Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Size: px
Start display at page:

Download "Fast Elliptic Curve Algorithm of Embedded Mobile Equipment"

Transcription

1 Send Orders for Reprints to 8 The Open Eletrial & Eletroni Engineering Journal, 0, 7, 8-4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment Open Aess Lihong Zhang *, Shuqian Chen and Yanglie Fu Shool of Computer Engineer, Huaihai Institute of Tehnology, Lianyungang, Jiangsu, China Abstrat: Seletion Algorithm and Generation Algorithm of ellipti urves have been the fous of researh and hotspot of the Ellipti Curve Cryptosystem. his paper disusses a random ellipti urve realization method of Embedded Mobile Equipment, the SEA algorithm and its improved algorithm from Ellipti Curve's seletion, Ellipti Curve's struture and Ellipti Curve's generation. Ensuring that the embedded system in the seurity situation goes through invariable situation auses the embedded system to realize a fast ellipti urve realization method, whih enhanes the effiieny of embedded system. Keywords: Ellipti urve ryptosystem, SEA, table, fast algorithm.. INTRODUCTION Embedded Mobile Equipment's proessor mostly is ARM9, Strong ARM or Xsale and so on. The proessor's proessing speed and the operational apability are limited. Most embedded mobile equipments offer many kinds of data aess methods, the use of Wi-Fi aess methods being more popular. But at present, in the Wi-Fi enryption algorithm whih is suited to the harateristis of embedded mobile equipment, omputing seure aess is less. The Ellipti Curve Cryptography publi key system is a more seure ryptosystem. However, the seletion and alulation of ellipti urves would be unbearable for embedded devies. The omplex regular operation, ombined with the harateristis of the embedded system, an use pre omputing and establish form to redue system's omputation load. At the same time, a simplified algorithm is used to improve system s operating effiieny. But the proessor speed of the textile mahine s ontroller and image reognition speed and auray determine whih of these senarios in real-world appliations are limited. In order to speed up the proessing speed, the use of high speed ARM proessor and the speialpurpose DSP hip, simultaneously makes the algorithm ahieve a better detetion. This artile disusses the weft detetion method from the perspetive of image reognition algorithms, and does not inlude the disussion on implementation in DSP proessor, ARM and DSP ontrol proess.. SELECTION OF ELLIPTIC CURVES Ellipti urve usually refers to a plane urve that satisfies the Weierstrass equation: y + a xy + a y = x + a x + a 4 x + a 6 ( *Address orrespondene to this author at the Shool of Computer Engineer, Huaihai Institute of Tehnology, Lianyungang, Jiangsu, China; Tel: ; Fax: ; zlh4@6.om In order to ensure the seleted seurity of ellipti urve, e should pay attention to the following question: ( In order to avoid the MOV [] algorithm attak, the seletion must be non-super singular ellipti urve; ( In order to avoid the SSAS [] algorithm attak, the seletion annot be the anomalous ellipti urve on the prime number field GF ( p ; ( Based on the Weil [] drop theory, the seletion of the harateristi of s Complex Domain is avoided and should be seleted p in domain GF( p of the ellipti urve as prime number. Based on the above seure request, there are two typial seurity ellipti urves. One is whose harateristi of finite field is prime, when q=p GF(q = GF(p, defined in the prime domain GF ( p, its Weierstrass equation is y = x + ax + b, a,b F ( The other is an ellipti urve whose finite field harateristi is, when q= n, and ellipti urves in the Binary finite field GF(q, its Weierstrass equation is y + xy = x + ax + a6, ( Note that here n is prime and n should be large enough to ounter the Weil desent algorithm, But these two kinds of urves have the shortoming of seletion diffiulty and running speed. At present, these problems are solved mainly through seletion of the appropriate or a prime order ellipti urve of prime order parameter in a limited parameter group of ellipti urves.. CONSTRUCTION OF LLIPTIC CURVES Constrution of an ellipti urve's method usually involves Random urve [4] and Complex Multipliation [] / 0 Bentham Open

