Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Size: px
Start display at page:

Download "Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks"

Transcription

1 The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department of Eectrica & Computer Engineering Michigan State University East Lansing, MI Emai: {iyun1, ijian6, Jie Wu Department of Computer & Information Sciences Tempe University Phiadephia, PA Emai: Abstract Message authentication is one of the most effective ways to thwart unauthorized and corrupted traffic from being forwarded in wireess sensor networks (WSNs). To provide this service, a poynomia-based scheme was recenty introduced. However, this scheme and its extensions a have the weakness of a buit-in threshod determined by the degree of the poynomia: when the number of messages transmitted is arger than this threshod, the adversary can fuy recover the poynomia. In this paper, we propose a scaabe authentication scheme based on eiptic curve cryptography (ECC). Whie enabing intermediate node authentication, our proposed scheme aows any node to transmit an unimited number of messages without suffering the threshod probem. In addition, our scheme can aso provide message source privacy. Both theoretica anaysis and simuation resuts demonstrate that our proposed scheme is more efficient than the poynomia-based approach in terms of communication and computationa overhead under comparabe security eves whie providing message source privacy. Index Terms Hop-by-hop authentication, symmetric-key cryptosystem, pubic-key cryptosystem, source privacy I. INTRODUCTION Message authentication pays a key roe in thwarting unauthorized and corrupted packets from being circuated in networks to save precious sensor energy. For this reason, many schemes have been proposed in iterature to provide message authenticity and integrity in network communications [1], [2]. These schemes can argey be divided into pubic-key-based and symmetric-key-based approaches. A secret poynomia-based message authentication scheme was introduced in [1]. To thwart the intruder from recovering the poynomia by computing the coefficients of the poynomia, the idea of adding random noise, caed a perturbation factor, to the poynomia was proposed [2]. However, a recent study shows that the random noise can be competey removed from the poynomia using error-correcting code techniques [3]. In this paper, we propose an unconditionay secure and efficient source anonymous message authentication (SAMA) scheme, based on the optima modified EGama signature (MES) scheme on eiptic curves. This MES scheme is secure against no-message attacks and adaptive chosen-message attacks in the random orace mode [4]. Our scheme enabes the intermediate nodes to authenticate the message so that a corrupted packets can be dropped to conserve sensor power. Whie achieving compromise-resiiency, fexibe-time authentication and source identity protection, our scheme does not have the threshod probem. Both theoretica anaysis and simuation resuts demonstrate that our proposed scheme is more efficient than the poynomia-based agorithms under comparabe security eves. To the best of our knowedge, this is the first scheme that provides hop-by-hop node authentication without the threshod imitation, whie having performance better than the symmetric-key based schemes. The distributed nature of our agorithms makes these schemes suitabe for decentraized networks. The major contributions of this paper incude: (i) we deveop a source anonymous message authentication (SAMA) scheme on eiptic curves that can provide unconditiona source anonymity; (ii) we offer an efficient hop-by-hop message authentication mechanism without the threshod imitation; (iii) we devise network impementation criteria on source node privacy protection in WSNs; (iv) we provide extensive simuation resuts under ns-2 and TeosB on mutipe security eves. II. TERMINOLOGY AND PRELIMINARY In this section, we wi briefy describe the terminoogy and the cryptographic toos that wi be used in this paper. A. Mode and Assumptions We assume that the wireess sensor network consists of a arge number of sensor nodes. Each node can be a data source or a data sink, and is capabe of communicating with its neighboring nodes directy. The whoe network is fuy connected through muti-hop communications. We assume that there is a security server (SS) that is responsibe for generating, storing and distributing the security parameters among the network. This server wi never be compromised. However, after depoyment, the sensor nodes may be captured and compromised by attackers. Once compromised, a information stored in the sensor nodes can be accessed by the attackers. The compromised nodes can be reprogrammed and fuy controed by the attackers. However, the compromised nodes wi not be abe to create new pubic keys that can be accepted by the SS and other nodes. Based on the above assumptions, this paper considers both passive attacks and active attacks. Our proposed authentication /12/$ IEEE 3353

