Two Factor Authentication Based Generated One Time Password

Size: px
Start display at page:

Download "Two Factor Authentication Based Generated One Time Password"

Transcription

1 Dr. Hlal Had Computer Scences Department, Unversty of Technology/Baghdad Rana Faeez Computer Scences Department, Unversty of Technology/Baghdad Emal: Revsed on:12/10/2014 & Accepted on: 7/5/2015 ABSTRACT: Ths paper explans a method of how the two factors authentcaton mplemented usng software token to generate (OTP) to secure users accounts. The proposed method guarantees authentcatng e-learnng features. The proposed system nvolves generatng of OTP by usng authentcaton web servce. The generated code s vald for only one logn and t s verfed usng Secured Cryptographc Algorthm. The proposed system has been mplemented and tested successfully. التخویل ثناي ي العوامل بالاعتماد على كلمة المرور المتولدة مرة واحدة الخلاصة: ھذا البحث یوضح طریقة كیفیة تمثیل التخویل ثناي ي العوامل باستخدام برنامج الرمز لتولید OTP لتا مین حسابات المستخدمین. الطریقة المقترحة تضمن توثیق میزات التعلم الالكتروني. النظام المقترح یتضمن تولید كلمة المرور المستخدمة لمرة واحدة باستخدام مصادقة خدمة الویب OTP المولد یكون صالح لتسجیل دخول واحد فقط ویتم التحقق منھ باستخدام خوارزمیة التشفیر المو منة. وقد تم تنفیذ النظام المقترح واختباره بنجاح. Keywords: Authentcaton, OTP, HMAC,SHA256, DES INTRODUCTION Securty s a major concern today n all sectors such as educatonal nsttutons, governmental applcatons, mltary organzatons, banks, etc. The rapd growth n the number of onlne servces leads to an ncreasng number of dfferent dgtal denttes each user needs to manage. But statc passwords are perhaps the most common type of credental used today [1]. In spte of statc password s short and easy, But t has many dsadvantages they are based on subjects close to the user - weddng date, chldren's name. When dfferent systems have dfferent passwords they can be dffcult to remember and may have to be wrtten down rasng ther vulnerablty [2]. To overcome statc password drawbacks, a new method was nvented that s called "One Tme Password (OTP)" OTP s a password that vald for only one logn sesson or 373

2 transacton. Ths OTP allows the user to get logn nto the system by enterng hs password wth OTP [3]. Some solutons based on hardware token to generate OTP, but tokens need cost to purchasng and managng. Tokens are vulnerable to be lost or stolen. So we propose a securely generated and verfed OTP based web servce. The OTP generator s nstalled on each clent computer, whch users run to generate a new OTP wth a predefned expre tme. INCEPTION E-learnng systems represent a new form of learnng and are becomng more and more popular every day. Hence, securty n e-learnng has become a fundamental requrement. But the problem of e-learnng systems s that only lttle money nvested for securty. Also to authentcate an e-learner s a major challenge n an e-learnng envronment. The role of authentcaton technques to prevent unauthorzed access by malcous users becomes more sgnfcant [4]. Authentcaton s the act of creatng or valdatng somethng (or someone) as authentc and clams made about the topc are true. User authentcaton methods can be classfed nto three categores: (1) Methods based on human memory (What you know) such as passwords. (2)Methods based on physcal devces (What you have) such as magnetc, token, etc. (3) Methods based on bometrcs(what you are) such as fngerprnt, rs, etc. Tokens could be a hardware and software. The use of tokens provdes a much safer envronment for users, but t can be very costly for organzatons. For example, an e- learnng foundaton wth hundred learners wll have to purchase, nstall, and mantan a hundred tokens. Furthermore, the foundaton has to provde contnuous support for tranng learners on how to use the tokens [5]. From the user's perspectve, havng an account wth more than one foundaton means need to carry and mantan several tokens whch consttute a bg nconvenence and can lead to tokens beng lost, stolen, or broken. So we propose a computer-based software token that wll save the organzatons, the cost of purchasng and mantanng the hardware tokens [6]. ONE TIME PASSWORDS A (OTP) s just what the names mples, a password that s only vald for one logn. The beneft of OTPs s that t offers much hgher securty than statc passwords, n expense of user frendlness and confguraton ssues. OTPs are mmune aganst password snffng attacks.otp can be generated usng dfferent methods [7]: -Tme-based OTPs: A devce wth an nternal clock generates passwords that are dependng on the current tme, and the same password s generated at the authentcaton server. The generated OTP s only vald for a short perod of tme, before t expres [8]. - Counter-synchronzed OTPs: A counter s synchronzed between the authentcaton server and the devce. For each logn the counter advance one step n the devce and n the server [9].-Seed-chan 374

