A Flexible Auditing Mechanism for Storages in Cloud Computing
|
|
- Erin Wilkinson
- 5 years ago
- Views:
Transcription
1 ISSN (Onlne : ISSN (Prnt : Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology Volume 3, Specal Issue 3, March Internatonal Conference on Innovatons n Engneerng and Technology (ICIET 14 On 21 st & 22 nd March Organzed by K.L.N. College of Engneerng, Madura, Taml Nadu, Inda A Flexble Audtng Mechansm for Storages n Cloud Computng Saranya C, Vnoth P PG Scholar, Dept of Computer Scence Engneerng, Mepco Schlenk Engneerng, College Svakas, Inda. Assstant Professor, Dept of Computer Scence Engneerng, Mepco Schlenk Engneerng, College Svakas, Inda. Abstract-In recent years, Cloud Computng has acheved greater heghts. Cloud storage s more preferable than normal local storage, as when we use global nternet based storage, t s easy to use wherever we go. But these cloud nfrastructures are prone to threats lke Cloud Servce Provder may behave unfathful towards the users data and also users may faulty perform mproper operatons that leads to loss of data. The soluton for the above problem s that a Flexble Audtng Mechansm was proposed whch allows a Thrd Party Audtor (TPA to verfy the ntegrty of data stored n the cloud.it uses the fragment structure and secure tag generaton method for perodc samplng audt process.it also supports audt for dynamc operatons. Ths audt servce can provde publc audtablty wthout downloadng raw data and protect prvacy of the data. Therefore, through ths audt system the dynamc data operatons and tmely anomaly detecton can be supported at low storage and communcaton cost. The next ssue s that the cloud servce provder would behave unfathful towards the cloud data. They may dscard the data that are rarely accessed or not accessed to save storage space and clam that the owner s data are correctly stored n the cloud. The other ssue s that users may perform mproper operatons that s they may accdently delete the data and clam the cloud servce provder s responsble for the data loss. So, t s necessary for the servce provder to have a flexble audtng servce to check the correctness of the data stored n the cloud. Audt nvolves the trackng of all actvtes that ncludes data accesses, securty volatons, and attacks and so on. However, tradtonal cryptographc schemes lack to support ntegrty verfcaton wthout the local copy of the data. If the audt servces are desgned to download the whole data whch ncurs storage and communcaton cost. Ths stuaton should be managed so, the man obectves of the flexble audtng servces are: Keywords-Storage Audtng, data ntegrty, cloud storage systems. I.INTRODUCTION Effcent Audtablty. To have a thrd party audtor (TPA to verfy the correctness of the data wthout downloadng the whole data. Dynamc Audtablty. To support audtng for dynamc operatons done by the user. Perodc detecton of errors and losses. To perform a perodc samplng audt on the data stored n the cloud. Forensc Evdences. To provde forensc evdences for the anomales those occur n the cloud. Lghtweght Audt Tasks. Cloud computng s an upcomng technology where the computng resources are shared across nternet for usage, that s we can pay as we use. There s no need for any local storage.the storage n clouds has become a popular way of storng and mantanng the data. The ntegrty of stored data should be preserved. But cloud nfrastructures are prone to threats. These threats can be nternal threat, caused by vrtual machne falure or external threat, caused by system holes. Ths damages the ntegrty of data. M.R. Thansekhar and N. Bala (Eds.: ICIET