2 scheme aims at achieving hop-by-hop message authentication, compromised node resiience and efficiency. B. Terminoogy Privacy is sometimes referred to as anonymity. It generay refers to the state of being unidentifiabe within the ambiguity set (AS). Sender anonymity means that a particuar message is not inkabe to any sender, and no message is inkabe to a particuar sender. Definition 1 (SAMA). A SAMA consists of the foowing two agorithms: Generate (m, Q 1, Q 2,, Q n ): Given a message m and the pubic keys Q 1, Q 2,, Q n of the AS S = {A 1, A 2,, A n }, the actua message sender A t, 1 t n, produces an anonymous message S(m) using its own private key d t. Verify S(m): Given a message m and an anonymous message S(m), which incudes the pubic keys of a members in the AS, a verifier can determine whether S(m) is generated by a member in the AS. The security requirements for SAMA incude: Sender ambiguity: The probabiity that a verifier successfuy determines the rea sender of the anonymous message is exacty 1/n, where n is the tota number of members in the AS. Unforgeabiity: An anonymous message scheme is unforgeabe if no adversary, given the pubic keys of a members of the AS and the anonymous messages m 1, m 2,, m n adaptivey chosen by the adversary, can produce, in poynomia time, a new vaid anonymous message with non-negigibe probabiity. In this paper, the user ID and the user pubic key wi be used interchangeaby without making any distinctions. C. Modified EGama Signature Scheme (MES) Definition 2 (MES). The modified EGama signature scheme consists of the foowing three agorithms: Key generation agorithm: Let p be a arge prime and g be a generator of Z p. Both p and g are made pubic. For a random private key x Z p, the pubic key y is computed from y = g x mod p. Signature agorithm: The MES can aso have many variants [5], [6]. For the purpose of efficiency, we wi describe the variant, caed the optima scheme. To sign a message m, one chooses a random k Z p 1, then computes the exponentiation r = g k mod p and soves s from: s = rxh(m, r) + k mod (p 1), (1) where h is a one-way hash function. The signature of message m is defined as the pair (r, s). Verification agorithm: The verifier checks the signature equation g s = ry rh(m,r) mod p. If the equaity hods true, then the verifier Accepts the signature and Rejects it otherwise. III. RELATED WORK A secret poynomia-based message authentication scheme was introduced in [1]. This scheme offers information theoretic security with ideas simiar to a threshod secret sharing scheme, where the threshod is determined by the degree of the poynomia. When the number of messages transmitted is beow the threshod, the scheme enabes the intermediate node to verify the authenticity of the message through poynomia evauation. However, when the number of messages transmitted is arger than the threshod, the poynomia can be fuy recovered and the system becomes competey broken. To increase the threshod and the compexity for the intruder to break the secret poynomia, random noise, aso caed a perturbation factor, was added to the poynomia in [2]. The main idea is to thwart the adversary from computing the coefficient of the poynomia. However, the added perturbation factor can be competey removed using error-correcting code techniques [3]. The recent progress on eiptic curve cryptography (ECC) shows that the pubic-key schemes can be more advantageous in terms of memory usage, message compexity, and security resiience since pubic-key-based approaches have simpe and cean key management [7]. The existing anonymous communication protocos are argey stemmed from mixnet [8]. A mixnet provides anonymity via packet re-shuffing through a set of mix servers (with at east one being trusted). Recenty, message sender anonymity based on ring signatures was introduced [9]. This approach enabes the message sender to generate a source-anonymous message signature with content authenticity assurance. The origina scheme has very imited fexibiity and very high compexity. Moreover, the origina paper ony focuses on the cryptographic agorithm, and the reevant network issues were eft unaddressed. IV. PROPOSED SOURCE ANONYMOUS MESSAGE AUTHENTICATION (SAMA) SCHEME In this section, we propose an unconditionay secure and efficient source anonymous message authentication scheme (SAMA). Our design enabes the SAMA to be verified through a singe equation without individuay verifying the signatures. A. Proposed MES Scheme on Eiptic Curves Let p > 3 be an odd prime. An eiptic curve E is defined by an equation of the form: E : y 2 = x 3 + ax + b mod p, where a, b F p, and 4a b 2 0 mod p. The set E(F p ) consists of a points (x, y) F p on the curve, together with a specia point O, caed the point at infinity. Let G = (x G, y G ) be a base point on E(F p ) whose order is a very arge vaue N. User A seects a random integer d A [1, N 1] as his private key. Then, he can compute his pubic key Q A from Q A = d A G. 3354

