi format which i le than 2 32 mentioned in paper [18]. For bigger key pace we aume that greater number of iteration of chaotic map will be required to reach fixed point, o we can ue data baed on ingle-preciion floatingpoint format a maximal etimation of part of the key pace which lead to fixed point in mentioned number of iteration. When double-preciion floating-point format i ued for implementation of the analyzed PRNG, about percent of initial point lead to one of the fixed point in

4 712 J Electron Tet (2018) 34: le than 100 iteration. It i obviou that greater key pace influenced uch a ignificant reduction in percent of initial point which lead to fixed point, o greater number of iteration hould be teted. More than 1 percent of initial point lead to one of the fixed point in le than 10 million iteration of the analyzed PRNG. Becaue analyzed PRNG i intended for video encryption, very large number of iteration of PRNG (and chaotic map) i required. For thi reaon analyzed chaotic map could reach fixed point during encryption proce and exhibit non-chaotic behavior even when double-preciion floating-point format i ued. We mut have in mind that double-preciion floating-point format enable key pace of 2 52 that i 2 20 time bigger than key pace of 2 32 mentioned in paper [18]. Therefore maller number of iteration will be required to reach fixed point. We can ue data baed on double-preciion floatingpoint format only a a minimal etimation of part of the key pace which lead to fixed point in mentioned number of iteration. Baed on previou data we can conclude that ignificant number of initial point of both chaotic map ued in the analyzed PRNG lead to fixed point after certain number of iteration. Thee initial point are not grouped in maller number of interval and therefore they cannot be completely avoided when the ecret key i elected in a random manner. Bearing in mind that the analyzed PRNG i intended for video encryption and that amount of data in video file i today meaured by hundred of million or even billion of bit, it i expected that the analyzed PRNG mut be capable to function properly in more than a everal hundred million iteration becaue only 32 output bit are generated in one iteration. When we compare expected number of required iteration (everal hundred million iteration) with experimentally obtained number of iteration for which part of key pace leading to fixed point i greater than one percent (10 million iteration for double-preciion format or 1000 iteration for ingle-preciion format), it i quite poible that chaotic map will diplay non-chaotic behavior. Therefore we can aume that chaotic map do not contribute to the afety of the analyzed PRNG after certain number of iteration. All value of ecret key which lead to reduced ecurity of cryptoytem are called weak key. In thi cae, all value of chaotic map which lead to fixed point can be conidered a weak key of the analyzed PRNG. Bearing in mind that exitence of only one weak key i unacceptable in PRNG ued for cryptographic purpoe we can conclude that analyzed chaotic map, whoe number of weak key i expreed in percentage of total key pace, hould not be ued in PRNG intended for ecure application uch a video encryption. 3.2 Cryptanalyi One of the baic propertie of a PRNG, which influence it ecurity, i unpredictability. If the PRNG i unpredictable, attacker can not gue value of next output bit with a probability greater than 50 percent, regardle of the number of known conecutive output bit of ome PRNG. In the analyzed PRNG, value of input parameter in each iteration of working tage are ued to calculate all ubequent output value. Therefore we can conider input parameter of ome iteration a a ecret key of analyzed PRNG. In thi ection it will be hown that baed on everal known iteration of thi PRNG, attacker can obtain all value of input parameter of ome iteration of working tage with complexity which i le than etimated ecurity. Therefore, attacker can calculate all ubequent output value of analyzed PRNG by attack which complexity i leer than etimated ecurity of guee. Let K i = ( 0,i,..., 15,i, R 1,i,R 2,i,x i,y i ) be the input of each iteration i of the working tage and 32-bit word Z i output of each iteration of the working tage, where K 0 = K. For calculation of Z i attacker need to know only value of X 0,i,X 1,i,X 2,i,X 3,i,R 1,i and R 2,i that i 15L,i, 14R,i, 11R,i, 9L,i, 7L,i, 5R,i, 2R,i, 0L,i,R 1,i and R 2,i. However, due to need to update value of parameter for next iteration, attacker alo need to know value of 15R,i, 13,i, 10,i, 6,i, 0R,i,x i and y i. Aume that the attacker know the output value of the firt 6 iteration of the analyzed PRNG Z 0,...Z 5.Goalof the attacker i to obtain input of the working tage K which can alo be conidered a a ecret key. Entire proce of the propoed attack i preented in Fig. 1. Each row in Fig. 1 repreent data of one iteration of the analyzed PRNG, while each column repreent a manner in which value of integer (left and right part) are obtained. In Fig. 1, gueed value are denoted by letter G, calculated value by letter C and value equal to ome value from other iteration i are denoted by = j,i. The propoed attack i performed in the following tep: Step 1: In working tage of the analyzed PRNG output Z i calculated baed on equation Z = F(X 0,X 1,X 2 ) X 3. If attacker guee value of input parameter X 0,0,X 1,0, X 2,0,R 1,0,R 2,0 of function F, he can calculate value of X 3,0 = F(X 0,0,X 1,0,X 2,0 ) Z 0 baed on known Z 0. Therefore, value of 2R,0, 0L,0 (which are part of X 3,0 ) are calculated baed on gueed 15L,0, 14R,0, 11R,0, 9L,0, 7L,0, 5R,0,R 1,0,R 2,0 and known Z 0. Attacker alo need to gue value of 15R,0, 13,0, 10,0, 6,0, 0R,0,x 0 and y 0 in order to calculate 16,0 which will be ued in next iteration. Total