2 To ncur the less cost computaton audt tasks. A Flexble Audtng Mechansm for Storages n Cloud Computng To acheve these obectves, a flexble audtng servce was ntroduced to provde effcent ntegrty verfcaton. Ths audt system supports dynamc data operatons and tmely anomaly detecton. The technques used are fragment structure, random samplng and ndex-hash table. The rest of the paper s organzed as follows: Secton 2 descrbes the research background and related work. Secton 3 descrbes the audt system archtecture and the technques used. Secton 4 descrbes the defnton and the algorthms. Secton 5, we present the performance of the expermental results. Fnally, we conclude the paper n Secton 6. II.BACKGROUND AND RELATED WORK Tradtonal schemes based on the hash functons and sgnature methods can t work wthout downloadng the whole data. That results n expensve communcaton especally for large-sze fles. As the work of audtng the cloud data are really expensve and complex. Ths audtng work of verfyng the correctness of the data s moved from cloud servce provder (CSP to the thrd party audtor (TPA.TPA has the capablty for perodcally audtng the data.ths servce gves data assurance and acts as a dgtal forenscs. Many researchers proposed new notatons for publc audtablty lke the notons of proof of retrevablty (POR[2] and PDP[5]. Anyone can use these schemes to prove the correctness of the data and offer a publcly accessble remote nterface to check large amount of data. Some audt servces solutons are there. Xe et al. [10] proposed a content comparablty method but t s not sutable for rregular data. Wang et al. [11] proposed a prvacy preservng property for outsourced data. In ths scheme, a fle s drectly splt nto n blocks and a verfcaton tag s generated for each block. Here, the sze of the block s equal to the cryptosystem.for,160 bts whch s 20 bytes. That s,1m bytes fle s splt nto 50,000 blocks and generates 50,000 tags, ths storage of tags s 1M bytes. So, t s neffcent to construct a system usng ths scheme. To overcome ths problem, a fragment structure technque s used to reduce the extra storage. Usng ths scheme, the data can be dynamcally updated by the clents. The block operatons lke modfcaton, deleton and nserton. Fg. 1.Archtecture of Cloud Audt Servce. In the exstng schemes, securty ssues arse a lot. Hence, to develop a secure mechansm for dynamc audt servces, a flexble scheme s requred. III.ARCHITECTURE AND TECHNIQUES Audt system archtecture for outsourced data n clouds s shown n Fg. 1.Ths archtecture the audt archtecture conssts of fve enttes. Cloud Servce Provder(CSP CSP provdes data storage servce and has enough storage space and computaton resources. Authentcated Applcatons(AA AA has the rght to access and manpulate the stored data Data Owner (DO DO have a large amount of data to be stored n the cloud. Thrd Party Audtor(TPA TPA has capabltes to manage or montor the outsourced data under the delegaton of DO. Applcaton User s Cloud User s enoy varous cloud applcaton servces va the AA s. TPA s relable and ndepent through the followng audt functons: TPA should be able to make regular checks on the ntegrty and avalablty of the delegated data at approprate ntervals. TPA should be able to organze, manage, and mantan the outsourced data nstead of DO TPA support dynamc data operatons for AAs. TPA should be able to take the evdences for dsputes about the nconsstency of M.R. Thansekhar and N. Bala (Eds.: ICIET
3 data n terms of authentc records for all data operatons. A Flexble Audtng Mechansm for Storages n Cloud Computng To acheve these functons, our audt servces has 3 processes: Tag Generaton And User s Verfcaton: The clent (DO uses a secret key s k to preprocess a fle, whch conssts of a collecton of n blocks, generates a set of publc verfcaton parameters (PVP s and IHT that are stored n TPA, transmts the fle and some verfcaton tags to CSP, and may delete ts local copy(see Fg.2a; Perodc Samplng Audt: By usng an nteractve proof protocol of retrevablty, TPA ssues a random samplng challenge to audt the ntegrty and avalablty of the outsourced data n terms of verfcaton nformaton (nvolvng PVP and IHT stored n TPA(see Fg. 2b;and Audt For Dynamc Data Operatons: An AA, who holds a DO s secret key λ, can manpulate the outsourced data and update the assocated IHT stored n TPA. The prvacy of λ and the checkng algorthm ensure that the storage server cannot cheat the AAs and forge the vald audt records(see Fg. 2c; The Authorzed Applcaton s provdes the cloud applcaton servces, must be authorzed by the DOs. Therefore, any AAs must gve TPA the authorzed nformaton to perform the dynamc operatons on the