3 Signature generation agorithm: For Aice to sign a message m, she foows these steps: 1) Seect a random integer k A, 1 k A N 1. 2) Cacuate r = x A mod N, where (x A, y A ) = k A G. If r = 0, go back to step 1. 3) Cacuate h A h(m, r), where h is a cryptographic hash function, such as SHA-1, and denotes the eftmost bits of the hash. 4) Cacuate s = rd A h A + k A mod N. If s = 0, go back to step 2. 5) The signature is the pair (r, s). When computing s, the string h A that resuts from h(m, r) sha be converted into an integer. Note that h A can be greater than N, but not onger. Signature verification agorithm: For Bob to authenticate Aice s signature, he must have a copy of her pubic key Q A, then he: 1) Checks that Q A O, otherwise it is invaid 2) Checks that Q A ies on the curve 3) Checks that nq A = O After that, Bob foows these steps to verify the signature: 1) Verify that r and s are integers in [1, N 1]. If not, the signature is invaid. 2) Cacuate h A h(m, r), where h is the same function used in the signature generation. 3) Cacuate (x 1, x 2 ) = sg rh A Q A mod N. 4) The signature is vaid if r = x 1 mod N, it is invaid otherwise. B. Proposed SAMA on Eiptic Curves Suppose that the message sender (say Aice) wishes to transmit a message m anonymousy from her network node to any other nodes. The AS incudes n members, A 1, A 2,, A n, e.g., S = {A 1, A 2,, A n }, where the actua message sender Aice is A t, for some vaue t, 1 t n. In this paper, we wi not distinguish between the node A i and its pubic key Q i. Therefore, we aso have S = {Q 1, Q 2,, Q n }. Authentication generation agorithm: Suppose that m is a message to be transmitted. The private key of the message sender Aice is d t, 1 t N. To generate an efficient SAMA for message m, Aice performs the foowing three steps: 1) Seect a random and pairwise different k i for each 1 i n 1, i t, and compute r i from (r i, y i ) = k i G. 2) Choose a random k i Z p and compute r t from (r t, y t ) = k t G i t r i h i Q i such that r t 0 and r t r i for any i t, where h i h(m, r i ). 3) Compute s = k t + k i + r t d t h t mod N. i t The SAMA of the message m is defined as: S(m) = (m, S, r 1, y 1,, r n, y n, s). C. Verification of SAMA Verification agorithm: For Bob to verify an aeged SAMA (m, S, r 1, y 1,, r n, y n, s), he must have a copy of the pubic keys Q 1,, Q n. Then he: 1) Checks that Q i O, i = 1,, n, otherwise it is invaid 2) Checks that Q i, i = 1,, n ies on the curve 3) Checks that nq i = O, i = 1,, n After that, Bob foows these steps: 1) Verify that r i, y i, i = 1,, n, and s are integers in [1, N 1]. If not, the signature is invaid. 2) Cacuate h i h(m, r i ), where h is the same function used in the signature generation. 3) Cacuate (x 0, y 0 ) = sg n r i h i Q i. i=1 4) The signature is vaid if the first coordinate of (r i, y i ) i equas x 0, invaid it is otherwise. Remark 1. It is apparent that when n = 1, SAMA becomes a simpe signature agorithm. D. Security Anaysis Theorem 1. The proposed source-anonymous message authentication scheme (SAMA) can provide unconditiona message sender anonymity. Theorem 2. The proposed SAMA is secure against adaptive chosen-message attacks in the random orace mode. V. AS SELECTION AND SOURCE PRIVACY The appropriate seection of an AS pays a key roe in message source privacy since the actua message source node wi be hidden in the AS. In this section, we wi discuss techniques that can prevent the adversaries from tracking the message source through the AS anaysis in combination with the oca traffic anaysis. Before a message is transmitted, the message source node seects an AS from the pubic key ist in the SS as its choice. This set shoud incude itsef, together with some other nodes. When an adversary receives a message, he can possiby find the direction of the previous hop, or even the rea node of the previous hop. However, if the adversary is unabe to monitor the traffic of the previous hop, then he wi be unabe to distinguish whether the previous node is the actua source node or simpy a forwarder node. Therefore, the seection of the AS shoud create sufficient diversity so that it is infeasibe for the adversary to find the message source based on the seection of the AS itsef. VI. PERFORMANCE ANALYSIS In this section, we wi evauate our proposed authentication scheme through both theoretica anaysis and simuation demonstrations. We wi compare our proposed scheme with the bivariate poynomia-based symmetric-key scheme described in [2]. A fair comparison of our proposed scheme and the scheme proposed in [2] shoud be performed with n =

