Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption
|
|
- Robert Patrick
- 5 years ago
- Views:
Transcription
1 Journal of Electronic Teting (2018) 34: Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar Janković 1 Muheer Ahmad 2 Received: 8 July 2018 / Accepted: 4 November 2018 / Publihed online: 8 November 2018 Springer Science+Buine Media, LLC, part of Springer Nature 2018 Abtract Recently, chao baed peudo-random number generator (PRNG) for video encryption wa propoed. Security analyi preented in thi paper reveal eriou problem. Chaotic map ued in analyzed PRNG do not enhance it ecurity due to a coniderable number of initial value that lead to fixed point. Alo, baed on 6 known iteration, an attacker can recontruct a ecret key ued in the working tage of the analyzed PRNG baed on attack whoe complexity i much maller than the etimated key pace. Therefore, ecurity of the analyzed PRNG i much lower than expected and it hould be ued with caution. Some potential improvement of the analyzed PRNG are propoed which could eliminate perceived hortcoming of the original verion. Keyword Chao Video encryption Peudo-random number generator Cryptanalyi Cryptography 1 Introduction A recently recognized, multimedia data i frequently being tranmitted through variou unafe channel. For thi reaon, ecurity of multimedia data uch a video file i attracting more and more attention. Some feature of video encryption uch a huge amount of data and higher requirement of real-time capacity are not completely upported by conventional cipher primarily intended for encryption of textual data [18]. Hence video encryption Reponible Editor: S. Bhunia Dragan Lambić dragan.lambic@pef.un.ac.r Alekandar Janković alekjankovic@gmail.com Muheer Ahmad muheer.ce@gmail.com 1 Faculty of Education, Univerity of Novi Sad, Podgorička 4, Sombor, Serbia 2 Department of Computer Engineering, Jamia Millia Ilamia, New Delhi, , India algorithm have been developed in recent year which are intended to protect the video content from unauthorized acce [7, 8, 18]. Security of cryptographic ytem developed for encryption of image and video file depend largely on feature of random number generator ued in thee ytem [9, 17]. There are two type of random number generator, truerandom number generator (TRNG) and peudo-random number generator (PRNG). TRNG are baed on nondeterminitic phyical procee and ome of them can achieve high peed but they are conidered unpredictable and uceptible to failure due to external fluctuation [12, 15]. On the other hand, PRNG are baed on digital algorithm which can provide random-like behaviour. Main diadvantage of PRNG i that they are necearily periodic [2], but on the other ide they are flexible, practical and can be ued at low cot [12]. Chao ha been widely ued in PRNG deign [4, 6, 12] due to it high enitivity to initial value, mixing, random-like behavior and ergodic behavior which are conidered a deirable propertie in cryptography. In recent year, variou chaotic map were ued a a ource of randomne in PRNG. For example, logitic map and it variation uch a quantum logitic map and piecewie logitic map have been ued in a ignificant number of PRNG [2, 5]. Chaotic map uch a piecewie-linear one-
2 710 J Electron Tet (2018) 34: dimenional map, multi-modal map, tinkerbell map, etc. arealowidelyuedinprng[6, 15, 16]. Many of the propoed cryptographic ytem and PRNG baed on chao uffer from eriou ecurity problem caued by inadequate election and application of chaotic map [1, 19, 20]. For example, initial value of multi-modal map are ued a a ecret key of peudo-random bit generator but ome feature of the ued multi-modal map caued exitence of certain number of weak key [11]. Alo, 99 percent of the key pace of PRNG baed on quantum chaotic map i compoed of weak key due to inadequate election of interval for control parameter of chaotic map [10]. Another caue of low ecurity, which i not directly connected to the feature of ued chaotic map, i inadequate deign of PRNG. For example, inadequate deign of PRNG baed on peudorandomly enhanced logitic map enabled ituation in which approximately 2 50 different ecret key produce the ame initial condition and control