Localization-based secret key agreement for wireless network
|
|
- Buck Robinson
- 6 years ago
- Views:
Transcription
1 The University of Toleo The University of Toleo Digital Repository Theses an Dissertations 2015 Localization-base secret key agreement for wireless network Qiang Wu University of Toleo Follow this an aitional works at: Recommene Citation Wu, Qiang, "Localization-base secret key agreement for wireless network" (2015). Theses an Dissertations This Thesis is brought to you for free an open access by The University of Toleo Digital Repository. It has been accepte for inclusion in Theses an Dissertations by an authorize aministrator of The University of Toleo Digital Repository. For more information, please see the repository's About page.
2 A Thesis entitle Localization-base Secret Key Agreement for Wireless Network by Qiang Wu Submitte to the Grauate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Electrical Engineering Dr. Junghwan Kim, Committee Chair Dr. Richar G. Molyet, Committee Member Dr. Ezzatollah Salari, Committee Member Dr. Patricia R. Komuniecki, Dean College of Grauate Stuies The University of Toleo May 2015
3 Copyright 2015, Qiang Wu This ocument is copyrighte material. Uner copyright law, no parts of this ocument may be reprouce without the expresse permission of the author.
4 An Abstract of Localization-base Secret Key Agreement for Wireless Network by Qiang Wu Submitte to the Grauate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Electrical Engineering The University of Toleo May 2015 Due to the share nature of wireless meium, generating secret key between legitimate noes uner the presence of eavesroppers remains challenging in wireless network environment. In this research, a framework of secret key agreement utilizing observations of noes relative location is consiere. While many current works concern secret key generation only for 3-noes (2 legitimate noes an 1 eavesropper), this research proposes an approach an analysis for a wireless network environment with m (m 3) legitimate noes an 1 eavesropper. The propose algorithm uses the istance between a ranomly selecte noe 1 an noe 2 as the Reference Distance (RD) to establish the secret key. In orer to secure the elivery of RD to other m-2 noes, an Aitive Distance Value (ADV) is use for public iscussion. Further, ifferent types of topologies are evelope to accomplish secret key agreement for m noe wireless network incluing star, chain an hybri topologies. After the ADV istribution an RD estimation, the secret key is generate through secret bit extraction. The Maximum achievable Secret key generation Rate (MSR) base on the above network topologies is stuie through theoretical analysis an mathematical estimation. Base on these analyze, the feasibility of propose secret key iii
5 generation algorithm is valiate with a comparable secret key generation rate. The relationship between secret key, wireless network size an signal-noise ratio has been ientifie. Moreover, a comparison between star topology, chain topology an hybri topology has been iscusse. After that, several wireless network moels incluing ranom patterne moving wireless noes are stuie to show the feasibility an performance of our propose secret key generation algorithm. A chain topology improving metho is propose base on the wireless network moel simulation. Last but not the lease, in orer to reuce the bit mismatch rate, an optional secret key agreement proceure is also propose. In all, this research stuies the secret key agreement base on localization information in an m noe wireless network uner the presence of eavesroppers. iv
6 Acknowlegements First of all I woul like to give my highest gratitue to my granma, my mom an my a. It s their altruistic love an encouragement which mae me go this far. I am like a ki sitting on their shoulers all the time an I hope one ay I woul be able to protect my family with my knowlege an work. Also, I want to give my greatest appreciation to my avisor Doctor Junghwan Kim. This thesis woul never been one without the help of Doctor Kim. The patience an kinness of him have assiste me to get through rough times. His iligent attitue an extensive knowlege of communication research have stimulate my esire of stuying. v
7 Table of Contents Abstract... iii Acknowlegements...v Table of Contents... vi List of Tables..... viii List of Figures... ix List of Abbreviations... xi List of Symbols... xii 1 Introuction Wireless Network an Secret Key Generation Localization Base Secret Key an Motivation of the Thesis Summary an Structure of Thesis Relate Work Mathematical Moel of Wireless Network Parameters of Wireless Network Moel Attacker Moel Basic Mathematical Moel of Wireless Network Calculation Rules for Entropy an Mutual Information Gaussian an Multivariate Gaussian Distribution...15 vi
