A PRACTICAL PROXY SIGNATURE SCHEME
|
|
- Gervais Flowers
- 5 years ago
- Views:
Transcription
1 A PRACTICAL PROXY SIGNATURE SCHEME Sattar J Aboud and Sufan Yousef Telecommuncatons Engneerng Research Grou Angla Ruskn Unversty, UK sattar_aboud@yahoo.com ABSTRACT A roxy sgnature scheme s a varaton of the ordnary dgtal sgnature scheme whch enables a roxy sgner to generate sgnatures on behalf of an orgnal sgner. In ths aer, we resent two effcent tyes of roxy sgnature scheme. The frst one s the roxy sgnature for warrant artal delegaton combnes an advantage of two well known warrant artal delegaton schemes. Ths roosed roxy sgnature scheme s based on the dffculty of solvng the dscrete logarthm roblem. The second roosed scheme s based on threshold delegaton the roxy sgner ower to sgn the message s share. We clam that the roosed roxy sgnature schemes meet the securty requrements and more ractcal than the exstng roxy sgnature schemes. KEYWORDS Proxy sgnature scheme, warrant artal delegaton, roxy unrotected scheme, roxy rotected scheme, threshold delegaton. 1 INTRODUCTION The dea of a roxy sgnature scheme was frst resented by Mambo et al. [1] n Ther roxy sgnature scheme allows an orgnal sgner to delegate hs sgnng rght to a roxy sgner to sgn the message on behalf of an orgnal sgner. Later, the verfer, whch knows the ublc keys of orgnal sgner and a roxy sgner can check a valdty of a roxy sgnature ssued by a roxy sgner. Tll now we have the followng tyes of delegatons. In general, there are three dfferent tyes of delegatons: full delegaton, artal delegaton and delegaton by warrant. In a full delegaton roxy sgnature scheme, a roxy sgner uses the same rvate key as an orgnal sgner and creates the roxy sgnature as an orgnal sgner does. The drawback of a full delegaton comes from a dffculty of dstnctve between an orgnal sgner and a roxy sgner. In a artal delegaton roxy sgnature scheme, the orgnal sgner derves the roxy key from hs rvate key and asses t to the roxy sgner n a secure channel. In the roxy sgnature scheme wth delegaton by warrant, an orgnal sgner rovdes the roxy sgner a secal message namely warrant. The warrant certfes that a roxy sgner s legal and contans sgner dentty, delegaton erod and the tyes of a message on whch roxy sgner can sgn. Also, there are two tyes n the second one: rotected and unrotected roxy sgnature schemes. In unrotected roxy sgnature scheme, a roxy sgnature s generated by both the roxy sgner and an orgnal sgner. In ths case, the verfer cannot dstngush the dentty of a sgner. In the rotected roxy sgnature scheme, a roxy sgnature s generated by the roxy sgnature key of an orgnal sgner and also wth a rvate key of a roxy sgner. 296
2 Later, a verfer valdates a roxy sgnature wth the ublc keys of both an orgnal sgner and a roxy sgner. Proxy sgnature scheme s useful n many uses such as e-ayment systems and wreless networks [2, 3, 4, 5]. In ths aer, we ntroduce an effcent tye of delegaton that s warrant artal delegaton. In delegaton by warrant, the orgnal sgner sgns a warrant whch descrbes the relatve rghts and nformaton of the orgnal sgner and roxy sgner such that a sgnature verfer can use the warrant as a art of verfcaton nformaton. Usually, delegaton by warrant ncurs more comutatonal cost than the other two. In ths aer we roose effcent and sold roxy sgnature schemes One s a roxy unrotected tye and the other s a roxy rotected tye. The roosed schemes are arorate to schemes usng a dscrete logarthm assumton. Also, because the roosed roxy rotected scheme needs a lnear combnaton of two shared secrets, so t can be develo to a threshold roxy sgnature schemes wthout dffculty.. 2 PRELIMINARIE In ths secton we resent some of the relmnares requred for roxy based sgnatures and threshold. 2.1 Securty Requrements A secure roxy sgnature scheme must satsfy the followng requrements: 1. Identfablty: Any erson can determne an dentty of a corresondng roxy sgner from a roxy sgnature. 2. unforgeablty: Only the desgnated roxy sgner can create the vald roxy sgnature on behalf of an orgnal sgner. 3. undenablty: Once the roxy sgner generates the vald roxy sgnature on behalf of the orgnal sgner, cannot deny a sgnature creaton aganst anyone else. 4. Verfablty: From a roxy sgnature, the verfer s convnced of an orgnal sgner agreement on the sgned message. 5. Proxy sgner devaton: The roxy sgner cannot generate the vald sgnature not detected as the roxy sgnature. 2.2 Notatons Used Throughout ths aer, we wll use the followng notatons. A : orgnal sgner entty A. B : roxy sgner entty B. V : verfer enttyv. : large rme number. g : generator Z. * h (.) : secure one-way hush functon. Id A : dentty of orgnal sgner Id B : dentty of roxy sgner m w : a warrant. WI (b) : reresents a comutng cost to acheve b bt modular nverson. WH (b) : denotes a comutng cost to fnd hash functon wthb btlong nut 2.3 Defntons Used Ths aer resents two new tyes of delegaton, called delegaton wth warrant and threshold delegaton. Defnton 1. (Partal delegaton wth warrant). In artal delegaton wth warrant, the new secret b s calculated from the secret s of entty A and the warrant and b s rovded to entty B n a 297
3 secure manner. From securty ont vew s must not be calculated from b and the warrant. Partal delegaton wth warrant also combnes a beneft of a artal delegaton and the delegaton by warrant. Thus ths delegaton has rad rocessng and s sutable for lmtng messages to be sgned. Also, snce a roxy for artal delegaton wth warrant can dentfy ts vald tme, the roosed scheme s not requred an extra roxy revocaton rotocol. Now n a grou-orented assocaton t s referred that a roxy sgner strength to sgn documents s shared. The entty A, for examle, has teach the secretary entty B to rely nstead of her accordngly. However, assume a secretary entty B s not follow gven nformaton rovded by entty A. It means that an entty B s not sgn the message whch requres to be answered radly or he sgn what entty A has teach to hold back. Therefore, for securty reasons, t may be an organzaton rules that messages be sgned by roxy sgners rather than one entty. Defnton 2. (threshold delegato In threshold delegaton, n roxy sgners are rovded shares for examle t n are requred to create the roxy sgnature rather than the orgnal sgner but less than t. Ths s enttled ( t, threshold delegaton that s n a ( t, threshold roxy sgnature scheme. t out of n roxy sgners should hel to ssue a roxy sgnature any t 1 corrut roxy sgners cannot forge a sgnature. 