An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

Size: px
Start display at page:

Download "An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements"

Transcription

1 The International Arab Journal of Information Technology, Vol. 1, No., July An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department, Zarka Private Univerity, Jordan Abtract: Thi paper introduce everal new technique and algorithm to peed up the elliptic curve digital ignature and reduce the ize of the tranited parameter. The baic idea i to ue pare element for the curve coefficient and the firt bae point coordinate. The implementation analyi how that the addition formula calculation are improved about 40 percent. The pare element are introduced with a compact repreentation, thu the digital ignature calculation are peeded up about percent, and the public key parameter are reduced about 7-48 percent. Keyword: Elliptic curve cryptography, projective coordinate, pare element, elliptic curve digital ignature. Received July 14, 00; accepted September 4, Introduction The main advantage of uing the finite group of Elliptic Curve (EC) i that it dicrete logarithm problem i believed to be harder than the dicrete logarithm problem for the multiplication group of a finite field. There i no known ub-exponential algorithm that can be applied to the elliptic curve dicrete logarithm problem. Another advantage that make elliptic curve more attractive i the poibility of optimizing the arithmetic operation in the underlying field [6]. Thi ha led to appearance of everal elliptic curve cryptography product uch a ecurity builder, SSL plu, WTLS pu, TrutPoint etc. In addition many companie have purchaed licene to ue EC code and embed them in their product [4, 5, 7]. By uing Elliptic Curve Cryptoytem ECC we can ue maller key ize with the ame level of cryptographic ecurity for DSA or RSA, whereby we will get maller public key certificate, fater implementation, lower power requirement and maller hardware proceor [15, 8]. Subequently ECC can be applied to many ytem and application [17, 18]. Elliptic curve cryptography application and protocol rely on the elliptic curve group operation uch a adding, doubling and calar multiplication, which will not be feaible unle a uitable elliptic curve finite group and efficient underlying finite field operation are ued. Thu any enhancement in the underlying finite field operation will peed up all the EC application [, 16]. Our approach to enhance the operation i the high utilization of the pare element in GF( n ). Several new algorithm are introduced uch a electing random pare element algorithm, finding pare bae point, compreing and decompreing the pare element and pare multiplication over a polynomial bai. The new algorithm improve the EC in three apect namely: Speed up the curve coefficient multiplication, peed up the multiplication of the firt bae point coordinate and reduce the ize of the tranited parameter. Thi new approach doe not reduce the ecurity to the fact that the elliptic curve over GF( n ) with pare coefficient are iomorphic to the curve which have coefficient elected randomly. Furthermore, although the bae point are retricted to be pare; the number of pare bae point i till very huge and provide the uer with rich choice. The experiment how that the reult of thi improvement varie from one protocol to another baed on the rate of uing the bae point, the number of tranited bit, the key ize and the ratio of doubling to adding. The remainder of thi paper i organized a follow. Section preent the mot efficient elliptic curve projective coordinate formula. In ection, we introduce the algorithm to elect and to compre the pare element. Moreover, we dicu the abundance of the pare point. Section 4 introduce the pare multiplication over polynomial bai. Finally, in ection 5, we how the improvement in elliptic curve digital ignature by uing the uggeted approache.. EC Projective Coordinate Operation In order to find the um of two ditinct point on the elliptic curve E over (GF( n )) by uing affine coordinate, one invere and one multiplication are needed, but to double a point one invere and two multiplication are required. Since the implementation of elliptic curve operation indicate that the invere operation i till more expenive than a field