2 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 9 (CM. Beause the CM method of onstruting ellipti urves has some additional harateristi, from the seurity angle, these harateristis are onsidered a potential threat, but the random urve is obtained ompletely randomly generated, that is onsidered the safer ellipti urve. To simplify the alulation of random ellipti urve, an isomorphi urve is onstruted in the same domain, and aording to the harateristis of the domain. In the prime field Fp, K is defined in the domain, harateristi p>, Eq. an be simplified as y = x + ax + b, a,b F, with = 4a + 7b mod, p 0 aquisition of the urve is mainly a finite group s Order alulation of an ellipti urve. In this aspet, there are many lassial algorithms, suh as the Shool algorithms, SEA algorithm, mold polynomial algorithm, Elkies algorithm, Atkin algorithm and so on. These algorithms in pratial appliations meeting the needs of the system bring lots of improvement. 4. ELLIPTIC CURVE GENERATING ALGORITHM On the preeding analysis, the seletion of a safe ellipti urve atually depends on how fast ellipti urve order is omputed. Among all the algorithms, SEA algorithm is the most representative, ombination of Elkies and Atkin brings improvements, and alulates the set of possible values, then the Chinese Remainder Theorem and Shank s Method(babystep giant-step,bsgs are used to alulate order. In the prime finite field Fq, the order is #E(Fq, the proess of the algorithm [6] is summarized as follows: Input :GF(q and E Output: #E (F(q ( l, E {(t mod,}, A {} ( for M = ; M < 4 p ompute f(q=gd( x p x, l (x, j(e if f(q Then Choose Elkies else Choose Atkin M M l get Prime l ( for (j=; j<=i; j++ M L j = ; y j = L j mod l j l j Compute t = t L y + tl y + L + ti Li yi (4 output #E F(q =q+l-t The main problem of the algorithm is the omplexity in the alulation of the l polynomial model and the division polynomial, at the same time seletion of the urve suess ratio is lower [7].. FAST GENERATING ALGORITHM In embedded systems, omputing speed of add and subtrat is faster than other operation. Multipliation mostly an omplete in the Single-yle, and supports 64-bit multiply. In order to adapt the harateristis of embedded systems, we need to improve the SEA algorithm. In above SEA algorithm desription, we will improve the alulation of ellipti urves in the order of finite groups, thus will enhane the effiieny of the system.. Improved Curve Seletion Algorithm After defining the finite domain GF(q, aording to the harateristis of embedded systems, it beomes appropriate to redue the safety requirements, request parameter q beomes greater than 60bit, its password strength is equivalent to 04bit RSA. Based on this, randomly generated parameter q, establishes the ellipti urve on this domain. Aording to the need of Generality of modular polynomials for solving #E(F(q in the SEA algorithm, onvert its definition [8], adopt the pretreatment method, and store the alulation results of polynomial model in the Flash or the main memory, and look-up table to obtain alulation results. Using these methods, the alulation time an be redued. If the randomly generated urve parameter does not meet the requirements, urve parameter needs to re-selet. So we need to set flag in the system, and alternately hange the parameters a and b. For example: when the flag is 0, hange the parameter a, then set flag to ; at next seletion, the flag is, hange the parameter b, then set flag to 0, and so on, avoid selet repeated parameters. Using these measures an improve the speed of the algorithm. The improved algorithm is as follows: Input: Random (a b Output: y = x + ax + b, a, b F ( Random (a b ( if E=Speial Curve Then return (step ( if Prime l then Elkies else Atkin (4 Compute t #E=q+l-t ( if non-prime #E if flag =0 hange a and flag return (step else hange b and flag 0 return (step else Output Curve Equation.. Improved Modulus Algorithm In the ellipti urve generating operation, the module omputing spends longer time than any other omputing. The module omputing speed an effetively improve the overall omputing effiieny of embedded systems, as mentioned above. The use of embedded memory look-up table method an save onsiderable omputing time. In eah enryption, deryption tasks, we establish a temporary table. Beause of memory omponent ost's redution, this plan's implementation possibly beomes gradual. Considering the Flash s reading speed, when forming initialization, we an map the form in the main memory (SDRAM or DDR to speed up the data s reading speed.