3. RELATED WORK Mambo et al. n 1996 [1] develoed a systematc aroach to roxy or delegated sgnatures. Neuman n 1993 [6] ntroduced the scheme for delegaton by warrant, whch was further extended by Km et al. n 1997 [7] to artal delegaton by warrant. Okamoto et al. n1999 [8] rooses a roxy-unrotected sgnature scheme. They analyze the securty of ther scheme by usng the reducton among functons. Y et al, n 2000 [9], roosed roxy multsgnature scheme whch allows a grou of orgnal sgners to delegate ts sgnng ower to a sngle roxy sgner. Hwang et al, n 2001 [10], ntroduced a new roxy mult-sgnature scheme. In 2001, Lee et al. [11] roosed a roxyrotected sgnature scheme. Unfortunately, ts securty roof s ncorrect by Wang 2004 [5]. In 2002, Ln et al. [12] resent a mult roxy sgnature scheme for artal delegaton wth cheater dentfcaton, they clam that ther scheme requred less comutatonal overhead comare wth other schemes. Zhou et al. n 2005 [13] roose two effcent roxy rotected sgnature schemes. They clam that ther schemes are more effcent than other schemes. Unfortunately, ther schemes nsecure. In 2006, Qn Wang and Zhenfu Cao [14] resent an attack on the aggregatesgnature based roxy sgnature scheme, they gve arguments for artal delegaton wth warrant roxy sgnature schemes. They construct a new roxy sgnature scheme and rove that t s secure aganst exstentally forgery on adatvely chosen-message attacks and adatvely chosen-warrant attacks under the random oracle model. Moreover, Lu et al. n 2007 [15] ont out that Zhou et al. schemes vulnerable to the un-delegated roxy sgnature attack In 2005 Sunder Lal and Amt Awasth [16] ntroduce a new mult-roxy sgnature scheme for artal 298
4 delegaton wth warrant, whch requres less comutatonal overhead n comarson to Ln et al, and also fulfll the requrement of artal delegaton wth warrant smultaneously. In 2008, Suntha and Amberker [17] roosed a roxy sgnature schemes for controlled delegaton. They fnd that the scheme can be used to control delegaton of fnancal ower to a roxy sgner. They use the dgtal sgnature algorthm n ther scheme. Shao n 2009 [18] roose roxy-rotected sgnature scheme. In 2010,, Lu and Huang [19] roosed a varant of threshold roxy sgnature scheme n whch all roxy sgners reman anonymous. The authors clamed ther constructon satsfes unforgeablty, roxy sgner devaton, dentfablty, undenablty and varablty. However, ths scheme does not rovde the roxy sgner devaton and dentfablty requrements. In 2011, Constantn Poescu [20] ntroduced a secure roxy sgnature scheme wth delegaton by warrant, the scheme s based on the dffculty of solvng the dscrete logarthm roblem. The rest of ths aer s organzed as follows. After we descrbed the related work n secton 3. we wll descrbe n secton 4 the Mambo et al. scheme for artal delegaton. In secton 5 the roosed roxy sgnature scheme s descrbed. However, n subsectons 5.1 and 5.2 we wll exlan and suggest an effcent and sold roxy sgnature schemes for warrant artal delegaton. The frst one s the roxy unrotected scheme and the second one s roxy rotected scheme. In subsectons 3.3 and 5.4 we dscuss the erformance analyss and securty analyss of the roosed scheme whch s extensvely arorate to scheme under a dscrete logarthm assumton. Lastly, ths aer s concluded n secton 6. 4 MAMBO et al. SCHEME It s suosed that the orgnal sgner entty A nvtes the roxy sgner entty B to erform sgnng on behalf of hm, and the verfer enttyv verfes the valdty of generated sgnatures. Also, suose that s a large rme number * and g s a generator for Z. Select a random nteger value e as a ublc key where e= g u mod, and u Z Descrton of the Scheme The stes of the scheme are as follows: Generaton: The orgnal snger entty A should do the followng: 1. select an nteger Z 1 2. comute t g mod 1= 3. fnd = u + * t 1 mod 1 b A 4. ass b, t ) to a roxy sgner entty ( 1 B n a secure channel. Sgnng: Entty B should do the followng: b 1. verfes g e t mod. A * 1 2. sgns the message m on behalf of entty A 3. emloys b as a substtute to u A 4. mlements an ordnary sgnng rocess. 5. the generated roxy sgnature on m s m, s, ( m ) t ) ( b 1 Verfcaton: Entty V should do the followng: 1. fnd e = e t mod as the new ublc key A * 1 299
5 2. a verfcaton of roxy sgnature s mlemented by the same verfyng rocess as n an orgnal sgnature scheme. 5 PROPOSED PROXY SIGNATURE SCHEMES we wll exlan and suggest an effcent and sold two roxy sgnature schemes for warrant artal delegaton. The frst one wth two tyes the frst tye s the roxy unrotected scheme and the second tye s roxy rotected scheme. The second scheme s also wth two tyes. The frst tye s a roxy sharng unrotected and the second tye s a roxy rotected sharng. 5.1 Proosed Schemes Usng Dscrete Logarthm Assumton There are two tyes whch are as follows Proxy Unrotected Scheme The stes of the frst tye are as follows: Generaton: The orgnal sgner entty A should do the followng: 1. selects an arbtrary nteger value Z 1 2. fnds t g mod 1=. 3. concatenates t ) ( m w 1 4. comutes = h m, t ) such that an nformaton on a delegaton must be descrbed n the warrant m for examle ts vald erod. 5. fnds b= * u A + mod asses m w, b, t ) to the roxy ( 1 sgner n the secure channel. Sgnng: entty B must do the followng: w 1. checks = h m, t ) b 2. verfes g e t mod (1) A * 1 3. for sgnng message m uses b nstead of u A and mlements an ordnary sgnng rocess. Thus the roxy sgnature on m s m, s ( m ), t, m ) ( b 1 w such that s ) ndcates the b ( m sgnng message m by secret key b. Verfcaton: A verfcaton of a roxy sgnature s erformed by the same checkng rocess as n an orgnal sgnature scheme excet for an addtonal calculaton: 1. comute = h m, t ) ' 2. comute e e t mod =. A * 1 ' 3. A comuted comonent e handled as a new ublc key clearly showng the artcaton of entty A. 4. A scheme has the followng tye smlar to the congruence (1) b h( t) 5. g = e t mod (2) * Proxy Protected Scheme The stes of the second tye are as follows: 1. Generaton and modfcaton: After checkng a valdty of ( m w, b, t 1) where must be created from an orgnal sgner Id A, roxy sgnature IdB and other data on the delegaton, a roxy sgner entty B comutes a substtute roxy, t ) ( 1 b : b = b+ u B * h(, t1) mod 1 (3) 2. Sgnng: To sgnng the message m, entty B uses b as a substtute to u A and erforms an ordnary sgnng rocess. Thus, a roxy sgnature on m s ( m, sb ( m ) t1, ). 300