2 04 The International Arab Journal of Information Technology, Vol. 1, No., July 004 multiplication, where Hankeron and other how that the cot ratio of the inverion to the multiplication over polynomial bai i 1-10 [, 9, 10]. Thu, the projective coordinate X, Y and Z on the curve y + xy= x + a x + a 6 over GF( n ) are ued to replace the invere operation by multiplication uch that [1]: Formula 1: (X 1, Y 1, 1) + (X, Y, Z )= (X, Y, Z ), where U = Z + X1 X Y1 Y T Z S = Z +, = S, Z = T V = Z X, ( ) 1 X = U + T U + S + Ta Y = ( V + X )( TU + Z + Z C ) Formula 1 need 9 field multiplication and 8 temporary variable are required. López and Dahab introduce a new doubling formula which require 5 field multiplication a follow [11-1]: Formula : (X 1, Y 1, Z 1 )= (X, Y, Z ), where Z = Z1 X1 4 4 = X1 a6z1 X + 4 Y = a6z1 Z + X ( a Z + Y1 + a6z. Spare Element Thi ection introduce algorithm to elect random curve have pare coefficient and pare bae point. The complexity analyi for the uggeted algorithm indicate that the time to generate pare element and bae point i relatively ignored. Moreover, the reduction of the pare element length i clarified..1. Select Random Spare Coefficient The firt tep to find a uitable elliptic curve i to elect random coefficient (a and a 6 ) and the election i repeated until a propective curve i found. However, there i no ecurity threat if the coefficient are retricted to be pare in GF(q). Moreover the number of generated curve i till very huge. Algorithm 1 i uggeted to generate random curve with pare coefficient. Algorithm 1: Generate random pare coefficient in GF( q) Input: The finite field GF( n ), (the maximum number of one) Output: The pare element a and a 6 in GF(q) 1. j 0. For i= 1 to rand () v rand (n ) If x v = 1 Then i i -1 (x v i the v th bit in the element x) 4 1 ) Ele x v = 1. If j= 0 then a x, j 1, x 0 and goto tep Ele a 6 x 4. Return a and a 6... The Upper Bound of Spare Bae Point Thi ubection how that even if the bae point i retricted to be pare, the number of generated point i till very huge. Definition: Let G be a point on E (GF( n )) repreented in the binary expand. Then the point G i pare if and only if the firt coordinate ha a few one o that the number of one i le than 5 percent from the field ize. Moreover the point G i called pare with one if the maximum number of the one in the firt coordinate i. Theorem: Let E be any elliptic curve over GF( n ); then the upper bound of the pare point with one on E i ( n i ) / t! i = 0 Proof: Let x be any element in GF(q) and ha t one, then x can be repreented in n n! = t t!( n t)! = t 1 i= 0 ( n i) / t! different way. If the maximum number of the one in the x coordinate i, then x can be repreented in ( n i ) / t! i = 0 different way. Since the quadratic equation ha two olution when x i in GF(q), then the upper bound for the number of pare point with one on E i ( n i ) / t! i = 0 The order of the elected elliptic curve mut be prime or nearly prime (the curve E j ha a nearly prime order if #E j = r j p j for mall integer r j and large prime number p j, where j i an integer), then the approximately average number (if the tet i run over many curve E j ) of pare bae point with one i: i = 0 ( n i ) / d ( t!) where d i the average of r j. Thu, thi number i large enough to give the uer rich choice, for example if n= 160 and = 7 then the number of pare bae point are

3 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element 05 nearly However there i no ecurity threat known in cae if many uer chooe the ame bae point... Selecting a Spare Bae Point Algorithm i uggeted to find a random pare bae point P, with one for any nearly prime elliptic curve over GF( n ), where P ha a large prime order. Algorithm : Chooing Random pare bae point with one. Input: An elliptic curve E over GF(q), the curve order rk, and the maximum number of one. Output: A pare bae point with one. 1. For i=1 to rand (). v rand (n ). If xv= 1 Then i i -1 (xv i the vth bit in the element x) Ele xv= 1 4. End For 5. Find the coordinate y by olving the quadratic equation, if y doe not exit go to tep 1 ele et y to one olution of the quadratic equation (randomly). 6. G (x,y) 7. P k G 8. If P= O then go to tep 1 9. Q r G 10. If Q O then output wrong order and top 11. Output G. The complexity of the previou algorithm i equal to the complexity of tandard algorithm to generate random bae point..4. Compact Spare Element Repreentation To utilize the pare field element in the real communication and implementation; Algorithm and 4 are introduced to compre and decompre any pare element with one in relatively ignored time. Algorithm : Compreion of any pare element in GF( n ), where n 56 Input: Spare element x. Output: Compreed repreentation array C. 1. m 1. For i=1 to n If x i 1 then continue C m = i m m + 1. Return C Algorithm 4: Decompreion of compact repreentation Input: Compreed repreentation array C with length. Output: Spare element x 1. For i=1 to t C m x t 1. Return x Since the dicrete problem for elliptic curve with field ize le than 56 i ufficient for the current application and at leat for next few year; dicuion will be retricted to thi field ize, but it can be extended eaily to any other field ize. Thu each element in the array C (which form the compact repreentation for a pare element) can be repreented in 8 bit, o the ize of the array C i (8). Table 1 how the reduction rate of the pare element. Table 1. The reduction rate of the pare element. Reduction Conventional Compact Size (n) Rate Spare Multiplication Over Polynomial Bai The field multiplication i the mot time conuming operation for adding two elliptic curve point particularly in the projective coordinate. Therefore thi ection how the great improvement whenever pare field element are ued over polynomial bai. Algorithm 5 [1] i ued to find firt the polynomial multiplication and then the reult i reduced by the irreducible polynomial f(x). The following notation are ued; if a(x) i element in GF( n ) then a(x) i aociated with the binary vector a= (a n-1,..., a, a 1, a 0 ), w i the word ize, t i the number of word that are neceary to repreent the vector a, thu the array A= (A[t-1],..., A[], A[1], A[0]) where A[h] i the h th word in the vector a, if C= (C[m],..., C[1], C[0]) then the truncated vector i C{ j}= (C[m],..., C[ j+1], C[j]) Algorithm 5: Polynomial multiplication (Right to left). Input: The polynomial a(x) and b(x) in GF( n ). Output: c(x)= a(x). b(x). 1. C 0. For k= 0 to w-1 do For j= 0 to t 1 do If the k th bit of A[j] i 1 then add B to C{j} If k w-1 then C C x. Return c