4 A. Theoretica Anaysis The secret bivariate poynomia is defined as [1]: f(x, y) = d x d y i=0 j=0 A i,j x i y j, where each coefficient A x,y is an eement of a finite fied F p, and d x and d y are the degrees of this poynomia. d x and d y are aso reated to the message ength and the computationa compexity of this scheme. From the performance aspect, d x and d y shoud be as short as possibe. On the other hand, it is easy to see that the intruders can recover the poynomia f(x, y) via Lagrange interpoation when either more than d y + 1 messages transmitted from the base station are received and recorded by the intruders, or more than d x + 1 sensor nodes have been compromised, In this case, the security of the system is totay broken and cannot be used anymore. This property requires both d x and d y to be very arge for the scheme to be resiient to node compromising attack. An aternative approach based on perturbation of the poynomia was aso expored. The main idea is to add a sma amount of random noise to the poynomia in the origina scheme so that the adversaries wi no onger be abe to sove the coefficients using Lagrange interpoation. However, this technique is proven to be vunerabe to security attacks [3] since the random noise can be removed from the poynomia using error-correcting techniques. Whie hop-by-hop authentication can be achieved through a pubic-key encryption system, the pubic-key-based schemes were generay considered as not preferred, mainy due to their high computationa overhead. However, our research demonstrates that this is not aways true, especiay for eiptic curve pubic-key cryptosystems. In our scheme, each SAMA contains an AS of n randomy seected nodes that dynamicay changes for each message. For n = 1, our scheme can provide at east the same security as the bivariate poynomia-based scheme. For n > 1, we can provide extra source privacy benefits. Even if one message is corrupted, other messages in the network can sti be secure. Therefore, n can be much smaer than the parameters d x and d y. In fact, even a sma n may provide adequate source privacy whie ensuring high system performance. B. Experimenta Resuts In this section, we compare the bivariate poynomia-based scheme and our scheme based on comparabe security eves. 1) Simuation parameter setup: The bivariate poynomiabased scheme is a symmetric-key-based impementation, whie our scheme is based on ECC. This requires us to determine the comparabe key sizes. If we choose the key size to be for the symmetric-key cryptosystem, then the key size for our proposed ECC wi be 2, which is much shorter than the traditiona pubic-key cryptosystem. This progress faciitates the impementation of the authentication scheme using ECC. In our simuation setting, we choose five security eves, which are indicated by the symmetric-key sizes : 24bit, 32bit, 40bit, 64bit, and 80bit, respectivey. The comparabe key sizes of our scheme are 48bit, 64bit, 80bit, 128bit, and 160bit, respectivey. We aso need to determine d x and d y for the bivariate poynomia-based scheme, and the n for our scheme. In our simuation, we seect d x equa d y and choose three vaues for them: 80, 100, and 150. We assume that WSNs do not contain more than 2 16 nodes in our simuation, which is reasonaby arge. For size n of the AS, we choose three vaues in the simuation: 10, 15, and 20. 2) Computationa overhead: For a pubic-key based authentication scheme, computationa overhead is one of the most important performance measurements. Thus we first conducted simuation to measure the process time. The simuations were carried out in 16-bit, 4 MHz TeosB mote. Tabe I shows the process time of our scheme and the bivariate poynomia-based scheme for both authentication generation and verification. In the simuations, we assume that the key ength of our scheme is 2. 3) Communication overhead and message transmission deay: The communication overhead is determined by the message ength. For the bivariate poynomia-based scheme, each message is transmitted in the form of < m, MAF m (y) >, where MAF m (y) is defined as: MAF m (y) = f(h(m), y) = dy j=0 M jy j. MAF m (y) is represented by its d y + 1 coefficients, M i, Z p, 0 i d y, where p (2 1, 2 ) is a arge prime number. The tota ength of the message is (d y + 1). For our scheme, assuming that the network is composed of λ nodes in tota, each ID wi be of the ength: og 2 λ. When n nodes are incuded in the AS, the ength of S is n og 2 λ. Therefore, the tota ength of one message for our scheme is: 4(n + 1) + n og 2 λ. 4) Simuation resuts: The simuation resuts, carried out in ns-2 on a RedHat Linux system, demonstrate that our proposed scheme has a much ower energy consumption and message transmission deay; see Fig. 1(a)&(b). The security eves 1, 2, 3, 4 correspond to symmetric key sizes 24bit, 32bit, 40bit, 64bit, and eiptic curves key sizes 48bit, 64bit, 80bit, 128bit, respectivey. Our simuations aso show that the deivery ratio of our scheme is sighty better than the bivariate poynomia-based scheme; see Fig. 1(c). Our simuation on memory consumption derived in TeosB, see Tabe II, shows that the overa memory consumption for the bivariate poynomia-based scheme is at east 5 times arger than our proposed scheme. VII. CONCLUSION In this paper, we first proposed a nove and efficient source anonymous message authentication scheme (SAMA) based on eiptic curve cryptography (ECC). Whie ensuring message sender privacy, SAMA can be appied to any messages to provide hop-by-hop message content authenticity without the weakness of the buit-in threshod of the poynomia-based scheme. Both theoretica and simuation resuts, conducted using ns-2 and TeosB, show that, in comparabe scenarios, 3356