6 3. Verfcaton: A verfer entty V erforms the same verfyng rocess as n an orgnal sgnature scheme excet for an addtonal calculaton: = h m, t ) e ' = ( e A * eb ) * t1 mod The calculated key e ' s rocessed as the new ublc key clearly showng an artcaton of entty A. 5.2 Proosed Scheme Usng Threshold Proxy Sgnature Assume that the orgnal sgner entty A needs to delegate the grou to sgn a document n such a way that a roxy sgnature can be generated by the set of t roxy sngers from the desgnated grou G of n roxy sgners but a subset wth t 1 roxy sgners cannot. Here, we llustrate the effcent ( t, threshold roxy sgnature scheme by usng a scheme that we roosed n secton 5.1 and Ceredo Schnorr tye threshold dgtal sgnature scheme [21]. For exedency, we suose that G= ( P 1. The ublc arameters are the same as those of secton 4 excet that 1has large rme factor q and selects g z wth the order of q Generaton Random Number Assume that the dealer wth an arbtrary secret D selects the random olynomal where f ( x) = D+ a1 x a t 1x asses u = f () to P rvately for = 1,..., n and transmts d g D a1 at 1 = mod and g,..., g mod Ths rocess s generated by the followng rotocol: 1. Every roxy sgner P selects y arbtrarly and transmts Z q d g y = mod to each roxy sgners. 2. To delver y every P arbtrarly chooses a olynomal f of degree n Z q where f ( 0) = y that s: f ( x= y + a a a 2, 1x+ a,2 x... Z + a, x wth, 1,...,, q and asses f ( ) mod q top n a secure way ( ). P also transmts a value a g, 1 a, t 1,..., g mod. 3. From delvered f ( )( ), P verfes f for every ( ), by g f l t ( ) a a 1,1, d ( g )...( g ) mod 4. Assume L P P) s not notced to be ( dshonest n ste 3. Every P fnds share u = f ) L ( rvately and fnds a a a 1,1 at 1 = = =, t 1 d d, g g,..., g g L L L Proxy Unrotected Sharng Ths scheme contans four hases whch are as follows: 1. Proxy Generaton The orgnal sgner entty A should do the followng: 1. selects arbtrarly Z q. 2. obtans t1 = g mod. 3. fnds ( m w t 1), 4. comutes = h(, t1). 5. calculates b = u A + mod q. 2. Proxy Sharng To share the roxy b n the threshold scheme wth threshold t entty A should do the followng: 1. chooses nteger Zq, = 1,..., b 301
7 b 2. ssues the result B = g, = 1,...,. 3. fnds a roxy share b as follows: ' 2 f ( x) = b+ b1 x+ b2 x +... b t 1x b = f () 3. Proxy Share Dstrbuton The orgnal sgner entty A should do the followng: 1. asses to every roxy sgner ( for = 1,..., a roxy share b n a secure way 2. transmts, t ) ( m w 1 4. Proxy Share Verfcaton To check the roxy share b a roxy sgner should do the followng: 1. comute = h m, t ) t 1 b 2. check f g ( e t ) B mod A 1 = Proxy Sgnature Broadcastng wthout Exosng Shares Assume that m s the document and L G ublsh the roxy sgnature. For exedency, suose L= ( P 1 t). Thus, the rest of the stes of the rotocol are as follows: 1. L mlements the rotocol for generaton random number and obtan the ublc key y a1 a d = ( g mod ), g,..., g mod and the rvate key of P, u such that a 1 u = f ( ) = y+ a Every roxy sgner P do followng: 1. fnds = h d, m ) ( the 2. comutes d = u + b mod q 3. dscloses d 3. Each roxy sgner P checks the followng: t 1 = d a l l g ( d ( g ) = 1 (( e t ) t 1 A 1 = 1 ( g b ) l ) h( d, m ) mod 4. Every P L fnds t satsfyng: for l. t = y + b = f (0) + f (0) mod q by usng Langrage equaton to d. A roxy sgnature s m, t,, t, m ) ( 1 w 5. The valdty of a sgnature m, t,, t, m ) s checked by: ( 1 w d t h(, t1 ) = g ( e t1) mod A h d, m ) ( In addton, by relacng an above roxy sharng wth the followng roxy rotected sharng, we can clearly extend an unrotected threshold roxy sgnature scheme nto a roxy rotected threshold sgnature scheme Proxy Protected Sharng There are fve hases n ths scheme whch are as follows: 1. Grou Key Generaton The G mlement rotocol for generatng random number and get a ublc key of a grou G ug c c g t 1,..., 1 eg ( = g mod ), g mod and rvate key of P, u G, (such that = u, = f ( ) = u + c c 1. G G t 2. Proxy Generaton Entty A should do the followng: 1. selects Z q. 2. fnds t g 1 = mod. 3. concatenates ( m w t 1). 4. fnds = h(, t1) where m w contans orgnal snger d,roxy sgner d. 5. fnds b = u A + mod q. 302
8 3. Proxy Sharng To share the roxy b n the threshold scheme wth threshold t entty A should do the followng: 1. selects nteger b Z, = 1,..., b 2. ssues a value B = g, = 1,..., q. 3. fnds a roxy share b such that: b = f ( ) = b+ b b 4. Proxy share delvery An entty A should do the followng: 1. asses to every P the roxy sgnature b n the secure way. 2. transmts m w, t ). ( 1 5. Verfcaton of the Proxy The verfcaton of ( m w, b, t 1) are as follows: The P comutes another roxy, ) as follows: ( b, t1 b, = b + u, h m G, t ) mod q utlzes b, as an oton to b 5.3 Performance Analyss When we select the dgtal sgnature standard scheme [22] n generatng the roxy sgnature and on checkng, a comutng tme s lesser n a roxy sgnature for warrant artal delegaton than that by the warrant. Thus, a warrant delegaton needs WI(512) comutng tme, whereas a roosed warrant artal delegaton want WI (9512) + 2WH( ) ( WI (512) + 2WH( ) comutng tme wth and wthout addton the value for the roxy unrotected sgnature scheme and that for the roxy rotected sgnature scheme resectvely. Numbers ndcate a comutng cost to acheve modular multlcaton n 512 bts modulus, WI (b) reresents a comutng cost to acheve b bt modular nverson, and WH (b) denotes a comutng cost to calculate the hash functon wth b bt long nut. When we comare the artal delegaton wth the roosed warrant artal delegaton. The roosed scheme requres WH ( )(642+ WH ( m w )) of comutng tme n the roxy generaton ste, 642+ WI (512)(642+ WI(512)) n sgnature generaton 875+WH ( )(876+ WH( m )) n a sgnature verfcaton ste. But, artal delegaton needs 641(642) of comutng tme n a roxy generaton ste, 642+ WI (512)(642+ WI(512)) n a sgnature generaton ste, 875 (906) n a sgnature verfcaton ste, and an extra 1282 of commutng tme for roxy revocaton algorthm. Observe that as n [1], the subsequent congruence can be emloyed as a substtute to a congruence (3) b = b+ ub * eb mod 1and ths requres ( 906+ WH( )) of comutng tme n a sgnature verfcaton ste. However, from a ont of comutatonal beneft, a warrant artal delegaton decrease an amount of comutng tme comare wth a delegaton by warrant, and from the ont of busness, the roosed scheme needs no addtonal roxy revocaton algorthm n a artal delegaton, the roxy sgnature scheme [23] s calculated n the same manner. 5.4 Securty Analyss In ths aer, we wll dscuss the followng attacks: Framng attack: In such attack, a hacker forges the roxy secret key and then creates vald roxy sgnatures such 303