8 4 Secret Key Generation Algorithm Basic Protocols between Noes Secret Key Generation Algorithm Theoretical Analysis on Secret Key Generation Rate Star Topology-base Maximum Secret Key Generation Rate Chain Topology-base Maximum Secret Key Generation Rate Hybri Topology-base Maximum Secret Key Generation Rate Mathematical Analysis for Maximum Secret Key Generation Rate Star Topology-base Maximum Secret Key Generation Rate Chain Topology-base Maximum Secret Key Generation Rate Hybri Topology-base Maximum Secret Key Generation Rate Discussions on the Star, Chain, Hybri Topologies Simulation of Wireless Network Moels Ranom Patterne Wireless Network Moel Simulation Ranom Patterne Wireless Network Moel Discussions on chain topology improvement Secret Key Agreement Algorithm Conclusions References...86 Appenix A...90 vii
9 List of Tables 6.1 Performance comparison between star, chain an hybri topology Ranom patterne performance comparison between star, chain an hybri Chain topology improving metho performance simulation...79 viii
10 List of Figures 4-1 Illustration of the 3-noe network of basic protocol Illustration for an m noe wireless network with star topology Illustration for an m noe wireless network with chain topology Illustration for wireless network with hybri topology Brief on star topology Schematic iagram of chain topology Scenario of hybri topology Star topology base MSR vs. SNR Star topology base MSR vs. wireless network size Chain topology base MSR vs. SNR Chain topology base MSR vs. wireless network size Hybri topology base MSR vs. SNR Hybri topology base MSR vs. wireless network size M Hybri topology base MSR vs. smallest star size ma Star topology vs. Chain Topology vs. Hybri Topology for SNR Star topology vs. Chain Topology vs. Hybri Topology for network size Star topology wireless network moel with an eavesropper Secret Bit Extraction Algorithm Generate secret key for noes an eavesropper when SNR = ix
11 6-13 Generate secret key for noes an eavesropper when SNR = 9.35B Chain topology wireless network moel Generate secret key for noes an eavesropper when SNR = 20.46B Generate secret key for noes an eavesropper when SNR = 7.45B Larger scale wireless network moel Star topology for the larger scale wireless network moel Chain topology for the larger scale wireless network moel Hybri topology for the larger scale wireless network moel Ranom patterne wireless network moel Ranom patterne wireless network moel with star topology Ranom patterne wireless network moel with chain topology Ranom patterne wireless network moel with chain topology Improve chain topology performance with hybri topology Wireless network with chain topology an improve hybri topology Illustration of secret key agreement for star topology Illustration of secret key agreement for chain topology Improve chain topology performance with hybri topology...85 x
12 List of Abbreviations ADV...Aitive Distance Value AOA...Angle Of Arrival AWGN...Aitive White Gaussian Noise BMR...Bit Mismatch Rate CDF...Cumulative Distribution Function ESPAR...Electronically Steerable Parasitic Array Raiator i.i....inepenent an ientically istribute Liar...Light etection an ranging LPS...Local Positioning System MSR...Maximum achievable Secret key generation Rate NLOS...Non-Line-Of Sight RD...Reference Distance SS...Signal Strength SNR...Signal-to-Noise Ratio TOA...Time of arrival UAV...Unmanne Aerial Vehicle xi
13 List of Symbols...istance between noe i an noe j i, j E...public iscussion pub h, H...entropy calculation i, j... i th/ j th wireless noe I...mutual information calculation k... k th time slot l...location for noe i i m...number of total wireless noes M...number of total wireless noes specifically in hybri topology mi...number of noes in the i th star in the hybri topology ma...number of noes in the smallest star in the hybri topology r...length of generate secret key bits for a single time slot R...secret key generation rate S i ()...generate secret key v...size of strings in the secret key agreement algorithm 2 2 β...signal to noise ratio, / w βb...signal to noise ratio in B, B 10log...aitive istance value ADV ε...any small positive number μ...mean value base on Gaussian assumption...variance of localization information base on Gaussian assumption 2...variance of noise base on Gaussian assumption 2 w xii
14 Chapter 1 Introuction In this chapter, the wireless network popularity an its challenges are initially iscusse. Later, the avantages of secret key generation using localization information is escribe as well as the propose algorithm an topology. To that en, a summary of the thesis is given. 1.1 Wireless Network an Secret Key Generation Wireless network has been wiely use throughout the worl nowaays. Laptops, tablets, smartphones an other forms of wireless evices have become an important part of our moern life, not to mention the comprehensive use of wireless network in meical, military an many other areas in the society. However, with the explosive growth of wireless communication network, security has become a critical issue because of the open nature of wireless meium an mobility of the wireless noes [5]. For example, a group of stuents want to share their project results with laptops or tablets among themselves, a group of tourists want to share their photos with smartphones to each other or a group of soliers 1
