A Proposal of One-Time Biometric Authentication
|
|
- Rosamund Bates
- 5 years ago
- Views:
Transcription
1 A Proposal of Oe-Time Biometric Autheticatio Yoshifumi Ueshige* *Istitute of Systems & Iformatio Techologies/ KYUSHU Fukuoka City, Fukuoka Pref., JAPAN Kouichi Sakurai*+ +The Graduate School of Iformatio Sciece ad Electrical Egieerig, Kyushu Uiversity Fukuoka City, Fukuoka Pref., JAPAN Abstract - I biometric autheticatio, feature iformatio of each erolled perso s biometric iformatio is erolled as templates. Secure databases or ati-tampered devices store the templates i geeral. The biometric iformatio, however, is irreplaceable iformatio, whe it is compromised. Thereby, oe must give a special attetio to protectio of such iformatio. O the other hads, icreasig iteret ecoomical services causes a motivatio of implemetig olie biometric autheticatio. We propose a ovel protectio techique for the biometric iformatio, especially the feature iformatio ad the templates. The poit of our proposal is that the extracted features ad the erolled templates are trasformed by oe-time trasformatio that is geerated i each autheticatio. The trasformed features ad templates travel through isecure commuicatio lie like the iteret, ad they are used i matchig process. This techique causes security agaist eavesdroppig ad replay attacks o the iteret, because the trasmitted feature iformatio ad the templates are differet every time. Keywords: biometric autheticatio, oe-time, template protectio, oliear trasform, securety 1 Itroductio 1.1 Backgroud Biometric autheticatio is well kow with both of kowledge-based autheticatio like passwords, ad possessio-based autheticatio like cards (magetic cards, IC cards, etc.). Because the biological features (figerprit, vei, iris, facial image, voice, etc.) are uique for each perso, productio of the biometric techiques is ecouraged. I facts, facilities for fiace ad immigratio authorities [1] have already itroduced the biometric autheticatio i may coutries. I additio, some products of persoal computers iclude the biometric autheticatio systems. The biometrics rapidly prevails i society like this. I these examples, the biometric systems are applied i closed eviromets, however, there are fervet social demad about the biometric systems applied to the autheticatio o iteret services such as iteret bakig, electrical govermet, approval i compay, etc. O the other hads, the biometric system causes some privacy issues. That is, i some cases, sigificat privacy iformatio like a medical history is compromised from the biometric iformatio which is icludig biometric raw data acquired from biometric sesor devices, the feature iformatio extracted from the correspodig biometric raw data, ad erolled templates. For example, oe ca kow a perso s diabetes from retia data. Whe biometric autheticatio system as show i figure 1 leaks erolled biometric templates, these templates are uable to re-eroll, because the correspodig biometric data is irreplaceable. This poit is seriously differet from the same situatio of password system ad public-key ecryptio. I the case that ecrypted data is trasmitted o each lie coectig betwee ay processes i figure 1, oe eeds the maagemet of the ecryptio (ad decryptio) keys amog the biometric autheticatio systems. Furthermore, if oe biometric autheticatio system cosists of distributed equipmets, the cost of the key maagemet becomes expesive. I additio, it is possible for adversaries to perform replay attack by usig ecrypted biometric iformatio eavesdropped. Therefore, we eed to protect the biometric iformatio strictly. I this viewpoit, Ratha et al.[2] ad Tulys et al.[3], [4] proposed some protectio techiques as biometric template protectio techiques. Next subsectio, we will briefly itroduce them. 1.2 Related Work We ca roughly classify the cocepts of template protectio ito followig two categories: 1) Geometrical trasformatio or irreversible mappig trasforms the erolled templates ito straied templates separately [2]. 2) Oe-way fuctio with helper data trasforms the erolled templates ito some correspodig uique parameter [3], [4]. Accordig to the former cocept, the biometric templates are blockwise scrambled, or geometrically distorted like morphig as show i figure 2. I this figure, the umber i the cells deotes idices of the sub blocks. The stars i these sub blocks deote the poits of features. It is difficult for ay adversaries to extract the iformatio of erolled templates from the trasformed templates. Thus, the ref [2] states oe ca protect the erolled templates. Because this method, however, causes decrease of the template quality i
