International Journal of Advanced Research in Computer Science and Software Engineering
|
|
- Dylan Cole
- 5 years ago
- Views:
Transcription
1 Volume 2, Issue 9, September 2012 ISSN: X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: Performance Enancement of RSA Cryptograpy Algoritm by Membrane Computing Sala Zaer, Amr Badr & Ibraim Farag Faculty of computer & information Cairo University, Egypt Tarek Abd Elmageed Governmental Security Consultant Egypt Abstract Te problem of using RSA algoritm in cryptograpy is te long time it takes for te encryption process. To overcome te problem, RSA algoritm uses sort messages. In tis paper we make analysis for te RSA public key protocol in te framework of membrane computing to develop a membrane model of RSA algoritm wit performance improvement. Te approac as been validated by developing a simulation program in C++ of RSA algoritm using te property of parallel computing of membrane environment to enance encryption/ decryption time of te RSA algoritm. Comparing te encryption time results using normal RSA algoritm and te developed model, it was proved tat te developed algoritm is faster tan te normal one by 30% approximately. Key words: Membrane Computing, RSA, public key, encryption, decryption. 1. INTRODUCTION Membrane computing is a branc of natural computing, te broad area of researc concerned wit computation taking place in nature and wit uman-designed computing inspired by nature. Besides systems biology tat tries to understand biological organisms as networks of interactions, and syntetic biology tat seeks to engineer and build artificial biological systems, anoter approac to understanding nature as computation is te researc on computation in living cells [1], [2]. Membrane computing abstracts computing models from te arcitecture and te functioning of living cells, as well as from te organization of cells in tissues, organs (brain included) or oter iger order structures suc as colonies of cells (e.g., bacteria).te initial goal was to learn from cell biology someting possibly useful to computer science, and te area quickly developed in tis direction. Several classes of computing models were defined in tis context, inspired from biological facts or motivated from matematical or computer science points of view. A number of applications were reported in te last few years in several areas biology, Bio-medicine, linguistics, computer grapics, economics approximate optimization, cryptograpy, etc. Te models investigated in membrane computing area are called P systems. Te main components of a P system are (i) te membrane structure, (ii) te mustiest of objects placed in te compartments of te membrane structure, and (iii) te rules for processing te objects and, te membranes. Tus, membrane computing can be defined as a framework for devising cell-like or tissue-like computing models wic process multisets in compartments defined by means of membranes [3].Te membrane structure consisting of several membranes arranged in a ierarcal structure [4].A membrane structure is represented by a Venn diagram (or a rooted tree) and is identified by a string of correctly matcing parenteses, wit a unique external pair of parenteses corresponding to te external membrane, called te skin. A membrane witout any oter membrane inside is said to be elementary. Te following Example from [5] illustrates te situation: te membrane structure in Fig.1 is identified by te string. μ = [1 [ 2 [ 5 ] 5 [6 ] 6 ]2 [ 3 ]3 [4 [7 [8 ]8 ] 7 ]4 ] 1 A P system wit active membranes is a construct[6] Fig.1.A membrane structure and its associated tree. 2012, IJARCSSE All Rigts Reserved Page 10
2 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), Π = (V, H, μ, w1, wm, R), Were: (i) M >= 1; (ii) V is an alpabet; (iii) H is a finite set of labels for membranes; (iv) μ is a membrane structure, consisting of membranes, labeled (not necessarily in a one-to-one manner) wit elements of H; all membranes in μ are supposed to be neutral; (V) w1... wm are strings over V, describing te multi sets of objects placed in te regions of μ; (vi) R is a finite set of developmental rules (a) a [ a v], for H, {,,0}, a V, v V (object evolution rules, associated wit membranes and depending on te label and te carge of te membranes, but not directly involving te membranes, in te sense tat te membranes are neiter taking part to te application of tese rules nor are tey modified by tem); (b) 2 a[ ] for 1 [ b] H, {,,0}, a, bv, 1 2 (Communication rules; an object is introduced into te membrane, may be modified during tis process; also, te polarization of te membrane can be modified, but not its label); (c) (d) 1 2 [ a] [ ] b, for, 1, 2 H {,,0}, a, bv (Communication