data. If any unauthorzed applcatons occur then the audtng servce should detect t. So, ths s a strong authentcaton-verfcaton mechansm. (a Tag Generaton and User Verfcaton Workflow (b Perodc Samplng Audt Workflow (c Dynamc operatons Audt Workflow Fg. 2. Three processes of the audt system. The entre goal of ths audt structure s to provde the credtablty n cloud. So, the burden of the DO and CSP are greatly reduced. The entre audtng servce s handled by a Trusted Thrd Party Audtor (TTPA.There s no addtonal cost for usng ths mechansm. Ths process nvolves the followng algorthms: KeyGen, TagGen, Update, and Delete, Insert algorthms. The followng technques are requred to construct a ths algorthms. The technques are Fragment structure, Blnear Mappng and Index table (ITable. 3.1 Fragment Structure and Secure Tags To maxmze the performance the audt system, a general fragment structure s used.a fle F s splt nto n data components {m 1,.,m n }.Each data block m s further splt nto s sectors. 1. Select the maxmum no. of sectors s max among all the sector numbers s. 2. m has s max sectors Set m =0 for s < < _ s max 3. Sze of each sector s constant and equal to securty parameter p. 4. Calculate the number of data blocks. 5. Encrypted data component s M { m} [1, n], [1, s] where s = number of sectors n each data block. p= securty parameter. M.R. Thansekhar and N. Bala (Eds.: ICIET
4 3.2 Blnear Mappng Let G 1,G 2 and G T be multplcatve groups wth same prme order p. Blnear map s gven by Let g 1 and g 2 be the generators of G 1 and G 2.. Keyed secure hash functon 1.3 Index table (ITable ITable s used to record the abstract nformaton of the data.it conssts of 4 components Index -Current block number of data block m.. B -Orgnal block number of data block m. V -Current verson number of data block m. T -Tmestamp used for generatng the data tag. TABLE 3ITable of the Abstract Informaton of Data M Index B V T T T2 IV.ALGORITHMS FOR AUDIT SYSTEM The algorthms for tag generaton process: 1. Key Generaton Algorthm - KeyGen(λ Algorthm KeyGen (λ //Input: λ securty parameter //Output: sk h secret hash key // sk t secret publc tag key // pk t publc tag key begn Choose 2 random numbers sk t, sk h Є Z p skt Compute pkt g2 G2 2. Tag Generaton Algorthm -TagGen(M, sk t, sk h Algorthm TagGen (M, sk t, sk h //Input: M encrypted fle // sk h secret hash key // sk t secret publc tag key //Output: T set of tags begn Choose s random values x 1, x 2, x s. Є Z p Compute x u for each data block m Compute for e: G1G2 h :{0,1} G GT g1 G1 [1, s] s t ( h( skh, W. u 1 1 A Flexble Audtng Mechansm for Storages n Cloud Computng m skt W = FID. FID = dentfer of data. = block number of m. 3. Challenge Algorthm - Chall (M nfo Algorthm Chall (M nfo // Input: M nfo Abstract nformaton of data // Output: C Challenge begn Select some data blocks and construct challenge set Q for each chosen block m Generate random numbers v Є Z p Compute challenge stamp for return C=({,v } ЄQ,R where r = randomly chosen number 4. Proof Algorthm - Prove (M,T,C Algorthm Prove (M,T,C //Input: M Fle // T Tag from audtor // C Challenge //Output: P= (TP,DP Proof // TP Tag Proof // DP Data Proof begn Generate tag proof v Compute sector lnear combnaton Generate data proof where r DP. e( H chal, pkt e( TP, g2 M.R. Thansekhar and N. Bala (Eds.: ICIET End R ( pkt 5. Verfcaton Algorthm - Verfy (C,P, sk h, pk t,m nfo The output of ths algorthm s 0 means then, the ntegrty of the cloud data s compromsed. Algorthm Verfy (C,P, sk h, pk t, M nfo // Input: T tag from audtor // C challenge // sk h secret hash key // pk t publc tag key // M nfo abstract nformaton of data // Output: 0 or 1 begn Compute dentfer hash values h=(sk h,w. Compute challenge hash r TP DP Q r Z p Verfes the proof by verfcaton equaton t MP v. m Q s 1 Q e( u, R H h( skh, W chal MP rv