3 40 The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 Zhang et al. When finite field Fq is determined, Pre-ompute l mod p, the result stores in system's form, and then modulus gets ompleted and demands the same order-mode. Modular multipliation an be divided into two steps: quadrature and modulo. The modulus operator will be deomposed into n i i by the modulus, just for eah i whih is not equal 0, the model results an be aumulated the pre-omputed value l mod P,fill the pre-omputed values in the memory table, using for referene table. n Suppose X = x i Y i, x i #[0,Y ] n X [# x i Y i + (x n Y n mod M ] mod M (4 n M = m i Y i, m i #[0,Y ] ( Z j Z 0 j a = j Y a ( j mod M or z, j Y i (6 a = j Y a ( j mod M or z 0, j Y i (7 Where: j = (,,L,Y Z ( j is M s a + -order mode, reorded as Z, Z 0 ( j is M s a -order mode, reorded as Z 0 Aording to the above definition of X and M If x a < m a X mod M = X If x a = m a X M > X $ X mod M = # 0 M = X $ % X M M < X If x a > m a X mod M = # T M > T $ T M M < T a Where: T = x i Y i + Z 0 (x a. Fast modulus algorithm First onstrut M s a + -order and a -order mold table, in eah enryption and deryption of messages, built table should be ompleted before modulo operation, an build tables in the following order: (X n + Y mod N = [(X n mod N + Y ] mod N (8 (X n + X mod N = [(X n mod N + (X mod N] mod N (9 Then set X is N -bit Y -nary number, result of modulo is a A -bit Y - nary number, whih may be greater than M, and may also be less than M, the algorithm is as follows: Modular (X,M,Z for i=n- to a a i =x i x i =0 X = X + Y na Z x The final result is A -bit Y - nary number, and is stored in the X. Finally, take the same-modes to the results obtained in the previous step, the algorithm is as follows: Modular (X,M,T for i=n- to a- if x a < m a then X mod M = X x m if a = a then if M>X then X mod M=X if M=X then X mod M=0 if M<X then X mod M=X-M if x a > m a then if M>T then X mod M=T if M<T then X mod M=T-M. Modular inversion In the Modular inversion alulation, usually inverse operation is onverted to multipliation operation, whih redues the inverse frequeny to ahieve the purpose of improving the effiieny. In the field Fq, for the given points p (x,y and Q (x,y, the alulation of the size of P+Q omputation is partiularly important. In literature [9] pointed out: Assuming that (x, y = P, (x 4 = P + Q. Algorithm is as follows: = (x + / (y x = x x, y = (x x y (0 = ( y y /( x x x 4 = x x = (x x 4 y ( = (y 4 y / (x 4 x x, y ( = x x4 y = ( x x

4 Fast Ellipti Curve Algorithm of Embedded Mobile Equipment The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 4 Introdution of ommon fator, is the,, denominator least ommon multiple number, and is known as term simplest formula. For ease of alulation, suppose A, A, A to separately express,, denominator, B, B, B to separately express,, numerator, obviously,, A, A, B, B is known,, A, B need to alulate. Assuming that = (A B + A B + (A B A B A (A A ( A = / (A A ( = B (A A / (4 Inverse operation to onvert the multipliation, that is to strike, through-type (8 ~ (0 alulated x,, from the above steps, Inverse items are the only ( y, whih is inverse from the times ( and and is redued to ( and then transformation and substitution B whih is in type (9, are obtained: = A A ( x x ( ( ( Transform equation (6, we an obtain x. x ( x + x + x (6 = + ( By alulating,,, and ( x, y, we an obtain ( x, y = P + Q, Omit (x 4 = P + Q, alulated to further redue, improved algorithms are as follows [0]: Input : P = ( x, y o and Q = (x, y o Output: P + Q = ( x, y Setp: if (y =0 then return P+Q if (x =x then if (y =y then return 4P else return P step: ompute,,, A y, B x + a A x - x, B y - y = # ( A B + A B + ( A B A B A ( A A = (A A = A B = A B = (A B (x x ( Step: ompute (x, y x = x, y = (x x y Step4: ompute (x, y x = ( + ( x + x + x, y = (x x y Step: result (x, y Known x F p gd(x, p = satisfies the equation xa = mod p s A F p whih is known as the inverse of the finite field, an be expressed as x mod p, the algorithm is as follows: step: step: step: b:=p;u 0 =0;u = while (b<>0 s:=x div b;r:=x mod b;u: =u 0 -s*;u x:=b; u 0 = u ; u =u if u 0 0 then return u 0 else return u 0 +p The algorithm desription of the atual realized should put modulo division after eah multipliation Operation is arried out. This may save more time, otherwise, the results of eah Exponentiation will beome more and more huge. We an use the following method to speed up the omputation speed. Input: m p x Output: x m mod p ( y=x ( for I=n ; I>=0 ; I y=y x m mod p ( result y.. Algorithm Effiieny Analysis In the embedded system platform to ahieve the ellipti urve alulation, we seleted the ARM9 family of proessors in the Samsung's SC40X, Xsale PXA 70, SC640 and SPV0, in the Linux operating system, C programming and embedded assembly mix programming situation. We ompared the omputing time of Optimizing by this method and not by look-up table, the onlusion is shown in the Table. Table. Effiieny table Algorithm SC40 PXA 70 SC640 SPV0 Look-up table optimization 687ms 7ms 0ms 7 ms Not look-up table 96ms 48ms 4ms 6 ms 6. CONCLUSIONS Implementation of ellipti urve ryptosystem has great diffiulty. This paper has arried on a more thorough om-