3 OTPs: In ths method, a prevous entered OTP s used as a seed to generate a new OTP, buldng a chan of passwords that all depend on the prevous password. The passwords wll be prnted out on a pece of paper, and the user wll have to follow the lst n the correct order to be able to log n [2]. -Challenge-based OTPs: These knds of OTPs are used together wth two-factor authentcaton. A user has to put a challenge nto the generatng devce (often a PIN code) n order to generate the OTP [10]. Extng HOTP Algorthm The Hash Message Authentcaton Code (HMAC) -based (HOTP) algorthm [11] s based on an ncreasng counter value and a statc symmetrc key known only to the token and the valdaton servce. In order to create the HOTP value, we wll use the HMAC-SHA-1algorthm.As the output of the HMAC-SHA-1 calculaton s 160 bts, we must truncate ths value to somethng that can be easly entered by a user. A bref descrpton of HMAC-SHA-1 gven n the followng: HOTP (K, C) = Truncate (HMAC-SHA-1(K, C)) (1) Where: Truncate represents the functon that converts an HMAC-SHA-1 value nto an HOTP value The Key (K), the Counter (C), and Data values are hashed hgh-order byte frst. [11] Wth a strong foundaton of the exstng HOTP algorthm, t s necessary to know where the changes should be ncorporated to adapt t to our specfcatons whle retanng ts strengths. Fgure (1) flow dagram provdes graphcal summary of the workng and generaton of OTP usng ths algorthm. The heart of the algorthm s the HMAC-SHA-1 dgest that s produced. HMAC s not a hash functon. It s a message authentcaton code (MAC) that uses the hash functon nternally. The HMAC-SHA-1 uses a shared "Key" wth the user and a "Counter" value as a seed to generate a 160 bts message dgest. The counter value changes wth every logn and thus provdes randomness. Ths 160 bts message dgest s then suppled to a truncaton functon that generates a 6 dgt OTP usng modulo functon [11]. Fgure (1).Flow dagram of the exstng algorthm[12] 375

4 For better securty t s recommended the use of 7-dgt or 8-dgt OTPs. The Chnese group [13] proved that t was possble to break SHA1 hashes. Although HMAC-SHA1 s not compromsed due to the breaks n SHA1 hash functon, t s a good dea to use another hash algorthm whch gves more securty aspects and fnds a schema to ncrease the randomness of the produced OTP. System Desgn and Implementaton In ths paper, the proposed computer-based software token was mplemented and tested. That s supposed to replace exstng hardware token devces. The System nvolves generaton of Secured OTP usng Cryptographc algorthm and verfy the authentcated users to access to the allowed servces, the proposed OTP generator wll be nstalled on each clent computer, whch users wll run to generate a new OTP. The user wll type the OTP value when prompted by the web browser and clcks submt. The authentcaton server calls a web servce to verfy authentcaton attempts by usng the same Cryptographc algorthm and the user nformaton from the SQL server table check the OTP computaton to respond wth success or falure. The Proposed OTP Algorthm To buld strong authentcaton system, the generated OTP must be unpredcted, hgh randomness, hard to retreve by hackers; therefore, there s a need to develop a secure OTP algorthm. The followng factors wll be used to generate OTP: User name: unque name that dentfes each regstered user wth the system. Password: secret phrase for each user, that submts to the system durng regstraton actvty. (Somethng the user knows). E-mal: electronc mal for the user. Phone number: phone number of the user. Algorthm1: Proposed OTP Generaton Algorthm Input : The value of current counter, C. User nformaton n bts. The value of the user key, K. Output: OTP of length 8-dgts. Processng: Part A // (HMAC-SHA256 ) Step1: Makng concatenate the user nformaton wth C and encode as a message. Step2: calculate the (HMAC-SHA256) to the result from step1 wth the key, K. Step3: Passng the result of step2 n part A to truncate operaton. 376

