Fast Elliptic Curve Algorithm of Embedded Mobile Equipment
|
|
- Ilene Washington
- 5 years ago
- Views:
Transcription
1 Send Orders for Reprints to 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian Chen and Yanglie Fu Shool of Computer Engineer, Huaihai Institute of Tehnology, Lianyungang, Jiangsu, China Abstrat: Seletion Algorithm and Generation Algorithm of ellipti urves have been the fous of researh and hotspot of the Ellipti Curve Cryptosystem. his paper disusses a random ellipti urve realization method of Embedded Mobile Equipment, the SEA algorithm and its improved algorithm from Ellipti Curve's seletion, Ellipti Curve's struture and Ellipti Curve's generation. Ensuring that the embedded system in the seurity situation goes through invariable situation auses the embedded system to realize a fast ellipti urve realization method, whih enhanes the effiieny of embedded system. Keywords: Ellipti urve ryptosystem, SEA, table, fast algorithm.. INTRODUCTION Embedded Mobile Equipment's proessor mostly is ARM9, Strong ARM or Xsale and so on. The proessor's proessing speed and the operational apability are limited. Most embedded mobile equipments offer many kinds of data aess methods, the use of Wi-Fi aess methods being more popular. But at present, in the Wi-Fi enryption algorithm whih is suited to the harateristis of embedded mobile equipment, omputing seure aess is less. The Ellipti Curve Cryptography publi key system is a more seure ryptosystem. However, the seletion and alulation of ellipti urves would be unbearable for embedded devies. The omplex regular operation, ombined with the harateristis of the embedded system, an use pre omputing and establish form to redue system's omputation load. At the same time, a simplified algorithm is used to improve system s operating effiieny. But the proessor speed of the textile mahine s ontroller and image reognition speed and auray determine whih of these senarios in real-world appliations are limited. In order to speed up the proessing speed, the use of high speed ARM proessor and the speialpurpose DSP hip, simultaneously makes the algorithm ahieve a better detetion. This artile disusses the weft detetion method from the perspetive of image reognition algorithms, and does not inlude the disussion on implementation in DSP proessor, ARM and DSP ontrol proess.. SELECTION OF ELLIPTIC CURVES Ellipti urve usually refers to a plane urve that satisfies the Weierstrass equation: y + a xy + a y = x + a x + a 4 x + a 6 ( *Address orrespondene to this author at the Shool of Computer Engineer, Huaihai Institute of Tehnology, Lianyungang, Jiangsu, China; Tel: ; Fax: ; zlh4@6.om In order to ensure the seleted seurity of ellipti urve, e should pay attention to the following question: ( In order to avoid the MOV [] algorithm attak, the seletion must be non-super singular ellipti urve; ( In order to avoid the SSAS [] algorithm attak, the seletion annot be the anomalous ellipti urve on the prime number field GF ( p ; ( Based on the Weil [] drop theory, the seletion of the harateristi of s Complex Domain is avoided and should be seleted p in domain GF( p of the ellipti urve as prime number. Based on the above seure request, there are two typial seurity ellipti urves. One is whose harateristi of finite field is prime, when q=p GF(q = GF(p, defined in the prime domain GF ( p, its Weierstrass equation is y = x + ax + b, a,b F ( The other is an ellipti urve whose finite field harateristi is, when q= n, and ellipti urves in the Binary finite field GF(q, its Weierstrass equation is y + xy = x + ax + a6, ( Note that here n is prime and n should be large enough to ounter the Weil desent algorithm, But these two kinds of urves have the shortoming of seletion diffiulty and running speed. At present, these problems are solved mainly through seletion of the appropriate or a prime order ellipti urve of prime order parameter in a limited parameter group of ellipti urves.. CONSTRUCTION OF LLIPTIC CURVES Constrution of an ellipti urve's method usually involves Random urve [4] and Complex Multipliation [] / 0 Bentham Open