5 4 The Open Eletrial & Eletroni Engineering Journal, 0, Volume 7 Zhang et al. parison to the ellipti urve generating algorithm, proposing the use of pre-omputation. We use established in tabular form to simplify the system operation, and to improve the Modular Exponentiation Algorithm and redue the amount of modular multipliation alulation. We have proposed for embedded systems the ellipti urve algorithm. We have arried on the movement onfirmation on many kinds of embedded proessors. When designing embedded system, if we hoose with the DSP or FPGA o-proessing system and Optimize proedure realization, the operations beome more effiient. CONFLICT OF INTEREST The authors onfirm that this artile ontent has no onflits of interest. ACKNOWLEDGMENTS Delared none. REFERENCES [] Menezes, T. Okamoto and S. Vanstone, Reduing Ellipti Curve Logarithms to Logarithms in a Finite Field, IEEE Trans. Inform Theory vol. 9, no., , 99. [] N. Smart, The Disrete Logarithm Problem on Ellipti Curves of Trae One, J. Cryptol., vol., no., 9-96, 999. [] I. Garia-Selfa, A.O. Miguel, and J. M. Tomero, Computing the rational torsion of an ellipti urve using tate normal form, J. Number Theory vol. 96, no. l, pp , 00. [4] N. Koblitz, CM-Curve with Good Cryptographi Properties, Advanes in Cryptology Crypto 9 LNCS76, 99, Springer- Verlag, pp [] G. Lay and H. Zimmer, Construting Ellipti Curves With Given Group Order Over Large Finite Field, Algorithmi Number Theory: First International Symposium Leture Notes in Computer Siene (877 Springer-Verlag, pp. 0-6, 994. [6] X. Youan and L. Layuan, A New Quik Publi Key Crypto System Based on the Diffiulty of Fatoring Very Large Numbers, International Symposium on Distributed Computing and Appliations to Business Engineering and Siene DCABES 00, pp. 0-4, 00. [7] S. A. Vanstone and R. J. Zuherato, Ellipti urve ryptosystems using urves of smooth order the ringzn, IEEE Trans. Inform Theory vol. 4, no. 7, pp. -7, 997. [8] X. Youan, Researhes Ellipti Curve Publi Key Cryptosystems in Network Information Seurity, PhD thesis, WuHan University of Tehnology, 00. [9] M. Ciet, M. Joye, K. Lauter and L. M. Peter, Trading inversions for multipliations in ellipti urve ryptography, Des, Codes Cryptography, vol. 9, no., pp , 006. [0] L. Lian-hao and S. Yong, Fast algorithm for salar multipliation in ellipti urves ryptography, Appl Res Comput, vol. 6, no., pp , 009. Reeived: July 0, 0 Revised: July 07, 0 Aepted: July, 0 Zhang et al.; Liensee Bentham Open. This is an open aess artile liensed under the terms of the Creative Commons Attribution Non-Commerial Liense ( whih permits unrestrited, non-ommerial use, distribution and reprodution in any medium, provided the work is properly ited.

