This summarizes a research document about modifying a multi-party fair exchange protocol. The original protocol required participants to trust both the trusted third party (TTP) and the initiator. The proposed modification cancels the dependence on the initiator by encrypting messages with the source and destination IDs, so the TTP can verify the intended recipient. This allows fairness without relying on any single participant, improving security.
This document discusses energy efficiency in mobile ad hoc networks (MANETs). It begins by explaining that wireless devices have limited battery capacities, so energy efficiency is important. It then discusses several routing protocols that aim to improve energy efficiency, including Minimum Transmission Power Routing (MTPR), Minimum Battery Cost Routing (MBCR), Min-Max Battery Cost Routing (MMBCR), and Conditional Min-Max Battery Cost Routing (CMMBCR). The document also proposes a new protocol called Min-Max Residual Energy in AOMDV (MMRE-AOMDV) and presents simulation results showing it performs better than AOMDV and AODV in terms of energy consumption and end-to-end delay
The document provides overarching conclusions from the 2016 World Water Week conference in Stockholm. Some key points:
- Implementation, action, and partnerships were emphasized as important to achieving the UN Sustainable Development Goals related to water.
- The conference focused on promoting sustainable and inclusive economic growth through sustainable water management.
- Water is crucial for achieving most SDGs and can help coherence in implementing international agreements.
- Partnerships between all levels of government, civil society, businesses, and others are needed to achieve sustainable solutions.
To improve our knowledge of how MD-caused muscle defects arise and to find efficacious therapeutic treatments, different animal models have been generated and applied.
Zebrafish model is one of the most useful in research conducted on muscular dystrophies.
The business plan outlines Asergis Telecom services' goals for JFM-2015 in Mumbai, India. It covers an overview and market analysis of the Mumbai telecom industry and focuses on a new vertical acquisition. The plan sets a revenue target for the period.
The document summarizes the perspective of the U.S. Department of Justice Antitrust Division on the importance of antitrust compliance programs. It describes how the Division's criminal enforcement program has uncovered "brazen" international cartels that involved senior executives colluding to fix prices globally. Effective compliance programs are critical to deterring antitrust crimes and reducing civil liability risks. The document outlines characteristics of prosecuted cartels and elements that an effective compliance program should include to prevent antitrust violations.
This document discusses energy efficiency in mobile ad hoc networks (MANETs). It begins by explaining that wireless devices have limited battery capacities, so energy efficiency is important. It then discusses several routing protocols that aim to improve energy efficiency, including Minimum Transmission Power Routing (MTPR), Minimum Battery Cost Routing (MBCR), Min-Max Battery Cost Routing (MMBCR), and Conditional Min-Max Battery Cost Routing (CMMBCR). The document also proposes a new protocol called Min-Max Residual Energy in AOMDV (MMRE-AOMDV) and presents simulation results showing it performs better than AOMDV and AODV in terms of energy consumption and end-to-end delay
The document provides overarching conclusions from the 2016 World Water Week conference in Stockholm. Some key points:
- Implementation, action, and partnerships were emphasized as important to achieving the UN Sustainable Development Goals related to water.
- The conference focused on promoting sustainable and inclusive economic growth through sustainable water management.
- Water is crucial for achieving most SDGs and can help coherence in implementing international agreements.
- Partnerships between all levels of government, civil society, businesses, and others are needed to achieve sustainable solutions.
To improve our knowledge of how MD-caused muscle defects arise and to find efficacious therapeutic treatments, different animal models have been generated and applied.
Zebrafish model is one of the most useful in research conducted on muscular dystrophies.
The business plan outlines Asergis Telecom services' goals for JFM-2015 in Mumbai, India. It covers an overview and market analysis of the Mumbai telecom industry and focuses on a new vertical acquisition. The plan sets a revenue target for the period.
The document summarizes the perspective of the U.S. Department of Justice Antitrust Division on the importance of antitrust compliance programs. It describes how the Division's criminal enforcement program has uncovered "brazen" international cartels that involved senior executives colluding to fix prices globally. Effective compliance programs are critical to deterring antitrust crimes and reducing civil liability risks. The document outlines characteristics of prosecuted cartels and elements that an effective compliance program should include to prevent antitrust violations.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
This document provides a comparative study of two-way finite automata and Turing machines. Some key points:
- Two-way finite automata are similar to read-only Turing machines in that they have a finite tape that can be read in both directions, but cannot write to the tape.