rules; an object is sent out of te membrane, maybe modified during tis process; also, te polarization of te membrane can be modified, but not its label); [ a] b, for H, {,,0}, a, bv (Dissolving rules; in reaction wit an object, a membrane can be dissolved, leaving its entire object in te surrounding region, wile te object specified in te rule can be modified); 2 3 (e) 1 [ ] [ ] [ ] a b c, for, 1, 2, 3 H {,,0}, a, b, c V (Division rules for elementary membranes; in reaction wit an object, te membrane is divided into two membranes wit te same label, may be of different polarizations; te object specified in te rule is replaced in te two new membranes by possibly new objects; all te oter objects are copied into bot resulting membranes); (f) [ [ 0 ]...[ ] [ ] 1 1 k k k 1 k 1...[ for n k 1, i H,0 i n, n ] ] n 2 3 [ [ ] k 2,..., 6 {, and,0} [ ] ] [ [ ]...[ ] ], (Division of non-elementary membranes; tis is possible only if a membrane contains two immediately lower membranes of opposite polarization, + and ; te membranes of opposite polarizations are separated in te two new membranes, but teir polarization can cange; all membranes of opposite polarizations are always separated by applying tis rule) ; k 0 0 k 1 k1 n n 0 If te membrane labeled 0 contains oter membranes tan 1,..., n specified above, ten tey must ave neutral carges in order to make tis rule applicable; tese membranes are duplicated and ten become part of te content of bot copies of membrane 0; P automata, wic are symport/antiport P systems wic accept strings: te sequence of objects (because we work wit strings and symbol objects, we use intercangeably te terms object" and symbol") imported by te system from te environment during a alting computation is te string accepted by tat computation (if several objects are brougt in te system at te same time, ten any permutation of tem is considered as a substring of te accepted string; a variant, is to associate a symbol to eac multiset and to build a string by suc marks" attaced to te imported mustiest) [7]. 2012, IJARCSSE All Rigts Reserved Page 11
3 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), A sequence of transitions constitutes a computation. A computation is successful if it alts; reaces a configuration were no rule can be applied. If we ave an output region specified, ten we count te objects present in te output regions in te alting configuration and tis number is te result of computation [8]. 2. RSA ALGORITHM RSA sceme is a block ciper in wic te plain text and ciper text are integers between 0 and n- 1 for some n [9]. 2.1 Description of te Algoritm RSA algoritm is specified as in [10], [11], [12], [13]. Key setup To setup te key material, user Alice performs te following steps: 1- Eac user generates a public/private key pair by selecting two large primes at random p, q. 2- Compute N=p.q 3- Compute ( N) ( p 1) ( q 1) 4- Selecting at random te encryption key e Were 1 e ( N),gcd( e, ( N)) 1 5- Solve te following equation to find decryption Key d were e d 1mod ( N) and 0 d N 6- Publis teir public encryption key KU { e, N} 7- keep secret private decryption key KR { d, q, p} Encryption To send a message m < N to Alice, te sender Bob creates te ciper text c as follows: e c m (mod N) Decryption d To decrypt te ciper text c. Alice computes c m (mod N). 2.2 Modular Exponentiation RSA uses fast exponential algoritm called "repeated square and multiply" te algoritm repeats te following process: dividing te exponent into 2, performing square and performing an extra multiplication if exponent is odd. Te algoritm is specified as in [14],[15]. Modular Exponentiation algoritm INPUT x, y, n: integers wit x 0, y 0, n 1; OUTPUT x y (modn). Mod_ exp (x, y, n) 1. If y = 0 return (1) ; 2. If y (mod 2) = 0 return (mod_exp(x 2 (mod n), y 2, n); 3. Return (x.mod_exp ((x 2 (mod n), y 2, n) ; 3. COMPACT ENCODING Te natural encoding is easy to understand and work wit; owever it as te disadvantage tat for very large numbers te membrane systems sould contain a very large number of objects, undesirable for practical reasons. We discuss compact encodings were eac object of a membrane system is represented in a more compact way, similarly to numbers in base 2 or iger. Tese compact encodings require notions and results from combinatorics over multisets. To develop encoding and decoding algoritms, we start considering te number n in base b represented by using m objects. To develop encoding and decoding algoritms, we start considering te number n in base b represented by using m objects. As a first step we must determine m, te encoding lengt, ten we look for te first (lowest) number 2012, IJARCSSE All Rigts Reserved Page 12