9 that a verfer consders that these roxy sgnatures were sgned by a roxy sgner entty B on behalf of an orgnal sgner entty A. If the roxy sgnature s resented, entty A cannot reudate that snce s an orgnal sgner of a roxy sgner entty B. The result s that entty A and entty B wll be framed. To acheve ths attack, hacker wants to forge entty B roxy key ar x, d ). As ( forward-secure sgnatures are used by roxy sgner t s comutatonally hard to forge a roxy rvate key. Knowng a roxy ublc key d hacker cannot create a roxy rvate key gven as t s hard to factorze. Thus the roosed scheme ressts the above attacks. By ths we can state that ust a desgnated roxy sgner can generate the vald roxy sgnature on behalf of an orgnal sgner. Thus a requrement of unforgeablty, of the secure roxy sgnature s satsfed. Forgery by orgnal sgner: The roxy rvate key s deendent on both a roxy nformaton sent by an orgnal sgner and a rvate key of a roxy sgner. So, an orgnal sgner cannot make a roxy rvate key. Also, cannot obtan a roxy rvate key from a roxy ublc key as t s hard to factorze. Thus an orgnal sgner s unable to sgn lke a roxy sgner. So, forgery by an orgnal sgner s comutatonally mossble. Imersonatng attack: Suose that entty B s not desgnated as the roxy sgner by an orgnal sgner entty A. Whle entty B can create the roxy key ar x, d ) and sgn the message on ( behalf of entty A, a verfer after recevng sgnatures, frst valdates usng the verfcaton formula f a sgnature s from the vald roxy sgner or from the revoked roxy sgner. Durng ths test a verfcaton fals and a verfer consders hm as the revoked sgner. Thus entty B cannot become a roxy sgner unless he s desgnated by an orgnal sgner entty A. 6 CONCLUSION We suggested two new knd of roxy sgnature. The frst one s a warrant artal delegaton, for whch has the comutatonal gan comared wth an orgnal roxy sgnature by warrant and has also the constructon beneft over a roxy sgnature for artal delegaton. The second one s the roxy for threshold delegaton In the ucomng hghly grou orented socety, t s desred to delegate the ower to sgn messages to a grou of n roxy sgner. We llustrated the requrements related to a roosed thoughts and demonstrated that the roxy sgnature scheme for warrant artal delegaton and a ( t, threshold roxy sgnature scheme wthout exosng roxy shares. Furthermore, a roosed scheme could be extended to a elltc curve roxy sgnature scheme easly. 7 REFERENCES 1. Mambo M., Usuda K., and Okamoto E.: Proxy Sgnatures: Delegaton of the ower to sgn Foundatonal, Volume E79-A, Number 9, PP (1996). 2. Chaum D., Fat A., Naor M.: Untraceable Electronc Cash, Proceedng of the Cryto'88, (1990). 3. Oros H., Poescu C.: A Secure and Effcent Off-lne Electronc Payment System for Wreless Networks, Internatonal Journal of 304
10 Comuters, Communcatons and Control, volume 5(4), (2010). 4. Poescu C.: A Secure and Effcent Off-lne Electronc Transacton Protocol, Studes n Informatcs and Control, volume 19(1), (2010). 5. Wang G.: Desgnated-verfer Proxy Sgnatures for e-commerce, Proceedng of IEEE 2004 Internatonal Conference on Multmeda and Exo (ICME 2004), (2004). 6. Neuman B C.: Proxy-based authorzaton and accountng for dstrbuted systems, Proc. 13th Internatonal conference on Dstrbuted Comutng systems, (1993). 7. Km S, Park S, Won D.: Proxy Sgnatures, Revsted, ICICS 97, LNCS 1334, Srnger verlag, (1997). 8. Okamoto T., Tada M., Okamoto E." Extended Proxy Sgnatures for Smart Cards, Proceedng. of Informaton Securty Worksho (ISW'99), LNCS 1729, Srngerverlag, (1999). 9. Y L, Ba G, and Xao G.: A new tye of roxy sgnature scheme, Electron Letter, 36(6), (2000). 10. Hwang S., Chen C.: A new roxy multsgnature scheme, Internatonal worksho on crytology and network securty, Tamkang Unversty Tae, Tawan, (2001). 11. Lee, B., Km H., Km K..: Secure Moble Agent usng Strong Non-desgnated Proxy Sgnature, Proceedng of the Australasan Conference on Informaton Securty and Prvacy, LNCS 2119, (2001). 12. Ln C., Wu T., Hwang J.: Mult roxy sgnature scheme for artal delegaton wth cheater dentfcaton, Insttute of Informaton Management, NCTU (2002). 13. Zhou Y, Cao Z, and Lu R.: Provably secure roxy-rotected sgnature schemes based on factorng, Alcaton Math Comuter164(1), (2005). 14. Wang Q., CAO Z.: An Identty-based Strong Desgnated Verfer Proxy Sgnature Scheme, Wuhan Unversty Journal of Natural Scences, vol. 11(6), (2006). 15. Lu, Y., Wen H., and Ln C.: Proxy-Protected Sgnature Secure Aganst the Un-delegated Proxy Sgnature Attack, Comuters and Electrcal Engneerng, Volume 33(3), (2007). 16. Sunder Lal, Awasth A.: A scheme for obtanng a warrant message from the dgtal roxy sgnatures, Crytology e-rnt Archve Reort 2005/073, (2005). 17. Suntha and Amberker: Proxy Sgnature Schemes for Controlled Delegaton, Journal of Informaton Assurance and Securty, (2008). 18. Shao Z.: Provably secure roxy-rotected sgnature schemes based on RSA, Comuter Electronc Engneerng, 35, (2009). 19. Lu and S. Huang: Identty-Based Threshold Proxy Sgnature from Blnear Parngs, Informatca, Inst. Math & Scence, Volume. 21, Number. 1, , IOS ress (2010). 20. Constantn Poescu: A Secure Proxy Sgnature Scheme wth Delegaton by Warrant, SIC: Volume 20, ssue 4, (2011). 21. Cerecedo M, Matsumoto T, and Ima H.: Effcent and Secure Multarty Generaton of Dgtal Sgnatures based on Dscrete Logarthms, IEICE Transactons Fundamental, Volume E76-A, Number A, (1993). 22. Lu R, Dong X, & Cao Z.: Desgnng effcent roxy sgnature schemes for moble communcaton, In Scence n Chna, F, 51(2), (2008). 23. B. Umarasada Rao and P. Vasudeva Reddy: ID-Based Drected Mult-Proxy Sgnature Scheme from Blnear Parngs, Internatonal Journal of Comuter Scence and Securty (IJCSS), Volume 5, Issue 1, (
DESIGN AND IMPLEMENTATION OF BASKETBALL TEACHING PLATFORM
0 th February 03. Vol. 48 No. 005-03 JATIT & LLS. All rghts reserved. ISSN: 99-8645 www.jatt.org E-ISSN: 87-395 DESIGN AND IMPLEMENTATION OF BASKETBALL TEACHING PLATFORM BO SU, SUFEI YANG, AIMIN QIN Deartment
More informationHigh Speed 128-bit BCD Adder Architecture Using CLA
Hgh Speed 128-bt BCD Archtecture Usng CLA J.S.V.Sa Prasanth 1, Y.Yamn Dev 2 PG Student [VLSI&ES], Dept. of ECE, Swamy Vvekananda Engneerng College, Kalavara, Andhrapradesh, Inda 1 Assstant Professor, Dept.
More informationBETHANY TAX INCREMENT FINANCING DISTRICT NO. 1 NOTICE OF TWO PUBLIC HEARINGS
BETHANY TAX NCREMENT FNANCNG DSTRCT NO. 1 NOTCE OF TWO PUBLC HEARNGS On December 12, 2017 at 7:00 P.M., at Bethany Cty Hall, 6700 N.W. 36th Street, Bethany, Oklahoma, the Cty Councl of the Cty of Bethany
More informationITRS 2013 Silicon Platforms + Virtual Platforms = An explosion in SoC design by Gary Smith
ITRS 2013 Slcon Platforms + Vrtual Platforms = An exploson n SoC desgn by Gary Smth 2013 2013 Gary Gary Smth Smth EDA, EDA, Inc. Inc. All All Rghts Rghts Reserved. Reserved. 1 The Fve Desgn Constrants
More informationReduced drift, high accuracy stable carbon isotope ratio measurements using a reference gas with the Picarro 13 CO 2 G2101-i gas analyzer
Reduced drft, hgh accuracy stable carbon sotope rato measurements usng a reference gas wth the Pcarro 13 CO 2 G2101- gas analyzer Chrs Rella, Ph.D. Drector of Research & Development Pcarro, Inc., Sunnyvale,
More informationEnglish Premier League (EPL) Soccer Matches Prediction using An Adaptive Neuro-Fuzzy Inference System (ANFIS) for
Englsh Premer League (EPL) Soccer Matches Predcton usng An Adaptve Neuro-Fuzzy Inference System (ANFIS) for Amadn, F. I 1 and Ob, J.C. 2 Department of Computer Scence, Unversty of Benn, Benn Cty. Ngera.