5 J Electron Tet (2018) 34: Fig. 1 Repreentation of the propoed attack complexity of firt tep of thi attack i 2 349, becaue 349 bit of the ecret key K 0 are gueed while 32 bit are calculated. Step 2: After each iteration of working tage hift of value of i performed by j,1 = j+1,0 for each 0 j < 16. Therefore, gueed and calculated value from previou iteration are now aigned to new parameter. For example, to parameter 15,1 value of calculated parameter 16,0 i aigned. In Fig. 2, proce of hifting value i preented. We can ee for example that value of 2R,0 calculated in firt iteration (denoted with 0) i hifted to 1R,1 and 0R,2 in next two iteration. Value of R 1,1,R 2,1,x 1 and y 1 are calculated baed on two chaotic map and function F(X 0,0,X 1,0,X 2,0 ). Therefore, for thi iteration of analyzed PRNG attacker know value 15,1, 14,1, 13R,1, 12,1, 10R,1, 9,1, 8L,1, 6L,1, 5,1, 4R,1, 1R,1 of ecret key K 1 Ȧttacker need to gue value of 11R,1 and 7L,1 in order to calculate X 3,1 that i 2R,1, 0L,1. Calculation i baed on known Z 1 in the ame way a in the previou tep. Now attacker need to gue only value of 13L,1, 10L,1, 6R,1, 0R,1 in order to obtain all neceary value of parameter ued for calculation of parameter for next iteration. Total complexity of econd tep of thi attack i 2 92, becaue 92 bit of ecret key K 1 are gueed while 32 bit are calculated. It i important to mention that baed on gueed and calculated value of in thi Fig. 2 Example of hift of value of iteration we can obtain value of ome in previou iteration due to j,1 = j+1,0.infig.2 we can ee for example that baed on value of 0L,5 calculated in fifth iteration (denoted by 4) we can obtain value of 1L,4 and 2L,3 from previou two iteration. Therefore, baed on gueed and calculated value in thi tep attacker know value of 14L,0, 12R,0, 11L,0, 8L,0, 7R,0, 3R,0, 1,0 of the ecret key K 0. Step 3: Baed on calculation and data from previou iteration attacker know value of 15,2, 14,2, 13,2, 12,2, 11,2, 10R,2, 9,2, 8,2, 7L,2, 6L,2, 5,2, 4,2, 3R,2, 1R,2, 0R,2 of the ecret key K 2. In thi tep attacker need to gue 10L,2 and 6R,2 and calculate X 3,2 that i 2R,2, 0L,2, baed on known Z 2. Total complexity of third tep of thi attack i 2 29, becaue 29 bit of ecret key K 2 are gueed while 32 bit are calculated. Baed on gueed and calculated value of in thi iteration we can obtain value of ome in firt iteration due to j,2 = j+1,1 = j+2,0. Therefore, baed on gueed and calculated value in thi tep attacker know value of 12L,0, 8R,0, 4R,0, 2L,0 of the ecret key K 0. Step 4: Baed on calculation and data from previou iteration attacker know value of 15,3, 14,3, 13,3, 12,3, 11,3, 10,3, 9,3, 8,3, 7,3, 6L,3, 5,3, 4,3, 3,3, 2R,3, 1R,3, 0R,3 of the ecret key K 3. In thi tep attacker need to gue only 6R,3 and calculate 0L,3 baed on known Z 3. Total complexity of fourth tep of thi attack i 2 15, becaue 15 bit of ecret key K 3 are gueed while 15 bit are calculated. Baed on gueed and calculated value of in thi iteration we can obtain value of 9R,0, 3L,0 of the ecret key K 0. Step 5: Baed on calculation and data from previou iteration attacker know all bit of the ecret key K 4 except for 0L,4 which i calculated baed on known Z 4. Thi tep do not increae complexity of propoed attack becaue no bit were gueed and only 15 bit are calculated. Baed on calculated value 0L,4 we can obtain value of 4L,0 of the ecret key K 0. Step 6: In thi tep all bit of the ecret key K 5 are known except for 0L,5 which i calculated baed on known Z 5. Baed on calculated value 0L,5 attacker know value of 5L,0 and therefore obtain the whole ecret key K 0. Baed