2 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 9 (CM. Beause the CM method of onstruting ellipti urves has some additional harateristi, from the seurity angle, these harateristis are onsidered a potential threat, but the random urve is obtained ompletely randomly generated, that is onsidered the safer ellipti urve. To simplify the alulation of random ellipti urve, an isomorphi urve is onstruted in the same domain, and aording to the harateristis of the domain. In the prime field Fp, K is defined in the domain, harateristi p>, Eq. an be simplified as y = x + ax + b, a,b F, with = 4a + 7b mod, p 0 aquisition of the urve is mainly a finite group s Order alulation of an ellipti urve. In this aspet, there are many lassial algorithms, suh as the Shool algorithms, SEA algorithm, mold polynomial algorithm, Elkies algorithm, Atkin algorithm and so on. These algorithms in pratial appliations meeting the needs of the system bring lots of improvement. 4. ELLIPTIC CURVE GENERATING ALGORITHM On the preeding analysis, the seletion of a safe ellipti urve atually depends on how fast ellipti urve order is omputed. Among all the algorithms, SEA algorithm is the most representative, ombination of Elkies and Atkin brings improvements, and alulates the set of possible values, then the Chinese Remainder Theorem and Shank s Method(babystep giant-step,bsgs are used to alulate order. In the prime finite field Fq, the order is #E(Fq, the proess of the algorithm [6] is summarized as follows: Input :GF(q and E Output: #E (F(q ( l, E {(t mod,}, A {} ( for M = ; M < 4 p ompute f(q=gd( x p x, l (x, j(e if f(q Then Choose Elkies else Choose Atkin M M l get Prime l ( for (j=; j<=i; j++ M L j = ; y j = L j mod l j l j Compute t = t L y + tl y + L + ti Li yi (4 output #E F(q =q+l-t The main problem of the algorithm is the omplexity in the alulation of the l polynomial model and the division polynomial, at the same time seletion of the urve suess ratio is lower [7].. FAST GENERATING ALGORITHM In embedded systems, omputing speed of add and subtrat is faster than other operation. Multipliation mostly an omplete in the Single-yle, and supports 64-bit multiply. In order to adapt the harateristis of embedded systems, we need to improve the SEA algorithm. In above SEA algorithm desription, we will improve the alulation of ellipti urves in the order of finite groups, thus will enhane the effiieny of the system.. Improved Curve Seletion Algorithm After defining the finite domain GF(q, aording to the harateristis of embedded systems, it beomes appropriate to redue the safety requirements, request parameter q beomes greater than 60bit, its password strength is equivalent to 04bit RSA. Based on this, randomly generated parameter q, establishes the ellipti urve on this domain. Aording to the need of Generality of modular polynomials for solving #E(F(q in the SEA algorithm, onvert its definition [8], adopt the pretreatment method, and store the alulation results of polynomial model in the Flash or the main memory, and look-up table to obtain alulation results. Using these methods, the alulation time an be redued. If the randomly generated urve parameter does not meet the requirements, urve parameter needs to re-selet. So we need to set flag in the system, and alternately hange the parameters a and b. For example: when the flag is 0, hange the parameter a, then set flag to ; at next seletion, the flag is, hange the parameter b, then set flag to 0, and so on, avoid selet repeated parameters. Using these measures an improve the speed of the algorithm. The improved algorithm is as follows: Input: Random (a b Output: y = x + ax + b, a, b F ( Random (a b ( if E=Speial Curve Then return (step ( if Prime l then Elkies else Atkin (4 Compute t #E=q+l-t ( if non-prime #E if flag =0 hange a and flag return (step else hange b and flag 0 return (step else Output Curve Equation.. Improved Modulus Algorithm In the ellipti urve generating operation, the module omputing spends longer time than any other omputing. The module omputing speed an effetively improve the overall omputing effiieny of embedded systems, as mentioned above. The use of embedded memory look-up table method an save onsiderable omputing time. In eah enryption, deryption tasks, we establish a temporary table. Beause of memory omponent ost's redution, this plan's implementation possibly beomes gradual. Considering the Flash s reading speed, when forming initialization, we an map the form in the main memory (SDRAM or DDR to speed up the data s reading speed.