4 06 The International Arab Journal of Information Technology, Vol. 1, No., July 004 The previou algorithm need w-1 hift operation and nearly n/ addition operation. Algorithm 6 i uggeted to compute the pare element multiplication in the polynomial bai repreentation. Algorithm 6: Spare polynomial multiplication. Input: The array A with length (the compreed repreentation of a(x) ) and the polynomial b(x) in GF( m ). Output: c(x)= a(x). b(x). 1. For i=1 to T= b<< (A i 1) c= c T. Return c The number of left hift and bit wie addition in the previou algorithm i equal to the number of one in the pare element. To implify the calculation, aume that the left hift cot i equal to the addition operation. Then Table ummarize the improvement by uing pare multiplication algorithm over the general field multiplication in algorithm 5 for word ize w=. Table. Comparion between the multiplication of pare and random field element in polynomial bai. Size (n) Algorithm (5) #Operation Algorithm (6) = 6 #Operation The Cot Ratio if a, a 6 and the firt coordinate of the bae point are pare, then formula 1 can be implemented with only 5 general field multiplication and 4 pare element multiplication. While formula can be implemented with only general field multiplication and pare element multiplication. 5. The Improvement in EC Digital Signature The digital ignature i an important algorithm that relie on public key technology, therefore any enhancement in the ignature generation or ignature verification will have impact on the e-commerce, e- payment and other application. The curve and bae point generation i the firt tep to implement a digital ignature baed on elliptic curve cryptography; the econd i generating the key which are ued to ign a meage and verify the ignature. Thee tep can be decribed a follow [, 14]: EC and Bae Point Generation: The firt party A doe the following: 1. Select a uitable elliptic curve E defined over GF(q),. Select a bae point P E(GF(q)) of order l, where l i the elliptic curve order. EC Key Generation: 1. Select an integer t in the interval [1, l - 1].. Compute the point Q= t P. A' public key i (a, a 6, P, l, Q) and A' private key i t. EC Signature Generation: To ign a meage m, A doe the following: 1. Select an integer k in the interval [1, l - 1].. Compute G= kp= (x 1, y 1 ).. Compute the firt ignature component r= x 1 mod l. (Here x 1 i the firt coordinate in the point G.) If r= 0, go to tep Compute k -1 mod l and e= h(m). 5. Compute = k -l {e + t r} mod l, where h i any Secure Hah Algorithm. 6. If = 0, then go to tep 1. The ignature for the meage m i the pair of integer (r, ). EC Signature Verification: To verify A ignature (r, ): 1. Obtain a copy of A' public key (a, a 6, P, l, Q).. Verify that r and are integer in the interval [1, l - 1].. Compute w= -1 mod l and f = h(m). 4. Compute u 1 = f w mod l. 5. Compute u = r w mod l. 6. Compute u 1 P + u Q= (x 0, y 0 ) and v= x 0 mod l. 7. Accept the ignature if and only if v= r. If a, a 6 and the firt coordinate of the bae point P are pare, then by uing the uggeted approach and algorithm; the number of public key bit will be reduced to (4 + n + ) from (5n +) for the tandard etting. Subequently reducing the neceary time for ending and receiving the EC digital ignature. Table how the percentage of the bit reduction in the public digital ignature parameter. Table. The reduction rate of the bit by uing the new approach. PK PK Reduction Size (n) Standard Compact Rate Aume that the curve order l, t, k, u 1 and u are equal to the field ize n, d i the ratio of doubling to adding. If the Formula 1 i ued for adding and Formula i ued for doubling, then number of multiplication over

