Genetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE)

Size: px
Start display at page:

Download "Genetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE)"

Transcription

1 Genetc Key Guded Neural Deep Learnng based Encrypton for Onlne Wreless Communcaton (GKNDLE) Arndam Sarkar Department of Computer Scence & Electroncs, Ramakrshna Msson Vdyamandra, Belur Math , West Bengal, Inda. Abstract In ths paper, a neural deep learnng guded genetc secret key based technque for encrypton (GKNDLE) has been proposed for onlne transmsson of data/nformaton through wreless communcaton. In ths approach both the communcatng networks receve an ndstngushable nput vector, produce an output bt and are traned based on the output bt. Synchronzed weght vectors become the chromosome of the 1 st generaton Genetc Algorthm based secret key used to encrypt the plan text. Intermedate encrypted stream goes through another trangular cpher process. A secret key s also fabrcated n the process of encrypton as cascaded manner. Ths ntermedate cpher text s agan encrypted to form the fnal cpher text through channg and cascaded xorng of dentcal weght vector wth the dentcal length ntermedate cpher text block. If sze of the last block of ntermedate cpher text s less than the sze of the key then ths block s kept unchanged. Recever wll use dentcal weght vector for performng decpherng process for gettng the trangular encrypted cpher text and secret key for decodng. Fnally GA secret key helps to generate ultmate plan text. A sesson key based transmsson has also been proposed usng 161-bt key format of 14 dfferent segments [7,8]. Parametrc tests are done and results are compared n terms of Ch-Square test, response tme n transmsson wth some exstng classcal technques, whch shows comparable results for the proposed system. Keywords: Deep Learnng, weght vector, nput vector, sub key, sesson key, channg, wrappng technque. INTRODUCTION These days a varety of technques are avalable to defend data and nformaton from eavesdroppers [2-9, 11, 20, 21, 22]. Every algorthm has ts own advantages and dsadvantages. For Example n DES, AES algorthms [1] the cpher block length s nflexble. RBCMPCC [14] allow only one cpher block encodng. In RPSP algorthm [15] any ntermedate blocks durng ts cycle taken as the encrypted block and ths number of teratons acts as secret key. The organzaton of ths paper s as follows. Secton II of the paper deals wth the proposed synchronzaton and key generaton technque and also random block length based cryptographc technques. Sesson key based encrypton technque has been dscussed n secton III. Example of ths technque s gven n secton IV. Complexty of the algorthm s presented n secton V. Results are presented n secton VI. Analyss regardng varous aspects of the technque has been presented n secton VII. Conclusons are drawn n secton VIII and that of references at end. THE TECHNIQUE In proposed technque Genetc key s used to encrypt the plan text. Then ths ntermedate GA encrypted stream goes through another round of trangular encrypton process. Secret key s padded wth the last block of ntermedate trangular encrypted text. Ths ntermedate and padded cpher text s agan encrypted to form the fnal cpher text usng channg of cascaded xorng of ntermedate cpher text wth the dentcal neural secret key. Usng the same weght vector recever performs the reverse technque. Secton II.A deals wth key generaton technque and that of secton II.B and II.C descrbes the encrypton and decrypton technques respectvely. A. Neural synchronzaton scheme & secret key At the begnnng of the transmsson, a neural network based secret key generaton s performed between recever and sender. The same may be done through the prvate channel also or t may be done n some other tme, whch s absolutely free from encrypton. Fgure 1 shows the tree based generaton process usng random number of nodes (neurons) and the correspondng algorthm s gven n twosub secton II.A.1 and II.A.2. Fgure 1. A tree party machne wth K=3 and N=4 3631