15 want to report the battle situation to the team. In such ynamic environments, the wireless parties nee to form their connection on-the-fly. Secret key generation has rawn more attention than the traitional cryptography methos for secure wireless communication in above scenarios [5-8]. In secret key generation, legitimate noes coul agree on a synchronize secret key, while eavesroppers can only overhear limite information through the wireless channel. In here, eavesroppers are malicious wireless noes which overhear the wireless channel communication an try to ecipher the secret key. The secret key is generate base on a ranom sequence extracte from certain characteristic of the legitimate noes, such as noes relative istance, wireless channel reciprocity an so on, therefore the legitimate noes woul have privacy privilege over the eavesroppers. In orer to achieve a higher secret key generation rate, the entropy of the extracte ranom sequence shoul be maximize, while the amount of information transmitte on the public channel shoul be minimize [22]. Therefore the maximum secret key generation rate (MSR) is frequently use to estimate the performance of secret key generation algorithm [6-12]. Security in wireless network has several challenges [5]: (1) Wireless nature of communication. The open nature of the wireless meium makes the secret key establishment process easy to be eavesroppe by the opponent. As a result, the secret key generation rate shoul be analyze uner the presence of eavesropping-aversaries. (2) Resource limitation on sensor noes (processor spee, memory storage an power supply, etc). (3) Lack of fixe infrastructure (ue to the highly ynamic mobile wireless environment). Many traitional cryptography methos such as authentication an key 2
16 exchange base on public-key cryptography [1-4] may not be feasible in many situation because of the limite resource on wireless noes an the lack of fixe key management infrastructure. (4) Unknown network topology prior to eployment. 1.2 Localization Base Secret Key an Motivation of the Thesis Recently, there have been overwhelming stuy that focus on secret key generation base on the wireless channel reciprocity (such as impulse response, signal envelopes, signal phases an receive signal strength) [9-14]. Unlike these research, the possibility of utilizing relative wireless noe localization to generate secret key is iscusse in this thesis. The avantage of using the relative noe istance is ue to the variety of technologies that can be use for localization, such as infrare, raio, ultrasoun, Liar (Light Detection An Ranging), Raar, an so on. This versatility of the localization technology makes the key generation system more capable in many circumstances an more powerful than just using wireless raio channel reciprocity. For example, Liar or narrow beam-with infrare system can enhance the ifficulty for eavesropping from ifferent angles. Furthermore, in many applications the localization information is reay to use which makes the propose secret key generation algorithm easy to hook up with the existing wireless network system. Plus, regarless of wireless noe the localization measurement initiates, the istance measure between two wireless noes is always ientical in certain time interval, even when ifferent frequency bans are use or it is non-line-of sight (NLOS) for the wireless noe pairs. 3
17 There are several motivations for this thesis. i) Most of the present secret key generation algorithm an its analysis are only base on a simple 3-noe wireless network moel (Noe A, Noe B an Eavesropper E). In orer to consier the secret key generation for a larger scale wireless network, a wireless network moel of m (m 3) legitimate noes an 1 eavesropper is consiere in this thesis. Different types of network topologies incluing star topology, chain topology an hybri topology are propose to moel the wireless communication in such a large scale wireless network. Furthermore, the propose secret key generation algorithm base on these topologies are analyze in etail. ii) The possibility of secret key generation using localization is stuie instea of the overwhelming research base on wireless channel reciprocity. Its avantage has been mentione. iii) Although there are some current research working on secret key generation topologies [12], an improvement has been mae by using propose secret key generation algorithms. In the propose algorithm, the noise accumulation along the chain is reuce, which results higher MSR. Further, the theoretical an mathematical analysis on the hybri topology is also stuie in this research. iv) In orer to reuce the bit mismatch rate, an optional secret key agreement algorithm is propose base on ifferent types of topologies. 1.3 Summary an Structure of Thesis This thesis is organize as following: A iscussion of the relate work an the tren of secret key generation is provie in Chapter 2. The system moel incluing the attacker moel is escribe in Chapter 3. The basic mathematical moel of secret key generation an its calculation rules are also iscusse in Chapter 3 an will be use further in the 4