5 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element 07 GF( n ) for the ignature generation and key generation are given by the equation Number of Multiplication= 5*(The number of doubling)+9*(the number of adding) So #mult=5n+9(n/d)= n (5+9/d) (1) and the verification: #mult= n( /d ) () while the number of multiplication for the ignature generation and key generation by uing the new approach are reduced to #mult= n( general field + pare +5/d general field +4/d pare () and the verification proce are reduced to #mult= n(6 general field + 4 pare +1/d general field +5/d pare ) (4) Thu the improvement in digital ignature i (1-multiplication cot of (1)/ cot of ()) * 100 and the improvement in the verification i (1-multiplication cot of ()/ cot of (4)) * 100 By uing the data in Table we can conider that the pare multiplication i approximately 10 time fater than the general field multiplication, therefore the improvement in the key generation, the ignature generation, and the verification proce are hown in Table 4. Table 4. The improvement in the digital ignature by uing the new approach. Size (n) Doubling/ Adding (d) 6. Concluion Signature Generation Improvement % Verification Proce Improve ment % 16 / / / / / To atify efficient computation and communication, everal algorithm are introduced uch a electing random pare element algorithm, finding pare bae point, compreing and decompreing the pare element, pare multiplication over polynomial bai. The new approache and algorithm lead to enhance the digital ignature implementation about percent, high reduction in the public key parameter by 7-48 percent and did not acrifice in the elliptic curve cryptography ecurity. Therefore, the elliptic curve application a e-cah and e-commerce can be implemented with better performance uing the uggeted approach. Reference [1] Al-Daoud E. and Ramlan M., A New Addition Formula for Elliptic Curve Over GF( n ), IEEE Tranaction on Computer, vol. 51, no. 8, pp , Augut 00. [] Al-Daoud E. and Ramlan M., Elliptic Curve Arithmetic Operation Over GF( n ) and GF(P) for Cryptoytem Purpoe, in Proceeding of the International Conference on Mathematic and it Application in the New Millennium, pp , 000. [] Blake I. F., Seroui G., and Smart N. P., Elliptic Curve in Cryptography, Univerity Pre, London, Cambridge, [4] Certicom, acceed on March 5, 00. [5] Gupta V., Gupta S., and Sheueling C., Performance Analyi of Elliptic Curve Cryptography for SSL, in Proceeding of ACM Workhop on Wirele Security, Atlanta, Georgia, 00. [6] Gura N., Eberle H., and Shantz S. H., Generic Implementation of Elliptic Curve Cryptography Uing Partial Reduction, in Proceeding of 9 th ACM Conference on Computer and Communication Security, Wahington DC, 00. [7] Gura N., Shantz S. C., Eberle H., Fincheltein D., Gupta S., Gupta V., and Stebila D., An End-to- End Sytem Approach to Elliptic Curve Cryptography, in Proceeding of CHES'00 Workhop on Cryptographic Hardware and Embedded Sytem, Lecture Note in Computer Science, Springer-Verlag, Redwood City, California, 00. [8] Ha J. S., Kim Y. H., and Lee K. Y., Compact Implementation of Elliptic Curve Cryptography Sytem Uing a FPGA, in Proceeding of the 9 th Korean Conference on Semiconductor, pp , 00. [9] Hankeron D., López J. and Meneze A. J., Software Implementation of Elliptic Curve Cryptography over Binary, in Proceeding of CHES'000, LNCS 1965, pp. 1-4, 000. [10] IEEE P16 Draft, Standard Specification for Public Key Cryptography, org/group/16/, verion D1, [11] King B., An Improved Implementation of Elliptic Curve Over GF() When Uing Projective Point Arithmetic, in Proceeding of 8 th Annual International Workhop on Selected Area in Cryptography (SAC'001), pp , 001. [1] López J. and Dahab R., High-Speed Software Multiplication in GF( m ), IC Technical Report, IC-00-09, Intitute of Computing, Univerity of Campina, 000. [1] López J. and Dahab R., Improved Algorithm for Elliptic Curve Arithmetic in GF( n ), in