2 Capture Feature Extractio Erolmet Autheticatio matchig process, we are ot able to expect high accuracy of autheticatio. I latter oe [3], [4], the framework is show i figure 3. We eroll both of a oe-way fuctio F(.) ad correctio term amed helper data W so that the fuctio F(.) geerate same values whe extracted feature Y for verificatio are close origial templates X. That is, erollmet data cosists of F(.), F(X) ad W. I verificatio, a user calculates F(Y) with helper data W. If F(X)=F(Y), the user is autheticated. This scheme has a characteristic, of which X or Y does ot directly travel through ope etworks. Because this scheme is the autheticatio by usig output of F(.) with W, this scheme has o compatibility with popular biometric autheticatio systems as show i figure 1. Furthermore, autheticatio accuracy seems to rely o the value W susceptibly. 1.3 Our cotributio Template Storage Matchig Judgmet Figure 1. Basic model of biometric autheticatio system I this paper, we propose a ovel compatible scheme with the popular biometric systems. Our mai idea is biometric autheticatio by usig oe-time characteristics. That is, commuicated data of the features ad the templates is differet every autheticatio sessio for eve uique perso, as show i oe-time password [9]. This scheme has followig properties: 1) The extracted features ad the erolled templates are trasformed by a commo oliear fuctio, ad matchig is doe by usig the trasformed features ad the trasformed templates i order to esure the oetime feature. 2) Our scheme eeds o cocer about compromisig the trasformed iformatio i the commuicatio through arbitrary lies, because of chageable autheticatio data for each autheticatio sessio. I every sessio, some TTP geerates the commo fuctio by usig a autheticatio sessio with a time-stamp ad some credetial. The geeratig algorithm of the fuctio esures oe-time characteristic of it. I this paper, we suppose the geeratig algorithm exists, we discuss the privacy protectio ad the biometric autheticatio scheme. If this requiremet is satisfied, eve though eavesdroppers X Ec. Erollmet S W F F(S) Autheticatio Database W V F(V) F(S) Y Dec. F Matchig Figure 3. Biometric autheticatio with oe way fuctio ad helper data collect commuicatio data betwee the biometric autheticatio processes, they caot obtai the erolled templates ad the extracted features. Whe they moitor some perso s etire autheticatio, they obtai oly trasformed data which has o correlatio with other autheticatio sessios. A autheticatio server which performs matchig process obtai the trasformed data that are the trasformed template, ad the trasformed features. We ca expect the oe-time characteristic of the trasform causes high security of biometrics from the view of privacy protectio. I this work, we call this trasform oe-time trasform (OTT). I the rest, sectio 2 describes what iformatio should be protected i the biometric autheticatio. I sectio 3, we propose a defiitio of OTT, cosideratio of geeratig OTT, ad autheticatio protocol. Sectio 4 gives a discussio of security i proposed scheme. Fially, sectio 5 cocludes this paper. 2 Problems i this work Figure 2. Trasform of template by scramblig blockwise Biometric autheticatio has two flows of processig, that is, erollmet ad autheticatio. Erollmet process is performed through the broke arrow lies i figure 1. Sesor device acquires a user s biometric raw data. Next step is feature extractio of the biometric raw data. The obtaied features are erolled as templates i the database. O the other hads, there are autheticatio processes alog straight arrow lies i figure 1. I the autheticatio, capture process ad feature extractio process are i commo with erollmet. The matchig process performs
3 Iteret Database of Templates Time Stamp Process of Time stamp Fuctio Geerator Geeratig OTT Database of Templates Applyig OTT Cliet Acquisitio Feature Extractio Autheticatio Matchig Judgemet Cliet Acquisitio Feature Extractio Iteret Autheticatio Matchig Figure 4. The server autheticatio model o the iteret applicatio Applyig OTT Judgemet compariso betwee the extracted features ad the erolled templates. The judgmet process evaluates the matchig result (matchig score) ad calls the user accept or reject referrig autheticatio policy. Whe we apply this biometric autheticatio to iteret services, we must cosider a part or all of the above five processes are icluded i separate etities