parameter of enhanced logitic map. Such deign error ignificantly reduce key pace, making thi PRNG non-reitant to brute-force attack [9]. Such ecurity problem can enable attacker to fully break analyzed cryptoytem and obtain ecret data and ecret key or can lead to partial reduction of ecurity which attacker cannot exploit to full extent with technological reource available today. In any cae, identification of uch ecurity iue i very important becaue level of ecurity of uch cryptoytem i far lower than expected. For that reaon, even cryptoytem with partially reduced ecurity are conidered broken [14]. Due to contant development of technological reource and cryptanalyi technique, uer mut be aware of reduced ecurity level which can lead to total break in the future. In [18] a novel peudo-random number generator i propoed, which i ued in a video encryption cheme. Thi PRNG i partially baed on two one-dimenional chaotic map. Due to it unuually large key, it can function properly and provide ufficient level of ecurity without thee two chaotic map. Unfortunately, ecurity analyi preented in thi paper indicate that chaotic map ued in analyzed PRNG often exhibit non-chaotic behavior which can lead to lower level of ecurity. Alo, baed on everal known iteration of thi PRNG, attacker can calculate all ubequent output value with complexity which i le than the etimated ecurity level. The ret of thi paper i organized a follow. In Section 2, the analyzed PRNG i decribed. Analyiof two chaotic map and cryptanalyi of the analyzed PRNG are preented in Section 3. In Section 4 the potential ecurityenhancement cheme i preented. Concluion are drawn in Section 5. 2 Decription of the Analyzed PRNG 2.1 Chaotic Map Analyzed PRNG [18] ue two chaotic map: x n+1 = 2xn 2 1 (1) y n+1 = 4yn 3 3y n (2) where x,y [ 1, 1]. In paper [18] x and y are decribed a real number from interval [ 1, 1] and key pace for each of them i etimated at = It i not clear how thee number hould be implemented becaue none of the two mot ued computer number format for toring real number have thi preciion. Single-preciion floatingpoint format ha 32 bit but 9 bit are ued for toring ign and exponent, therefore key pace of only 2 24 i available in thi format. Double-preciion floating-point format ha 64 bit and preciion of 2 52 which i higher than etimated key pace for x and y. 2.2 The Structure of the Analyzed PRNG Analyzed PRNG ha two tage, initialization tage and working tage. Initialization tage i ued only to etup initial tate of the analyzed PRNG K baed on ecret key K. BearinginmindthatK and K have ame number of bit and repreent ame parameter of the analyzed PRNG, attacker can ue K intead of K to obtain complete equence produced by the analyzed PRNG. For thi reaon initialization tage i not of interet to the attacker and therefore decription of analyzed PRNG will focu only on working tage. In the decription of the analyzed PRNG following notation i ued: the bitwie excluive OR operation, the modulo 2 32 addition, a L the leftmot 16 bit of integer a, a R the rightmot 16 bit of integer a, a b the concatenation of tring a and b. The ecret key of the analyzed PRNG conit of following parameter: 16 integer ( 0,..., 15 ), each repreented by 31 bit, two 32-bit integer R 1 and R 2 and two real number x 0 and y 0 from interval [ 1, 1] which are repreented by 33 bit each in paper [18]. In total, ecret key conit of 626 bit which i a very large number of bit compared to current required level of afety of 128 bit [3]. Secret key of uch length i more complicated for generation, ue and afe keeping but on the other hand it offer very high level of ecurity even if PRNG i partially broken. Secret key K
