A Proposal of One-Time Biometric Authentication

Size: px
Start display at page:

Download "A Proposal of One-Time Biometric Authentication"

Transcription

1 A Proposal of Oe-Time Biometric Autheticatio Yoshifumi Ueshige* *Istitute of Systems & Iformatio Techologies/ KYUSHU Fukuoka City, Fukuoka Pref., JAPAN Kouichi Sakurai*+ +The Graduate School of Iformatio Sciece ad Electrical Egieerig, Kyushu Uiversity Fukuoka City, Fukuoka Pref., JAPAN Abstract - I biometric autheticatio, feature iformatio of each erolled perso s biometric iformatio is erolled as templates. Secure databases or ati-tampered devices store the templates i geeral. The biometric iformatio, however, is irreplaceable iformatio, whe it is compromised. Thereby, oe must give a special attetio to protectio of such iformatio. O the other hads, icreasig iteret ecoomical services causes a motivatio of implemetig olie biometric autheticatio. We propose a ovel protectio techique for the biometric iformatio, especially the feature iformatio ad the templates. The poit of our proposal is that the extracted features ad the erolled templates are trasformed by oe-time trasformatio that is geerated i each autheticatio. The trasformed features ad templates travel through isecure commuicatio lie like the iteret, ad they are used i matchig process. This techique causes security agaist eavesdroppig ad replay attacks o the iteret, because the trasmitted feature iformatio ad the templates are differet every time. Keywords: biometric autheticatio, oe-time, template protectio, oliear trasform, securety 1 Itroductio 1.1 Backgroud Biometric autheticatio is well kow with both of kowledge-based autheticatio like passwords, ad possessio-based autheticatio like cards (magetic cards, IC cards, etc.). Because the biological features (figerprit, vei, iris, facial image, voice, etc.) are uique for each perso, productio of the biometric techiques is ecouraged. I facts, facilities for fiace ad immigratio authorities [1] have already itroduced the biometric autheticatio i may coutries. I additio, some products of persoal computers iclude the biometric autheticatio systems. The biometrics rapidly prevails i society like this. I these examples, the biometric systems are applied i closed eviromets, however, there are fervet social demad about the biometric systems applied to the autheticatio o iteret services such as iteret bakig, electrical govermet, approval i compay, etc. O the other hads, the biometric system causes some privacy issues. That is, i some cases, sigificat privacy iformatio like a medical history is compromised from the biometric iformatio which is icludig biometric raw data acquired from biometric sesor devices, the feature iformatio extracted from the correspodig biometric raw data, ad erolled templates. For example, oe ca kow a perso s diabetes from retia data. Whe biometric autheticatio system as show i figure 1 leaks erolled biometric templates, these templates are uable to re-eroll, because the correspodig biometric data is irreplaceable. This poit is seriously differet from the same situatio of password system ad public-key ecryptio. I the case that ecrypted data is trasmitted o each lie coectig betwee ay processes i figure 1, oe eeds the maagemet of the ecryptio (ad decryptio) keys amog the biometric autheticatio systems. Furthermore, if oe biometric autheticatio system cosists of distributed equipmets, the cost of the key maagemet becomes expesive. I additio, it is possible for adversaries to perform replay attack by usig ecrypted biometric iformatio eavesdropped. Therefore, we eed to protect the biometric iformatio strictly. I this viewpoit, Ratha et al.[2] ad Tulys et al.[3], [4] proposed some protectio techiques as biometric template protectio techiques. Next subsectio, we will briefly itroduce them. 1.2 Related Work We ca roughly classify the cocepts of template protectio ito followig two categories: 1) Geometrical trasformatio or irreversible mappig trasforms the erolled templates ito straied templates separately [2]. 2) Oe-way fuctio with helper data trasforms the erolled templates ito some correspodig uique parameter [3], [4]. Accordig to the former cocept, the biometric templates are blockwise scrambled, or geometrically distorted like morphig as show i figure 2. I this figure, the umber i the cells deotes idices of the sub blocks. The stars i these sub blocks deote the poits of features. It is difficult for ay adversaries to extract the iformatio of erolled templates from the trasformed templates. Thus, the ref [2] states oe ca protect the erolled templates. Because this method, however, causes decrease of the template quality i