2 .A.1. Neural Synchronzaton Algorthm Input: - Random weghts, nput vectors for both neural networks Output: - Secret key through synchronzaton of nput and output neurons as vectors. Method: - Each party (A and B) uses ts own (same) tree party machne. Neural network parameters: K, N, L s wll be dentcal for both partes and synchronzaton of the tree party machnes s acheved. Parameters: K - The number of hdden neurons. N - The number of nput neurons connected to each hdden neuron, total (K*N) nput neurons. L - The weght {-L..+L} Step 1. Intalze random weght s. Step 2. Repeat step 3 to 6 untl the full synchronzaton s acheved, usng hebban-learnng rules (eq. 3). Step 3. Generate random nput vector X. Inputs are generated by a thrd party (say the server) or one of the communcatng partes (fg. 2) Fgure 2. Neural network for sender and recever Step 4. Compute the s of the hdden neurons 1 f N sgn wj xj sgn x 0 f j1 1 f Step 5. Compute the of the output neuron K sgn N 1 j 1 x 0, x 0, x 0. w j x j Step 6. Compare the output s of both tree party machnes by exchangng between the networks Outputs are not same: Go to step 3 f Output (A) Output (B) else f Output (A) = Output (B) then one of the sutable learnng rule s appled to the weghts. Update the weghts only f the fnal output s of the neural machnes are (1) (2) equvalent. In ths paper we have used deep hebban-learnng rule for synchronzaton (eq. 3). When synchronzaton s fnally occurred, the synaptc weghts are same for both the networks. In each step there may be three possbltes: w w x A B 1. Output (A) Output (B): None of the partes updates ts weghts. 2. Output (A) = Output (B) = Output (E): All the three partes update weghts n ther tree party machnes. 3. Output (A) = Output (B) Output (E): Partes A and B update ther tree party machnes, but the attacker cannot do that. Because of ths crcumstance hs learnng s slower than the synchronzaton of partes A and B. The synchronzaton of two partes s faster than learnng of an attacker. Complexty: O(N) computatonal steps are needed to generate a key of length N. The average synchronzaton tme up to N=1000 asymptotcally one expects an ncrease lke O (log N). A.2. Fnal Key generaton usng Genetc Algorthm The technque consders the synchronzed weght vector from the n the form of blocks of bts wth dssmlar sze lke 8/16/32/64/128/256 becomes the 1 st chromosome of the 1 st generaton. Steps of Random numbers generaton (eq. 4) usng genetc functons,.e., crossover and mutaton respectvely. Assumpton about the generaton of random numbers: - Chromosomes representaton n Bnary, Populaton Sze s 10 (could be vared), Hence 5 generatons are requred to generate 50chromosomes f the number of block of characters s 50.The sequence of random numbers (chromosome) s generated va the followng teratve equaton. X ( a * X ) mod m (3) n1 nc (4) Where, Xn denotes the randomly selected 8 bts synchronzed weght vector whch becomes frst chromosome of the frst generaton, m -modulus (m > 0), a - multpler (0 <= a < m),c -ncrement (0 <= c < m). After cratng the 1 st generaton of the chromosomes, next generaton chromosomes are generated usng the GA operators CROSSOVER followed by MUTATION. In case of even generaton crossover s taken place from top to bottom n a sequental way by parng up chromosomes lke (1,2) (3,4) (5,6).In case of odd generaton crossover s take place from bottom to top n a sequental way by parng up chromosomes lke (50,49) (48,47) (46,45) Consder 284, 7000, 9024, 4025, 1235, 2564, 654, 6526, 3652, 124, as frst generaton chromosomes. 2 nd generaton chromosomes are obtaned by Parng up lke (284, 7000), (9024, 4025), (1235, 2564), (654, 6526), (3652, 124) 3632