3 40 The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 Zhang et al. When finite field Fq is determined, Pre-ompute l mod p, the result stores in system's form, and then modulus gets ompleted and demands the same order-mode. Modular multipliation an be divided into two steps: quadrature and modulo. The modulus operator will be deomposed into n i i by the modulus, just for eah i whih is not equal 0, the model results an be aumulated the pre-omputed value l mod P,fill the pre-omputed values in the memory table, using for referene table. n Suppose X = x i Y i, x i #[0,Y ] n X [# x i Y i + (x n Y n mod M ] mod M (4 n M = m i Y i, m i #[0,Y ] ( Z j Z 0 j a = j Y a ( j mod M or z, j Y i (6 a = j Y a ( j mod M or z 0, j Y i (7 Where: j = (,,L,Y Z ( j is M s a + -order mode, reorded as Z, Z 0 ( j is M s a -order mode, reorded as Z 0 Aording to the above definition of X and M If x a < m a X mod M = X If x a = m a X M > X $ X mod M = # 0 M = X $ % X M M < X If x a > m a X mod M = # T M > T $ T M M < T a Where: T = x i Y i + Z 0 (x a. Fast modulus algorithm First onstrut M s a + -order and a -order mold table, in eah enryption and deryption of messages, built table should be ompleted before modulo operation, an build tables in the following order: (X n + Y mod N = [(X n mod N + Y ] mod N (8 (X n + X mod N = [(X n mod N + (X mod N] mod N (9 Then set X is N -bit Y -nary number, result of modulo is a A -bit Y - nary number, whih may be greater than M, and may also be less than M, the algorithm is as follows: Modular (X,M,Z for i=n- to a a i =x i x i =0 X = X + Y na Z x The final result is A -bit Y - nary number, and is stored in the X. Finally, take the same-modes to the results obtained in the previous step, the algorithm is as follows: Modular (X,M,T for i=n- to a- if x a < m a then X mod M = X x m if a = a then if M>X then X mod M=X if M=X then X mod M=0 if M<X then X mod M=X-M if x a > m a then if M>T then X mod M=T if M<T then X mod M=T-M. Modular inversion In the Modular inversion alulation, usually inverse operation is onverted to multipliation operation, whih redues the inverse frequeny to ahieve the purpose of improving the effiieny. In the field Fq, for the given points p (x,y and Q (x,y, the alulation of the size of P+Q omputation is partiularly important. In literature [9] pointed out: Assuming that (x, y = P, (x 4 = P + Q. Algorithm is as follows: = (x + / (y x = x x, y = (x x y (0 = ( y y /( x x x 4 = x x = (x x 4 y ( = (y 4 y / (x 4 x x, y ( = x x4 y = ( x x
4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 4 Introdution of ommon fator, is the,, denominator least ommon multiple number, and is known as term simplest formula. For ease of alulation, suppose A, A, A to separately express,, denominator, B, B, B to separately express,, numerator, obviously,, A, A, B, B is known,, A, B need to alulate. Assuming that = (A B + A B + (A B A B A (A A ( A = / (A A ( = B (A A / (4 Inverse operation to onvert the multipliation, that is to strike, through-type (8 ~ (0 alulated x,, from the above steps, Inverse items are the only ( y, whih is inverse from the times ( and and is redued to ( and then transformation and substitution B whih is in type (9, are obtained: = A A ( x x ( ( ( Transform equation (6, we an obtain x. x ( x + x + x (6 = + ( By alulating,,, and ( x, y, we an obtain ( x, y = P + Q, Omit (x 4 = P + Q, alulated to further redue, improved algorithms are as follows [0]: Input : P = ( x, y o and Q = (x, y o Output: P + Q = ( x, y Setp: if (y =0 then return P+Q if (x =x then if (y =y then return 4P else return P step: ompute,,, A y, B x + a A x - x, B y - y = # ( A B + A B + ( A B A B A ( A A = (A A = A B = A B = (A B (x x ( Step: ompute (x, y x = x, y = (x x y Step4: ompute (x, y x = ( + ( x + x + x, y = (x x y Step: result (x, y Known x F p gd(x, p = satisfies the equation xa = mod p s A F p whih is known as the inverse of the finite field, an be expressed as