More informationMethodology for ACT WorkKeys as a Predictor of Worker Productivity
Methodology for ACT WorkKeys as a Predctor of Worker Productvty The analyss examned the predctve potental of ACT WorkKeys wth regard to two elements. The frst s tme to employment. People takng WorkKeys
More informationEvaluation of a Center Pivot Variable Rate Irrigation System
Evaluaton of a Center Pvot Varable Rate Irrgaton System Ruxu Su Danel K. Fsher USDA-ARS Crop Producton Systems Research Unt, Stonevlle, Msssspp Abstrat: Unformty of water dstrbuton of a varable rate center
More informationDecomposition guide Technical report on decomposition
June 2013 Decomposton gude Techncal report on decomposton Erasmus MC Start date of project: 20 Aprl 2012 Duraton: 36 months 1 Table of contents Abstract... 4 Acknowledgements... 5 Introducton... 6 Part
More informationEngineering Analysis of Implementing Pedestrian Scramble Crossing at Traffic Junctions in Singapore
Engneerng Analyss of Implementng Pedestran Scramble Crossng at Traffc Junctons n Sngapore Dr. Lm Wee Chuan Eldn Department of Chemcal & Bomolecular Engneerng, Natonal Unversty of Sngapore, 4 Engneerng
More informationThe impact of foreign players on international football performance
MPRA Munch Personal RePEc Archve The mpact of foregn players on nternatonal football performance Orhan Karaca Ekonomst Magazne, Research Department October 008 Onlne at http://mpra.ub.un-muenchen.de/11064/
More informationOnboard Sea State Estimation Based on Measured Ship Motions
Proceedngs of the 1 th Internatonal Sh Stablty Worksho 1 Onboard Sea State Estmaton Based on Measured Sh Motons ABSTRACT Ulrk D. Nelsen Techncal Unversty of Denmark, Kgs. Lyngby, Denmark Davd C. Stredulnsky
More informationInternational Journal of Engineering and Technology, Vol. 8, No. 5, October Model Systems. Yang Jianjun and Li Wenjin
Internatonal Journal of Engneerng and Technology, Vol. 8, No. 5, October 2016 1 Relablty Optmzaton Desgn of Submarne Free-Runnng Model Systems Yang Janjun and L Wenjn Abstract Wth regard to the relablty
More informationDETECTION AND REFACTORING OF BAD SMELL
Internatonal Journal of Software Engneerng & Applcatons (IJSEA), Vol.4, No.5, September 2013 DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALE Jang Dexun 1, Ma Pejun 2, Su Xaohong 3, Wang Tantan
More informationM. Álvarez-Mozos a, F. Ferreira b, J.M. Alonso-Meijide c & A.A. Pinto d a Department of Statistics and Operations Research, Faculty of
Ths artcle was downloaded by: [b-on: Bbloteca do conhecmento onlne UP] On: 29 May 205, At: 02:46 Publsher: Taylor & Francs Informa Ltd Regstered n England and Wales Regstered Number: 072954 Regstered offce:
More informationEvolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
Internatonal Journal on Marne Navgaton and Safety of Sea Transportaton Volume 6 Number 3 September 2012 Evolutonary Sets of Safe Shp Trajectores: Evaluaton of Indvduals R. Szlapczynsk Gdansk Unversty of
More informationFirst digit of chosen number Frequency (f i ) Total 100
1 4. ANALYSING FREQUENCY TABLES Categorcal (nomnal) data are usually summarzed n requency tables. Contnuous numercal data may also be grouped nto ntervals and the requency o observatons n each nterval
More informationADDITIONAL INSTRUCTIONS FOR ISU SYNCHRONIZED SKATING TECHNICAL CONTROLLERS AND TECHNICAL SPECIALISTS
A ADDITIONAL INSTRUCTIONS FOR ISU SYNCHRONIZED SKATING TECHNICAL CONTROLLERS AND TECHNICAL SPECIALISTS DIFFICULTY GROUPS OF FEATURES 1 DEFINITIONS: Change of Rotaton: Refers to TURNS or LINKING STEPS rotatng
More informationCIVL Paragliding and Hang-Gliding Committees CIVL GAP. Centralised Cross-Country Competition Scoring for Hang-Gliding and Paragliding
CIVL Paragldng and Hang-Gldng Commttees CIVL GAP Centralsed Cross-Country Cometton Scorng for Hang-Gldng and Paragldng 2014 Edton Revson 1.1 Publshed March 23, 2014 CIVL GAP Centralsed Cross-Country Cometton
More informationDynamic Analysis of the Discharge Valve of the Rotary Compressor
Purdue Unversty Purdue e-pubs Internatonal Compressor Engneerng Conference School of Mechancal Engneerng 8 Dynamc Analyss of the Dscharge Valve of the Rotary Compressor Bo Huang Shangha Htach Electrcal
More informationNumerical Study of Occupants Evacuation from a Room for Requirements in Codes
Numercal Study of Occupants Evacuaton from a Room for Requrements n Codes HL MU JH SUN Unversty of Scence and Technology of Chna State Key Laboratory of Fre Scence Hefe 2300326, CHINA muhl@mal.ustc.edu.cn
More informationM.H.Ahn, K.J.Lee Korea Advance Institute of Science and Technology 335 Gwahak-ro, Yuseong-gu, Daejeon , Republic of Korea
The Methodology on Exposure Dose Evaluaton Modelng Related to Arbtrary Accdent n the Temporary Storage Faclty for Low and Intermedate Level Waste - 9133 M.H.Ahn, K.J.Lee Korea Advance Insttute of Scence
More informationNUMERICAL SIMULATION OF EXTREME WAVE GENERATION USING VOF METHOD *
466 010,(4):466-477 DOI: 10.1016/S1001-6058(09)60078-0 NUMERICAL SIMULAION OF EXREME WAVE GENERAION USING VOF MEHOD * ZHAO X-zeng RIAM, Kyushu Unversty, Fukuoka, Jaan State Key Laboratory o Coastal and
More informationEndogenous Minimum Participation in International Environmental Agreements: An Experimental Analysis
Endogenous Mnmum Partcaton n Internatonal Envronmental Agreements: An Exermental Analyss Davd M. McEvoy Deartment of Economcs, Aalachan State Unversty, Boone NC, USA Todd L. Cherry Deartment of Economcs,
More informationPeak Field Approximation of Shock Wave Overpressure Based on Sparse Data
Peak Feld Approxmaton of Shock Wave Overpressure Based on Sparse Data Yongl Zhang, Taln Han, Yuqun Chen, Enku Zhang, and Xuan Lu Abstract To obtan the shock wave feld dstrbuton, two knds of calber weapons
More informationGripping force, O.D. gripping. MPZ 20 / 4 bar MPZ 20 / 6 bar. MPZ 20-AS / 4 bar MPZ 20-AS / 6 bar. Gripping force, I.D. gripping
SCHUNK Grppers pneumatc 3-Fnger Centrc Grppers Small Components Grpper Grppng force, O.D. grppng Fnger load Grppng force 50 MPZ 20 / 4 bar MPZ 20 / 6 bar MPZ 20-AS / 4 bar MPZ 20-AS / 6 bar 40 30 20 10
More informationarxiv: v1 [cs.ne] 3 Jul 2017
Modelng preference tme n mddle dstance trathlons Iztok Fster, 1 Andres Iglesas, 2 Suash Deb, 3, 4 Dušan Fster, 5 and Iztok Fster Jr. 6 1 Unversty of Marbor, Faculty of Electrcal Engneerng and Computer
More informationStudy on coastal bridge under the action of extreme wave
Study on coastal brdge under the acton of extreme wave Bo Huang Bng Zhu Jawe Zhang School of Cvl Engneerng, Southwest Jaotong Unversty, Chengdu 610031, Chna Abstract In order to research the catastrophc
More informationNo TRINIDAD AND TOBAGO.