2 Capture Feature Extractio Erolmet Autheticatio matchig process, we are ot able to expect high accuracy of autheticatio. I latter oe [3], [4], the framework is show i figure 3. We eroll both of a oe-way fuctio F(.) ad correctio term amed helper data W so that the fuctio F(.) geerate same values whe extracted feature Y for verificatio are close origial templates X. That is, erollmet data cosists of F(.), F(X) ad W. I verificatio, a user calculates F(Y) with helper data W. If F(X)=F(Y), the user is autheticated. This scheme has a characteristic, of which X or Y does ot directly travel through ope etworks. Because this scheme is the autheticatio by usig output of F(.) with W, this scheme has o compatibility with popular biometric autheticatio systems as show i figure 1. Furthermore, autheticatio accuracy seems to rely o the value W susceptibly. 1.3 Our cotributio Template Storage Matchig Judgmet Figure 1. Basic model of biometric autheticatio system I this paper, we propose a ovel compatible scheme with the popular biometric systems. Our mai idea is biometric autheticatio by usig oe-time characteristics. That is, commuicated data of the features ad the templates is differet every autheticatio sessio for eve uique perso, as show i oe-time password [9]. This scheme has followig properties: 1) The extracted features ad the erolled templates are trasformed by a commo oliear fuctio, ad matchig is doe by usig the trasformed features ad the trasformed templates i order to esure the oetime feature. 2) Our scheme eeds o cocer about compromisig the trasformed iformatio i the commuicatio through arbitrary lies, because of chageable autheticatio data for each autheticatio sessio. I every sessio, some TTP geerates the commo fuctio by usig a autheticatio sessio with a time-stamp ad some credetial. The geeratig algorithm of the fuctio esures oe-time characteristic of it. I this paper, we suppose the geeratig algorithm exists, we discuss the privacy protectio ad the biometric autheticatio scheme. If this requiremet is satisfied, eve though eavesdroppers X Ec. Erollmet S W F F(S) Autheticatio Database W V F(V) F(S) Y Dec. F Matchig Figure 3. Biometric autheticatio with oe way fuctio ad helper data collect commuicatio data betwee the biometric autheticatio processes, they caot obtai the erolled templates ad the extracted features. Whe they moitor some perso s etire autheticatio, they obtai oly trasformed data which has o correlatio with other autheticatio sessios. A autheticatio server which performs matchig process obtai the trasformed data that are the trasformed template, ad the trasformed features. We ca expect the oe-time characteristic of the trasform causes high security of biometrics from the view of privacy protectio. I this work, we call this trasform oe-time trasform (OTT). I the rest, sectio 2 describes what iformatio should be protected i the biometric autheticatio. I sectio 3, we propose a defiitio of OTT, cosideratio of geeratig OTT, ad autheticatio protocol. Sectio 4 gives a discussio of security i proposed scheme. Fially, sectio 5 cocludes this paper. 2 Problems i this work Figure 2. Trasform of template by scramblig blockwise Biometric autheticatio has two flows of processig, that is, erollmet ad autheticatio. Erollmet process is performed through the broke arrow lies i figure 1. Sesor device acquires a user s biometric raw data. Next step is feature extractio of the biometric raw data. The obtaied features are erolled as templates i the database. O the other hads, there are autheticatio processes alog straight arrow lies i figure 1. I the autheticatio, capture process ad feature extractio process are i commo with erollmet. The matchig process performs