3 Here, crossover and mutaton wll be perform let at 4 th locus of the gene of chromosome. Consder bnary representaton of chromosomes as 284= = The output stream on crossover s The output generated on mutaton s = =6428 (Mutaton of 4 th bt). Up to 5 th generaton same technque s use to generate 50 chromosomes (Each generaton 10 populatons) and get the fnal set of numbers. Encrypton 1. Once all the numbers are generated then let ths array of numbers be called GENETIC_ARRAY and select the LAST dgt of each number from GENETIC _ARRAY and a new collecton of numbers s generated and let ths collecton s called CODED_ARRAY. 2. Use ths numbers from CODED _ARRAY sequentally for substtutng on a one-to-one bass for the characters of the plan text. 3. Use ASCII s of the plan text characters and ADD the numbers of CODED_ARRAY from the ASCII s. For example the message ARINDAM the CIPHER TEXT wll be calculated accordng to followng method. LET GENETIC _ARRAY = {2365, 1211, 8526, 1258, 7639, 4584,3982} Table I: Genetc Algorthm Based Encrypton Character ASCII GENETIC_ARRAY Addton Result Value Number Taken sequentally A (F) R (S) I (O) N (V) D (M) A (E) M (O) ntermedate sub-stream S 1 s also then par-wse XORed to generate S 2 = s 2 0 s 2 1 s 2 2 s 2 3 s 2 4 s 2 5 s 2 n-3, whch s the 2 nd ntermedate sub-stream of length (n-2). The method terates (n-1) tmes to produce S n-1 = s n-1 0, whch s a sngle bt only. So, the sze of the 1 st mdway sub-stream s one bt fewer than the source sub-stream; the sze of each of the ntermedate sub-streams startng from the 2 nd one s one bt less than that of the sub- stream wherefrom t was generated; and fnally the sze of the fnal sub-stream n the process s one bt less than the fnal ntermedate sub-stream. Fgure 3 shows the process. Table II: Optons for choosng Target Block from Trangle Opton Target Block Seral No s 0 0 s 1 0 s 2 0 s 3 0 s 4 0 s 5 0 s n-2 0 s n-1 0 s n-1 0 s n-2 0 s n-3 0 s n-4 0 s n-5 0 s 1 0 s 0 0 s 0 n-1 s 1 n-2 s 2 n-3 s 3 n-4 s 4 n-5 s n-2 1 s n-1 0 s n-1 0 s n-2 1 s n-3 2 s n-4 3 s n-5 4 s 1 n-2 s 0 n-1 Method of Formaton Takng all the MSBs startng from the source block tll the last block generated Takng all the MSBs startng from the last block generated tll the source block Takng all the LSBs startng from the source block tll the last block generated Takng all the LSBs startng from the last block generated tll the source block The ntermedate cpher text s FSOVMEO from table I. Now ths ntermedate encrypted stream s consder as an nput source block to the next level of encrypton procedure. B.Ttrangularzaton Durng encrypton, consder a block S = s 0 0 s 0 1 s 0 2 s 0 3 s 0 4 s 0 5 s 0 n-2 s 0 n-1 of sze n bts, where s 0 = 0 or 1 for 0 <= <= (n- 1). Now, startng from MSB (s 0 0) and the next-to-msb (s 0 1), bts are par-wse XORed, so that the 1 st ntermedate substream S 1 = s 1 0 s 1 1 s 1 2 s 1 3 s 1 4 s 1 5 s 1 n-2 s generated consstng of (n-1) bts, where s 1 j = s 0 j s 0 j+1 for 0 <= j <= n- 2, stands for the exclusve OR operaton. Ths 1 st Opton Seral No. 010 Opton Seral No. 100 Opton Seral No. 001 Opton Seral No. 011 Fgure 3. Dagrammatc Representaton of Optons for choosng Target Block from Trangle Table II s for optons for choosng target block from trangle. Now sze of each encrypted block under consderaton and optons chosen for ths partcular block merged together. In ths way a ntermedate key s formed and padded wth the encrypted block. Then the neural secret key s use to xored wth the same length frst ntermedate cpher text block to produce the frst fnal cpher block (neural secret key XOR 3633