- Turing machines have an infinite tape that can be read from and written to, allowing them to recognize recursively enumerable languages.
- Both models are examined in their ability to accept the regular language L={anbm|m,n>0}.
- The time complexity of a two-way finite automaton for this language is O(n2) due to making two passes over the
This document analyzes and compares the performance of the AODV and DSDV routing protocols in a vehicular ad hoc network (VANET) simulation. Simulations were conducted using NS-2, SUMO, and MOVE simulators for a grid map scenario with varying numbers of nodes. The results show that AODV performed better than DSDV in terms of throughput and packet delivery fraction, while DSDV had lower end-to-end delays. However, neither protocol was found to be fully suitable for the highly dynamic VANET environment. The document concludes that further work is needed to develop improved routing protocols optimized for VANETs.
This document discusses the digital circuit layout problem and approaches to solving it using graph partitioning techniques. It begins by introducing the digital circuit layout problem and how it has become more complex with increasing circuit sizes. It then discusses how the problem can be decomposed into subproblems using graph partitioning to assign geometric coordinates to circuit components. The document reviews several traditional approaches to solve the problem, such as the Kernighan-Lin algorithm, and discusses their limitations for larger circuit sizes. It also discusses more recent approaches using evolutionary algorithms and concludes by analyzing the contributions of various approaches.
This document summarizes various data mining techniques that have been used for intrusion detection systems. It first describes the architecture of a data mining-based IDS, including sensors to collect data, detectors to evaluate the data using detection models, a data warehouse for storage, and a model generator. It then discusses supervised and unsupervised learning approaches that have been applied, including neural networks, support vector machines, K-means clustering, and self-organizing maps. Finally, it reviews several related works applying these techniques and compares their results, finding that combinations of approaches can improve detection rates while reducing false alarms.
This document provides an overview of speech recognition systems and recent progress in the field. It discusses different types of speech recognition including isolated word, connected word, continuous speech, and spontaneous speech. Various techniques used in speech recognition are also summarized, such as simulated evolutionary computation, artificial neural networks, fuzzy logic, Kalman filters, and Hidden Markov Models. The document reviews several papers published between 2004-2012 that studied speech recognition methods including using dynamic spectral subband centroids, Kalman filters, biomimetic computing techniques, noise estimation, and modulation filtering. It concludes that Hidden Markov Models combined with MFCC features provide good recognition results for large vocabulary, speaker-independent, continuous speech recognition.
This document discusses integrating two assembly lines, Line A and Line B, based on lean line design concepts to reduce space and operators. It analyzes the current state of the lines using tools like takt time analysis and MTM/UAS studies. Improvements are identified to eliminate waste, including methods improvements, workplace rearrangement, ergonomic changes, and outsourcing. Paper kaizen is conducted and work elements are retimed. The goal is to integrate the lines to better utilize space and manpower while meeting manufacturing standards.
This document summarizes research on the exposure of microwaves from cellular networks. It describes how microwaves interact with biological systems and discusses measurement techniques and safety standards regarding microwave exposure. While some studies have alleged health hazards from microwaves, independent reviews by health organizations have found no evidence that exposure to microwaves below international safety limits causes harm. The document concludes that with precautions like limiting exposure time and using phones with lower SAR ratings, microwaves from cell phones pose minimal health risks.
This document summarizes a research paper that examines the effect of feature reduction in sentiment analysis of online reviews. It uses principle component analysis to reduce the number of features (product attributes) from a dataset of 500 camera reviews labeled as positive or negative. Two models are developed - one using the original set of 95 product attributes, and one using the reduced set. Support vector machines and naive Bayes classifiers are applied to both models and their performance is evaluated to determine if classification accuracy can be maintained while using fewer features. The results show it is possible to achieve similar accuracy levels with less features, improving computational efficiency.
This document provides a review of multispectral palm image fusion techniques. It begins with an introduction to biometrics and palm print identification. Different palm print images capture different spectral information about the palm. The document then reviews several pixel-level fusion methods for combining multispectral palm images, finding that Curvelet transform performs best at preserving discriminative patterns. It also discusses hardware for capturing multispectral palm images and the process of region of interest extraction and localization. Common fusion methods like wavelet transform and Curvelet transform are also summarized.