5 Part B // (Truncate Operaton) Step1: Splt the receved result from HMAC-SHA256 nto four sub groups each wth (8 bytes) length. Step2: Apply Data Encrypton Standards-Permutaton Choce1 (DES-PC1) to each of these sub groups to produce four sub groups each wth (7 bytes) length. Step3: Apply (DES-PC2) to the result of prevous step to produce four groups each wth (6 bytes) length. Step4: Apply (DES- 8 substtuton boxes) to the result of step3 to produce four sub groups each wth (4 bytes) length. Step5: Makng XOR between the results groups as follow A = group1 XOR group3 B = group2 XOR group4 Step6: makng XOR between group A and group B, to produce the fnal group whch s (32 bts). Step7: Splt the fnal 32 bts nto 8 sub-groups each wth 4 bts length. Step8: Convertng the groups of step7 to hexadecmal. Step9: convertng the Asc values to character strng. Step10: Dsplay the fnal result from step9 to the user as (OTP). End Fgure (2). Show the flow dagram of Algorthm (1). Fgure(2)Flow dagram of the proposed algorthm 377

6 System Modules Regstraton Phase The servce provder dsplays logn screen to the users. Then users create an account by submttng the requred nformaton and clck on submt button n logn page. The nformaton entered durng the regstraton are stored n a database.the URL lnk of the OTP applcaton wll be sent to the e-mal address of the user. Now the user downloads ths applcaton to generate the OTP. Fgure(2) shows the regstraton page. Fgure (3). Regstraton page A. Authentcaton Phase Processng of authentcaton model descrbed n Fg. (4). 1. The user logs n to the servce provder s web ste, e.g.: an E-Learnng ste, requestng access, As a response to ths access request, secure sesson establshed allowng the user enter hs authentcaton prvleges (user name, password) The frst factor of authentcaton. 2. The servce provder verfes user nformaton by checkng f t s exst n the SQL DB. 3. If the verfcaton was successful, return to user success message and requres OTP, Else gves falure message to the user and suggests vstng the regstraton page. 4. The user run the OTP applcaton on hs/her computer and generates OTP based on the user nformaton, current count, and the secret key. 5. The user logs n web ste by submttng the password and the generated OTP. 6. The servce provder generates OTP based on the current counter, secret key of ths user, and the retreved user nformaton from the DB. 7. Verfy the OTP, f the generated OTP by the provder s the same as the receved OTP from the user, return logn success else logn falure. 378

7 At user end User logn usng 1 If match User name/ password At server end 2 Match user name/ password n DB 4 The user generates OTP 3 Return a request of OTP to the user 5 Logs by OTP + password 6 Generate OTP based on user nfo., current counterand secret key If receved OTP = generated OTP 7 Logn success Fgure (4) Processng of the model OTP Illustraton The user nfo, random secret key and current counter all are the nputs to the proposed algorthm to produce (32bytes), whch reduced to 8 characters OTP code. For example, the user nfo as n (fg.5), current counter s 64bts 7b4510c4ef07b198 and the random secret key value was 256bts 77ad4d0d33dd8954b3b3c4f ba6ae1fd fee e5cac.The result of the HMAC-SHA-256 was 46c96e730ecf3c755e75cdac4a46d50a616 f034011e97054fa9949eefb8b58a8, whch passed to truncaton operaton to be reduced to (32 bts). The result of truncaton was encoded to represent the OTP code, whch s 15821DC9 based of the above gven nput parameters. Ths code s vald for one logn only. 379

8 Fgure (5) Proposed software for OTP SystemTests and Analyss 1. Tests of randomness The randomness of the generated OTP depends on dfferent factors; the most mportant factor was the randomness of the secret key. The proposed algorthm uses SHA256 hash functon, the permutaton and substtuton of the DES and the XOR operaton. - The permutatons and substtutons wll ncrease the randomness of the generated OTP. - The XOR operaton have the property of preserve the randomness meanng that a random bt XOR wth a non-random bt wll result n a random bt. Multple sources of potentally random data can be combned usng XOR, and the unpredctablty of the output s guaranteed to be at least as good as the best ndvdual source [14]. To prove the randomness of the generated OTP, we experment the randomness by passng t through four popular tests of randomness[15]: A. Frequency Test The purpose of ths test s to determne whether the number of 0 s and 1 s n s are approxmately the same, as would be expected for a random sequence, Whch approxmately follows a α2 dstrbuton wth 1 degree of freedom f n 10 X1 = (n0 n1) 2 /n (2) B. Blocks Test The Block test dvdes a pattern nto blocks and examnes the number of 1s n each block. A random pattern would be expected to have about 50 percent 1s n every block. C. Runs Test The purpose of the runs test s to determne whether the number of runs (of ether zeros or ones) of varous lengths n the sequence s s as expected for a random sequence. The expected number of gaps (or blocks) of length n a random sequence of length n s e = (n +3)/2+2. Let k be equal to the largest nteger for whch e 5. Let B, G be the number of blocks and gaps, respectvely, of length n s for each, 1 k. The statstc used: K 2 K 2 ( b e ) ( g e ) X 2 = +. (3) e e = 1 = 1 380