6 08 The International Arab Journal of Information Technology, Vol. 1, No., July 004 Proceeding of 5 th Annual International Workhop on Selected Area in Cryptography (SAC'98), pp. 01-1, [14] Meneze A. J., Oorchot P. C., and Vantone S. A., Handbook of Applied Cryptography, CRC Pre, Boca Raton, [15] Paar C., Implementation Option for Finite Arithmetic for Elliptic Curve Cryptoytem, in Proceeding of Invited Preentation at the rd Workhop on Elliptic Curve Cryptography (ECC'99), Univerity of Waterloo, Waterloo, Canada, pp. 1-, [16] Roing M., Implementing Elliptic Curve Cryptography, Manning, Greenwich, [17] Sklavo N. and Koufopavlou O., Mobile Communication World: Security Implementation Apect- A State of the Art, Computer Science Journal of Moldova, Intitute of Mathematic and Computer Science, vol. 1, no., 00. [18] Weimerkirch A., Paar C., and Shantz C. S., Elliptic Curve Cryptography on a Palm OS Device, in Proceeding of the 6 th Autralaian Conference on Information Security and Privacy (ACISP'001), LNCS 119, Macquarie Univerity, Sydney, Autralia, pp , 001. Eam Al-Daoud graduated from Mu tah Univerity in He continued hi mater tudy at Al Al- Bayt Univerity majoring in numerical analyi. He recieved hi PhD from Univerity Putra Malayia. Hi reearch interet are namely pare matrice and cryptoytem.

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation

Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Julio López 1 and Ricardo Dahab 2 1 Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Elliptic Curve Cryptography on a Palm OS Device

Elliptic Curve Cryptography on a Palm OS Device Elliptic Curve Cryptography on a Palm OS Device André Weimerskirch 1, Christof Paar 2, and Sheueling Chang Shantz 3 1 CS Department, Worcester Polytechnic Institute, USA weika@wpi.edu 2 ECE and CS Department,

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1

( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1 A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1 International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints

A Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Studying Software Implementations of Elliptic Curve Cryptography

Studying Software Implementations of Elliptic Curve Cryptography Studying Software Implementations of Elliptic Curve Cryptography Hai Yan and Zhijie Jerry Shi Department of Computer Science and Engineering, University of Connecticut Abstract Elliptic Curve Cryptography

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Generic GF(2 m ) Arithmetic in Software and its Application to ECC

Generic GF(2 m ) Arithmetic in Software and its Application to ECC Generic GF(2 m ) Arithmetic in Software and its Application to ECC André Weimerskirch 1, Douglas Stebila 2, and Sheueling Chang Shantz 3 1 Communication Security Group, Ruhr-Universität Bochum, Germany

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

Data Mining with Linguistic Thresholds

Data Mining with Linguistic Thresholds Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs

Integrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity

More information

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery

Mirror shape recovery from image curves and intrinsic parameters: Rotationally symmetric and conic mirrors. Abstract. 2. Mirror shape recovery Mirror hape recovery from image curve and intrinic parameter: Rotationally ymmetric and conic mirror Nuno Gonçalve and Helder Araújo Λ Intitute of Sytem and Robotic Univerity of Coimbra Pinhal de Marroco

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Dimitri Dimoulakis, Steve Jones, and Lee Haughton May 05 2000 Abstract. Elliptic curves can provide methods of encryption that, in some cases, are faster and use smaller keys

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption

Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar

More information

IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C.

IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C. ISSN 2320-9194 13 International Journal of Advance Research, IJOAR.org Volume 1, Issue 7, July 2013, Online: ISSN 2320-9194 IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

PROBLEM -1. where S. C basis x. 0, for entering

PROBLEM -1. where S. C basis x. 0, for entering ISSN: 77754 ISO 9:8 Certified Volume 4 Iue 8 February 5 Optimum Solution of Linear Programming Problem by New Method Putta aburao; Supriya N. Khobragade and N.W.Khobragade Department of Mathematic RTM

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images

Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images 2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

A User-Attention Based Focus Detection Framework and Its Applications

A User-Attention Based Focus Detection Framework and Its Applications A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information