3 J Electron Tet (2018) 34: i ued in initialization tage a initial value of parameter which are after 32 iteration of thi tage tranformed into K which i ued a initial value of parameter in working tage. Working tage of the analyzed PRNG ue bit reorganiation function and function F(X 0,X 1,X 2 ). Bit reorganiation() {X 0 = 15L 14R ; X 1 = 11R 9L ; X 2 = 7L 5R ; X 3 = 2R 0L } F(X 0,X 1,X 2 ) {D = (X 0 R 1 ) R 2 ; D 1 = R 1 X 1 ; D 2 = R 2 X 2 ; R 1 = D 1 INTx i ; R 2 = D 2 INTy i ;} where INTx i and INTy i are 32-bit nonnegative binary integer repreentation of x i and y i, i i index of iteration and D i 32-bit output of function F(X 0,X 1,X 2 ). 2.3 The Execution Procedure of the Analyzed PRNG In the initialization tage of the analyzed PRNG, whoe detailed decription can be found in paper [18], ecret key K i tranformed to the input of the working tage K which can be alo conidered a a ecret key. Baed on K, attacker can obtain complete equence produced by analyzed PRNG. Let K i = ( 0,i,..., 15,i, R 1,i,R 2,i,x i,y i ) be the input of each iteration i of the working tage and 32-bit word Z i output of each iteration of the working tage, where K 0 = K. In each iteration of working tage following algorithm i ued: { Bit reorganiation(); Z = F(X 0,X 1,X 2 ) X 3 ; 16,i = ,i ,i ,i ,i + ( ) 0,i mod (231 1); If 16,i = 0thenet 16,i = 231 1; For each 0 j<16 et j,i+1 = j+1,i ; } Firt 100 output Z i are dicarded and ubequent value of Z i for i 100 are ued. 3 Security Analyi 3.1 Chaotic Map Analyi Analyzed PRNG ue two chaotic map. Firt map (Eq. 1) ha two fixed point x = 1andx = 1 2 and great number of value of x which after certain number of iteration lead to one of thee two fixed point. In paper [13] itihownthat 89 percent of initial point of thi chaotic map, implemented in digital computer, lead to fixed point. For thi reaon there i a high probability that thi chaotic map will produce ame value after certain number of iteration. Second map (Eq. 2) ha three fixed point y = 1, y = 1 and y = 0 and great number of value of y which after certain number of iteration lead to one of thee fixed point. Becaue econd chaotic map i cubic function, each of thee three fixed point can be obtained on the bai of three value, each of thee three value can be obtained on the bai of another three value and o on. For thi reaon, if we conider i iteration of thi chaotic map, there i 3 i value of y 0 which lead to ome of thee three fixed point. However, becaue y i repreented with 32 bit plu one bit for ign in paper [18], the vat majority of thee value will be found in the ame interval of length 1 and therefore a 2 32 greater number of real value will be repreented with the ame dicretized value. Becaue none of the two mot ued computer number format for toring real number have preciion of 32 bit, experiment with ingle-preciion (24 bit preciion) and double-preciion (52 bit preciion) floating-point format are performed in order to prove exitence of initial value which lead to fixed point. When ingle-preciion floatingpoint format i ued for implementation of the analyzed PRNG, about 0.86 percent of initial point lead to one of the fixed point in le than 100 iteration of the analyzed PRNG. Even 7.86 percent of initial point lead to one of the fixed point in le than 1000 iteration of the analyzed PRNG, which repreent very large part of key pace for uch a mall number of iteration. We mut have in mind that in ingle-preciion floating-point format only 24 bit are ued, therefore key pace of only 2 24 i available in thi format which i le than 2 32 mentioned in paper [18]. For bigger key pace we aume that greater number of iteration of chaotic map will be required to reach fixed point, o we can ue data baed on ingle-preciion floatingpoint format a maximal etimation of part of the key pace which lead to fixed point in mentioned number of iteration. When double-preciion floating-point format i ued for implementation of the analyzed PRNG, about percent of initial point lead to one of the fixed point in
4 712 J Electron Tet (2018) 34: le than 100 iteration. It i obviou that greater key pace influenced uch a ignificant reduction in percent of initial point which lead to fixed point, o greater number of iteration hould be teted. More than 1 percent of initial point lead to one of the fixed point in le than 10 million iteration of the analyzed PRNG. Becaue analyzed PRNG i intended for video encryption, very large number of iteration of PRNG (and chaotic map) i required. For thi reaon analyzed chaotic map could reach fixed point during encryption proce and exhibit non-chaotic behavior even when double-preciion floating-point format i ued. We mut have in mind that