18 secret key generation rate erivation. In Chapter 4, the framework of secret key generation algorithm is propose. The propose secret key generation algorithm inclues quantization for localization, public iscussion consiering network topology (star, chain an hybri topologies) an bit extraction. In Chapter 5, a theoretic analysis for the Maximum achievable Secret key generation Rate (MSR) is conucte base on the previously iscusse network topologies (star, chain an hybri) respectively. In Chapter 6, with the help of mathematic analyzer, the relationship between the maximum secret key generation rate, the wireless network scale an the signal-to-noise ratio (SNR) is analyze with intuitive chart view. In Chapter 7, wireless network moels with ranom patterne moving wireless noes is simulate to further stuy the feasibility an performance of our propose algorithm. An a metho of improving the chain topology performance is suggeste. In Chapter 8, an optional secret key agreement proceure is propose towar reucing bit mismatch rate. Finally, the conclusions of the research is given in Chapter 9. 5
19 Chapter 2 Relate Work With the robust popularization of wireless network, how to secure the wireless communication within the authorize wireless noes has become a critical issue. In such scenario, traitional authentication an key exchange methos base on public-key cryptography [1-4] may not be applicable because of its fixe key infrastructure. Meanwhile, secret key agreement algorithms have recently rawn more attention ue to its synchronize key generation scheme which gives the legitimate noes more privacy privilege over eavesroppers. Multiple key istribution mechanisms are iscusse by Seyit [5]. In [5], Seyit iscusse about pair-wise, group-wise an network-wise key istribution schemes, which provie a reference for esigning secret key generation algorithm. In [6], Maurer has stuie the lower an upper limit of secret key generation rate for a 3-noe wireless network moel (incluing two legitimate noes A, B an one eavesropper E). Maurer provie the upper boun with the assumption that the eavesropper is receiving a very small amount of information an the lower boun given by the eavesropper can only access the public channel information. Later, the maximum secret key generation rate uner such 3-noe moel was improve by consiering ifferent wireless communication 6
20 scenarios in Ruolph [7] an Maurer [8]. However, the maximum secret key generation rate of a propose algorithm still nees to be stuie further towar improvement. Recently, an overwhelming amount of stuies are focuse on generating the secret key for wireless network by exploiting reciprocal properties of the wireless channel [9-14]. [9] an [10] stuie the secret key generation utilizing channel response. Detaile secret key generation algorithms also have been propose in this regar an its performance is evaluate through secret key generation rate an secret bit mismatch rate analysis. Example stuies in [11-14] are base on the signal envelop an receive signal strength. [11] i an experimental setup of 3-noe wireless network to test the propose algorithm. [12] gave an initial research on large scale wireless network an its topology. However, the hybri topology is not stuie an the algorithm coul be further improve. Further research [13] uses the electronically steerable parasitic array raiator (ESPAR) antenna an [14] concerns on the multiple antenna evices in signal reception. Different from the previous stuies base on channel reciprocity, some recent researches [15-20] are utilizing localization information for wireless network secret key generation. Due to the variable technology that can be use for wireless localization, the localizationbase secret key generation algorithm [15] is applicable to more iverse circumstances. [15] iscusse on the localization using ultra-wieban raios. Time of arrival (TOA), angle of arrival (AOA) an signal strength (SS) base wireless positioning techniques are introuce in this research. [16] gave an overview of localization techniques via wieban raios an iscusse its funamental limits. [17] presente stuy on wireless localization leveraging ultrasoun technology. The feasibility of ultrasonic localization for local positioning system (LPS) is prove through both theoretical an experimental stuy. [18] 7