4 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), m represented using m objects. i=0 Tis number is 1 N (b, i) te count of all numbers represented using less tan m objects, and it is lower or equal to n. Tus we determine m from te following equation: i0 m 1 i0 N ( b, i) n 0 TABLE1. MOST COMPACT ENCODINGS (MCE) IN BASES 1,2,3. Decimal MCE1 Natural encoding MCE 2 MCE Successor in MCE Time complexity: O (1). Te successor of a number ii tis encoding is computed in te following manner: eiter we ave an object 0 aid te rule 0s 1, transforms tis 0 in to an 1, or we ave a number encoded using only objects 1 ten aid te rule 1 0 s transforms all 1s into 0s; moreover te rule s 0 produces an additional Predecessor in MCE Time complexity: O (1). Te predecessor of a number is computed by turning an 1 in to a 0 by te rule 1s 0 wenever we ave objects 1; oterwise we consume one 0 by te rule 0s u, aid transform all te oter objects 0 into 1. By rule 0 1 u. 3.3 Multiplication MCE Time complexity: O (n1 n2) = O (n2) if n1 = n2 =n. We implement multiplication in a similar manner to addition, coupling a predecessor wit an adder. Te idea is to provide te first number to a predecessor, and perform te addition iteratively until te predecessor reaces 0. Te evolution is started by te predecessor working over te first number. Te predecessor activates te adder by passing a communication token. Te adder is modified to use an extra backup membrane wic always contains te second number. Wen te adder is triggered by te predecessor, it signals te backup membrane wic supplies a fres copy of te second number to te adder, and a new addition iteration is performed. At te end of te iteration. At te end te adder sends out a token to te predecessor. Te procedure is repeated until te predecessor reaces. 2012, IJARCSSE All Rigts Reserved Page 13
5 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), 4. RSA ENCRYPTION IN MEMBRANE COMPUTING Te MCE multiplication can be used in calculating te encryption equation of RSA: C m e (mod N) Using Modular Exponentiation as dividing te exponent into 2, performing square and performing an extra multiplication wit membrane computing system. Te evolution process of te P system for RSA encryption is sown in Fig. 2. Te P system model of RSA encryption can be described as follows. Π = (V, H, μ, w1, wm, R), M= 4 H= a b c u=[1[2]2[3]3[4]4]1 V1= {[x,1,1]} V2= {[x,2,1],[x,2,2]} V3= {[x,3,1]} V4= {[x,2,2],[x,1,1],[x,2,1]} R1= {[x,1,1]} R2= {([x,2,1]^2) % [x,2,2]} R3= {BitSiftRigt([x,3,1])} R4= {([x,1,1]*[x,2,1]) % [x,2,2]} A modular power function wit tree parallel treads as described in Fig. 3 is used in simulating te encryption equation using te property of parallelism of membrane computing. Te pseudo-code of te function is described as follows: Function modular_pow(base, exponent, modulus) result := 1 wile exponent > 0 if (exponent mod 2 == 1): result := (result * base) mod modulus exponent := exponent >> 17 base = (base * base) mod modulus return result Fig.2. Te evolution process of te P system for RSA encryption. 2012, IJARCSSE All Rigts Reserved Page 14
6 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), Fig. 3. Parallel treads description. 5. EXPREMINTAL RESULTS Te performance of te proposed algoritm of RSA using membrane computing is simulated using software written in C++(using visual c++) We compared te performance to te performance of normal RSA on te same platform. We used 3.2 giga ertz Intel processor wit one giga byte ram. Te results is sown in table 2. Te encryption time in seconds was recorded as a function of number of decimal digits of te two primary numbers products (N) in decimal digits. Te results is graped as in Fig. 4. TABLE 2 COMPARISON BETWEEN ENCRYPTION TIME OF NORMAL RSA AND MEMBRANE RSA Number of Decimal Digits N(digits) Average Normal Time T n (ms) Average Membrane Time T m (ms) , IJARCSSE All Rigts Reserved Page 15
7 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), Fig.4 Comparison between encryption times of normal RSA and membrane RSA 6. CONCLOUSION AND FUTURE WORK In tis paper, we propose an analysis of RSA using te membrane computing environment. We make a comparison wit normal RSA and our proposed system can improve te performance of te encryption time of te algoritm. te proposed algoritm also enance te security of RSA by using large prime numbers and large exponents in addition to proving te ability of membrane computing in performing massive calculations wit ig performance, in relatively sort time. REFERENCES [1] D. Endy. Foundations for engineering biology. Nature, pp 438: , (2005). [2] J. Dassow, G. P_AUN "Journal of Universal Computer Science, vol. 5, no. 2, pp 33-49", (1999). [3] O. H. Ibarra, G. Paun Membrane Computing: General View Te European Academy of Sciences, (2007). [4] G. Paun, Membrane Computing: An introduction Springer Verlag, Berlin, ISBN: , (2002) [5] P. Sosik, Alfonso Rodriguez-Patton Membrane computing and complexity teory: A caracterization of PSPACE Journal of Computer and System Sciences73, pp , (2007). [6] H. Adorna, G. Paun, M. J. PEREZ- JIMENEZ " On Communication Complexity in Evolution- Communication P Systems "Romanian Journal Of Informartion " Volume 13, Number 2, pp , (2010). [7] G. P aun, M. J. Perez Jimenez "Solving Problems in a distributed Way in Membrane Computing: DP systems" Int. J. of Computers, Communications & Control, ISSN , E-ISSN Vol. V, No. 2, pp , (2010). [8] G.Paun Application of Membrane Computing Springer- Verlag, Berlin, ISBN: (2002). [9] W. Stallings" Cryptograpy and Network Security Principles and Practices", fift Edition, ISBN: (2011). [10] C. Paar.jan pelzl "understanding cryptograpy "Spring Verlag,Berlin, ISBN : , (2010). 2012, IJARCSSE All Rigts Reserved Page 16
8 Sala et al., International Journal of Advanced Researc in Computer Science and Software Engineering 2 (9), [11] B. Esslinger "Te cryptool script cryptograpy, matematics and more", available at [ttp: // (2010). [12] B. Scneier "Applied cryptograpy Protocol, Algoritms and Code in C" ISBN: (1996),. [13] J. Katz and y. lindel "introduction to modern cryptograpy", ISBN: , (2008). [14] W. mao "modern cryptograpy, teory and practice ", ISBN , (2004). [15] R. Oppliger "Contemporary Cryptograpy" Artec House, ISBN , (2011). 2012, IJARCSSE All Rigts Reserved Page 17
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More informationA Novel QC-LDPC Code with Flexible Construction and Low Error Floor
A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationMTH-112 Quiz 1 - Solutions
MTH- Quiz - Solutions Words in italics are for eplanation purposes onl (not necessar to write in te tests or. Determine weter te given relation is a function. Give te domain and range of te relation. {(,
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More information15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes
15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationHASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS
HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece
More informationExcel based finite difference modeling of ground water flow
Journal of Himalaan Eart Sciences 39(006) 49-53 Ecel based finite difference modeling of ground water flow M. Gulraiz Akter 1, Zulfiqar Amad 1 and Kalid Amin Kan 1 Department of Eart Sciences, Quaid-i-Azam
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationAVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic
1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationArrays in a Lazy Functional Language a case study: the Fast Fourier Transform
Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationTHE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM
THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT
More informationAuthor's personal copy
Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationData Structures and Programming Spring 2014, Midterm Exam.
Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationAll truths are easy to understand once they are discovered; the point is to discover them. Galileo
Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume
More informationREVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE
International Researc Journal of Engineering and Tecnology (IRJET) e-issn: 2395-0056 REVERSIBLE DATA HIDING USING IMPROVED INTERPOLATION TECHNIQUE Devendra Kumar 1, Dr. Krisna Raj 2 (Professor in ECE Department
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationThe (, D) and (, N) problems in double-step digraphs with unilateral distance
Electronic Journal of Grap Teory and Applications () (), Te (, D) and (, N) problems in double-step digraps wit unilateral distance C Dalfó, MA Fiol Departament de Matemàtica Aplicada IV Universitat Politècnica
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationCS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33
CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationImplementation of Integral based Digital Curvature Estimators in DGtal
Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,
More informationEncodings and Arithmetic Operations in Membrane Computing
Encodings and Arithmetic Operations in Membrane Computing Artiom Alhazov, Cosmin Bonchiş, Cornel Izbaşa, Gabriel Ciobanu June 19, 006 1 Introduction Membrane systems represent a new abstract model inspired
More informationMULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS
ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.