double-preciion floating-point format enable key pace of 2 52 that i 2 20 time bigger than key pace of 2 32 mentioned in paper [18]. Therefore maller number of iteration will be required to reach fixed point. We can ue data baed on double-preciion floatingpoint format only a a minimal etimation of part of the key pace which lead to fixed point in mentioned number of iteration. Baed on previou data we can conclude that ignificant number of initial point of both chaotic map ued in the analyzed PRNG lead to fixed point after certain number of iteration. Thee initial point are not grouped in maller number of interval and therefore they cannot be completely avoided when the ecret key i elected in a random manner. Bearing in mind that the analyzed PRNG i intended for video encryption and that amount of data in video file i today meaured by hundred of million or even billion of bit, it i expected that the analyzed PRNG mut be capable to function properly in more than a everal hundred million iteration becaue only 32 output bit are generated in one iteration. When we compare expected number of required iteration (everal hundred million iteration) with experimentally obtained number of iteration for which part of key pace leading to fixed point i greater than one percent (10 million iteration for double-preciion format or 1000 iteration for ingle-preciion format), it i quite poible that chaotic map will diplay non-chaotic behavior. Therefore we can aume that chaotic map do not contribute to the afety of the analyzed PRNG after certain number of iteration. All value of ecret key which lead to reduced ecurity of cryptoytem are called weak key. In thi cae, all value of chaotic map which lead to fixed point can be conidered a weak key of the analyzed PRNG. Bearing in mind that exitence of only one weak key i unacceptable in PRNG ued for cryptographic purpoe we can conclude that analyzed chaotic map, whoe number of weak key i expreed in percentage of total key pace, hould not be ued in PRNG intended for ecure application uch a video encryption. 3.2 Cryptanalyi One of the baic propertie of a PRNG, which influence it ecurity, i unpredictability. If the PRNG i unpredictable, attacker can not gue value of next output bit with a probability greater than 50 percent, regardle of the number of known conecutive output bit of ome PRNG. In the analyzed PRNG, value of input parameter in each iteration of working tage are ued to calculate all ubequent output value. Therefore we can conider input parameter of ome iteration a a ecret key of analyzed PRNG. In thi ection it will be hown that baed on everal known iteration of thi PRNG, attacker can obtain all value of input parameter of ome iteration of working tage with complexity which i le than etimated ecurity. Therefore, attacker can calculate all ubequent output value of analyzed PRNG by attack which complexity i leer than etimated ecurity of guee. Let K i = ( 0,i,..., 15,i, R 1,i,R 2,i,x i,y i ) be the input of each iteration i of the working tage and 32-bit word Z i output of each iteration of the working tage, where K 0 = K. For calculation of Z i attacker need to know only value of X 0,i,X 1,i,X 2,i,X 3,i,R 1,i and R 2,i that i 15L,i, 14R,i, 11R,i, 9L,i, 7L,i, 5R,i, 2R,i, 0L,i,R 1,i and R 2,i. However, due to need to update value of parameter for next iteration, attacker alo need to know value of 15R,i, 13,i, 10,i, 6,i, 0R,i,x i and y i. Aume that the attacker know the output value of the firt 6 iteration of the analyzed PRNG Z 0,...Z 5.Goalof the attacker i to obtain input of the working tage K which can alo be conidered a a ecret key. Entire proce of the propoed attack i preented in Fig. 1. Each row in Fig. 1 repreent data of one iteration of the analyzed PRNG, while each column repreent a manner in which value of integer (left and right part) are obtained. In Fig. 1, gueed value are denoted by letter G, calculated value by letter C and value equal to ome value from other iteration i are denoted by = j,i. The propoed attack i performed in the following tep: Step 1: In working tage of the analyzed PRNG output Z i calculated baed on equation Z = F(X 0,X 1,X 2 ) X 3. If attacker guee value of input parameter X 0,0,X 1,0, X 2,0,R 1,0,R 2,0 of function F, he can calculate value of X 3,0 = F(X 0,0,X 1,0,X 2,0 ) Z 0 baed on known Z 0. Therefore, value of 2R,0, 0L,0 (which are part of X 3,0 ) are calculated baed on gueed 15L,0, 14R,0, 11R,0, 9L,0, 7L,0, 5R,0,R 1,0,R 2,0 and known Z 0. Attacker alo need to gue value of 15R,0, 13,0, 10,0, 6,0, 0R,0,x 0 and y 0 in order to calculate 16,0 which will be ued in next iteration. Total