4 wth same length cpher text). Ths newly generated block agan xored wth the mmedate next block and so on. Ths channg of cascaded xorng mechansm s performed untl all the blocks get exhausted. If the last block sze of ntermedate cpher text s less than the requre xorng block sze (.e. weght vector sze) then ths block s kept unchanged C. Decrypton Technque Durng decrypton, the encrypted message s converted nto the correspondng stream of bts and then ths stream s decomposed nto a fnte set of blocks, each consstng of a fnte set of bts usng same rule of encrypton. It s to be noted that the recever wll take dentcal weght vectors and same neural key generaton algorthm s use to generate the neural key. Then cascaded xorng operaton s performed usng dentcal neural secret key wth the cpher text. The technque of performng xorng s same that was n encrypton process. Fnally from the outcomes ntermedate encrypted block (E) and key block s extracted and now key s use to decpher the E to get the ntermedate source stream. To ease the explanaton of decrypton technque, let us consder, e 0-1 = s -1 n- for 1 <= <= n, so that the encrypted block becomes E = e 0 0 e 0 1 e 0 2 e 0 3 e 0 4 e 0 n-2 e 0 n-1. Now, followng the same approach as mentoned n secton 3.2.1, a trangle s to be formed. After the formaton of the trangle, for the purpose of decrypton, the block e n-1 0 e n-2 0 e n-3 0 e n-4 0 e n-5 0 e 1 0 e 0 0,.e., the block constructed by takng all the MSBs of the blocks startng from the fnally generated sngle-bt block E n-1 to E, are to be taken together and t s to be consdered as the decrypted block. Fgure 4 show the trangle generated and hence the decrypted block obtaned. Here the ntermedate blocks are referred to as E 1, E 2,, E n-2 and the fnal block generated as E n-1. Opton Seral No. 010 Opton Seral No. 100 Opton Seral No. 001 Opton Seral No. 011 Fgure 4. Generaton of Source Block from Target Result (R) Table III: Genetc Algorthm Based Decrypton For loop I =0 to 255 Do (I R) & Compare Wth CODED _ARRAY & Choose I Character A R I N D A M SESSION KEY GENERATION To ensure secured encrypton of the proposed technque wth varyng sze of blocks, a 161 bt key format consstng of 14 dfferent segment has been proposed here [7,8]. The secton of rank the R, there can exst a utmost of N=218-R blocks, each of unque sze of S=218-R, R startng from 1 and movng tll 14.Full nput s dvded nto blocks of varous szes based on the sesson key. Fgure bt key format Segment wth R=1 formed wth the frst maxmum blocks, each of sze bts Segment wth R=2 formed wth the frst maxmum blocks, each of sze bts Segment wth R=3,4,5,----,14 formed wth the next maxmum 32768, 16384,8192,----,16 blocks, each of sze 32768, 16384,8192, ,16 bts respectvely. Wth such a structure, the key space becomes 147 bts long and a stream of the maxmum sze 2.6 GB can be encrypted usng the proposed technque. The key structure s represented n Fgure 5.Ths sesson key may be used durng each sesson as a random manner to enhance the securty of wreless communcaton. EXAMPLE Fnally, table III Genetc Algorthm based decrypton procedure s use to get orgnal plan text. In ths secton, we consder Genetc Algorthm based encrypted stream as a source stream. Secton IV.A shows how the GA based encrypted text s further encrypted and secton IV.B descrbes the process of decrypton. 3634

5 A The Process of Encrypton: Fgure 6. Formaton of Trangle for S = Fgure 6 shows the trangle formaton of 1 st 8 bts source block. Table IV: Dfferent Target Blocks for S = Source Block S Target Block Correspondng to Seral No. Target Block T 001 T 1 = T 2 = T 3 = T 4 = Table IV shows that dfferent target (decrypted) block for a partcular source block dependng on dfferent opton seral no (001,010,011,100). For dfferent 8/16/32/64/128 bt blocks dfferent opton seral no can be chosen. B The Process of Decrypton: For target blocks T 1 = and T 4 = , the same approach s to be followed to generate the correspondng source blocks. But blocks T 2 = and T 3 = requre dfferent technques. Fgure 7 show the generatons of source block from target blocks T Fgure7. Source Block S = from Target Block T 2 = After stuffng the key wth the above mdway cpher text and xorng wth the neural secret key, fnal encrypted cpher text s generated. At the destnaton pont, recever s secret neural key s use to xorng the cpher text to get back the key and ntermedate cpher text. Now, by that secret key, the recever gets the nformaton on dfferent block lengths.in ths way all the source blocks of bts are regenerated and combnng those blocks n the same sequence and performng GA based decrypton the source stream of bts are obtaned to get the source message or the plantext. RESULTS In ths secton the results of mplementaton of the proposed technque has been presented n terms of encrypton decrypton tme, Ch-Square test, source fle sze vs. encrypton tme along wth source fle sze vs. encrypted fle sze. The results are also compared wth exstng RSA technque. Source Sze (bytes) Encrypton & decrypton tme Table V: ENCRYPTION / DECRYPTION TIME VS. FILE SIZE Encrypton Tme (s) Decrypton Tme (s) Proposed RPSP Encrypted ANNGKE Sze (bytes) Source sze Proposed RPSP ANNGKE Table V shows encrypton and decrypton tme wth respect to the source and encrypted sze respectvely. It s also observed the alternaton of the sze on encrypton. In fgure 8 stream sze s represented along X axs and encrypton / decrypton tme s represented along Y-axs. Ths graph s not lnear, because of dfferent tme requrement for fndng approprate random number for dfferent block sze. The decrypton tme s approxmately lnear, snce there s no random number generaton durng decrypton Encrypton Decrypton Fgure 8. Source sze vs. encrypton tme & decrypton tme 3635