distributed i iteret. Because the biometrics o the iteret services requires commuicatio of the autheticatio iformatio like the feature iformatio, the template iformatio, the autheticatio results etc. betwee the five processes through the iteret. Sice the iteret is ot secure agaist eavesdroppig, substitutio, ad impersoatio, we must appreciate that isufficiet security for the above iformatio compromises the user s biometric iformatio as oe of persoal iformatio. Because biometric iformatio is irreplaceable i geeral, the user is uable to re-eroll to the biometric autheticatio system [5]. I additio, eve if eavesdroppers obtaied oly ecrypted biometric iformatio, their replay attacks ca meace the biometric system. Thereby, protectio of the biometric iformatio from these risks is oe of the sigificat problems i the biometric autheticatio as a problem of privacy protectio. I the rest of this paper, we otice protectio of the feature iformatio ad the template iformatio i the server autheticatio model as show i figure 4. This model seems to be a practical implemetatio as a remote biometric autheticatio. I this model, we must save the features ad the templates as persoal iformatio from adversaries. 3 Proposals oe-time trasform I this work, we propose the biometric autheticatio so that iformatio trasformed by a chageable commo fuctio, OTT is used as commuicatio data o the iteret. The OTT is oliear fuctio ad chages every Figure 5. Proposed framework (The sever autheticatio model) autheticatio sessio i order to prevet predictio of the fuctios by adversaries. A third trusted party geerates the OTTs as show i figure 5. I this paper, we apply the OTT to the feature iformatio ad the template iformatio. Eve if our proposal eeds ew etities for geeratig the OTTs, it is easy to exted the curret popular biometric system because oly software of applicatio of OTT is added to the system. We call our biometric autheticatio oe-time biometric autheticatio (OTBA). Followig subsectios precisely explai the OTBA i server autheticatio model. 3.1 Requiremets of the autheticatio system usig OTT For costructio of the OTBA system, we suppose five etities which are cliet, autheticatio server, database storig templates, fuctio geerator of OTT, ad time-stamp server as show i figure 5. I figure 5, the fuctio geerator ad the time-stamp server are TTP. Requiremet of the fuctio geerator is followigs: Algorithm ad iput values for geeratig the OTT is opeed. I order to give time depedecy to fuctio geerator, the iput values are autheticatio sessio with time-stamp data siged by time-stamp server ad secret value of fuctio geerator. 3.2 Requiremets of the OTT fuctios The goals of applicatio of the OTT fuctio are to protect erolled origial templates ad to prevet replay attacks by usig dishoest acquiremet data of trasformed iformatio by OTT. For achievemet of the goals, the OTTs eed to satisfy the followig coditios:
4 Y : Recursively trasformed poits by OTT at time t 1, sessio a 1 : Recursively trasformed poits by OTT at time t 2, sessio a 2, ( t1 t 2 ) Because orbits of poits recursively mapped by this fuctio are strogly deped o the parameters a, b, ad iitial poits (see figure 6), we expect the mapped poits do ot imply the iformatio of iitial poits if a ad b are securely protected. That is, it may be possible to costruct the OTTs by geeratig ad protectig the parameters of the OTTs. I additio, if these parameters are chageable at each geeratio of OTTs, eve though adversaries obtai data of the idetical user s autheticatio sessios, the adversaries caot kow eve the idetity. For example of Heo s mappig, we ca represet geeratig the parameters a ad b at fuctio geerator as followig: O Coordiate of oe feature poit or template Figure 6 Image of OTT X a= f ( H b= g( H, t, t, s), s) where H, t c, ad s deote hash value of sessio, time from the time-stamp data of the sessio, secret value, respectively. Fuctio f ad g eed to be oe-way fuctios. C C (2) 1) Oe-to-oe fuctio I the methods [3], ad [4], the origial templates ad features are trasformed ito a differet space which has o direct relatioship with a space of these iformatio. Therefore, the method [3] ad [4] become low similarity to the curret biometric systems. This poit receives our attetio. I our method, the origial templates ad features are trasformed ito same space i order to keep the similarity at the matchig process. 2) Difficulty of predictio It is extremely difficult for ay adversary to guess the origial templates ad features from the trasformed iformatio. 