r)( /6 / 2 TRNDAD AND TOBAGO. General Loan and nscrbed Stock. No. 25.-1912. 6th May. AN ORDNANCE to declare the terms and condtons applcable to Loans authorsed to be rased by the Government of Trndad and
More informationAn intro to PCA: Edge Orientation Estimation. Lecture #09 February 15 th, 2013
An ntro to PCA: Edge Orentaton Estmaton Lecture #09 February 15 th, 2013 Revew: Edges Convoluton wth an edge mask estmates the partal dervatves of the mage surface. The Sobel edge masks are: " #!1 0 1!2
More informationStructural Gate Decomposition for Depth-Optimal Technology Mapping in LUT-based FPGA
Structural Gate Decomposton for Depth-Optmal Technology Mappng n LUT-based FPGA Abstract Jason Cong and Yean-Yow Hwang Department of Computer Scence Unversty of Calforna, Los Angeles Los Angeles, CA 9004
More informationLSSVM Model for Penetration Depth Detection in Underwater Arc Welding Process
ISS 1746-7659, England, UK Journal of Informaton and Computng Scence Vol. 5, o. 4, 2010, pp. 271-278 LSSVM Model for Penetraton Depth Detecton n Underwater Arc Weldng Process WeMn Zhang 1, 2, GuoRong Wang
More informationSummary and Cruise Statistics 8
Suary and Cruse Statstcs 8 July 1, 014 8-1 Cruse Colaton Manual Mnstry of Forests, Lands and NRO 8.1 Plot Suary Reort Overvew The Plot Suary reorts nuber of stes, daeter, and erchantable volue nforaton
More informationCoastal Engineering Technical Note
Coastal Engneerng Techncal Note CETN V-10 Even-Odd Functon Analyss of Shorelne Poston and Volume Change by Jule Dean RoSllt and Nchollls C. Kraus Purpose: To present the background and methodology for
More informationCIVL Paragliding and Hang-Gliding Committees CIVL GAP. Centralised Cross-Country Competition Scoring for Hang-Gliding and Paragliding
CIVL Paragldng and Hang-Gldng Commttees CIVL GAP Centralsed Cross-Country Cometton Scorng for Hang-Gldng and Paragldng 2016 Edton Revson 1.0 Publshed February 26, 2017 CIVL GAP Centralsed Cross-Country
More informationPedestrian Impact Testing: Modelling the Effect of Head-form Mass and Speed
Pedestran Iact Testng: Modellng the Effect of Head-for Mass and Seed D. Searson, R.W.G. Anderson Centre for Autootve Safety Research, Unversty of Adelade, AUSTRALIA, 55 Eal: danel@casr.adelade.edu.au Abstract
More informationCS 2750 Machine Learning. Lecture 4. Density estimation. CS 2750 Machine Learning. Announcements
CS 75 Machne Learnng Lecture 4 ensty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 539 Sennott Square CS 75 Machne Learnng Announcements Homework ue on Wednesday before the class Reports: hand n before the
More informationA Study on Parametric Wave Estimation Based on Measured Ship Motions
1 A Study on Parametrc Wave Estmaton Based on Measured Shp Motons Ulrk Dam NIELSEN * and Tosho ISEKI ** Abstract The paper studes parametrc wave estmaton based on the wave buoy analogy, and data and results
More informationAerator Performance in Reducing Phenomenon of Cavitation in Supercritical Flow in Steep Channel Bed
Engneerng Internatonal Conference UNNES Conservaton 13 Proceedng Aerator Performance n Reducng Phenomenon of Cavtaton n Supercrtcal Flow n Steep Channel Bed Yer Sutopo 1, Bud Wgnyosukarto, Istarto, dan
More information2017 GIRLS CENTRAL DISTRICT PLAYER DEVELOPMENT GUIDE
2017 GIRLS CENTRAL DISTRICT PLAYER DEVELOPMENT GUIDE GENERAL OVERVIEW USA Hockey Grls Player Development Dstrct-Specfc Gude The USA Hockey Grls Player Development Dstrct-Specfc Gude outlnes the 2017 grls
More informationMechanical Engineering Journal
56789 Bulletn of the JSME Mechancal Engneerng Journal Vol., o., 6 Measurement of three-dmensonal orentaton of golf club head wth one camera Wataru KIMIZUKA* and Masahde OUKI* * DULOP SPORTS CO. LTD. Waknohama-cho
More informationPlanning of production and utility systems under unit performance degradation and alternative resource-constrained cleaning policies
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 Plannng of producton and utlty systems under unt performance degradaton
More informationENERGY SAVING IN THE HYDRAULIC CIRCUIT FOR AGRICULTURAL TRACTORS: FOCUS ON THE POWER SUPPLY GROUP.
ENERGY SAVING IN THE HYDRAULIC CIRCUIT OR AGRICULTURAL TRACTORS: OCUS ON THE POWER SUPPLY GROUP. Massmo Borgh, Barbara Zardn, rancesco Pntore, Engneerng Department Enzo errar, Unversty of Modena and Reggo
More informationEndogenous Coalition Formation in Global Pollution Control
Fondazone En Enrco Matte Endogenous Coalton Formaton n Global Polluton Control Mchael Fnus and Banca Rundshagen NOTA DI LAVORO 43.001 JUNE 001 Coalton Theory Network Unversty of Hagen, Germany Ths paper
More informationProduct Information. Gripper for small components MPG-plus
Product Informaton Grpper for small components MPG-plus MPG-plus Grpper for small components More powerful. Faster. Longer fngers. MPG-plus grpper for small components 2-fnger parallel grpper wth smooth
More informationUnified optimal power flow model for AC/DC grids integrated with natural gas systems considering gas-supply uncertainties
J. Mod. Power Syst. Clean Energy https://do.org/10.1007/s40565-018-0404-6 Unfed optmal power flow model for AC/DC grds ntegrated wth natural gas systems consderng gas-supply uncertantes Jale FAN 1, Xaoyang
More informationOPTIMIZATION OF PRESSURE HULLS OF COMPOSITE MATERIALS
OPTIMIZATION OF PRESSURE HULLS OF COMPOSITE MATERIALS J.Franco a, A.Corz a*.a.peña b a Materal Composte Group. Unversdad de Cadz. Avda/Ramon Puyol s/n. 11205 Algecras (Span) *alcorz@caltech.es b Calpe
More informationPERFORMANCE AND COMPENSATION ON THE EUROPEAN PGA TOUR: A STATISTICAL ANALYSIS
PERFORMANCE AND COMPENSATION ON THE EUROPEAN PGA TOUR: A STATISTICAL ANALYSIS C. Barry Pftzner and Chrs Spence, Department of Economcs/Busness, Randolph-Macon College, Ashland, VA, bpftzne@rmc.edu, cspence@rmc.edu
More informationPLAYERS AGENT REGISTRATION REGULATIONS
PLAYERS AGENT REGISTRATION REGULATIONS 1 DEFINITIONS 1.1 In these Players Agent Regstraton Regulatons, the followng terms shall have the followng meanngs: Agency Actvty means actng n any way and at any
More informationCOMPENSATING FOR WAVE NONRESPONSE IN THE 1979 ISDP RESEARCH PANEL
COMPENSATING FOR WAVE NONRESPONSE IN THE 1979 ISDP RESEARCH PANEL 1. Introducton Graham Kalton, Unversty of Mchgan ames Lepkowsk, Unversty of Mchgan Tng-Kwong Ln. Natonal Unversty of Sngapore The choce
More informationFor models: 660 EF/EFO
Installaton Instructons Gas converson kts For models: 660 EF/EFO Part no. 660NGKIT/660LPKIT Warnng: Ths kt must be nstalled by a qualfed nstaller n accordance wth these nstructons and all applcable codes
More informationA Prediction of Reliability of Suction Valve in Reciprocating Compressor
Purdue Unversty Purdue e-pubs nternatonal Compressor Engneerng Conference School of Mechancal Engneerng 1996 A Predcton of Relablty of Sucton Valve n Recprocatng Compressor W. H. You Samsung Electroncs
More informationSOME OBSERVATIONS ON THE CO-ORDINATION DIAPHRAGMATIC AND RIB MOVEMENT IN RESPIRATION
Thorax (199),, 65. SOME OBSERVATONS ON THE CO-ORDNATON DAPHRAGMATC AND RB MOVEMENT N RESPRATON BY HERBERT HERXHEMER Surgcal Unt, Unversty College Hosptal, London Daphragm and ntercostal muscles together
More informationFast Adaptive Coding Unit Depth Range Selection Algorithm for High Efficiency Video Coding
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com Fast Adaptve Codng Unt Depth Range Selecton Algorthm for Hgh Effcency Vdeo Codng Fang Shuqng, Yu Me, Chen Fen, Xu Shengyang,