x mod p, the algorithm is as follows: step: step: step: b:=p;u 0 =0;u = while (b<>0 s:=x div b;r:=x mod b;u: =u 0 -s*;u x:=b; u 0 = u ; u =u if u 0 0 then return u 0 else return u 0 +p The algorithm desription of the atual realized should put modulo division after eah multipliation Operation is arried out. This may save more time, otherwise, the results of eah Exponentiation will beome more and more huge. We an use the following method to speed up the omputation speed. Input: m p x Output: x m mod p ( y=x ( for I=n ; I>=0 ; I y=y x m mod p ( result y.. Algorithm Effiieny Analysis In the embedded system platform to ahieve the ellipti urve alulation, we seleted the ARM9 family of proessors in the Samsung's SC40X, Xsale PXA 70, SC640 and SPV0, in the Linux operating system, C programming and embedded assembly mix programming situation. We ompared the omputing time of Optimizing by this method and not by look-up table, the onlusion is shown in the Table. Table. Effiieny table Algorithm SC40 PXA 70 SC640 SPV0 Look-up table optimization 687ms 7ms 0ms 7 ms Not look-up table 96ms 48ms 4ms 6 ms 6. CONCLUSIONS Implementation of ellipti urve ryptosystem has great diffiulty. This paper has arried on a more thorough om-
5 4 The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 Zhang et al. parison to the ellipti urve generating algorithm, proposing the use of pre-omputation. We use established in tabular form to simplify the system operation, and to improve the Modular Exponentiation Algorithm and redue the amount of modular multipliation alulation. We have proposed for embedded systems the ellipti urve algorithm. We have arried on the movement onfirmation on many kinds of embedded proessors. When designing embedded system, if we hoose with the DSP or FPGA o-proessing system and Optimize proedure realization, the operations beome more effiient. CONFLICT OF INTEREST The authors onfirm that this artile ontent has no onflits of interest. ACKNOWLEDGMENTS Delared none. REFERENCES [] Menezes, T. Okamoto and S. Vanstone, Reduing Ellipti Curve Logarithms to Logarithms in a Finite Field, IEEE Trans. Inform Theory vol. 9, no., , 99. [] N. Smart, The Disrete Logarithm Problem on Ellipti Curves of Trae One, J. Cryptol., vol., no., 9-96, 999. [] I. Garia-Selfa, A.O. Miguel, and J. M. Tomero, Computing the rational torsion of an ellipti urve using tate normal form, J. Number Theory vol. 96, no. l, pp , 00. [4] N. Koblitz, CM-Curve with Good Cryptographi Properties, Advanes in Cryptology Crypto 9 LNCS76, 99, Springer- Verlag, pp [] G. Lay and H. Zimmer, Construting Ellipti Curves With Given Group Order Over Large Finite Field, Algorithmi Number Theory: First International Symposium Leture Notes in Computer Siene (877 Springer-Verlag, pp. 0-6, 994. [6] X. Youan and L. Layuan, A New Quik Publi Key Crypto System Based on the Diffiulty of Fatoring Very Large Numbers, International Symposium on Distributed Computing and Appliations to Business Engineering and Siene DCABES 00, pp. 0-4, 00. [7] S. A. Vanstone and R. J. Zuherato, Ellipti urve ryptosystems using urves of smooth order the ringzn, IEEE Trans. Inform Theory vol. 4, no. 7, pp. -7, 997. [8] X. Youan, Researhes Ellipti Curve Publi Key Cryptosystems in Network Information Seurity, PhD thesis, WuHan University of Tehnology, 00. [9] M. Ciet, M. Joye, K. Lauter and L. M. Peter, Trading inversions for multipliations in ellipti urve ryptography, Des, Codes Cryptography, vol. 9, no., pp , 006. [0] L. Lian-hao and S. Yong, Fast algorithm for salar multipliation in ellipti urves ryptography, Appl Res Comput, vol. 6, no., pp , 009. Reeived: July 0, 0 Revised: July 07, 0 Aepted: July, 0 Zhang et al.; Liensee Bentham Open. This is an open aess artile liensed under the terms of the Creative Commons Attribution Non-Commerial Liense ( whih permits unrestrited, non-ommerial use, distribution and reprodution in any medium, provided the work is properly ited.