5 Energy / Joue Fig Security Leve Deay / seconds Security Leve Deivery Ratio Security Leve (a) (b) (c) Performance comparison of our proposed scheme and bivariate poynomia-based scheme: (a) energy consumption, (b) message deay, (c) deivery ratio TABLE I. PROCESS TIME (S) FOR THE TWO SCHEMES (16-BIT, 4 MHZ TELOSB MOTE) POLYNOMIAL BASED APPROACH PROPOSED APPROACH d x, d y = 80 d x, d y = 100 d x, d y = 150 n = 1 GEN VERIFY GEN VERIFY GEN VERIFY GEN VERIFY GEN VERIFY GEN VERIFY GEN VERIFY = = = = = TABLE II. MEMORY (KB) AND TIME (S) CONSUMPTION FOR THE TWO SCHEMES (TELOSB) (F STANDS FOR FLASH MEMORY) POLYNOMIAL BASED APPROACH. PROPOSED APPROACH d x, d y = 80 d x, d y = 100 d x, d y = 150 n = 1 ROM RAM F ROM RAM F ROM RAM F ROM RAM F ROM RAM F ROM RAM F ROM RAM F = = = = = our proposed scheme is more efficient than the bivariate poynomia-based scheme in terms of computationa overhead, energy consumption, deivery ratio, message deay, and memory consumption. ACKNOWLEDGEMENTS This research was partiay supported by the NSF under grants CNS , CNS and CND REFERENCES [1] C. Bundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfecty-secure key distribution for dynamic conferences, in Advances in Cryptoogy - Crypto 92, Lecture Notes in Computer Science Voume 740, pp , [2] W. Zhang, N. Subramanian, and G. Wang, Lightweight and compromiseresiient message authentication in sensor networks, in IEEE INFOCOM, (Phoenix, AZ.), Apri [3] M. Abrecht, C. Gentry, S. Haevi, and J. Katz, Attacking cryptographic schemes based on perturbation poynomias. Cryptoogy eprint Archive, Report 2009/098, [4] D. Pointcheva and J. Stern, Security proofs for signature schemes, in Advances in Cryptoogy - EUROCRYPT, Lecture Notes in Computer Science Voume 1070, pp , [5] L. Harn and Y. Xu, Design of generaized EGama type digita signature schemes based on discret ogarithm, Eectronics Letters, vo. 30, no. 24, pp , [6] K. Nyberg and R. A. Rueppe, Message recovery for signature schemes based on the discrete ogarithm probem, in Advances in Cryptoogy - EUROCRYPT, Lecture Notes in Computer Science Voume 950, pp , [7] H. Wang, S. Sheng, C. Tan, and Q. Li, Comparing symmetric-key and pubic-key based security schemes in sensor networks: A case study of user access contro, in IEEE ICDCS, (Beijing, China), pp , [8] D. Chaum, Untraceabe eectronic mai, return addresses, and digita pseudonyms, Communications of the ACM, vo. 24, pp , February [9] R. Rivest, A. Shamir, and Y. Tauman, How to eak a secret, in Advances in Cryptoogy ASIACRYPT, Lecture Notes in Computer Science, vo 2248/2001, Springer Berin / Heideberg,