6 Table VI shows Ch-Square for dfferent source stream sze after applyng dfferent encrypton algorthms. It s seen that the Ch-Square of ANNGKE s better compared to the algorthm RBCMPCC and comparable to the Ch-Square of the RSA algorthm. Stream Sze (bytes) Table VI: Source sze vs. Ch-Square Ch- Square (TDES) Ch-Square (Proposed ANNGKE) Fgure 9 shows graphcal representaton of table VI. Fgure 9. Source sze vs. Ch-Square COMPLEXITY OF THE TECHNIQUE Ch-Square (RBCM CPCC) Ch- Square (RSA) The proposed technque has a complexty of O(L), whch can be computed usng followng three steps. Step 1:To generate a key of length N needs O(N) Computatonal steps. The average synchronzaton tme s almost ndependent of the sze N of the networks, at least up to N=1000.Asymptotcally one expects an ncrease lke O (log N). Step 2: Complexty of the encrypton technque s O(L). Step2.1:Genetc Algorthm based encrypton technque of the source block S = s 0 s 1 s 2 s 3 s 4 s L-1, takes O (L) amount of tme. Step 2.2:Trangular encrypton process takes O(L). Step 2.3: Neural weght encrypton technque s carred out whch generates the complexty as O (L). Step 3: Complexty of the decrypton technque s O(L). Step 3.1: Neural weght decrypton technque. So tme complexty s O(L). Step 3.2: Trangular decrypton process takes O(L). Step3.3:In Genetc Algorthm based decrypton technque, complexty to convert T nto the correspondng stream of bts S = s 0 s 1 s 2 s 3 s 4 s L-1, whch s the source block s O(L) as ths step also takes constant amount of tme for mergng s 0 s 1 s 2 s 3 s 4 s L-1. So, overall tme complexty of the entre technque s O(L). ANALYSIS OF RESULT From expermental results t s clear that the proposed technque may acheve optmal performances. Encrypton tme and decrypton tme vares almost lnearly wth respect to the block sze For the proposed algorthm Ch-Square s very hgh compared to some exstng algorthms. In the RBCMCPCC [14] a user nput key (mnmum length of eght byte) and a set of arbtrarly generated sesson keys are used to encrypt a source block. But ths key generaton technque s not sustanable aganst attack. Because RBCMCPCC key potency thoroughly depend upon strengthness of user nput key. A user nput key has to transmt over the publc channel all the way to the recever for performng the decrypton procedure. So there s a lkelhood of attack at the tme of key exchange. To defeat ths nsecure secret key generaton technque a neural network based secret key generaton technque has been proposed. The securty ssue of RBCMCPCC and RPSP [15] algorthm can be mproved by usng neural secret sub key generaton technque. In ths case, the two partners A and B do not have to share a common secret but use ther ndstngushable weghts as a secret key needed for encrypton. The fundamental concepton of neural network based key exchange protocol [10,12,13,16,17,18,19] focuses mostly on two key attrbutes of neural networks. Frstly, two nodes coupled over a publc channel wll synchronze even though each ndvdual network exhbts dsorganzed behavor. Secondly, an outsde network, even f dentcal to the two communcatng networks, wll fnd t exceptonally dffcult to synchronze wth those partes, those partes are communcatng over a publc network. An attacker E who knows all the partculars of the algorthm and records through ths channel fnds t thorny to synchronze wth the partes, and hence to calculate the common secret key. Synchronzaton by mutual learnng (A and B) s much qucker than learnng by lstenng (E) [17]. For usual cryptographc systems, we can mprove the safety of the protocol by ncreasng of the key length. In the case of neural cryptography, we mprove t by ncreasng the synaptc depth L of the neural networks. For a brute force attack usng K hdden neurons, K*N nput neurons and boundary of weghts L, gves (2L+1)KN possbltes. For example, the confguraton K = 3,L = 3 and N = 100 gves us 3*10253 key possbltes, makng the attack unfeasble wth today s computer power. E could start from all of the (2L+1)3N ntal weght vectors and calculate the ones whch are consstent wth the nput/output sequence. It has been shown, that all of these ntal states move towards the same fnal weght vector, the key s unque. Ths s not true for smple perceptron the most unbeaten cryptanalyss has two supplementary ngredents frst; a group of attacker s used. Second, E makes extra tranng steps when A and B are quet. So ncreasng synaptc depth L of the neural networks we can make our neural network safe. 3636