5 J Electron Tet (2018) 34: Fig. 1 Repreentation of the propoed attack complexity of firt tep of thi attack i 2 349, becaue 349 bit of the ecret key K 0 are gueed while 32 bit are calculated. Step 2: After each iteration of working tage hift of value of i performed by j,1 = j+1,0 for each 0 j < 16. Therefore, gueed and calculated value from previou iteration are now aigned to new parameter. For example, to parameter 15,1 value of calculated parameter 16,0 i aigned. In Fig. 2, proce of hifting value i preented. We can ee for example that value of 2R,0 calculated in firt iteration (denoted with 0) i hifted to 1R,1 and 0R,2 in next two iteration. Value of R 1,1,R 2,1,x 1 and y 1 are calculated baed on two chaotic map and function F(X 0,0,X 1,0,X 2,0 ). Therefore, for thi iteration of analyzed PRNG attacker know value 15,1, 14,1, 13R,1, 12,1, 10R,1, 9,1, 8L,1, 6L,1, 5,1, 4R,1, 1R,1 of ecret key K 1 Ȧttacker need to gue value of 11R,1 and 7L,1 in order to calculate X 3,1 that i 2R,1, 0L,1. Calculation i baed on known Z 1 in the ame way a in the previou tep. Now attacker need to gue only value of 13L,1, 10L,1, 6R,1, 0R,1 in order to obtain all neceary value of parameter ued for calculation of parameter for next iteration. Total complexity of econd tep of thi attack i 2 92, becaue 92 bit of ecret key K 1 are gueed while 32 bit are calculated. It i important to mention that baed on gueed and calculated value of in thi Fig. 2 Example of hift of value of iteration we can obtain value of ome in previou iteration due to j,1 = j+1,0.infig.2 we can ee for example that baed on value of 0L,5 calculated in fifth iteration (denoted by 4) we can obtain value of 1L,4 and 2L,3 from previou two iteration. Therefore, baed on gueed and calculated value in thi tep attacker know value of 14L,0, 12R,0, 11L,0, 8L,0, 7R,0, 3R,0, 1,0 of the ecret key K 0. Step 3: Baed on calculation and data from previou iteration attacker know value of 15,2, 14,2, 13,2, 12,2, 11,2, 10R,2, 9,2, 8,2, 7L,2, 6L,2, 5,2, 4,2, 3R,2, 1R,2, 0R,2 of the ecret key K 2. In thi tep attacker need to gue 10L,2 and 6R,2 and calculate X 3,2 that i 2R,2, 0L,2, baed on known Z 2. Total complexity of third tep of thi attack i 2 29, becaue 29 bit of ecret key K 2 are gueed while 32 bit are calculated. Baed on gueed and calculated value of in thi iteration we can obtain value of ome in firt iteration due to j,2 = j+1,1 = j+2,0. Therefore, baed on gueed and calculated value in thi tep attacker know value of 12L,0, 8R,0, 4R,0, 2L,0 of the ecret key K 0. Step 4: Baed on calculation and data from previou iteration attacker know value of 15,3, 14,3, 13,3, 12,3, 11,3, 10,3, 9,3, 8,3, 7,3, 6L,3, 5,3, 4,3, 3,3, 2R,3, 1R,3, 0R,3 of the ecret key K 3. In thi tep attacker need to gue only 6R,3 and calculate 0L,3 baed on known Z 3. Total complexity of fourth tep of thi attack i 2 15, becaue 15 bit of ecret key K 3 are gueed while 15 bit are calculated. Baed on gueed and calculated value of in thi iteration we can obtain value of 9R,0, 3L,0 of the ecret key K 0. Step 5: Baed on calculation and data from previou iteration attacker know all bit of the ecret key K 4 except for 0L,4 which i calculated baed on known Z 4. Thi tep do not increae complexity of propoed attack becaue no bit were gueed and only 15 bit are calculated. Baed on calculated value 0L,4 we can obtain value of 4L,0 of the ecret key K 0. Step 6: In thi tep all bit of the ecret key K 5 are known except for 0L,5 which i calculated baed on known Z 5. Baed on calculated value 0L,5 attacker know value of 5L,0 and therefore obtain the whole ecret key K 0. Baed