6 714 J Electron Tet (2018) 34: on the ecret key K 0 attacker can generate all peudo random number produced by analyzed PRNG. Total complexity of propoed attack i = which i time maller than etimated ecurity of Thi attack can be even more efficient due to mentioned problem with chaotic map. Becaue great number of initial point x 0,y 0 lead to fixed point, there i poibility that after ome x i,y i all obtained value of chaotic map will be equal to fixed point. Therefore, attacker can kip arbitrary number of iteration and perform thi attack baed on known Z i,...,z i+5. For higher value of i there i greater probability that value of x i,y i will be equal to fixed point. For thi reaon attacker can probably reduce earch for x i on two fixed point and earch for y i on three fixed point. Therefore complexity of earch for x i,y i will be reduced from 2 66 to only 6 guee. In thi cae total complexity of propoed attack i approximately which i dratically le than etimated ecurity of the analyzed PRNG of Although the analyzed PRNG i till afe againt attack performed with technological reource which are available today (due to extremely large key pace), it ecurity level i far lower than etimated and for that reaon we can conider thi cryptoytem broken [14]. Uer of thi PRNG mut be aware of reduced ecurity level becaue future development of technology can lead to ituation in which thi attack can be feaible. Preented cryptanalyi technique can be applicable to other imilar chaotic or non-chaotic PRNG which are baed on XOR operation and do not ue whole ecret key in each iteration. Alo thi attack can be ueful for deigner of new PRNG, becaue it indicate which chaotic map and deign method lead to reduced level of ecurity. 4 The Potential Security-enhancement Scheme Due to the great number of initial value of chaotic map which lead to fixed point, level of ecurity of the analyzed PRNG doe not correpond to the length of the ecret key K. Becaue ecurity of the analyzed PRNG i good regardle of performance of ued chaotic map, thee chaotic map hould be excluded from the analyzed PRNG. Alo, all bit of hould be ued in each iteration of the analyzed PRNG in order to avoid attack decribed in previou ection. For above mentioned reaon following change hould be made to bit reorganiation function and function F : Bit reorganiation() {X 0 = 15L 14R ; X 1 = 11R 9L ; X 2 = 7L 5R ; X 3 = 2R 0L ; X 4 = 14L 11L ; X 5 = 9R 7R ; X 6 = 5L 2L } F(X 0,X 1,X 2,X 3,X 4,X 5,X 6 ) {D = (X 0 R 1 X 4 R 2 1 ) X 3 ; R 1 = (R 1 X ) X 1 ; R 2 = R 2 X 2 X ;} Recommended change hould not influence peed of the analyzed PRNG ignificantly. In changed verion there i bigger number of XOR operation than in original verion but ue of chaotic map i completely eliminated which hould keep the peed of the analyzed PRNG at approximately ame level. The ecret key of new verion of the analyzed PRNG conit of 16 integer ( 0,..., 15 ) repreented by 31 bit each and two 32-bit integer R 1 and R 2. Two real number x 0 and y 0 are no longer part of the ecret key which i now 560 bit long. Becaue all parameter of the PRNG are ued in each iteration, attacker can not calculate any part of the ecret key baed on attack whoe complexity i lower than Therefore, ecurity of the improved verion of the analyzed PRNG correpond to the length of the ecret key. 5 Concluion In thi paper ecurity analyi of the efficient chao peudorandom number generator applied to video encryption i preented. Analyi of chaotic map ued in the analyzed PRNG how that thee chaotic map do not enhance ecurity of the analyzed PRNG due to the fact that coniderable number of initial value lead to fixed point. Alo, baed on 6 known iteration of the analyzed PRNG, data ufficient for recontruction of whole peudo random equence can be obtained with complexity which i much maller than the etimated key pace. Therefore, ecurity of the analyzed PRNG i much lower than expected and it hould be ued with caution. Preented cryptanalyi technique can be applicable to other imilar PRNG baed on XOR operation which do not ue whole ecret key in each iteration. Some potential improvement of the analyzed PRNG are propoed which could eliminate perceived hortcoming of the original verion. Compliance with Ethical Standard Conflict of interet The author declare that they have no conflict of interet.