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

High Speed Area Efficient VLSI Architecture for DCT using Proposed CORDIC Algorithm

High Speed Area Efficient VLSI Architecture for DCT using Proposed CORDIC Algorithm International Journal of Innovative Researh in Siene, Engineering and Tehnology Website: www.ijirset.om High Speed Area Effiient VLSI Arhiteture for DCT using Proposed CORDIC Algorithm Deepnarayan Sinha

More information

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints 5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Torpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control

Torpedo Trajectory Visual Simulation Based on Nonlinear Backstepping Control orpedo rajetory Visual Simulation Based on Nonlinear Bakstepping Control Peng Hai-jun 1, Li Hui-zhou Chen Ye 1, 1. Depart. of Weaponry Eng, Naval Univ. of Engineering, Wuhan 400, China. Depart. of Aeronautial

More information

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1

NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1 International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing Defet Detetion and Classifiation in Cerami Plates Using Mahine Vision and Naïve Bayes Classifier for Computer Aided Manufaturing 1 Harpreet Singh, 2 Kulwinderpal Singh, 1 Researh Student, 2 Assistant Professor,

More information

Managing Handover Authentication in Big-domain Wireless Environment

Managing Handover Authentication in Big-domain Wireless Environment Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan, Aiqun Hu, Juan Zhang Managing Handover Authentiation in Big-domain Wireless Environment Changsheng Wan *1, Aiqun Hu *1,

More information

Number Theory and Cryptography

Number Theory and Cryptography Volume 114 No. 11 2017, 211-220 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Number Theory and Cryptography 1 S. Vasundhara 1 G.Narayanamma Institute

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else

timestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else 3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C.

IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR 1Prof. Renuka H. Korti, 2Dr. Vijaya C. ISSN 2320-9194 13 International Journal of Advance Research, IJOAR.org Volume 1, Issue 7, July 2013, Online: ISSN 2320-9194 IMPLEMENTATION OF ELLIPTIC CURVE POINT MULTIPLICATION ALGORITHM USING DSP PROCESSOR

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Design of High Speed Mac Unit

Design of High Speed Mac Unit Design of High Speed Ma Unit 1 Harish Babu N, 2 Rajeev Pankaj N 1 PG Student, 2 Assistant professor Shools of Eletronis Engineering, VIT University, Vellore -632014, TamilNadu, India. 1 harishharsha72@gmail.om,

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Transition Detection Using Hilbert Transform and Texture Features

Transition Detection Using Hilbert Transform and Texture Features Amerian Journal of Signal Proessing 1, (): 35-4 DOI: 1.593/.asp.1.6 Transition Detetion Using Hilbert Transform and Texture Features G. G. Lashmi Priya *, S. Domni Department of Computer Appliations, National

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Background/Review on Numbers and Computers (lecture)

Background/Review on Numbers and Computers (lecture) Bakground/Review on Numbers and Computers (leture) ICS312 Mahine-Level and Systems Programming Henri Casanova (henri@hawaii.edu) Numbers and Computers Throughout this ourse we will use binary and hexadeimal

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

ROBUST LOW-ALTITUDE IMAGE MATCHING BASED ON LOCAL REGION CONSTRAINT AND FEATURE SIMILARITY CONFIDENCE

ROBUST LOW-ALTITUDE IMAGE MATCHING BASED ON LOCAL REGION CONSTRAINT AND FEATURE SIMILARITY CONFIDENCE ROBUST LOW-ALTITUDE IMAGE MATCHING BASED ON LOCAL REGION CONSTRAINT AND FEATURE SIMILARITY CONFIDENCE Min Chen a, b,, *, Qing Zhu a, b,, Shengzhi Huang a, b,, Han Hu a, Jingxue Wang a a Faulty of Geosienes

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Color Image Fusion for Concealed Weapon Detection

Color Image Fusion for Concealed Weapon Detection In: E.M. Carapezza (Ed.), Sensors, and ommand, ontrol, ommuniations, and intelligene (C3I) tehnologies for homeland defense and law enforement II, SPIE-571 (pp. 372-379). Bellingham, WA., USA: The International

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Biometrics Modalities Introduction (2)

Biometrics Modalities Introduction (2) Biometris Modalities Introdution ( Why Fingerprints? Empirial Evidene Established Siene? Used in forensis to establish individual identity for over a entury Sotland Yard 1900; FBI 194 High Universality