More informationJohnnie Johnson, Owen Jones and Leilei Tang. Exploring decision-makers use of price information in a speculative market
Johnne Johnson, Owen Jones and Lele Tang Explorng decson-makers use of prce nformaton n a speculatve market Abstract We explore the extent to whch the decsons of partcpants n a speculatve market effectvely
More informationDevelopment of Accident Modification Factors for Rural Frontage Road Segments in Texas
Development of Accdent Modfcaton Factors for Rural Frontage Road Segments n Texas Domnque Lord* Zachry Department of Cvl Engneerng & Center for Transportaton Safety Texas Transportaton Insttute Texas A&M
More informationProduct Information. Long-stroke gripper PSH 42
Product Informaton PSH 42 PSH Compact. Flexble. Fully encapsulated. PSH long-stroke grpper 2-fnger parallel grpper wth long jaw stroke and drt-resstant round gudance Feld of applcaton n contamnated work
More informationTHE STATE OIL AND GAS BOARD OF MISSISSIPPI ORDER. This day this cause came on to be heard on the petition
BLED FOR RECORD J Jf\H 6 1978 OIL AND GAS BOARD Clyde R. Davs, State Ol & Gas Supervsor THE STATE OIL AND GAS BOARD OF MISSISSIPPI ^ DOCKET NO. 251-77-56 ORDER NO. ORDER Ths day ths cause came on to be
More informationReport No. FHWA/LA.13/508. University of Louisiana at Lafayette. Department of Civil and Environmental Engineering
TECHNICAL REPORT STANDARD PAGE Report No. FHWA/LA.13/508 4. Ttle and Subttle A Comprehensve Study on Pavement Edge Lne Implementaton 7. Author(s) Xaoduan Sun, Ph.D., P.E. Subassh Das 9. Performng Organzaton
More informationProduct Information. Radial gripper PRG 52
Product Informaton PRG More flexble More powerful. Slm. PRG unversal grpper 180 radal grpper wth powerful 1-shft slotted lnk gear and oval pston. Feld of applcaton For areas of applcaton whch, n addton
More informationRelative Salary Efficiency of PGA Tour Golfers: A Dynamic Review
Relatve Salary Effcency of PGA Tour Golfers: A Dynamc Revew Julo Cesar Alonso Unversdad Ices Julan Benavdes Unversdad Ices Based on one-year sample, Nero (2001) estmated golfers' usng four performance
More informationSeabed type clustering using single-beam echo sounder time series data
SELECTED TOPICS n POWER SYSTEMS and REMOTE SENSING Seabed type clusterng usng sngle-beam echo sounder tme seres data PETER HUNG, SEÁN MCLOONE Department of Electronc Engneerng, StratAG Natonal Unversty
More information2018 GIRLS DISTRICT-SPECIFIC PLAYER DEVELOPMENT GUIDE
2018 GIRLS DISTRICT-SPECIFIC PLAYER DEVELOPMENT GUIDE GENERAL OVERVIEW USA Hockey Grls Player Development Dstrct-Specfc Gude The USA Hockey Grls Player Development Dstrct-Specfc Gude outlnes the 2018 grls
More informationComparisons of Means for Estimating Sea States from an Advancing Large Container Ship
Downloaded from orbt.dtu.dk on: Jan 31, 18 Comparsons of Means for Estmatng Sea States from an Advancng Large Contaner Shp Nelsen, Ulrk Dam; Andersen, Ingrd Mare Vncent; Konng, Jos Publshed n: Proceedngs
More informationA PROBABILITY BASED APPROACH FOR THE ALLOCATION OF PLAYER DRAFT SELECTIONS IN AUSTRALIAN RULES
Journal of Sports Scence and Medcne (2006) 5, 509-516 http://www.jssm.org Research artcle The 8th Australasan Conference on Mathematcs and Computers n Sport, 3-5 July 2006, Queensland, Australa A PROBABILITY
More informationMuscle drain versus brain gain in association football: technology transfer through
Muscle dran versus bran gan n assocaton football: technology transfer through player emgraton and manager mmgraton G. J. Allan a * and J. Moffat b a Correspondng Author: Department of Economcs, Sr Wllam
More informationOPTIMAL LINE-UPS FOR A YOUTH SOCCER LEAGUE TEAM. Robert M. Saltzman, San Francisco State University
OPTIMAL LINE-UPS FOR A YOUTH SOCCER LEAGUE TEAM Robert M. Saltzman, San Francsco State Unversty ABSTRACT Coaches n some dvsons of the Amercan Youth Soccer Organzaton (AYSO) are asked to fll out ther team
More informationA comparison study on the deck house shape of high speed planing crafts for air resistance reduction
csnak, 2014 Int. J. Nav. Archt. Ocean Eng. (2014) 6:867~875 http://dx.do.org/10.2478/ijnaoe-2013-0218 pissn: 2092-6782, eissn: 2092-6790 A comparson study on the deck house shape of hgh speed planng crafts
More informationSECOND-ORDER CREST STATISTICS OF REALISTIC SEA STATES
SECOND-ORDER CREST STATISTICS OF REALISTIC SEA STATES MARIOS CHRISTOU Shell Internatonal Exploraton and Producton, 2288 GS Rjswjk, The Netherlands. E-mal: maros.chrstou@shell.com PETER TROMANS Ocean Wave
More informationJournal of Environmental Management
Journal of Envronmental Management 90 (2009) 3057 3069 Contents lsts avalable at ScenceDrect Journal of Envronmental Management journal homepage: www.elsever.com/locate/jenvman Sustanable value assessment
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): Research Article
Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 204, 6(5): 520-526 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Dgtal Electrcal Resstance Tomography System and ts Expermental
More information11. Contract or Grant No. Lubbock, Texas
Tee hnalr c eport D ocwnentaton Page 1. ReportNo. 2. Government Accesson No.. Recpent's Catalog No. TX -917-951-S. Ttle and Subttle 5. Report Date Proposed Geometrc Desgn for Two-Lane, Two-Way Hghway ntermttent
More informationPedestrian Facilities Planning on Tianjin New Area program
Avalable onlne at www.scencedrect.com ScenceDrect Proceda - Socal and Behavoral Scenc es 96 ( 2013 ) 683 692 13th COTA Internatonal Conference of Transportaton Professonals (CICTP 2013) Pedestran Facltes
More informationInternal Wave Maker for Navier-Stokes Equations in a Three-Dimensional Numerical Model
Journal of Coastal Research SI 64 511-515 ICS2011 (Proceedngs) Poland ISSN 0749-0208 Internal Wave Maker for Naver-Stokes Equatons n a Three-Dmensonal Numercal Model T. Ha, J.W. Lee and Y.-S. Cho Dept.
More informationPower Generation Scheduling of Thermal Units Considering Gas Pipelines Constraints
World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:3, No:1, 29 ower Generaton Schedulng of Thermal Unts Consderng Gas pelnes Constrants Sara
More informationProduct Information. Universal gripper PZN-plus
Product Informaton Unversal grpper PZN-plus PZN-plus Unversal grpper Relable. Robust. Flexble. PZN-plus unversal grpper Unversal 3-Fnger Centrc Grpper wth hgh grppng force and maxmum moments due to mult-tooth
More information2017 GIRLS DISTRICT-SPECIFIC PLAYER DEVELOPMENT GUIDE
2017 GIRLS DISTRICT-SPECIFIC PLAYER DEVELOPMENT GUIDE GENERAL OVERVIEW USA Hockey Grls Player Development Dstrct-Specfc Gude The USA Hockey Grls Player Development Dstrct-Specfc Gude outlnes the 2017 grls
More informationAalborg Universitet. Published in: 9th ewtec Publication date: Document Version Publisher's PDF, also known as Version of record
Aalborg Unverstet Predctablty of the Power Output of Three Wave Energy Technologes n the Dansh orth Sea Chozas, Jula Fernandez; Jensen,. E. Helstrup; Sørensen, H. C.; Kofoed, Jens Peter; Kabuth, Alna Krstn
More informationExperimental And Numerical Investigation Of The Flow Analysis Of The Water-Saving Safety Valve
Expermental And Numercal Investgaton Of The Flow Analyss Of The Water-Savng Safety Valve Muhammed Safa KAMER s PhD Student n Department of Mechancal Engneerng n Kahramanmaras Sutcu Imam Unversty, Turkey.