6 714 J Electron Tet (2018) 34: on the ecret key K 0 attacker can generate all peudo random number produced by analyzed PRNG. Total complexity of propoed attack i = which i time maller than etimated ecurity of Thi attack can be even more efficient due to mentioned problem with chaotic map. Becaue great number of initial point x 0,y 0 lead to fixed point, there i poibility that after ome x i,y i all obtained value of chaotic map will be equal to fixed point. Therefore, attacker can kip arbitrary number of iteration and perform thi attack baed on known Z i,...,z i+5. For higher value of i there i greater probability that value of x i,y i will be equal to fixed point. For thi reaon attacker can probably reduce earch for x i on two fixed point and earch for y i on three fixed point. Therefore complexity of earch for x i,y i will be reduced from 2 66 to only 6 guee. In thi cae total complexity of propoed attack i approximately which i dratically le than etimated ecurity of the analyzed PRNG of Although the analyzed PRNG i till afe againt attack performed with technological reource which are available today (due to extremely large key pace), it ecurity level i far lower than etimated and for that reaon we can conider thi cryptoytem broken [14]. Uer of thi PRNG mut be aware of reduced ecurity level becaue future development of technology can lead to ituation in which thi attack can be feaible. Preented cryptanalyi technique can be applicable to other imilar chaotic or non-chaotic PRNG which are baed on XOR operation and do not ue whole ecret key in each iteration. Alo thi attack can be ueful for deigner of new PRNG, becaue it indicate which chaotic map and deign method lead to reduced level of ecurity. 4 The Potential Security-enhancement Scheme Due to the great number of initial value of chaotic map which lead to fixed point, level of ecurity of the analyzed PRNG doe not correpond to the length of the ecret key K. Becaue ecurity of the analyzed PRNG i good regardle of performance of ued chaotic map, thee chaotic map hould be excluded from the analyzed PRNG. Alo, all bit of hould be ued in each iteration of the analyzed PRNG in order to avoid attack decribed in previou ection. For above mentioned reaon following change hould be made to bit reorganiation function and function F : Bit reorganiation() {X 0 = 15L 14R ; X 1 = 11R 9L ; X 2 = 7L 5R ; X 3 = 2R 0L ; X 4 = 14L 11L ; X 5 = 9R 7R ; X 6 = 5L 2L } F(X 0,X 1,X 2,X 3,X 4,X 5,X 6 ) {D = (X 0 R 1 X 4 R 2 1 ) X 3 ; R 1 = (R 1 X ) X 1 ; R 2 = R 2 X 2 X ;} Recommended change hould not influence peed of the analyzed PRNG ignificantly. In changed verion there i bigger number of XOR operation than in original verion but ue of chaotic map i completely eliminated which hould keep the peed of the analyzed PRNG at approximately ame level. The ecret key of new verion of the analyzed PRNG conit of 16 integer ( 0,..., 15 ) repreented by 31 bit each and two 32-bit integer R 1 and R 2. Two real number x 0 and y 0 are no longer part of the ecret key which i now 560 bit long. Becaue all parameter of the PRNG are ued in each iteration, attacker can not calculate any part of the ecret key baed on attack whoe complexity i lower than Therefore, ecurity of the improved verion of the analyzed PRNG correpond to the length of the ecret key. 5 Concluion In thi paper ecurity analyi of the efficient chao peudorandom number generator applied to video encryption i preented. Analyi of chaotic map ued in the analyzed PRNG how that thee chaotic map do not enhance ecurity of the analyzed PRNG due to the fact that coniderable number of initial value lead to fixed point. Alo, baed on 6 known iteration of the analyzed PRNG, data ufficient for recontruction of whole peudo random equence can be obtained with complexity which i much maller than the etimated key pace. Therefore, ecurity of the analyzed PRNG i much lower than expected and it hould be ued with caution. Preented cryptanalyi technique can be applicable to other imilar PRNG baed on XOR operation which do not ue whole ecret key in each iteration. Some potential improvement of the analyzed PRNG are propoed which could eliminate perceived hortcoming of the original verion. Compliance with Ethical Standard Conflict of interet The author declare that they have no conflict of interet.