3) Preservatio of distace This meas that matchig process ca evaluate the distace betwee the trasformed feature ad the correspodig trasformed template by usig optimal distace fuctio. Because OTTs are oliear mappig, OTTs may be cotractive or expasile, locally. However, it is ecessary to desig OTTs so that every OTT trasforms relative feature ad template ito close poits. We aticipate satisfyig the above coditios may be difficult. We, however, expect a cadidate of the OTTs is chaos mappig such as Heo s mappig: x t+ 1 = 1 axt + by y = x t+ 1 2 t y (1) 3.3 Protocols of the biometric autheticatio usig oe-time trasforms We propose a autheticatio protocol usig OTT. I the rest, (a) - (p) deote umeral otatios show i figure 7. 1) Processes from (a) to (c) deote egotiatio for begiig the autheticatio. After these steps, the cliet ad the autheticatio server share the autheticatio sessio 2) I (d), fuctio geerator receives requests of geeratig OTT with the sessio from both of the cliet ad the autheticatio server. Process (e) is a verificatio cocerig validity of the autheticatio sessio. 3) I (f) ad (g), the fuctio geerator obtais timestamped data of the above sessio. The timestamped data is used for a parameter of OTT geeratio ad a evidece of the sessio performed. 4) About process (h), please refer the discussio i subsectio 3.1 ad ) I (i), the fuctio geerator seds the geerated OTT to both of the cliet ad the database of erolled templates. 6) I order to ed the geeratio process, the fuctio geerator seds sigal of the ed to the autheticatio server i process (l). 7) I j) ad k), the cliet ad the database apply the OTT to the feature data ad the correspodig template data, respectively. Because of commo OTT used, the trasformed data are used i matchig process as is. For example, we ca deote formally as followig equatio: o ftr = F ( ftr) (3), where F(x),, ad ftr deote the OTT, the umber of iteratio, ad the coordiate of the features,
5 Cliet Time Stamp Fuctio Geerator Database of Templates Autheticatio (a) Request of Autheticatio Sessio (b) Start of Autheticatio Sessio (c) Cofirmatio of the start (d) Autheticatio Sessio (d) Autheticatio Sessio (e) Verificatio of the received data from Cliet ad Autheticatio (f) Autheticatio Sessio (i) OTT (g) Time Stamp data of iformatio received i step (f) (h) Geeratig OTT (i) OTT (j) Applyig OTT to feature data (k) Applyig OTT to template data (l) Sig of fiishig geeratio of OTT (m) Request of OTT feature data () Request of OTT template data (o) OTT Template data (p) OTT Feature data Figure 7. Protocol of startig autheticatio sessio to sedig oe-time trasformed features ad oe-time trasformed template respectively. We ca describe the trasform of the templates as followig: o tpl = F (tpl) (4), where tpl deotes the coordiate of the templates. 8) I ()-(q) the autheticatio server obtais the trasformed data of templates ad features. After the above protocols fiished, the autheticatio server performs matchig process ad judgmet process. 9) I matchig process, the autheticatio server calculates distace betwee the set of trasformed features ad oe of the trasformed templates. For a example of distace fuctio, we ca fid the Hausdorff distace [6]: H ( Tpl, Ftr ) = max{ max tpl Tpl ftr Ftr max ftr Ftr tpl Tpl mi { d( tpl mi { d( tpl, ftr, ftr )}} )}, (5), where Tpl, Ftr deote the set of OTT templates ad oe of the OTT features. Fuctio d(.) deotes distace fuctio betwee two poits. We should choose the optimal distace fuctio depedig upo OTT. 10) The autheticatio server calculates the matchig score based o H(Tpl,Ftr ). I judgmet process, the autheticatio server decides accept or reject by comparig H(Tpl,Ftr ) with the correspodig threshold. 4 Argumet of Security of OTBA We discuss the security of the above proposal. First, we metio the security of the framework of the OTBA. If adversaries success to steal this value s stored i the fuctio geerator, they ca become impostor of the fuctio geerator. After that, the fuctio geerator loses trust from other etities i figure 5. However, eve if adversaries hijack the fuctio geerator, because it receives o persoal iformatio, of course icludig the