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
This document discusses and compares two techniques for image denoising using wavelet transforms: Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT. Both techniques decompose an image corrupted by noise using filter banks, apply thresholding to the wavelet coefficients, and reconstruct the image. The Double-Density Dual-Tree Complex DWT yields better denoising results than the Dual-Tree Complex DWT as it produces more directional wavelets and is less sensitive to shifts and noise variance. Experimental results on test images demonstrate that the Double-Density method achieves higher peak signal-to-noise ratios, especially at higher noise levels.
This document compares the k-means and grid density clustering algorithms. It summarizes that grid density clustering determines dense grids based on the densities of neighboring grids, and is able to handle different shaped clusters in multi-density environments. The grid density algorithm does not require distance computation and is not dependent on the number of clusters being known in advance like k-means. The document concludes that grid density clustering is better than k-means clustering as it can handle noise and outliers, find arbitrary shaped clusters, and has lower time complexity.
This document proposes a method for detecting, localizing, and extracting text from videos with complex backgrounds. It involves three main steps:
1. Text detection uses corner metric and Laplacian filtering techniques independently to detect text regions. Corner metric identifies regions with high curvature, while Laplacian filtering highlights intensity discontinuities. The results are combined through multiplication to reduce noise.
2. Text localization then determines the accurate boundaries of detected text strings.
3. Text binarization filters background pixels to extract text pixels for recognition. Thresholding techniques are used to convert localized text regions to binary images.
The method exploits different text properties to detect text using corner metric and Laplacian filtering. Combining the results improves
This document describes the design and implementation of a low power 16-bit arithmetic logic unit (ALU) using clock gating techniques. A variable block length carry skip adder is used in the arithmetic unit to reduce power consumption and improve performance. The ALU uses a clock gating circuit to selectively clock only the active arithmetic or logic unit, reducing dynamic power dissipation from unnecessary clock charging/discharging. The ALU was simulated in VHDL and synthesized for a Xilinx Spartan 3E FPGA, achieving a maximum frequency of 65.19MHz at 1.98mW power dissipation, demonstrating improved performance over a conventional ALU design.
This document describes using particle swarm optimization (PSO) and genetic algorithms (GA) to tune the parameters of a proportional-integral-derivative (PID) controller for an automatic voltage regulator (AVR) system. PSO and GA are used to minimize the objective function by adjusting the PID parameters to achieve optimal step response with minimal overshoot, settling time, and rise time. The results show that PSO provides high-quality solutions within a shorter calculation time than other stochastic methods.
This document discusses implementing trust negotiations in multisession transactions. It proposes a framework that supports voluntary and unexpected interruptions, allowing negotiating parties to complete negotiations despite temporary unavailability of resources. The Trust-x protocol addresses issues related to validity, temporary loss of data, and extended unavailability of one negotiator. It allows a peer to suspend an ongoing negotiation and resume it with another authenticated peer. Negotiation portions and intermediate states can be safely and privately passed among peers to guarantee stability for continued suspended negotiations. An ontology is also proposed to provide formal specification of concepts and relationships, which is essential in complex web service environments for sharing credential information needed to establish trust.
This document discusses and compares various nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing imagery, including Biogeography-Based Optimization (BBO), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO). It provides an overview of each algorithm, explaining key concepts like migration and mutation in BBO. The document aims to prove that BBO is the best algorithm for resolving the mixed pixel problem by comparing it to other evolutionary algorithms. It also includes figures illustrating concepts like the species model and habitat in BBO.
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
This document provides a comparative study of two-way finite automata and Turing machines. Some key points:
- Two-way finite automata are similar to read-only Turing machines in that they have a finite tape that can be read in both directions, but cannot write to the tape.
- Turing machines have an infinite tape that can be read from and written to, allowing them to recognize recursively enumerable languages.
- Both models are examined in their ability to accept the regular language L={anbm|m,n>0}.