A {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationPartial Character Decoding for Improved Regular Expression Matching in FPGAs
Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationCross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer
Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationMulti-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks
Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationEstablishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments
Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,
More information13.1 Numerical Evaluation of Integrals Over One Dimension
13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationHigh Speed Area Efficient VLSI Architecture for DCT using Proposed CORDIC Algorithm
International Journal of Innovative Researh in Siene, Engineering and Tehnology Website: www.ijirset.om High Speed Area Effiient VLSI Arhiteture for DCT using Proposed CORDIC Algorithm Deepnarayan Sinha
More informationOptimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints
5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationTorpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control
orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial
More informationNEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1
International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationDefect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing
Defet Detetion and Classifiation in Cerami Plates Using Mahine Vision and Naïve Bayes Classifier for Computer Aided Manufaturing 1 Harpreet Singh, 2 Kulwinderpal Singh, 1 Researh Student, 2 Assistant Professor,
More informationManaging Handover Authentication in Big-domain Wireless Environment
Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan *1, Aiqun Hu *1,
More informationNumber Theory and Cryptography
Volume 114 No. 11 2017, 211-220 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Number Theory and Cryptography 1 S. Vasundhara 1 G.Narayanamma Institute
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationDetection of RF interference to GPS using day-to-day C/No differences
1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationAccommodations of QoS DiffServ Over IP and MPLS Networks
Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationPlot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar
Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationMATH STUDENT BOOK. 12th Grade Unit 6
MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE
More informationIMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C.
ISSN 2320-9194 13 International Journal of Advance Research, IJOAR.org Volume 1, Issue 7, July 2013, Online: ISSN 2320-9194 IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR
More informationPROJECT PERIODIC REPORT
FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise
More informationDesign of High Speed Mac Unit
Design of High Speed Ma Unit 1 Harish Babu N, 2 Rajeev Pankaj N 1 PG Student, 2 Assistant professor Shools of Eletronis Engineering, VIT University, Vellore -632014, TamilNadu, India. 1 harishharsha72@gmail.om,
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationCOST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY
COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary
More informationTransition Detection Using Hilbert Transform and Texture Features
Amerian Journal of Signal Proessing 1, (): 35-4 DOI: 1.593/.asp.1.6 Transition Detetion Using Hilbert Transform and Texture Features G. G. Lashmi Priya *, S. Domni Department of Computer Appliations, National
More informationSystem-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications
System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis
More informationBackground/Review on Numbers and Computers (lecture)
Bakground/Review on Numbers and Computers (leture) ICS312 Mahine-Level and Systems Programming Henri Casanova (henri@hawaii.edu) Numbers and Computers Throughout this ourse we will use binary and hexadeimal
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationROBUST LOW-ALTITUDE IMAGE MATCHING BASED ON LOCAL REGION CONSTRAINT AND FEATURE SIMILARITY CONFIDENCE
ROBUST LOW-ALTITUDE IMAGE MATCHING BASED ON LOCAL REGION CONSTRAINT AND FEATURE SIMILARITY CONFIDENCE Min Chen a, b,, *, Qing Zhu a, b,, Shengzhi Huang a, b,, Han Hu a, Jingxue Wang a a Faulty of Geosienes
More information特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing
デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper
More informationChapter 2: Introduction to Maple V
Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationColor Image Fusion for Concealed Weapon Detection