More informationYou should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by
Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,
More informationCS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22
CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,
More information8/6/2010 Assignment Previewer
Week 4 Friday Homework (1321979) Question 1234567891011121314151617181920 1. Question DetailsSCalcET6 2.7.003. [1287988] Consider te parabola y 7x - x 2. (a) Find te slope of te tangent line to te parabola
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationIMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM
Journal of ELECTRICAL ENGINEERING, VOL. 65, NO., 014, 90 96 IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM Xiaopeng Wei Bin Wang Qiang Zang Cao Ce In recent years, tere
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More information12.2 Investigate Surface Area
Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern
More informationTREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II
UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More informationGeorge Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of
IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,
More informationLimits and Continuity
CHAPTER Limits and Continuit. Rates of Cange and Limits. Limits Involving Infinit.3 Continuit.4 Rates of Cange and Tangent Lines An Economic Injur Level (EIL) is a measurement of te fewest number of insect
More informationFUZZY INVENTORY MODEL WITH SINGLE ITEM UNDER TIME DEPENDENT DEMAND AND HOLDING COST.
Int J of Intelligent omputing and pplied Sciences 5 FZZY INVENORY MODEL WIH SINGLE IEM NDER IME DEPENDEN DEMND ND HOLDING OS S Barik SKPaikray S Misra K Misra orresponding autor: odma@driemsacin bstract:
More information5.4 Sum and Difference Formulas
380 Capter 5 Analtic Trigonometr 5. Sum and Difference Formulas Using Sum and Difference Formulas In tis section and te following section, ou will stud te uses of several trigonometric identities and formulas.
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationComputer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media
Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationProgramming Real-Time Applications with Signal
Programming Real-Time Applications wit Signal Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire To cite tis version: Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire. Programming
More informationCommunicator for Mac Quick Start Guide
Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main
More informationVector Processing Contours
Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of
More information19.2 Surface Area of Prisms and Cylinders
Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area
More informationNotes: Dimensional Analysis / Conversions
Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationBrief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION
1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung
More informationPROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT
IMEKO 21 TC3, TC5 and TC22 Conferences Metrology in Modern Context November 22 25, 21, Pattaya, Conburi, Tailand PROTOTYPE OF LOAD CELL APPLICATION IN TORQE MEASUREMENT Tassanai Sanponpute 1, Cokcai Wattong
More informationA Practical Approach of Selecting the Edge Detector Parameters to Achieve a Good Edge Map of the Gray Image
Journal of Computer Science 5 (5): 355-362, 2009 ISSN 1549-3636 2009 Science Publications A Practical Approac of Selecting te Edge Detector Parameters to Acieve a Good Edge Map of te Gray Image 1 Akram
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationSlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization
Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary
More informationTHANK YOU FOR YOUR PURCHASE!
THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions
More informationMinimizing the Embedding Impact in Steganography
Minimizing te Embedding Impact in Steganograpy Jessica Fridric SUNY Bingamton Department of ECE Bingamton, NY 3902-6000 00 607 777 677 fridric@bingamton.edu ABSTRACT In tis paper, we study te trade-off
More informationSLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University
SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationCS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants
CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt
More informationHoles, Knots and Shapes: A Spatial Ontology of a Puzzle
Holes, Knots and Sapes: A Spatial Ontology of a Puzzle Paulo Santos Centro Universitário da FEI, São Paulo, email: psantos@fei.edu.br Pedro Cabalar Coruña University, Spain, email: cabalar@dc.fi.udc.es
More informationOn the use of FHT, its modification for practical applications and the structure of Hough image
On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More informationAsynchronous Power Flow on Graphic Processing Units
Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing
More informationYou Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.
1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationAnalytical CHEMISTRY
ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:
More information