- The time complexity of a two-way finite automaton for this language is O(n2) due to making two passes over the
This document analyzes and compares the performance of the AODV and DSDV routing protocols in a vehicular ad hoc network (VANET) simulation. Simulations were conducted using NS-2, SUMO, and MOVE simulators for a grid map scenario with varying numbers of nodes. The results show that AODV performed better than DSDV in terms of throughput and packet delivery fraction, while DSDV had lower end-to-end delays. However, neither protocol was found to be fully suitable for the highly dynamic VANET environment. The document concludes that further work is needed to develop improved routing protocols optimized for VANETs.
This document discusses the digital circuit layout problem and approaches to solving it using graph partitioning techniques. It begins by introducing the digital circuit layout problem and how it has become more complex with increasing circuit sizes. It then discusses how the problem can be decomposed into subproblems using graph partitioning to assign geometric coordinates to circuit components. The document reviews several traditional approaches to solve the problem, such as the Kernighan-Lin algorithm, and discusses their limitations for larger circuit sizes. It also discusses more recent approaches using evolutionary algorithms and concludes by analyzing the contributions of various approaches.
This document summarizes various data mining techniques that have been used for intrusion detection systems. It first describes the architecture of a data mining-based IDS, including sensors to collect data, detectors to evaluate the data using detection models, a data warehouse for storage, and a model generator. It then discusses supervised and unsupervised learning approaches that have been applied, including neural networks, support vector machines, K-means clustering, and self-organizing maps. Finally, it reviews several related works applying these techniques and compares their results, finding that combinations of approaches can improve detection rates while reducing false alarms.
This document provides an overview of speech recognition systems and recent progress in the field. It discusses different types of speech recognition including isolated word, connected word, continuous speech, and spontaneous speech. Various techniques used in speech recognition are also summarized, such as simulated evolutionary computation, artificial neural networks, fuzzy logic, Kalman filters, and Hidden Markov Models. The document reviews several papers published between 2004-2012 that studied speech recognition methods including using dynamic spectral subband centroids, Kalman filters, biomimetic computing techniques, noise estimation, and modulation filtering. It concludes that Hidden Markov Models combined with MFCC features provide good recognition results for large vocabulary, speaker-independent, continuous speech recognition.
This document discusses integrating two assembly lines, Line A and Line B, based on lean line design concepts to reduce space and operators. It analyzes the current state of the lines using tools like takt time analysis and MTM/UAS studies. Improvements are identified to eliminate waste, including methods improvements, workplace rearrangement, ergonomic changes, and outsourcing. Paper kaizen is conducted and work elements are retimed. The goal is to integrate the lines to better utilize space and manpower while meeting manufacturing standards.
This document summarizes research on the exposure of microwaves from cellular networks. It describes how microwaves interact with biological systems and discusses measurement techniques and safety standards regarding microwave exposure. While some studies have alleged health hazards from microwaves, independent reviews by health organizations have found no evidence that exposure to microwaves below international safety limits causes harm. The document concludes that with precautions like limiting exposure time and using phones with lower SAR ratings, microwaves from cell phones pose minimal health risks.
This document summarizes a research paper that examines the effect of feature reduction in sentiment analysis of online reviews. It uses principle component analysis to reduce the number of features (product attributes) from a dataset of 500 camera reviews labeled as positive or negative. Two models are developed - one using the original set of 95 product attributes, and one using the reduced set. Support vector machines and naive Bayes classifiers are applied to both models and their performance is evaluated to determine if classification accuracy can be maintained while using fewer features. The results show it is possible to achieve similar accuracy levels with less features, improving computational efficiency.
This document provides a review of multispectral palm image fusion techniques. It begins with an introduction to biometrics and palm print identification. Different palm print images capture different spectral information about the palm. The document then reviews several pixel-level fusion methods for combining multispectral palm images, finding that Curvelet transform performs best at preserving discriminative patterns. It also discusses hardware for capturing multispectral palm images and the process of region of interest extraction and localization. Common fusion methods like wavelet transform and Curvelet transform are also summarized.
This document describes a vehicle theft detection system that uses radio frequency identification (RFID) technology. The system involves embedding an RFID chip in each vehicle that continuously transmits a unique identification signal. When a vehicle is stolen, the owner reports it to the police, who upload the vehicle's information to a central database. Police vehicles are equipped with RFID receivers. If a stolen vehicle passes within range of a receiver, the receiver detects the vehicle's ID signal and displays its details on a tablet. This allows police to quickly identify and recover stolen vehicles. The system aims to make it difficult for thieves to hide a vehicle's identity and allows vehicles to be tracked globally wherever the detection system is implemented.