6 origial template ad the extracted feature, the takeover does ot threate the user s privacy. The we cosider the case of a malicious autheticatio server collects iformatio. I this framework, it receives trasformed features ad templates. As aforemetioed, they imply o iformatio before trasform. Furthermore, the malicious sever caot kow the correspodig OTT. Hece, the malicious server obtais o iformatio about origial templates ad extracted features. Next, we cosider security of the iformatio trasformed by OTT agaist hill-climbig attack [7], [8], replay attack, collusio attack. Hill-climbig attack uses of replied matchig score i order to make a fake. Whe the applicatio server seds the matchig score to cliet (adversary) i figure 5, the adversary trasforms feature data selected from database which the adversary costructs. The adversary seds the trasformed features to the autheticatio server. Because this system chages the calculatio algorithm of matchig score ad threshold for it accordig to selected distace fuctio d(.), it is difficult for the adversary to improve the fake from the replied matchig score. Therefore, the probability of the adversary s success o the OTBA becomes less tha covetioal biometric autheticatio like figure 4. I geeral, replay attack is impossible, if previously obtaied iformatio is ot reusable. Whe adversaries eavesdrop o the commuicatio betwee the cliet ad the autheticatio server, they obtai oly trasformed features which are ot reusable. Hece, o adversary successes replay attack o the OTBA. If the adversaries ca liste to the commuicatio from the fuctio geerator, they obtai the iformatio of OTT. Whe they reuse this iformatio, the cliet ad the database ca detect replay attack by verifyig the differece amog the iformatio of OTT used i former autheticatio sessios. Two cases of collusio attack establish possibly. The oe of case is that the cliet cospires with the fuctio geerator. I this case, the cliet ca obtai ot oly OTT but also iformatio of evaluatio fuctio. Hece, adversaries who ca perform ormal hill-climbig attack success the collusio attack. The other oe is that the autheticatio server stads i with the fuctio geerator. The maer of attack is same as the above oe. 5 Coclusios I this paper, we poited out the problems of the curret studies of the template protectio. As a coutermeasure, we proposed the OTBA to protect the biometric templates ad the extracted features. The mai cocept of the OTBA is that stole biometric iformatio is ot reusable by chageable trasform, OTT every autheticatio for eve same perso. We described recursive trasform as a cadidate of OTT. As a result, we obtaied the view of the security of the OTBA agaist hill-climbig attack ad replay attack durig the fuctio geerator keeps security. This paper described oly cocept of the OTBA. As future works, we should study optimal fuctio of the OTTs, ad practical geeratig algorithm of the OTTs. I additio, we should research formal aalysis of iformatio theoretic security ad time of calculatio i the OTBA. Ackowledgemet This research was supported by Strategic Iteratioal Cooperative Program, Japa Sciece ad Techology Agecy (JST). Refereces [1] ISO/JTC1/SC17/WG3/TF1 for ICAO-NTWG, Supplemet 9303, Iteratioal Civil Aviatio Orgaizatio (ICAO), (URL: mrtd/dowload/documets/ftt_supplemet%20to%20 Doc% pdf) [2] N. K. Ratha, J. H. Coell, R. M. Bolle, "Ehacig Security ad Privacy i Biometric-based Autheticatio Systems", IBM Systems Joural, Vol. 40, No. 3, pp , [3] P. Tulys, J. Goselig, Capacity ad Example of Template-Protectig Biometric Autheticatio Systems, ECCV Workshop BioAW, o. 77, pp , [4] J.-P. Liartz, P. Tuyls New Shieldig Fuctios to Ehace Privacy ad Prevet Misuse of Biometric Templates, AVBPA 2003, pp , [5] P. Reid, Biometrics for Network Security, Pretice Hall, [6] M. F. Barsley, Fractals Everywhere secod editio, Academic Press Professioal, [7] C. Soutar, Biometric System Security, Secure No. 5, pp , 2002 (URL: pdf/secure_5/46_techo_4.pdf) [8] A. Dimovski, D. Gilogoroski, Geeratig highly oliear Boolea fuctio usig a geetic algorithm, 1st Balka Coferece o Iformatics, 2003 [9] PKCS #11 v2.20 Amedmet 1, PKCS #11 mechaisms for Oe-Time Password Tokes, RSA Security Ic. (URL: ftp://ftp.rsasecurity.com/pub/pkcs/ pkcs-11/v2-20/pkcs-11v2-20a1.pdf)
Security of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationA Comparative Study of Positive and Negative Factorials
A Comparative Study of Positive ad Negative Factorials A. M. Ibrahim, A. E. Ezugwu, M. Isa Departmet of Mathematics, Ahmadu Bello Uiversity, Zaria Abstract. This paper preset a comparative study of the
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationThe golden search method: Question 1
1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationProbability of collisions in Soft Input Decryption
Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.