3 Iteret Database of Templates Time Stamp Process of Time stamp Fuctio Geerator Geeratig OTT Database of Templates Applyig OTT Cliet Acquisitio Feature Extractio Autheticatio Matchig Judgemet Cliet Acquisitio Feature Extractio Iteret Autheticatio Matchig Figure 4. The server autheticatio model o the iteret applicatio Applyig OTT Judgemet compariso betwee the extracted features ad the erolled templates. The judgmet process evaluates the matchig result (matchig score) ad calls the user accept or reject referrig autheticatio policy. Whe we apply this biometric autheticatio to iteret services, we must cosider a part or all of the above five processes are icluded i separate etities distributed i iteret. Because the biometrics o the iteret services requires commuicatio of the autheticatio iformatio like the feature iformatio, the template iformatio, the autheticatio results etc. betwee the five processes through the iteret. Sice the iteret is ot secure agaist eavesdroppig, substitutio, ad impersoatio, we must appreciate that isufficiet security for the above iformatio compromises the user s biometric iformatio as oe of persoal iformatio. Because biometric iformatio is irreplaceable i geeral, the user is uable to re-eroll to the biometric autheticatio system [5]. I additio, eve if eavesdroppers obtaied oly ecrypted biometric iformatio, their replay attacks ca meace the biometric system. Thereby, protectio of the biometric iformatio from these risks is oe of the sigificat problems i the biometric autheticatio as a problem of privacy protectio. I the rest of this paper, we otice protectio of the feature iformatio ad the template iformatio i the server autheticatio model as show i figure 4. This model seems to be a practical implemetatio as a remote biometric autheticatio. I this model, we must save the features ad the templates as persoal iformatio from adversaries. 3 Proposals oe-time trasform I this work, we propose the biometric autheticatio so that iformatio trasformed by a chageable commo fuctio, OTT is used as commuicatio data o the iteret. The OTT is oliear fuctio ad chages every Figure 5. Proposed framework (The sever autheticatio model) autheticatio sessio i order to prevet predictio of the fuctios by adversaries. A third trusted party geerates the OTTs as show i figure 5. I this paper, we apply the OTT to the feature iformatio ad the template iformatio. Eve if our proposal eeds ew etities for geeratig the OTTs, it is easy to exted the curret popular biometric system because oly software of applicatio of OTT is added to the system. We call our biometric autheticatio oe-time biometric autheticatio (OTBA). Followig subsectios precisely explai the OTBA i server autheticatio model. 3.1 Requiremets of the autheticatio system usig OTT For costructio of the OTBA system, we suppose five etities which are cliet, autheticatio server, database storig templates, fuctio geerator of OTT, ad time-stamp server as show i figure 5. I figure 5, the fuctio geerator ad the time-stamp server are TTP. Requiremet of the fuctio geerator is followigs: Algorithm ad iput values for geeratig the OTT is opeed. I order to give time depedecy to fuctio geerator, the iput values are autheticatio sessio with time-stamp data siged by time-stamp server ad secret value of fuctio geerator. 3.2 Requiremets of the OTT fuctios The goals of applicatio of the OTT fuctio are to protect erolled origial templates ad to prevet replay attacks by usig dishoest acquiremet data of trasformed iformatio by OTT. For achievemet of the goals, the OTTs eed to satisfy the followig coditios:

4 Y : Recursively trasformed poits by OTT at time t 1, sessio a 1 : Recursively trasformed poits by OTT at time t 2, sessio a 2, ( t1 t 2 ) Because orbits of poits recursively mapped by this fuctio are strogly deped o the parameters a, b, ad iitial poits (see figure 6), we expect the mapped poits do ot imply the iformatio of iitial poits if a ad b are securely protected. That is, it may be possible to costruct the OTTs by geeratig ad protectig the parameters of the OTTs. I additio, if these parameters are chageable at each geeratio of OTTs, eve though adversaries obtai data of the idetical user s autheticatio sessios, the adversaries caot kow eve the idetity. For example of Heo s mappig, we ca represet geeratig the parameters a ad b at fuctio geerator as followig: O Coordiate of oe feature poit or template Figure 6 Image of OTT X a= f ( H b= g( H, t, t, s), s) where H, t c, ad s deote hash value of sessio, time from the time-stamp data of the sessio, secret value, respectively. Fuctio f ad g eed to be oe-way fuctios. C C (2) 1) Oe-to-oe fuctio I the methods [3], ad [4], the origial templates ad features are trasformed ito a differet space which has o direct relatioship with a space of these iformatio. Therefore, the method [3] ad [4] become low similarity to the curret biometric systems. This poit receives our attetio. I our method, the origial templates ad features are trasformed ito same space i order to keep the similarity at the matchig process. 2) Difficulty of predictio It is extremely difficult for ay adversary to guess the origial templates ad features from the trasformed iformatio. 3) Preservatio of distace This meas that matchig process ca evaluate the distace betwee the trasformed feature ad the correspodig trasformed template by usig optimal distace fuctio. Because OTTs are oliear mappig, OTTs may be cotractive or expasile, locally. However, it is ecessary to desig OTTs so that every OTT trasforms relative feature ad template ito close poits. We aticipate satisfyig the above coditios may be difficult. We, however, expect a cadidate of the OTTs is chaos mappig such as Heo s mappig: x t+ 1 = 1 axt + by y = x t+ 1 2 t y (1) 3.3 Protocols of the biometric autheticatio usig oe-time trasforms We propose a autheticatio protocol usig OTT. I the rest, (a) - (p) deote umeral otatios show i figure 7. 1) Processes from (a) to (c) deote egotiatio for begiig the autheticatio. After these steps, the cliet ad the autheticatio server share the autheticatio sessio 2) I (d), fuctio geerator receives requests of geeratig OTT with the sessio from both of the cliet ad the autheticatio server. Process (e) is a verificatio cocerig validity of the autheticatio sessio. 3) I (f) ad (g), the fuctio geerator obtais timestamped data of the above sessio. The timestamped data is used for a parameter of OTT geeratio ad a evidece of the sessio performed. 4) About process (h), please refer the discussio i subsectio 3.1 ad ) I (i), the fuctio geerator seds the geerated OTT to both of the cliet ad the database of erolled templates. 6) I order to ed the geeratio process, the fuctio geerator seds sigal of the ed to the autheticatio server i process (l). 7) I j) ad k), the cliet ad the database apply the OTT to the feature data ad the correspodig template data, respectively. Because of commo OTT used, the trasformed data are used i matchig process as is. For example, we ca deote formally as followig equatio: o ftr = F ( ftr) (3), where F(x),, ad ftr deote the OTT, the umber of iteratio, ad the coordiate of the features,

5 Cliet Time Stamp Fuctio Geerator Database of Templates Autheticatio (a) Request of Autheticatio Sessio (b) Start of Autheticatio Sessio (c) Cofirmatio of the start (d) Autheticatio Sessio (d) Autheticatio Sessio (e) Verificatio of the received data from Cliet ad Autheticatio (f) Autheticatio Sessio (i) OTT (g) Time Stamp data of iformatio received i step (f) (h) Geeratig OTT (i) OTT (j) Applyig OTT to feature data (k) Applyig OTT to template data (l) Sig of fiishig geeratio of OTT (m) Request of OTT feature data () Request of OTT template data (o) OTT Template data (p) OTT Feature data Figure 7. Protocol of startig autheticatio sessio to sedig oe-time trasformed features ad oe-time trasformed template respectively. We ca describe the trasform of the templates as followig: o tpl = F (tpl) (4), where tpl deotes the coordiate of the templates. 8) I ()-(q) the autheticatio server obtais the trasformed data of templates ad features. After the above protocols fiished, the autheticatio server performs matchig process ad judgmet process. 9) I matchig process, the autheticatio server calculates distace betwee the set of trasformed features ad oe of the trasformed templates. For a example of distace fuctio, we ca fid the Hausdorff distace [6]: H ( Tpl, Ftr ) = max{ max tpl Tpl ftr Ftr max ftr Ftr tpl Tpl mi { d( tpl mi { d( tpl, ftr, ftr )}} )}, (5), where Tpl, Ftr deote the set of OTT templates ad oe of the OTT features. Fuctio d(.) deotes distace fuctio betwee two poits. We should choose the optimal distace fuctio depedig upo OTT. 10) The autheticatio server calculates the matchig score based o H(Tpl,Ftr ). I judgmet process, the autheticatio server decides accept or reject by comparig H(Tpl,Ftr ) with the correspodig threshold. 4 Argumet of Security of OTBA We discuss the security of the above proposal. First, we metio the security of the framework of the OTBA. If adversaries success to steal this value s stored i the fuctio geerator, they ca become impostor of the fuctio geerator. After that, the fuctio geerator loses trust from other etities i figure 5. However, eve if adversaries hijack the fuctio geerator, because it receives o persoal iformatio, of course icludig the