7 J Electron Tet (2018) 34: Reference 1. Ahmad M, Alam MZ, Anari S, Lambić D, AlSharari HD (2018) Cryptanalyi of an image encryption algorithm baed on PWLCM and inertial delayed neural network. J Intell Fuzzy Syt 34: Akhhani A, Akhavan A, Mobaraki A, Lim S-C, Haan Z (2014) Peudo random number generator baed on quantum chaotic map. Commun Nonlinear Sci Numer Simulat 19: Ecrypt II yearly report on algorithm and keyize. (2010) Francoi M, Groge T, Barchiei D, Erra R (2013) A new Peudo-Random number generator baed on two chaotic map. Informatica 24(2): Francoi M, Groge T, Barchiei D, Erra R (2014) Peudorandom number generator baed on mixing of three chaotic map. Commun Nonlinear Sci Numer Simulat 19: Garcia-Martinez M, Campo-Canton E (2015) Peudo-random bit generator baed on multi-modal map. Nonlinear Dyn 82: Hellwagner H, Kuchnig R, Stutz T, Uhl A (2009) Efficient in-network adaptation of encrypted h.264/svc content, Signal Proce. Image Commun 24: Kodikara Arachchi H, Perramon X, Dogan S, Kondoz AM (2009) Adaptation-aware encryption of calable h.264/avc video for content ecurity. Signal Proce Image Commun 24: Lambić D (2017) Cryptanalyzing a novel peudorandom number generator baed on peudorandomly enhanced logitic map. Nonlinear Dyn 89: Lambić D (2018) Security analyi and improvement of the peudo-random number generator baed on quantum chaotic map. Nonlinear Dyn 94: Lambić D (2018) Security analyi of the peudo-random bit generator baed on multi-modal map. Nonlinear Dyn 91: Lambić D, Nikolić M (2017) Peudo-random number generator baed on dicrete-pace chaotic map. Nonlinear Dyn 90: Lanford OE III (1998) Some informal remark on the orbit tructure of dicrete approximation to chaotic map. Exp Math 7(4): Schneier B (1996) Applied cryptography. Wiley, New York 15. Stojanovki T, Kocarev L (2001) Chao-baed random number generator-part i: analyi. IEEE Tran Circuit Sytem I Fund Theory Appl 48: Stoyanov B, Kordov K (2015) Novel ecure peudo-random number generation cheme baed on two tinkerbell map. Adv Stud Theor Phy 9: Vaferi E, Sabbaghi-Nadoohan R (2015) A new encryption algorithm for color image baed on total chaotic huffling cheme. Optik 126: Xu H, Tong X, Meng X (2016) An efficient chao peudo-random number generator applied to video encryption. Optik 127: Zeng L, Liu R (2015) Cryptanalyzing a novel couple image encryption algorithm baed on DNA ubequence operation and chaotic ytem. Optik 126(24): Zhang Y (2015) Cryptanalyi of a novel image fuion encryption algorithm baed on DNA equence operation and hyper-chaotic ytem. Optik 126(2): Dragan Lambić received the PhD degree from the Faculty of Mathematic in Belgrade, Univerity of Belgrade, Serbia. Hi primary reearch area are mathematic, computer cience, cryptography, chao, computer cience education and mathematic education. Alekandar Janković i aitant profeor at Faculty of Education in Sombor, Univerity of Novi Sad, Serbia. Muheer Ahmad i aitant profeor at the department of Computer Engeneering, Jamia Milia Ilamia Univerity, New Delhi, India.
Laboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationHow to. write a paper. The basics writing a solid paper Different communities/different standards Common errors
How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationPerformance Evaluation of search engines via user efforts measures
IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationIntegration of Digital Test Tools to the Internet-Based Environment MOSCITO
Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationAalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces
Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationA CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT
Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449
More informationDWH Performance Tuning For Better Reporting
DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in
More informationVariable Resolution Discretization in the Joint Space
Variable Reolution Dicretization in the Joint Space Chritopher K. Monon, David Wingate, and Kevin D. Seppi {c,wingated,keppi}@c.byu.edu Computer Science, Brigham Young Univerity Todd S. Peteron peterto@uvc.edu
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationCS201: Data Structures and Algorithms. Assignment 2. Version 1d
CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and
More informationPERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM
PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationData Mining with Linguistic Thresholds
Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationA NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL
International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE
More informationNew DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index
New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of
More informationEvolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA
Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More information