This document discusses and compares two techniques for image denoising using wavelet transforms: Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT. Both techniques decompose an image corrupted by noise using filter banks, apply thresholding to the wavelet coefficients, and reconstruct the image. The Double-Density Dual-Tree Complex DWT yields better denoising results than the Dual-Tree Complex DWT as it produces more directional wavelets and is less sensitive to shifts and noise variance. Experimental results on test images demonstrate that the Double-Density method achieves higher peak signal-to-noise ratios, especially at higher noise levels.
This document compares the k-means and grid density clustering algorithms. It summarizes that grid density clustering determines dense grids based on the densities of neighboring grids, and is able to handle different shaped clusters in multi-density environments. The grid density algorithm does not require distance computation and is not dependent on the number of clusters being known in advance like k-means. The document concludes that grid density clustering is better than k-means clustering as it can handle noise and outliers, find arbitrary shaped clusters, and has lower time complexity.
This document proposes a method for detecting, localizing, and extracting text from videos with complex backgrounds. It involves three main steps:
1. Text detection uses corner metric and Laplacian filtering techniques independently to detect text regions. Corner metric identifies regions with high curvature, while Laplacian filtering highlights intensity discontinuities. The results are combined through multiplication to reduce noise.
2. Text localization then determines the accurate boundaries of detected text strings.
3. Text binarization filters background pixels to extract text pixels for recognition. Thresholding techniques are used to convert localized text regions to binary images.
The method exploits different text properties to detect text using corner metric and Laplacian filtering. Combining the results improves
This document describes the design and implementation of a low power 16-bit arithmetic logic unit (ALU) using clock gating techniques. A variable block length carry skip adder is used in the arithmetic unit to reduce power consumption and improve performance. The ALU uses a clock gating circuit to selectively clock only the active arithmetic or logic unit, reducing dynamic power dissipation from unnecessary clock charging/discharging. The ALU was simulated in VHDL and synthesized for a Xilinx Spartan 3E FPGA, achieving a maximum frequency of 65.19MHz at 1.98mW power dissipation, demonstrating improved performance over a conventional ALU design.
This document describes using particle swarm optimization (PSO) and genetic algorithms (GA) to tune the parameters of a proportional-integral-derivative (PID) controller for an automatic voltage regulator (AVR) system. PSO and GA are used to minimize the objective function by adjusting the PID parameters to achieve optimal step response with minimal overshoot, settling time, and rise time. The results show that PSO provides high-quality solutions within a shorter calculation time than other stochastic methods.
This document discusses implementing trust negotiations in multisession transactions. It proposes a framework that supports voluntary and unexpected interruptions, allowing negotiating parties to complete negotiations despite temporary unavailability of resources. The Trust-x protocol addresses issues related to validity, temporary loss of data, and extended unavailability of one negotiator. It allows a peer to suspend an ongoing negotiation and resume it with another authenticated peer. Negotiation portions and intermediate states can be safely and privately passed among peers to guarantee stability for continued suspended negotiations. An ontology is also proposed to provide formal specification of concepts and relationships, which is essential in complex web service environments for sharing credential information needed to establish trust.
This document discusses and compares various nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing imagery, including Biogeography-Based Optimization (BBO), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO). It provides an overview of each algorithm, explaining key concepts like migration and mutation in BBO. The document aims to prove that BBO is the best algorithm for resolving the mixed pixel problem by comparing it to other evolutionary algorithms. It also includes figures illustrating concepts like the species model and habitat in BBO.
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document summarizes research on using wireless sensor networks to detect mobile targets. It discusses two optimization problems: 1) maximizing the exposure of the least exposed path within a sensor budget, and 2) minimizing sensor installation costs while ensuring all paths have exposure above a threshold. It proposes using tabu search heuristics to provide near-optimal solutions. The research also addresses extending the models to consider wireless connectivity, heterogeneous sensors, and intrusion detection using a game theory approach. Experimental results show the proposed mobile replica detection scheme can rapidly detect replicas with no false positives or negatives.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Monitoring and Managing Anomaly Detection on OpenShift.pdf
1901 1903
1. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1901
www.ijarcet.org
Abstract— With the widespread utilization of e-commerce,
improving fair exchange service becomes an important role in
research area. A cyclic fair exchange protocol for multi party
was proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen
and Vijay Varadharajan in 1999. According to this protocol, the
user must trust in not only the Trusted Third Party (TTP) but
also the initiator. This paper proposes a modified multi-party
fair exchange protocol that does not depend on the initiator in
order to provide fairness.