9 Whch approxmately follows a α 2 (ch-square dstrbuton) wth 2k 2 degrees of freedom. D. Seral Test (Two-Bt Test) The purpose of ths test s to determne whether the number of occurrences of 00, 01, 10, and 11 as subsequences of s are approxmately the same, as would be expected for a random sequence. Let n0, n1 denote the number of 0 s and 1 s n s, respectvely, and let n00, n01, n10, n11 denote the number of occurrences of 00, 01, 10, 11 n s, respectvely. Note that n00 + n01 + n10 + n11 = (n 1) snce the subsequence's are allowed to overlap. The statstc used s X 3 = 4 /n 1 (n n n 2 10+n 2 11) 2/n (n 2 0+ n 2 1) (4) Whch approxmately follows a α2 (ch-square dstrbuton) wth 2 degrees of freedom f n 21. Example We test the OTP codes that produce to one user for two tmes logn to the system. The randomness tests gven n the followng: User name: Rana2014 Password: myaccount123 E-mal: rana_rah@yahoo.com Phone no.: Key: 77ad4d0d33dd8954b3b3c4f ba6ae1fd fee e5cac Count: 7b4510c4ef07b198 OTP: 15821DC User name: Rana2014 Password: myaccount123 E-mal: rana_rah@yahoo.com Phone no.: Key: 716f6e 863f 744b9ac22c97ec7b76ea5f5908bc5b2f67c6 1510bfc ea7a Count: 8b4510c4ef07b198 OTP: B4 2. Tme to generate a sngle OTP The tme to generate the OTP s governed only by the algorthm to generate the dgest. Ths tme s almost constant over the length of the OTP generated. Theaverage tme for 381

10 generaton of OTP was foundto range from ( ) second for OTP of sze OTP Entropy Entropy defne as lack of order or predctablty; gradual declne nto dsorder. Hgher OTP entropy the less predctable OTP patterns, so the stronger and more secure OTP [16]. Ths s a smple equaton to demonstrate OTP entropy: H total bnary bts of entropy L length of your password N number of possble symbols n password H = L * log 2 (N).. (5) Here below Table (1) Shows the Entropy of the generated OTP codes. Table (1) OTP Entropy Characters Equaton Bts Passwords 8 8 * log 2 (16) CONCLUSIONS 1. OTP generaton algorthms typcally make use of pseudo randomness or randomness. Ths s necessary because otherwse t would be easy to predct future OTPs by observng prevous ones. 2. If users lost ther pervous password then there s no need to worry for them because OTP gves them a new password for each sesson. 3. OTP prevents user d from replay or eaves droppng attack. 4. In ths work the proposed method for generatng the OTP was mplemented and tested, In future more work should be done on how to provde more securty n ths approach. REFERENCES [1]Josang and G. Sanderud, Securty n Moble Communcatons: Challenges and Opportuntes, n Proc. OfThe Australasan Informaton Securty Workshop Conference on ACSW Fronters. [2] E.Kalakavta,Julana Gnanaselv, Secure Logn Usng Encrypted One Tme Password (OTP)and Moble Based Logn Methodology, Department of Informaton Technology,Rathnam College of Arts and Scence College,2013. [3] B. Rajkumar, C. Yeo, S. Venugopal, S. Malpan, Cloud computng and Emergng IT platforms: vson, hype, and realty for Delverng Computng 5 th utlty, Future Generaton Computer Systems, [4] Asha, S., Chellappan, C., Authentcaton of E-learners Usng Multmodal Bometrc Technology, Department of Computer Scence Engneerng, Anna unversty, Chenna, IEEE,