21 introuce an infrare local positioning system (LPS) esigne for inoor unmanne aerial vehicle (UAV) use, which emonstrate the possibility of wireless localization base on infrare technology. Due to this reainess of localization technology in most wireless systems, the propose localization-base secret key generation algorithm can be easily integrate. There are also some comparable researches about secret key generation via localization [19-20]. However, [19] is base on pre-istribute personal secret information. Also the sensors within the network are consiere as either low mobility or fixe. [20] stuie the secret key generation algorithm only base on a 3-noe wireless network moel. Actually, most of the previously mentione researches are conucte only for the simplest 3-noe wireless network moel. In orer to further stuy the probability of secret key establishment via localization in a larger scale real wireless network, the research for an m (m 3) legitimate noes an 1 eavesropper wireless network moel is conucte in this thesis. [21] is consiering high secret key generation rate for the secret key generation algorithm base on wireless channel reciprocity. [22] is research for faing wireless channel. Increasing the secret key generation rate an analyzing the algorithm with ifferent kins of wireless channel coul be a future work. In this thesis, the analysis is base on Gaussian istribution assumption of the sample localization information for the noes an the noise is also consiere as Aitive White Gaussian noise (AWGN). In all, this thesis proposes an algorithm of secret key generation using localization information for multiple noe wireless network. A theoretical stuy of the Maximum Secret key generation Rate (MSR) is erive an the MSR is further examine through mathematical analysis. Aitionally, an optional secret key agreement proceure is presente to reuce the bit mismatch rate. 8
22 Chapter 3 Mathematical Moel of Wireless Network 3.1 Parameters of Wireless Network Moel Secret key agreement is essential for securing wireless communication. However, most of the previous localization-base secret key generation research only consier a simple network of 3-noes (Noe A, Noe B an Attacker E). In orer to stuy the secret key generation algorithm that works for a real wireless network, a wireless network moel consisting of a large scale area of m (m 3) legitimate noes an 1 malicious eavesropper must be consiere. Towar this goal, we efine that the istance between two ranomly selecte noe 1 an noe 2 is terme as the Reference Distance (RD) an use for secret key agreement. Furthermore, instea of transmitting the RD itself, an Aitive Distance Value (ADV) is publishe uring public iscussion to secure the secret key agreement. Since an m noe wireless network is consiere in this research, ifferent types of topologies (star, chain an hybri) are iscusse, as the group of wireless evices in the secret key establishment may or may not within the communication range of each other. For the circumstance that 9
23 each wireless evice is within the communication range of another wireless evice, a star topology is employe, while a chain topology is use for the scenarios in that not all wireless evices are within the communication range of others, but all noes are interconnecte. Other than the star an chain topologies, a hybri topology coul be utilize uner other circumstances. The hybri topology is a combination of star an chain topology. After the istribution of ADV, RD is estimate an the secret key is generate through bit extraction. Further, the maximum achievable secret key generation rate is erive an analyze base on the star, chain an hybri topology. After that, a secret key agreement proceure is propose to reuce the bit mismatch rate. Finally, a conclusion is mae for the propose framework of secret key generation utilizing localization for wireless network. More etaile system escription is presente as follow: i) To quantize the localization information for the m noe 1 eavesropper wireless network, the time is ivie into n iscrete slots. Let l i (k) be the location for the noe i at time slot k, where i{1,2,, m, e} an k {1,2,, n}. Then the istance between noe i an noe j at slot k can be presente as i,j (k) li(k) l j(k), while the noes exchange their localization information in public iscussion. ii) Two ranom wireless noes are selecte as Noe 1 an Noe 2. The istance between them, 1,2 (k) l1(k) l2(k), is terme as the Reference Distance (RD) to generate the wireless network secret key. Noe 1 an noe 2 estimates the RD as 1,2(k) an 2,1(k) respectively. 10
24 iii) Instea of transmitting the RD irectly, an Aitive Distance Value (ADV) is use in the public iscussion to better ensure the wireless network security. Above assumptions an efinitions are use for the following respective network moels: a) In the star topology, noe 1 will be selecte as the central noe of star topology. It will publish ADV to all other noes to perform the secret key generation. All the other noes observe the istance between themselves an noe 1, where (k) (k) (k), i {3,4,, m}. 1,i l1 l i b) In the chain topology, noe 1 will be selecte as the hea noe of the chain an ADV will be passe by each noe throughout the chain topology. All the other noes i observe the istance between themselves an the other two ajacent noes, where i 1,i (k) li 1(k) li (k) an i,i 1(k) li (k) li 1(k), i {3,4,, m}. c) In the hybri topology, noe 0 an noe 1 will be ranomly selecte an the istance between noe 0 an noe 1 is terme as RD. Noe 1 will be selecte as the central noe of the 1st star. It publishes the ADV to all noes in the 1st star through the star topology an forwar the ADV to the 2n star central noe through the chain topology. 2n star central noe publishes the ADV to all noes in 2n star an forwar the ADV to the next star central noe through the chain. iv) When all noes receive the ADV in any topologies, they are able to calculate RD through ADV. The secret key is then generate through secret bit extraction base on RD. 11