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS

SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 SCALABLE MESSAGE AUTHENTICATION SCHEME BASED ON ECC IN WIRELESS SENSOR NETWORKS Ms. S.Banumathi #1,Ms., Ms.M. Mr.

More information

MESSAGE authentication plays a key role in thwarting

MESSAGE authentication plays a key role in thwarting IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014 1223 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks Jian Li, Yun Li, Jian Ren, Senior Member,

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Survey on Wireless Sensor Network for Message Authentication and Source Privacy Survey on Wireless Sensor Network for Message Authentication and Source Privacy Vaishali Kisanrao Gulhane 1, S. N. Shelke 2 Computer Engineering, Sinhgad Academy of Engineering, Kondhwa, Pune. Professor,

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication 6th Asia-Pacific Conference on Communications Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication Xu Huang Facuty of Information Sciences and Engineering

More information

Distinct Sampling on Streaming Data with Near-Duplicates*

Distinct Sampling on Streaming Data with Near-Duplicates* Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

ID-Based Group Password-Authenticated Key Exchange

ID-Based Group Password-Authenticated Key Exchange ID-Based Group Password-uthenticated Key Exchange Xun Yi 1, Rayin Tso 2, and Eiji Okamoto 2 1 Schoo of Engineering and Science Victoria University, Mebourne, Victoria 8001, ustraia 2 Department of Risk

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues

power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats IEEE-SA Ethernet & Automotive Technology Day

Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats IEEE-SA Ethernet & Automotive Technology Day Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats 2017 IEEE-SA Ethernet & IP @ Automotive Technoogy Day 2 Agenda Connected vehice attack surfaces High eve security

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

Lightweight and Compromise-Resilient Message Authentication in Sensor Networks

Lightweight and Compromise-Resilient Message Authentication in Sensor Networks Lightweight and Compromise-Resilient Message Authentication in Sensor Networks Wensheng Zhang and Nalin Subramanian Department of Computer Science Iowa State University Ames, IA 50011 Email: {wzhang,nvsubram}@cs.iastate.edu

More information