Index Terms— e-commerce, cyclic-exchange, multi-party,
fairness, initiator
I. INTRODUCTION
Fairness is one popular research topic in Network Security
area. A protocol can be said as ―fair‖ on condition that after
performing that protocol, all members must have the same
chance and same authority to influence another member.
Assume that two members have their own important
information and each member wants the information from the
other. So each member agrees on one exchange protocol that
he expects to get fairness. After performing this protocol,
receiving respective information and same authority satisfied
each member. Such a protocol is fair exchange protocol.
Fair exchange is usually performed with Trusted Third
Party (TTP).TTP is the third party whom believed by both
parties. Without TTP, the actual fairness cannot be obtained.
Depending on the level of TTP involvement, a protocol can
be described in two types: online-TTP and offline-TTP. With
online-TTP, every exchange step of the protocol must be
noticed by TTP. With offline-TTP, TTP is necessary only
when some unnatural behaviors occur. A protocol can be
idealized to be optimistic if it can delete the involvement of
TTP in the whole exchange process.
Later, researchers tried to gain fairness for more than two
parties. These protocols are named as multi-party fair
exchange (MPFE) protocols. MPFE based on two exchange
methods: Cyclic and General. In Cyclic, the exchange’s
topology is a ring in which each participant Pi offers to
participant Pi+1 message mi in exchange of message mi-1
offered by participant Pi-1 [1]–[4]. In general, each entity can
communicate with the set of entities of his choice [5].
Moreover, the exchanged item may be defined as single unit
Manuscript received May, 2013.
Ms.Nay Chi Htun, Faculty of Information and Communication
Technology, University of Technology (Yatanarpon Cyber City), (Pyin Oo
Lwin, Myanmar
Mrs. Khin Khat Khat Kyaw Faculty of Information and Communication
Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
Lwin, Myanmar
or multi units. So there are four classes of MPFE: single-unit
cyclic exchange, single-unit general exchange, multi-unit
cyclic exchange and multi-unit general exchange [6].
In this paper, a cyclic fair exchange protocol for
multi-party will be modified and analyzed. In [1], the protocol
is applicable for multi-unit or single-unit cyclic exchange.
Multi- unit general model could also be achieved with some
restrictions. However, participants who agree on the protocol
must trust in both TTP and the initiator to achieve the fairness.
In 2001, N. Gonzalez Deleito and O. Markowitch proposed a
method to cancel the initiator dependence [2]. However, the
communication overhead is dramatically increased because of
many broadcasted messages [3]. In 2011, Yi Liu and Hongli
Hu modified the same protocol to cancel the initiator
dependence with low communication overhead. They use the
equation: f (a). f (b) = f (ab),f (y) =y2
mod N where N is the
product of two prime numbers. There are many possible
number pairs that satisfy above these equations. For example,
f(15).f (16) = f (15.16) where N= 13* 17.So authentication
may be broken down by Dictionary attack. In the proposed
protocol, the participants need to trust only in TTP. The
communication overhead is not high because no message is
broadcasted many times.
The paper is organized as follow. The original protocol
proposed by Feng Bao, Robert Deng, Khanh Quoc Nguyen
and Vijay Varadharajan is described and analyzed in section
2. The proposed protocol is presented and analyzed in
section3. In section 4, the paper is concluded.
II. CYCLIC FAIR EXCHANGE PROTOCOL WITH OFF-LINE TTP
In this section, the single unit cyclic fair exchange
protocol with off-line TTP introduced in [1] is briefly
described. The notations are described as follow.
For i=0, 1, 2…n-1
P0 : the initiator of the protocol
mi : the secret item owned by Pi and wanted by Pi+1
Mi : h (mi) and at least known by Pi+1 and TTP
ci : the encrypted value of mi under the public key ei
certi: the proof to convinced that mi is truly encrypted under
the key ei
Here, TTP knows the status of P0, public key (e) and
private key (d) of the cryptosystem. The channel is resilient.