7 CONCLUSIONS Ths paper presents a novel approach for generaton of secret key proposed algorthm usng neural cryptography. Ths technque enhances the securty features of the RBCMCCC and RPSP algorthm by ncreasng of the synaptc depth L of the neural networks. In ths case, the two partners A and B do not have to exchange a common secret key over a publc channel but use ther ndstngushable weghts as a secret key needed for encrypton or decrypton. So lkelhood of attack proposed technque s much lesser than the smple RBCMCCC algorthm. REFERENCES [1] Kahate, A. (2010). Cryptography and Network Securty, 2 nd edton, Tata McGraw Hll. [2] Dffe, W., & Hellman, M. (1976). New drectons n cryptography, IEEE Trans. Inform. Theory, 22(6), pp [3] Zhang, R., Shen, J., We, F., L, X., & Sangaah, A. K. (2017). Medcal mage classfcaton based on multscale non-negatve sparse codng. Artfcal Intellgence n Medcne. [4] Anurag Roy and Asoke Nath, DNA Encrypton Algorthms: Scope and Challenges n Symmetrc Key Cryptography, IJIRAE [5] Kals, S., Kaur, H. & Chang, V. J Med Syst (2018) 42: Sprnger US, ISSN: [6] Lao, X., Yn, J., Guo, S., L, X., & Sangaah, A. K. (2017). Medcal JPEG mage steganography based on preservng nterblock dependences. Computers & Electrcal Engneerng. [7] Anusudha, K., Venkateswaran, N. & Valarmath, J. Multmed Tools Appl (2017) 76 (2), pp , Sprnger US, Prnt ISSN , Onlne ISSN [8] Al-Haj, A., Mohammad, A. & Amer(2017) A. J Dgt Imagng 30(1), pp 26 38https://do.org/ /s [9] Chen, C., Xang, H., Qu, T., Wang, C., Zhou, Yang., Chang, V. A rear-end collson predcton scheme based on deep learnng n the Internet of Vehcles, Journal of Parallel and Dstrbuted Computng, [10] Sarkar, A., & Mandal, J. K. (2014). Cryptanalyss of Key Exchange method n Wreless Communcaton (CKE). Internatonal Journal of Network Securty (IJNS), 17(4), , ISSN [Onlne]; X [Prnt]. [11] Sarkar, A., & Mandal, J. K. (2014). Computatonal Scence guded Soft Computng based Cryptographc Technque usng Ant Colony Intellgence for Wreless Communcaton (ACICT). Internatonal Journal of Computatonal Scence and Applcatons (IJCSA), 4(5), 61-73, DOI: /jcsa , ISSN [12] Sarkar, A., & Mandal, J. K. (2014). Soft Computng based Cryptographc Technque usng Kohonen's Self- Organzng Map Synchronzaton for Wreless communcaton (KSOMSCT). Internatonal Journal n Foundatons of Computer Scence & Technology (IJFCST), 4(5), , DOI: /jfcst , ISSN [13] Sarkar, A., & Mandal, J. K. (2013). Computatonal Intellgence based Trple Layer Perceptron Model Coordnated PSO guded Metamorphosed based Applcaton n Cryptographc Technque for Secured Communcaton (TLPPSO). In Proceedngs of the Frst Internatonal Conference on Computatonal Intellgence: Modelng, Technques and Applcatons (CIMTA-2013), Vol.10, pp , DOI: /j.protcy , ISSN: , September , Department of Computer Scence & Engneerng, Unversty of Kalyan, Kalyan, Inda, Proceda Technology, Elsever. [14] Jayanta Kumar Pal, J. K. Mandal A Random Block Length Based Cryptosystem through Multple Cascaded Permutaton Combnatons and Channg of Blocks Fourth Internatonal Conference on Industral and Informaton Systems, ICIIS 2009, 28 31December2009, SrLanka. [15] J. K. Mandal, et al, A 256-bt Recursve Par Party Encoder for Encrypton, Advances n Modelng, D; Computer Scence & Statstcs (AMSE), vol. 9, No. 1, pp. 1-14, France, [16] T. Godhavar, N. R. Alanelu and R. Soundararajan Cryptography Usng Neural Network IEEE Indcon 2005 Conference, Chenna, Inda, Dec ggggjgggggggggggg [17] Wolfgang Knzel and ldo Kanter, "Interactng neural networks and cryptography", Advances n Sold State Physcs, Ed. by B. Kramer (Sprnger, Berln. 2002), Vol. 42, p. 383 arxv- cond-mat/ [18] Wolfgang Knzel and ldo Kanter, "Neural cryptography" proceedngs of the 9 th nternatonal conference on Neural Informaton processng(iconip 02).h [19] Dong Hu "A new servce based computng securty model wth neural cryptography"ieee07/2009.j [20] Jha P. K., Mandal, J. K., Encrypton Through Cascaded Recursve Key Rotaton of a Sesson Key wthtransposton and Addton of Blocks (CRKRTAB) Proceedngs of Natonal conference on Recent Trends n Informaton Systems 2006, organzed by IEEE Kolkata secton, Jadavpur Unversty, Kolkata held on July 14-15th, pp [21] Jha P. K., Nayak, A.K., An Encrypton Technque through Btwse Operaton of Blocks (BOB) accepted tothe 97th Indan Scence Congress, to be held n Kerala, Jan 2010, Inda. [22] Saurabh Dutta, Ph. D. Thess An Approach Towards Development of Effcent encrypton Technques The Unversty of North Bengal, Inda,