More informationNew HSL Distance Based Colour Clustering Algorithm
The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationAccuracy Improvement in Camera Calibration
Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z
More informationMobile terminal 3D image reconstruction program development based on Android Lin Qinhua
Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College
More informationRelationship between augmented eccentric connectivity index and some other graph invariants
Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationEvaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System
Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1 ad Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-10559 Berli,
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More informationMATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)
MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give
More informationEffect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions
Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural
More informationA Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions
Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationANN WHICH COVERS MLP AND RBF
ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi
More informationPrivate Key Cryptography. TELE3119: Week2
Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i
More informationHarris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c
Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi
More informationOntology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection
2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationA Boolean Query Processing with a Result Cache in Mediator Systems
A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationEvaluation of the Software Industry Competitiveness in Jilin Province Based on Factor Analysis
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 4 Sofia 2014 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI: 10.1515/cait-2014-0008 Evaluatio of the Software Idustry
More informationEVALUATION OF TRIGONOMETRIC FUNCTIONS
EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationMapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System
Mappig Publishig ad Mappig Adaptatio i the Middleware of Railway Iformatio Grid ystem You Gamei, Liao Huamig, u Yuzhog Istitute of Computig Techology, Chiese Academy of cieces, Beijig 00080 gameiu@ict.ac.c
More informationUniversity of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani
Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442
More informationA PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT
GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationBezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only
Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationProtecting Biometric Templates with Image Watermarking Techniques
Protectig Biometric Templates with Image Watermarkig Techiques Nikos Komios ad Tassos Dimitriou Athes Iformatio Techology, GR-19002 Peaia Attiki, Greece {kotdim}@ait.edu.gr Abstract. Biometric templates
More informationLinearising Calibration Methods for a Generic Embedded Sensor Interface (GESI)
1st Iteratioal Coferece o Sesig Techology November 21-23, 2005 Palmersto North, New Zealad Liearisig Calibratio Methods for a Geeric Embedded Sesor Iterface (GESI) Abstract Amra Pašić Work doe i: PEI Techologies,
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationCubic Polynomial Curves with a Shape Parameter
roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationPrivacy-preserving and Secure Top-k Query in Two-tier Wireless Sensor Network
Privacy-preservig ad Secure Top-k Query i Two-tier Wireless Sesor Network Xiaojig Liao, Jiazhog Li School of Computer Sciece ad Techology, Harbi Istitute of Techology, Heilogjiag, Chia Email:{xiaojigliao,lijzh}@hit.edu.c
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationLow Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:
More informationReal-time Path Prediction and Grid-based Path Modeling Method Using GPS
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 12, Number 20 (2017) pp. 9997-10001 Research Idia Publicatios. http://www.ripublicatio.com Real-time Path Predictio ad Grid-based Path
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationMath Section 2.2 Polynomial Functions
Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationProperties and Embeddings of Interconnection Networks Based on the Hexcube
JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,
More informationConsider the following population data for the state of California. Year Population
Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB
More information( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb
Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationBOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM
MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research
More informationn Learn how to implement identity management controls n Learn how to implement access management controls n Prevent unauthorized access
Chapter Objectives Lear how to implemet idetity maagemet cotrols Lear how to implemet access maagemet cotrols Chapter #20: Idetity ad Access Maagemet 2 Idetity ad Access Maagemet Cotrols All actios will
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationWEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE
WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE Wiwik Aggraei 1, Agyl Ardi Rahmadi 1, Radityo Prasetyo Wibowo 1 1 Iformatio System Departmet, Faculty of Iformatio Techology, Istitut Tekologi Sepuluh
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationEE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control
EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,
More informationCreating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA
Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationSERIAL COMMUNICATION INTERFACE FOR ESA ESTRO
Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More information