More information

Robust Dynamic Provable Data Possession

Robust Dynamic Provable Data Possession Robust Dynami Provable Data Possession Bo Chen Reza Curtmola Department of Computer Siene New Jersey Institute of Tehnology Newark, USA Email: b47@njit.edu, rix@njit.edu Abstrat Remote Data Cheking (RDC)

More information

A RAY TRACING SIMULATION OF SOUND DIFFRACTION BASED ON ANALYTIC SECONDARY SOURCE MODEL

A RAY TRACING SIMULATION OF SOUND DIFFRACTION BASED ON ANALYTIC SECONDARY SOURCE MODEL 19th European Signal Proessing Conferene (EUSIPCO 211) Barelona, Spain, August 29 - September 2, 211 A RAY TRACING SIMULATION OF SOUND DIFFRACTION BASED ON ANALYTIC SECONDARY SOURCE MODEL Masashi Okada,

More information

CONSIDERING the high computational load of synthetic

CONSIDERING the high computational load of synthetic IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 5, NO. 4, OCTOBER 2008 573 Doppler Keystone Transform: An Approah Suitable for Parallel Implementation of SAR Moving Target Imaging Gang Li, Member, IEEE,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

The Application of Elliptic Curves Cryptography in Embedded Systems

The Application of Elliptic Curves Cryptography in Embedded Systems The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Software Implementation of Tate Pairing over GF(2 m )

Software Implementation of Tate Pairing over GF(2 m ) Software Implementation of Tate Pairing over GF(2 m ) G. Bertoni 1, L. Breveglieri 2, P. Fragneto 1, G. Pelosi 2 and L. Sportiello 1 ST Microelectronics 1, Politecnico di Milano 2 Via Olivetti, Agrate

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Olsonhhhi 7EAR RAGMENT OF DISCRETE PROCESSORSIJ) AIR FORCE INST OF AFS OH SCHOOL OF ENGI. D-A SI A T O OF FAULT TOLERANCE IN A HYPERCUBE i/i

Olsonhhhi 7EAR RAGMENT OF DISCRETE PROCESSORSIJ) AIR FORCE INST OF AFS OH SCHOOL OF ENGI. D-A SI A T O OF FAULT TOLERANCE IN A HYPERCUBE i/i D-A 1 6 2 SI A T O OF FAULT TOLERANCE IN A HYPERCUBE i/i 7EAR RAGMENT OF DISCRETE PROCESSORSIJ) AIR FORCE INST OF MU WRIGHT-PATTERSON ITECH AFS OH SCHOOL OF ENGI UNCLASSIFIED G. ZILBERSTEIIN DEC.87 AFIT/GSO/ENG/87D-i

More information

Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation

Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Fast Multiplication on Elliptic Curves over GF (2 m ) without Precomputation Julio López 1 and Ricardo Dahab 2 1 Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158 Enhancing The Security Of Koblitz s Method Using Transposition Techniques For Elliptic Curve Cryptography Santoshi Pote Electronics and Communication Engineering, Asso.Professor, SNDT Women s University,

More information

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in

HIGHER ORDER full-wave three-dimensional (3-D) large-domain techniques in FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 21, no. 2, August 2008, 209-220 Comparison of Higher Order FEM and MoM/SIE Approahes in Analyses of Closed- and Open-Region Eletromagneti Problems Milan

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH

More information

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

PROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS

PROBABILISTIC SURFACE DAMAGE TOLERANCE ASSESSMENT OF AIRCRAFT TURBINE ROTORS Proeedings of ASE Turbo Expo 2 Power for Land, Sea, and Air June 16 19, 2, Atlanta, Georgia, USA GT2-871 PROBABILISTIC SURFACE DAAGE TOLERANCE ASSESSENT OF AIRCRAFT TURBINE ROTORS ihael P. Enright R. Craig

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Finding the Equation of a Straight Line

Finding the Equation of a Straight Line Finding the Equation of a Straight Line You should have, before now, ome aross the equation of a straight line, perhaps at shool. Engineers use this equation to help determine how one quantity is related

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Key Management and Distribution

Key Management and Distribution CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 10 Key Management; Other Public Key Cryptosystems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information