11 [5] Fad Aloul, Syed Zahd Two Factor Authentcaton Usng Moble Phones, College of Informaton Technology, UAE Unversty. [6] George Sadowsky James X. Dempsey Alan Greenberg Barbara J. Mack Alan Schwartz, Informaton Technology Securty Handbook, Washngton, [7] Markus Johnsson,A.S.M. Faruqe Azam, Moble s and RC4 Encrypton for Cloud Computng, Master Thess, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty, [8] Young Sl Lee, Hyo Taek Lm, HoonJae Lee, A Study on Effcent OTP Generaton usng Stream Cpher wth Random Dgt, Advanced Communcaton Technology (ICACT), IEEE, [9] Hmka Parmar, Nancy Nanan, SumayaThaseen, Generaton of Secure One-Tme Password Based on Image Authentcaton,Computer Scence & Informaton Technology, VIT Unversty, Inda, [10] Vshal Paranjape,Vmm Pandey, An Approach towards Securty n Prvate Cloud Usng OTP, Internatonal Journal of Emergng Technology and Advanced Engneerng (IJETAE),Volume 3, Issue 3, March [11] Matthew Allan Ezell, A Framework for Federated Two-Factor Authentcaton Enablng Cost-Effectve Secure Access to Dstrbuted Cybernfrastructure, Master thess, Unversty of Tennessee, Knoxvlle. [12] RohtTolan, Anjal Yeole, SachnGavhane, An HOTP Based Algorthm to Enhance W-F Securty, Department of Computer Engneerng, V.E.S.I.T, [13] Pro. Xaoyun Wang and her assocates, SHA1 Broken,Tsnghua Unversty and Shandong Unversty of Technology,(Onlne) [14] Robert B Daves, Exclusve OR (XOR) and Hardware RandomNumber Generators, [15] J K M SadqueUzZaman,RanjanGhosh, A Revew Study of NIST Statstcal Test Sute: Development of an ndgenous Computer Package, Insttute of Rado Physcs and Electroncs, Unversty of Calcutta. [16] Jacob Ncholson Password Strength and Securty, 2014,(Onlne) 383

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin

Weaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton

More information

New Remote Mutual Authentication Scheme using Smart Cards

New Remote Mutual Authentication Scheme using Smart Cards 141 152 New Remote Mutual Authentcaton Scheme usng Smart Cards Rajaram Ramasamy*, Amutha Prabakar Munyand** * Thagarajar College of Engneerng, Madura, Taml Nadu 625 015, Inda E mal: rrajaram@tce.edu **

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A software agent enabled biometric security algorithm for secure file access in consumer storage devices

A software agent enabled biometric security algorithm for secure file access in consumer storage devices A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

An enhanced dynamic-id-based remote user authentication protocol with smart card

An enhanced dynamic-id-based remote user authentication protocol with smart card Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

arxiv: v1 [cs.cr] 20 Jun 2013

arxiv: v1 [cs.cr] 20 Jun 2013 arxv:306.4726v [cs.cr] 20 Jun 203 A secure and effectve anonymous authentcaton scheme for roamng servce n global moblty networks Dawe Zhao a,b Hapeng Peng a,b Lxang L a,b Yxan Yang a,b a Informaton Securty

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015)

International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) Internatonal Conference on Materals Engneerng and Informaton Technology Applcatons (MEITA 2015) Cryptanalyss of Vadya et al s User Authentcaton Scheme wth Key Agreement n Wreless Sensor Networks L Jpng

More information

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework

Providing Stronger Authentication at a LowCost to RFID Tags Operating under the EPCglobal Framework 2008 IEEE/IFIP Internatonal Conference on Embedded and Ubqutous Computng Provdng Stronger Authentcaton at a LowCost to RFID Tags Operatng under the EPCglobal Framework Pedro Pers-Lopez, ppers@nf.uc3m.es

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Secure and Fast Fingerprint Authentication on Smart Card

Secure and Fast Fingerprint Authentication on Smart Card SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 Internatonal Journal of Computer Scence Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Bometrc Based User Authentcaton n WSN Usng ABC Optmzaton D.Thamaraselv

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment

Parallel Implementation of Classification Algorithms Based on Cloud Computing Environment TELKOMNIKA, Vol.10, No.5, September 2012, pp. 1087~1092 e-issn: 2087-278X accredted by DGHE (DIKTI), Decree No: 51/Dkt/Kep/2010 1087 Parallel Implementaton of Classfcaton Algorthms Based on Cloud Computng

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information