7 J Electron Tet (2018) 34: Reference 1. Ahmad M, Alam MZ, Anari S, Lambić D, AlSharari HD (2018) Cryptanalyi of an image encryption algorithm baed on PWLCM and inertial delayed neural network. J Intell Fuzzy Syt 34: Akhhani A, Akhavan A, Mobaraki A, Lim S-C, Haan Z (2014) Peudo random number generator baed on quantum chaotic map. Commun Nonlinear Sci Numer Simulat 19: Ecrypt II yearly report on algorithm and keyize. (2010) Francoi M, Groge T, Barchiei D, Erra R (2013) A new Peudo-Random number generator baed on two chaotic map. Informatica 24(2): Francoi M, Groge T, Barchiei D, Erra R (2014) Peudorandom number generator baed on mixing of three chaotic map. Commun Nonlinear Sci Numer Simulat 19: Garcia-Martinez M, Campo-Canton E (2015) Peudo-random bit generator baed on multi-modal map. Nonlinear Dyn 82: Hellwagner H, Kuchnig R, Stutz T, Uhl A (2009) Efficient in-network adaptation of encrypted h.264/svc content, Signal Proce. Image Commun 24: Kodikara Arachchi H, Perramon X, Dogan S, Kondoz AM (2009) Adaptation-aware encryption of calable h.264/avc video for content ecurity. Signal Proce Image Commun 24: Lambić D (2017) Cryptanalyzing a novel peudorandom number generator baed on peudorandomly enhanced logitic map. Nonlinear Dyn 89: Lambić D (2018) Security analyi and improvement of the peudo-random number generator baed on quantum chaotic map. Nonlinear Dyn 94: Lambić D (2018) Security analyi of the peudo-random bit generator baed on multi-modal map. Nonlinear Dyn 91: Lambić D, Nikolić M (2017) Peudo-random number generator baed on dicrete-pace chaotic map. Nonlinear Dyn 90: Lanford OE III (1998) Some informal remark on the orbit tructure of dicrete approximation to chaotic map. Exp Math 7(4): Schneier B (1996) Applied cryptography. Wiley, New York 15. Stojanovki T, Kocarev L (2001) Chao-baed random number generator-part i: analyi. IEEE Tran Circuit Sytem I Fund Theory Appl 48: Stoyanov B, Kordov K (2015) Novel ecure peudo-random number generation cheme baed on two tinkerbell map. Adv Stud Theor Phy 9: Vaferi E, Sabbaghi-Nadoohan R (2015) A new encryption algorithm for color image baed on total chaotic huffling cheme. Optik 126: Xu H, Tong X, Meng X (2016) An efficient chao peudo-random number generator applied to video encryption. Optik 127: Zeng L, Liu R (2015) Cryptanalyzing a novel couple image encryption algorithm baed on DNA ubequence operation and chaotic ytem. Optik 126(24): Zhang Y (2015) Cryptanalyi of a novel image fuion encryption algorithm baed on DNA equence operation and hyper-chaotic ytem. Optik 126(2): Dragan Lambić received the PhD degree from the Faculty of Mathematic in Belgrade, Univerity of Belgrade, Serbia. Hi primary reearch area are mathematic, computer cience, cryptography, chao, computer cience education and mathematic education. Alekandar Janković i aitant profeor at Faculty of Education in Sombor, Univerity of Novi Sad, Serbia. Muheer Ahmad i aitant profeor at the department of Computer Engeneering, Jamia Milia Ilamia Univerity, New Delhi, India.

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract

A Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Performance Evaluation of search engines via user efforts measures

Performance Evaluation of search engines via user efforts measures IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1

More information

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:

Gray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations: Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

Variable Resolution Discretization in the Joint Space

Variable Resolution Discretization in the Joint Space Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION

ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Web Science and additionality

Web Science and additionality Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of

More information

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA

Evolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information