The protocol use the verifiable encryption schemes to
convince that mi is actually encrypted under the key ei.
A. Main Protocol
Pi Pi+1: ci, certi for i = 0,…,n-1
where ci=e (mi)
Pi Pi+1: mi for i = 0,…, n-1.
Analysis and Improvement on a Single Unit
Cyclic Fair Exchange Protocol for Multi-party
Nay Chi Htun, Khin Khat Khat Kyaw
2. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
www.ijarcet.org
1902
In the first round, P0 sends c0 and cert0 to P1. Then P1
checks that verify (c0, cert0, M0, e0) =yes to convince that c0 is
e0 (m0). After checking, P1 sends c1 and cert1 to P2 and so on
till Pn-1. In the second round, P0 sends m0 to P1. P1 sends m1 to
P2 and so on till Pn-1.
B. Recovery Protocol
Pi TTP: ci-1, certi-1.
TTP P0: call.
P0 TTP: yes or abort.
TTP Pi: mi-1 or abort.
In the second round, if Pi does not receive the mi, it can run
the recovery protocol with ci-1 and certi-1. Calling the recovery
protocol may be two different ways. If Pi is the first participant
who runs the recovery protocol, then TTP checks ceti-1, ask P0
whether P0 receives cn-1 and certin-1. If P0 answers ―yes‖, TTP
replies mi-1 to Pi. Otherwise, TTP sends ―abort‖ message to Pi.
If Pi is not the first participant who calls the recovery protocol,
TTP makes the decision according to the first time.
C. Analysis of the Protocol
In the protocol, every participant must trust in P0. Here P0
can say false ―yes‖ or ―abort‖ to fool other parties and the
honest parties can lose fairness. Assume that P3 colludes with
P0 to defeat other parties.
Example 1: P3 got m2 but did not send m3 to P4. When P4
runs recovery protocol with c2 and cert2, P0 says abort to TTP
even if it receives cn-1 and certin-1. So TTP replies ―abort‖
message to P4.
Example 2: P3 got c2 and cert2 but did not send c3 and cert3
to P4. Then P3 run the recovery protocol to get m2. When TTP
call P0, P0 replies ―yes‖ even though it did not receive cn-1 and
certin-1. As described in two examples, it can be seen clearly
that fairness can break down.
III. AN IMPROVED CYCLIC FAIR EXCHANGE PROTOCOL
In this section, the improved protocol will be described.
The notations and assumptions are similar to those of the
original protocol.
A. Main Protocol
Pi Pi+1: ci, certi for i = 0,… ,n-1 where ci=e (mi,
SID, DID)
Pi Pi+1: mi for i = 0,…,n-1
Main protocol is the same as the original protocol except
ci. In the original protocol, ci is the encrypted message of only
mi. So the dishonest party can cheat the information of the
other party and run the recovery protocol.
Example: Assume that P2 is dishonest party. Then P2
Recovery Protocol can cheat ci and certi (i= 1, 3, 4,... ,n-1) and
run recovery protocol.
In the proposed protocol, ci includes the encrypted message
of mi, source ID (SID) and destination ID (DID). Therefore,
TTP can check the intended receiver is whether P2 or not
when it decrypts the ci with the key d even if P2 cheats ci and
certi (i=1, 3, 4,…, n-1) and runs the recovery protocol.
B. Recovery Protocol
Pi TTP : ci, certi, ci-1, certi-1.
TTP Pi+1 : ci, certi or abort.
TTP Pi : mi-1 or abort.
If Pi does not receive the mi, it must run the recovery
protocol with not only ci-1 and certi-1 but also ci and certi. Then
TTP does not call P0. Instead, TTP sends ci and certi to Pi+1
and mi-1 to Pi after TTP verifies and satisfies with the
information of Pi. Otherwise, TTP sends abort message to Pi
and Pi+1.
Figure 1. The Proposed Cyclic Fair Exchange Protocol for Multi Party
C. Analysis of the Protocol
Proposition 1: After the protocol (including the recovery
protocol) has executed, dishonest Pi can never achieve mi-1
without sending his secret information (ci, certi).
Proof: Fairness means ―Give and Take‖. To take the one
of the other , give the one of mine.