6 origial template ad the extracted feature, the takeover does ot threate the user s privacy. The we cosider the case of a malicious autheticatio server collects iformatio. I this framework, it receives trasformed features ad templates. As aforemetioed, they imply o iformatio before trasform. Furthermore, the malicious sever caot kow the correspodig OTT. Hece, the malicious server obtais o iformatio about origial templates ad extracted features. Next, we cosider security of the iformatio trasformed by OTT agaist hill-climbig attack [7], [8], replay attack, collusio attack. Hill-climbig attack uses of replied matchig score i order to make a fake. Whe the applicatio server seds the matchig score to cliet (adversary) i figure 5, the adversary trasforms feature data selected from database which the adversary costructs. The adversary seds the trasformed features to the autheticatio server. Because this system chages the calculatio algorithm of matchig score ad threshold for it accordig to selected distace fuctio d(.), it is difficult for the adversary to improve the fake from the replied matchig score. Therefore, the probability of the adversary s success o the OTBA becomes less tha covetioal biometric autheticatio like figure 4. I geeral, replay attack is impossible, if previously obtaied iformatio is ot reusable. Whe adversaries eavesdrop o the commuicatio betwee the cliet ad the autheticatio server, they obtai oly trasformed features which are ot reusable. Hece, o adversary successes replay attack o the OTBA. If the adversaries ca liste to the commuicatio from the fuctio geerator, they obtai the iformatio of OTT. Whe they reuse this iformatio, the cliet ad the database ca detect replay attack by verifyig the differece amog the iformatio of OTT used i former autheticatio sessios. Two cases of collusio attack establish possibly. The oe of case is that the cliet cospires with the fuctio geerator. I this case, the cliet ca obtai ot oly OTT but also iformatio of evaluatio fuctio. Hece, adversaries who ca perform ormal hill-climbig attack success the collusio attack. The other oe is that the autheticatio server stads i with the fuctio geerator. The maer of attack is same as the above oe. 5 Coclusios I this paper, we poited out the problems of the curret studies of the template protectio. As a coutermeasure, we proposed the OTBA to protect the biometric templates ad the extracted features. The mai cocept of the OTBA is that stole biometric iformatio is ot reusable by chageable trasform, OTT every autheticatio for eve same perso. We described recursive trasform as a cadidate of OTT. As a result, we obtaied the view of the security of the OTBA agaist hill-climbig attack ad replay attack durig the fuctio geerator keeps security. This paper described oly cocept of the OTBA. As future works, we should study optimal fuctio of the OTTs, ad practical geeratig algorithm of the OTTs. I additio, we should research formal aalysis of iformatio theoretic security ad time of calculatio i the OTBA. Ackowledgemet This research was supported by Strategic Iteratioal Cooperative Program, Japa Sciece ad Techology Agecy (JST). Refereces [1] ISO/JTC1/SC17/WG3/TF1 for ICAO-NTWG, Supplemet 9303, Iteratioal Civil Aviatio Orgaizatio (ICAO), (URL: mrtd/dowload/documets/ftt_supplemet%20to%20 Doc% pdf) [2] N. K. Ratha, J. H. Coell, R. M. Bolle, "Ehacig Security ad Privacy i Biometric-based Autheticatio Systems", IBM Systems Joural, Vol. 40, No. 3, pp , [3] P. Tulys, J. Goselig, Capacity ad Example of Template-Protectig Biometric Autheticatio Systems, ECCV Workshop BioAW, o. 77, pp , [4] J.-P. Liartz, P. Tuyls New Shieldig Fuctios to Ehace Privacy ad Prevet Misuse of Biometric Templates, AVBPA 2003, pp , [5] P. Reid, Biometrics for Network Security, Pretice Hall, [6] M. F. Barsley, Fractals Everywhere secod editio, Academic Press Professioal, [7] C. Soutar, Biometric System Security, Secure No. 5, pp , 2002 (URL: pdf/secure_5/46_techo_4.pdf) [8] A. Dimovski, D. Gilogoroski, Geeratig highly oliear Boolea fuctio usig a geetic algorithm, 1st Balka Coferece o Iformatics, 2003 [9] PKCS #11 v2.20 Amedmet 1, PKCS #11 mechaisms for Oe-Time Password Tokes, RSA Security Ic. (URL: ftp://ftp.rsasecurity.com/pub/pkcs/ pkcs-11/v2-20/pkcs-11v2-20a1.pdf)