5 A Flexble Audtng Mechansm for Storages n Cloud Computng f both the values are equal then return 1 else return 0 f V.CONSTRUCTION OF THE AUDIT SCHEME Ths scheme ncludes a 2-move nteractve proof protocol, whch also provdes prvacy protecton property to ensure the confdentalty of secret data. 5.1 Notatons Let be a keyed hash famly of functons H k : The collson resstance hash functon SHA1 s used, where the probablty s over random choce s made. Ths hash functon can be obtaned from n {0,1} {0,1} H { H k } hash functon of BLS sgnatures.blnear parngs proposed by Boneh and Frankln [11] s used. Let G and G T be two multplcatve groups usng ellptc curve conventons wth a large prme order p. The functon e be a computable blnear map e : G x G-> G T. wth the followng propertes: 1 Blnearty2 Nondegeneracy and 3 Computablty. The fle s encrypted usng collson resstance algorthm by usng the blnear mappng and then the tags are generated for ths fle whch s fragmented. 5.2 Constructon for Dynamc Audtng Data update. There are three types of data update operatons that can be used by the owner: modfcaton, nserton, and deleton. For each update operaton, there s a correspondng algorthm n the dynamc audtng to process the operaton and facltate the future audtng, defned as follows: Data update. There are three types of data update Operatons that can be used by the owner: modfcaton, nserton, and deleton. For each update operaton, there s a correspondng algorthm n the dynamc audtng to process the operaton and facltate the future audtng, defned as follows: Modfy( m, sk t, sk ( Msg h modfy The modfcaton algorthm takes as nputs the new verson of data block m,the secret tag key sk t, and the secret hash key sk h. Itgenerates a new verson number V, new tme stamp T,and calls the TagGen to generate a new data tag t for data. Insert ( m, sk, sk t h ( Msg, t nsert The nserton algorthm takes as nputs the new data block m, the secret tag key sk t, and the secret hash key sk h. It nserts a new data block m before the th, t poston. It generates an orgnal number B, a new verson number V, and a new tme stamp T. Then, t calls the TagGen to generate a new data tag t for the new data block m. It outputs the new tag t and the update message Then, t nserts the new par of data block and tag (m,t on the server and ss the update message Msg nsert to the audtor. Msg (, B, V, T nsert Delete( m Msg delete The deleton algorthm takes as nput the data block m. It outputs the update message Msg delete (, B, V, T. It then deletes the par of data block and ts tag (m, t from the server and ss the update message Msg delete to the audtor. VI CONCLUSION In ths paper, a flexble audtng mechansm was proposed by usng Blnearty property of blnear parng and also supports audt for dynamc operatons. Ths enhances the performance of TPAs. REFERENCES [1] Yan Zhu, Gal-Joon Ahn, Hongxn Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu, Dynamc Audt Servces for Outsourced Storages n Clouds, IEEE Transactons on Servces Computng, Vol. 6, No. 2, Aprl-June [2] A. Juels and B.S. Kalsk Jr., PORs: Proofs of Retrevablty for Large Fles, Proc. ACM Conf. Computer and Communcatons Securty (CCS 07, pp , [3] M. Mowbray, The Fog over the Grmpen Mre: Cloud Computng and the Law, Techncal Report HPL , HP Lab., [4] A.A. Yavuz and P. Nng, BAF: An Effcent Publcly Verfable Secure Audt Loggng Scheme for Dstrbuted Systems, Proc. Ann. Computer Securty Applcatons Conf. (ACSAC, pp , [5] G. Atenese, R.C. Burns, R. Curtmola, J. Herrng, L. Kssner, Z.N.J. Peterson, and D.X. Song, Provable Data Possesson at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm.Securty, pp , [6] G. Atenese, R.D. Petro, L.V. Mancn, and G. Tsudk, Scalable and Effcent Provable Data Possesson, Proc. Fourth Int l Conf. Securty and Prvacy n Comm. Netowrks (SecureComm, pp. 1-10,2008. [7] C.C. Erway, A. Ku pc u, C. Papamanthou, and R. Tamassa, Dynamc Provable Data Possesson, Proc. 16th ACM Conf. Computer and Comm. Securty, pp , [8] H. Shacham and B. Waters, Compact Proofs of Retrevablty, Proc. 14th Int l Conf. Theory and Applcaton of Cryptology and Informaton Securty: Advances n Cryptology Advances n Cryptology,(ASIACRYPT 08, J. Peprzyk, ed., pp , [9] A.R. Yumeref and J.S. Chase, Strong Accountablty for Network Storage, Proc. Sxth USENIX Conf. Fle and Storage Technologes (FAST, pp , [10] M. Xe, H. Wang, J. Yn, and X. Meng, Integrty Audtng of Outsourced Data, Proc. 33rd Int l Conf. Very Large Databases (VLDB, pp , [11] C. Wang, Q. Wang, K. Ren, and W. Lou, Prvacy-Preservng Publc Audtng for Data Storage Securty n Cloud Computng, Proc. IEEE INFOCOM, pp. 1-9, M.R. Thansekhar and N. Bala (Eds.: ICIET
Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code
Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,
More informationSecurity of Data Dynamics in Cloud Computing
M.Yughar et al, / (IJCSIT) Internatonal Journal of Computer Scence Informaton Technologes, Vol. 3 (4), 202,4868-4873 Securty of Data Dynamcs n Cloud Computng M.Yughar, D. Subhramanya Sharma Dept. of CSE,
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationTwo-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationNew Remote Mutual Authentication Scheme using Smart Cards
141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationSTRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationStorage Data Security of Data in Cloud Computing
IOSR Journal of Comuter Engneerng (IOSR-JCE) e-issn: 2278-066,-ISSN: 2278-8727, Volume 6, Issue 4, Ver. VI (Jul Aug. 204), PP 7-77 www.osrjournals.org Storage Data Securty of Data n Cloud Comutng Srnvasulu.B,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationImplement Public Audit ability and Data Dynamics with Security in Cloud Computing
Internatonal Journal of Modern Engneerng Research (IJMER) www.jmer.com Vol. 3, Issue. 6, Nov - Dec. 203-3786-379 ISSN: 2249-6645 Imlement Publc Audt ablty and Data Dynamcs wth Securty n Cloud Comutng P.
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationDecentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
COMPUTER SYSTEM SECURITY Decentralzed Attrbute-Based Encrypton and Data Sharng Scheme n Cloud Storage Xehua L*, Yanlong Wang, Mng Xu, Yapng Cu College of Computer Scence and Electronc Engneerng, Hunan
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationA Simple Secure Auditing for Cloud Storage
A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci
More informationHOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY
HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationEfficient Data Storage Security with Multiple Batch Auditing in Cloud Computing
Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department
More informationAvailable online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationKey Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.
Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block
More informationSpecifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
P asudeva Reddy et al / Internatonal Journal on Computer Scence and Engneerng ol(), 9, 74-79 -based Drected Threshold Multsgnature Scheme from Blnear Parngs P asudeva Reddy, B Umaprasada Rao, T Gowr (
More informationA software agent enabled biometric security algorithm for secure file access in consumer storage devices
A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationAn enhanced dynamic-id-based remote user authentication protocol with smart card
Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of
More informationA broadcast protocol with drivers anonymity for vehicle-to-vehicle communication networks
Int. J. Vehcle Informaton and Communcaton Systems, Vol. 2, Nos. 1/2, 2009 1 A broadcast protocol wth drvers anonymty for vehcle-to-vehcle communcaton networks Nader Mazen Rabad and Syed Masud Mahmud* Electrcal
More informationA Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO
More informationReal-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution
Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationEnhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage
Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,
More informationAnalysis and Improvement of a Lightweight Anonymous Authentication Protocol for Mobile Pay-TV Systems (Full text)
Analyss and Improvement of a Lghtweght Anonymous Authentcaton Protocol for Moble Pay-TV Systems (Full text) arxv:1808.09493v3 [cs.cr] 13 Sep 2018 1 st Saeed Banaean Far Department of Electrcal and Computer
More informationDLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.
DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets
More informationarxiv: v1 [cs.cr] 28 May 2013
arxv:1305.6350v1 [cs.cr] 28 May 2013 An effcent dynamc ID based remote user authentcaton scheme usng self-certfed publc keys for mult-server envronment Dawe Zhao ab Hapeng Peng ab Shudong L c Yxan Yang
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationProtecting Your Right: Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud
1 Protectng Your Rght: Verfable Attrbute-based Keyword Search wth Fne-graned Owner-enforced Search Authorzaton n the Cloud Wenha Sun, Student Member, IEEE, Shucheng Yu, Member, IEEE, Wenjng Lou, Senor
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationA Distributed Private-Key Generator for Identity-Based Cryptography
A Dstrbuted Prvate-Key Generator for Identty-Based Cryptography Anket Kate Ian Goldberg Davd R. Cherton School of Computer Scence Unversty of Waterloo Waterloo, ON, Canada N2L 3G1 {akate,ang}@cs.uwaterloo.ca
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L, Qan Wang, Cong Wang, Nng Cao, Ku Ren, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationAPRAP: Another Privacy Preserving RF Authentication Protocol. Author(s)Miyaji, Atsuko; Rahman, Mohammad Sha
JAIST Repos https://dspace.j Ttle APRAP: Another Prvacy Preservng RF Authentcaton Protocol Author(s)Myaj, Atsuko; Rahman, Mohammad Sha Ctaton 2010 6th IEEE Workshop on Secure Net Protocols (NPSec): 13-18
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationDynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Yan Zhu 1,2, Huaixi Wang 3, Zexing Hu 1, Gail-Joon Ahn 4, Hongxin Hu 4, Stephen S Yau 4 1 Institute of Computer Science
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationResource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationDynamic and Flexible Group Key Generation Based on User Behaviour Monitoring
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key
More informationCost-efficient deployment of distributed software services
1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed
More informationAn Optimized Pseudorandom Generator using Packed Matrices
An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus
More informationNeeded Information to do Allocation
Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationSecurity analysis and design of an efficient ECC-based two-factor password authentication scheme
SECURITY ND COMMUNICTION NETWORKS Securty Comm. Networks 2016; 9:4166 4181 Publshed onlne 24 ugust 2016 n Wley Onlne Lbrary (wleyonlnelbrary.com)..1596 RESERCH RTICLE Securty analyss and desgn of an effcent
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationDynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Yan Zhu 1,2, Huaixi Wang 3, Zexing Hu 1, Gail-Joon Ahn 4, Hongxin Hu 4, Stephen S. Yau 4 1 Institute of Computer Science
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationFine-Grained Data Updates on Cloud with Authorized Public Auditing
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi
More informationRisk-Based Packet Routing for Privacy and Compliance-Preserving SDN
Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:
More informationOracle Database: 12c Administrator
Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationLecture - Data Encryption Standard 4
The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationarxiv: v1 [cs.cr] 20 Jun 2013
arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty
More informationPattern Recognition 43 (2010) Contents lists available at ScienceDirect. Pattern Recognition. journal homepage:
Pattern Recognton 43 (2010) 397 -- 404 Contents lsts avalable at ScenceDrect Pattern Recognton ournal homepage: www.elsever.com/locate/pr Secret mage sharng based on cellular automata and steganography
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationBatch Verification Scheme for Economic Cloud Storage Services
Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,
More informationCryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag
IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and
More informationMassive XML Data Mining in Cloud Computing Environment
JOURNAL OF MULTIMEDIA, VOL. 9, NO. 8, AUGUST 2014 1011 Massve XML Data Mnng n Cloud Computng Envronment Zhao L Department of Computer Scence, Xnyang College of Agrculture and Forestry, Xnyang, Chna Emal:
More informationPrivacy Models for RFID Authentication Protocols
Prvacy Models for RFID Authentcaton Protocols Jan Shen 1,2, Jn Wang 1,2, Yuan Me 1,2, Ilyong Chung 3 1 Jangsu Engneerng Center of Network Montorng, Nanjng Unversty of Informaton Scence &echnology, Nanjng,210044,Chna
More informationData Hiding and Image Authentication for Color-Palette Images
Data Hdng and Image Authentcaton for Color-Palette Images Chh-Yang Yn ( 殷志揚 ) and Wen-Hsang Tsa ( 蔡文祥 ) Department of Computer & Informaton Scence Natonal Chao Tung Unversty 00 Ta Hsueh Rd., Hsnchu, Tawan
More information(1) The control processes are too complex to analyze by conventional quantitative techniques.
Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More information