More informationCFD Simulation of R134a and R410A Two-Phase Flow in the Vertical Header of Microchannel Heat Exchanger
Purdue Unversty Purdue e-pubs Internatonal Refrgeraton and Ar Condtonng Conference School of Mechancal Engneerng 2016 CFD Smulaton of R134a and R410A Two-Phase Flow n the Vertcal Header of Mcrochannel
More informationInternational Journal of Industrial Engineering Computations
Internatonal Journal of Industral Engneerng Computatons 2 (20) 93 202 Contents lsts avalable at GrowngScence Internatonal Journal of Industral Engneerng Computatons homepage: wwwgrowngscencecom/ec A mult-obectve
More informationTerminating Head
Termnatng Head 58246-1 Instructon Sheet for MTA- 100 Receptacle Connectors 408-6929 Usng Dscrete Wre 07 APR 11 Locatng Pawl Feed Slde Tool Base Wre Inserter Adjuster (Inserton Rod) Mass Termnaton Assembly
More informationSUPPLEMENTAL MEMORANDUM. TRANCHE l
SUPPLEMENTAL MEMORANDUM TRANCHE l Prvate Placement of upto 500 (Fve Hundred) Secured, Rated, Lsted, Redeemable, Non-Convertble Debentures ("Debentures" or "NCDs") of the face value of Rs. 10,00,0001- (Rupees
More informationFully encapsulated. Reliable. Precise. DPZ-plus Sealed Gripper
DPZ-plus Fully encapsulated. Relable. Precse. DPZ-plus Sealed Grpper Despte the hgh moment load of the base jaws, ths sealed 3-fnger centrc grpper satsfes the requrements of IP67 and does not permt any
More informationTransportation Research Forum
Transportaton Research Forum On the Impact of HOT Lane Tollng Strateges on Total Traffc Level Author(s): Sohel Sbdar and Mansoureh Jehan Source: Journal of the Transportaton Research Forum, Vol. 48, No.
More informationModeling the Performance of a Baseball Player's Offensive Production
Brgham Young Unversty BYU ScholarsArchve All Theses and Dssertatons 006-03-09 Modelng the Performance of a Baseball Player's Offensve Producton Mchael Ross Smth Brgham Young Unversty - Provo Follow ths
More informationCrash Frequency and Severity Modeling Using Clustered Data from Washington State
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 WB7.1 Crash Frequency and Severty Modelng Usng Clustered Data from Washngton
More informationComparative Deterministic and Probabilistic Analysis of Two Unsaturated Soil Slope Models after Rainfall Infiltration
Jordan Journal of Cvl Engneerng, Volume 11, No. 1, 2017 Comparatve Determnstc and Probablstc Analyss of Two Unsaturated Sol Slope Models after Ranfall Infltraton Manoj Kr. Sahs 1) and Partha Pratm Bswas
More informationEvaluating the Effectiveness of Price and Yield Risk Management Products in Reducing. Revenue Risk for Southeastern Crop Producers * Todd D.
Evaluatng the Effectveness of Prce and Yeld Rsk Management Products n Reducng Revenue Rsk for Southeastern Crop Producers * Todd D. Davs ** Abstract A non-parametrc smulaton model ncorporatng prce and
More informationMass Spectrometry. Fundamental GC-MS. GC-MS Interfaces
Mass Spectrometry Fundamental GC-MS GC-MS Interfaces Wherever you see ths symbol, t s mportant to access the on-lne course as there s nteractve materal that cannot be fully shown n ths reference manual.
More informationNumerical Analysis of Rapid Gas Decompression in Pure Nitrogen using 1D and 3D Transient Mathematical Models of Gas Flow in Pipes
Internatonal Journal of Chemcal and Bologcal Engneerng 6 01 Numercal Analyss of Rapd as Decompresson n Pure Ntrogen usng 1D and 3D Transent Mathematcal Models of as Flow n Ppes Evgeny Burlutsky Abstract
More informationInvestigating Reinforcement Learning in Multiagent Coalition Formation
Investgatng Renforcement Learnng n Multagent Coalton Formaton Xn L and Leen-Kat Soh Department of Computer Scence and Engneerng Unversty of Nebrasa-Lncoln 115 Ferguson Hall, Lncoln, NE 66588-0115 {xnl,
More informationBit shape geometric considerations when sampling by dry drilling for obtaining chloride profiles in concrete
Materals and Structures/Matéraux et Constructons, Vol. 34, Aprl 2001, pp 150-154 TECHNICAL REPORTS Bt shape geometrc consderatons when samplng by dry drllng for obtanng chlorde profles n concrete M. A.
More informationOWNERSHIP STRUCTURE IN U.S. CORPORATIONS. Mohammad Rahnamaei. A Thesis. in the. John Molson School of Business
OWNERSHIP STRUCTURE IN U.S. CORPORATIONS Mohammad Rahnamae A Thess n the John Molson School of Busness Presented n Partal Fulfllment of the Requrements For the Degree of Master of Scence (Busness Admnstraton)
More informationAn Enforcement-Coalition Model: Fishermen and Authorities forming Coalitions. Lone Grønbæk Kronbak Marko Lindroos
An Enforcement-Coalton Model: Fshermen and Authortes formng Coaltons Lone Grønbæ Kronba Maro Lndroos December 003 All rghts reserved. No part of ths WORKING PAPER may be used or reproduced n any manner
More informationST70+ User Reference Manual. Document reference: Date: January 2009
ST70+ User Reference Manual Document reference: 85024-1 Date: January 2009 Autohelm, HSB, RayTech Navgator, Sal Plot, SeaTalk and Sportplot are UK regstered trademarks of Raymarne UK Lmted. Pathfnder and
More informationPower Generation Scheduling of Thermal Units Considering Gas Pipelines Constraints
ower Generaton Schedulng of Thermal Unts Consderng Gas pelnes Constrants Sara Mohtasham and Habb Raab Mashhad Abstract W e grow of electrcty generaton from gas energy gas ppelne relablty can substantally
More informationProduct Information. Long-stroke gripper PFH-mini
Product Informaton PFH-mn PFH-mn Loadable. Flexble. Relable. PFH-klen long-stroke grpper 2-fnger parallel grpper wth large jaw stroke for large parts and / or a broad range of parts Feld of applcaton clean
More informationNonlinear Risk Optimization Approach to Gas Lift Allocation Optimization
pubs.acs.org/iecr Nonlnear Rsk Optmzaton Approach to Gas Lft Allocaton Optmzaton Mahd Khshvand and Ehsan Khamehch* Faculty of Petroleum Engneerng, Amrkabr Unversty of Technology, Tehran, Iran ABSTRACT:
More informationIBIS: ATestbed for the Evolution of Intelligent Broadband Networks toward TINA
BS: ATestbed for the Evoluton of ntellgent Broadband Networks toward TNA Marc0 Lstant, Unversty of Roma "La Sapenza" Stefan0 Salsano, CoRTeL ABSTRACT Ths artcle analyzes a possble path for the evoluton
More information