In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International
More informationSVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections
SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty
More informationBiometrics Modalities Introduction (2)
Biometris Modalities Introdution ( Why Fingerprints? Empirial Evidene Established Siene? Used in forensis to establish individual identity for over a entury Sotland Yard 1900; FBI 194 High Universality
More informationRobust Dynamic Provable Data Possession
Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)
More informationA RAY TRACING SIMULATION OF SOUND DIFFRACTION BASED ON ANALYTIC SECONDARY SOURCE MODEL
19th European Signal Proessing Conferene (EUSIPCO 211) Barelona, Spain, August 29 - September 2, 211 A RAY TRACING SIMULATION OF SOUND DIFFRACTION BASED ON ANALYTIC SECONDARY SOURCE MODEL Masashi Okada,
More informationCONSIDERING the high computational load of synthetic
IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 5, NO. 4, OCTOBER 2008 573 Doppler Keystone Transform: An Approah Suitable for Parallel Implementation of SAR Moving Target Imaging Gang Li, Member, IEEE,
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationSoftware Implementation of Tate Pairing over GF(2 m )
Software Implementation of Tate Pairing over GF(2 m ) G. Bertoni 1, L. Breveglieri 2, P. Fragneto 1, G. Pelosi 2 and L. Sportiello 1 ST Microelectronics 1, Politecnico di Milano 2 Via Olivetti, Agrate
More informationPerformance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification
erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationOlsonhhhi 7EAR RAGMENT OF DISCRETE PROCESSORSIJ) AIR FORCE INST OF AFS OH SCHOOL OF ENGI. D-A SI A T O OF FAULT TOLERANCE IN A HYPERCUBE i/i
D-A 1 6 2 SI A T O OF FAULT TOLERANCE IN A HYPERCUBE i/i 7EAR RAGMENT OF DISCRETE PROCESSORSIJ) AIR FORCE INST OF MU WRIGHT-PATTERSON ITECH AFS OH SCHOOL OF ENGI UNCLASSIFIED G. ZILBERSTEIIN DEC.87 AFIT/GSO/ENG/87D-i
More informationFast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation
Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Julio López 1 and Ricardo Dahab 2 1 Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158
Enhancing The Security Of Koblitz s Method Using Transposition Techniques For Elliptic Curve Cryptography Santoshi Pote Electronics and Communication Engineering, Asso.Professor, SNDT Women s University,
More informationHIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in
FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan
More informationHigh-level synthesis under I/O Timing and Memory constraints
Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,
More informationRAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationMeasurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method
Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH
More informationA SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS
A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationDirect-Mapped Caches
A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.
More informationThe recursive decoupling method for solving tridiagonal linear systems
Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More information- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.
- 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?
More informationPrime Field over Elliptic Curve Cryptography for Secured Message Transaction
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationXML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst
XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl
More informationDrawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;
Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;
More information1. Introduction. 2. The Probable Stope Algorithm
1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground
More informationMake your process world
Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,
More informationPROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS
Proeedings of ASE Turbo Expo 2 Power for Land, Sea, and Air June 16 19, 2, Atlanta, Georgia, USA GT2-871 PROBABILISTIC SURFACE DAAGE TOLERANCE ASSESSENT OF AIRCRAFT TURBINE ROTORS ihael P. Enright R. Craig
More informationAdobe Certified Associate
Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals
More informationFinding the Equation of a Straight Line
Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related
More informationCA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5
Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer
More informationKey Management and Distribution
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More information