Condition 1: In the first round, for i=1,2,3,…,n-1,
dishonest Pi gets (ci-1,certi-1) from Pi-1. But dishonest Pi
doesn’t give (ci, certi) to Pi+1. However Pi wants mi-1and he
cannot get mi-1 from ci-1 because Pi doesn’t know the
decryption key. So Pi must call the recovery protocol with (ci,
certi) as well as (ci-1, certi-1). Consequently, TTP gets (ci,
certi) and TTP can forward to other parties. For that reason, Pi
cannot call the recovery protocol.
Condition 2: In the second round, if Pi gets mi-1 from Pi-1
and doesn’t give mi to Pi+1, then Pi+1 can run recovery protocol
and ask mi from TTP.
Condition 3: TTP can independently recover the mi-1 for
every honest party Pi without confirming the honesty of Pi
with the initiator.
Proposition 2: During the protocol, any dishonest party
(external or internal) cannot run the recovery protocol with
the cheating information (ci, certi) in order to get the actual
message mi-1.
Proof: In the proposed protocol, ci=e (mi, SID, DID),
where SID= source ID and DID= destination ID. So anyone
cannot fool TTP with illegal ci.
IV. CONCLUSION
Fairness plays a vital role in e-commerce applications.
The current multi-party cyclic fair exchange protocols still
have weak-points such as initiator dependence, high
c0,cert0P0
P1
Pi-1
Pi
Pi+1
Pn-1
c1, cert1
ci-1,certi-1
ci, certi
ci+1,
certi+1
cn-1,certn-1
ci,certi
or abort
mi or
abort
ci-1 ,certi-1,
ci, certi
3. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1903
www.ijarcet.org
communication overhead. The proposed protocol can
overcome those weak points. It can give the actual fairness for
multi-party exchange applications without trusting the
initiator. Communication overhead gets lower by deleting
broadcasted messages. Moreover, the proposed protocol
modifies the message ci. Therefore, it can prevent the
dishonest party from running the recovery protocol with the
cheated information.
ACKNOWLEDGMENT
We foremost thanks go to Professor Dr. Aung Win, the
Principal of the Technology of University in Yatanarpon
Cyber City, for welcoming our research and giving a hand for
us. Next, we would like to thank Professor Dr. Soe Soe
Khaing, the Head of the Department of Information and
Communication Technology in our university, for giving a
chance to fulfill my goal. Moreover, I also wish to thank to the
other members of our department for encouraging us and
offering guidelines about our research. Finally, our thanks go
to our families and friends for all the love and kindness they
give us.
REFERENCES
[1] Feng Bao, Robert Deng, Khanh Quoc Nguyen and Vijay Varadharajan,
―Multi-party fair exchange with an off-line trusted neutral party‖, in
DEXA’99 Workshop on Electronic Commerce and Security, Firenze,
Italy, September 1999.
[2] N. Gonza lez-Deleito and O. Markowitch, ―An optimistic multi-party
fair exchange protocol with reduced trust requirements‖, in
proceedings of the 4th
International Conference on Information
Security and Cryptology, LNCS 2288, Springer-Verlag, Dec.
2001,pp.258-267.
[3] Yi Liu, Hongli Hu, ―An improved protocol for optimistic multi-party
fair exchange‖, in International Conference on Electronic and
Mechanical Engineering and Information Technology, Aug.2011.
[4] N. Gonzalez-Deleito and O. Markowitch, ―Exclusion-freeness in
multi-party exchange protocols,‖ in 5th
International Conference on
Information Security, LNCS 2433, Springer-Verlag, 2002, pp.
200-209.
[5] N. Asokan, M. Schunter, and M. Waidner, ―Optimistic protocols for
multi-party fair exchange‖, research report RZ 2892 (# 90840),
IBM Research, Dec. 1996.
[6] M. Franklin and G. Tsudik, ―Secure group barter: multi-party fair
exchange with semi-trusted neutral parties‖, Financial, cryto’98,
LNCS, Springer-Verlag, 1998.
Ms. Nay Chi Htun is a post-graduate student at University of Technology
in Yatanarpon Cyber City, Myanmar.
Mrs. Khin Khat Khat Kyaw is an Assistant Professor at the faculty of
Information and Communication Technology in University of Technology ,
Yatanarpon Cyber City ,Myanmar.