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

NEURO GENETIC KEY BASED RECURSIVE MODULO-2 SUBSTITUTION USING MUTATED CHARACTER FOR ONLINE WIRELESS COMMUNICATION (NGKRMSMC)

NEURO GENETIC KEY BASED RECURSIVE MODULO-2 SUBSTITUTION USING MUTATED CHARACTER FOR ONLINE WIRELESS COMMUNICATION (NGKRMSMC) NEURO GENETIC KEY BASED RECURSIVE MODULO-2 SUBSTITUTION USING MUTATED CHARACTER FOR ONLINE WIRELESS COMMUNICATION (NGKRMSMC) Arindam Sarkar and J. K. Mandal Department of Computer Science & Engineering,

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm

Vectorization of Image Outlines Using Rational Spline and Genetic Algorithm 01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A Comparative Analysis of Encryption Algorithms for Better Utilization

A Comparative Analysis of Encryption Algorithms for Better Utilization A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

IMAGE FUSION TECHNIQUES

IMAGE FUSION TECHNIQUES Int. J. Chem. Sc.: 14(S3), 2016, 812-816 ISSN 0972-768X www.sadgurupublcatons.com IMAGE FUSION TECHNIQUES A Short Note P. SUBRAMANIAN *, M. SOWNDARIYA, S. SWATHI and SAINTA MONICA ECE Department, Aarupada

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

An Ensemble Learning algorithm for Blind Signal Separation Problem

An Ensemble Learning algorithm for Blind Signal Separation Problem An Ensemble Learnng algorthm for Blnd Sgnal Separaton Problem Yan L 1 and Peng Wen 1 Department of Mathematcs and Computng, Faculty of Engneerng and Surveyng The Unversty of Southern Queensland, Queensland,

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks

Reliable and Efficient Routing Using Adaptive Genetic Algorithm in Packet Switched Networks IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 168 Relable and Effcent Routng Usng Adaptve Genetc Algorthm n Packet Swtched

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Dynamic wetting property investigation of AFM tips in micro/nanoscale

Dynamic wetting property investigation of AFM tips in micro/nanoscale Dynamc wettng property nvestgaton of AFM tps n mcro/nanoscale The wettng propertes of AFM probe tps are of concern n AFM tp related force measurement, fabrcaton, and manpulaton technques, such as dp-pen

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

A Serial and Parallel Genetic Based Learning Algorithm for Bayesian Classifier to Predict Metabolic Syndrome

A Serial and Parallel Genetic Based Learning Algorithm for Bayesian Classifier to Predict Metabolic Syndrome A Seral and Parallel Genetc Based Learnng Algorthm for Bayesan Classfer to Predct Metabolc Syndrome S. Dehur Department of Informaton and Communcaton Technology Fakr Mohan Unversty, Vyasa Vhar Balasore-756019,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION 1 THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Seres A, OF THE ROMANIAN ACADEMY Volume 4, Number 2/2003, pp.000-000 A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION Tudor BARBU Insttute

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information