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

A Comparative Study of Positive and Negative Factorials

A Comparative Study of Positive and Negative Factorials A Comparative Study of Positive ad Negative Factorials A. M. Ibrahim, A. E. Ezugwu, M. Isa Departmet of Mathematics, Ahmadu Bello Uiversity, Zaria Abstract. This paper preset a comparative study of the

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1 ad Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-10559 Berli,

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

A Boolean Query Processing with a Result Cache in Mediator Systems

A Boolean Query Processing with a Result Cache in Mediator Systems A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

Evaluation of the Software Industry Competitiveness in Jilin Province Based on Factor Analysis

Evaluation of the Software Industry Competitiveness in Jilin Province Based on Factor Analysis BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 4 Sofia 2014 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI: 10.1515/cait-2014-0008 Evaluatio of the Software Idustry

More information

EVALUATION OF TRIGONOMETRIC FUNCTIONS

EVALUATION OF TRIGONOMETRIC FUNCTIONS EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System Mappig Publishig ad Mappig Adaptatio i the Middleware of Railway Iformatio Grid ystem You Gamei, Liao Huamig, u Yuzhog Istitute of Computig Techology, Chiese Academy of cieces, Beijig 00080 gameiu@ict.ac.c

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Protecting Biometric Templates with Image Watermarking Techniques

Protecting Biometric Templates with Image Watermarking Techniques Protectig Biometric Templates with Image Watermarkig Techiques Nikos Komios ad Tassos Dimitriou Athes Iformatio Techology, GR-19002 Peaia Attiki, Greece {kotdim}@ait.edu.gr Abstract. Biometric templates

More information

Linearising Calibration Methods for a Generic Embedded Sensor Interface (GESI)

Linearising Calibration Methods for a Generic Embedded Sensor Interface (GESI) 1st Iteratioal Coferece o Sesig Techology November 21-23, 2005 Palmersto North, New Zealad Liearisig Calibratio Methods for a Geeric Embedded Sesor Iterface (GESI) Abstract Amra Pašić Work doe i: PEI Techologies,

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network

Privacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network Privacy-preservig ad Secure Top-k Query i Two-tier Wireless Sesor Network Xiaojig Liao, Jiazhog Li School of Computer Sciece ad Techology, Harbi Istitute of Techology, Heilogjiag, Chia Email:{xiaojigliao,lijzh}@hit.edu.c

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Real-time Path Prediction and Grid-based Path Modeling Method Using GPS

Real-time Path Prediction and Grid-based Path Modeling Method Using GPS Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 12, Number 20 (2017) pp. 9997-10001 Research Idia Publicatios. http://www.ripublicatio.com Real-time Path Predictio ad Grid-based Path

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Math Section 2.2 Polynomial Functions

Math Section 2.2 Polynomial Functions Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

n Learn how to implement identity management controls n Learn how to implement access management controls n Prevent unauthorized access

n Learn how to implement identity management controls n Learn how to implement access management controls n Prevent unauthorized access Chapter Objectives Lear how to implemet idetity maagemet cotrols Lear how to implemet access maagemet cotrols Chapter #20: Idetity ad Access Maagemet 2 Idetity ad Access Maagemet Cotrols All actios will

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE

WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE Wiwik Aggraei 1, Agyl Ardi Rahmadi 1, Radityo Prasetyo Wibowo 1 1 Iformatio System Departmet, Faculty of Iformatio Techology, Istitut Tekologi Sepuluh

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

27 Refraction, Dispersion, Internal Reflection

27 Refraction, Dispersion, Internal Reflection Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information