25 3.2 Attacker Moel In this thesis, a passive eavesropper noe e is consiere. This passive aversary noe e oes not have transmitting beacons, however, it eavesrops all the public iscussion uring the secret key generation. Noe e also observes the istance between e an any other noe i. We efine its relative istance as e, i(k) le(k) li (k). 3.3 Basic Mathematical Moel of Wireless Network Maurer [6], Ahlswee an Csisz ar [7] performe the initial research on secret key generation using correlate information. In [7], the theoretical bouns of secret key generation rate for a simple 3-noe wireless network with two legitimate noes A, B an one eavesropper E has been ientifie. In their work, iscrete ranom variables X an Y respectively represent the information observe an sample by noe A an noe B in n iscrete time slots, where X an Y are inepenent an ientically istribute (i.i.) ranom variables such that X [X(1), X(2), X(n)] an Y [ Y(1), Y(2), Y(n)]. In any given time instance k, k {1,2,, n}, the observe information pair (X, Y) is statistically highly epenent so that noe A an B are able to extract synchronize secrete key. Noe A an noe B then generate the secret key by communicating over a public error-free channel, an the public communication between A an B is represente collectively by Z. Let the ranom variable S with finite range s be the secret key generate by noe A an noe B, if there exist two functions f A an f B so that S f (X, Z), S f ( Y, Z), an for any A A B B small positive number >0, following limitations must be met: 12
26 P ( S S S ) 1 (3-1) r A B I( S; Z) (3-2) H( S) log s (3-3) Here, Pr ( S ) enotes the probability mass function of S, I(S; Z) enotes the mutual information between S an Z, H(S) enotes the entropy of S. For these quantities, there are certain conitions attache to the Eq.(4-1)-Eq.(4-3) such that: Conition (1): noe A an noe B generate the same secret key with high probability. Conition (2): the generate secret key is well encrypte from the aversary noe E observing the public communication Z. Conition (3): the generate secret key is nearly uniformly istribute in entropy sense. 3.4 Calculation Rules for Entropy an Mutual Information The entropy of an arbitrary ranom variable X is efine as H(X) P(x )log P(x ) (3-4) i i i The mutual information for correlate ranom variable X an Y is terme as p(x i, y j) p(x, y) I(X;Y) p(x i, y j)log( ) p(x, y)log( ) xy p(x )p( y ) Y X p(x)p( y) (3-5) i j i j Conitional mutual information can be terme as 13
27 p (z )p (x, y,z ) (3-6) Z k X, Y, Z i j k I(X;Y Z) p X, Y, Z (x i, y j,z k )log( ) k j i p X, Z (x i,z k )p Y, Z (y j,z k ) The following aitional calculation rules between entropy, mutual information an conitional mutual information will be use in future theoretical erivation. (a) Relationship between mutual information an entropy: I(X;Y) H (X) H(X Y) H ( Y ) H( Y X ) H (X) H(Y) H(X, Y) H(X,Y) H(X Y) H (Y X) (3-7) (b) Relationship between conitional mutual information an conitional entropy: I(X;Y Z) H(X Z) H(X Y,Z) (3-8) (c) Chain rule for mutual information I(X;Y,Z) I(X;Z) I(X;Y Z) (3-9) () Bayes rule for conitional entropy H(Y X ) H(X Y) H(X) H(Y) (3-10) These efinitions an rules will be further utilize in Chapter 5 for the theoretical analysis of the MSR. 14
28 3.5 Gaussian an Multivariate Gaussian Distribution Gaussian istribution assumption for the signals is wiely use in recent theoretical analysis for the secret key generation. Here are some basic calculation rules for Gaussian an Multivariate Gaussian istribution which will be use later. 2 2 A Gaussian istribution can be presente as N ~ (, ), where is the mean an is the variance. The entropy for such Gaussian istribution is [24]: 1 ln(2 2 e ) h (3-11) 2 A multivariate Gaussian istribution of an m ranom vector X X X X can be,? m presente as N ~ (, ), where the mean vector {E[ X1], E[ X 2],, E[ X m ]} an the covariance matrix [Cov [ X, X ]], i 1,2,, m, j 1,2,, m. i j 1 2 The entropy for such multivariate Gaussian istribution is [24]: hm 1 ln{(2 ) m e } (3-12) 2 where is the eterminant of the covariance matrix. Here are some matrix eterminant calculation rules for certain matrix. For an mm matrix with iagonal elements equal to a an all other numbers equal to b, the eterminant woul be: et( ) [ ( 1) ]( ) m ( 1) a m b a b (3-13) 15
29 Laplace Expansion: Suppose B = { b ij } is an n n matrix, i, j {1, 2,..., n}. Then its eterminant B is given by: B b C b C b C i1 i1 i2 i2 in in b C b C b C 1 j 1 j 2 j 2 j nj nj n b C ij ij ij ij j1 i1 n b C. (3-14) where C ( 1) i j M an M ij is the eterminant of i, j minor matrix of B which is the ij ij eterminant of an (n-1) (n-1) matrix that results from eleting the i-th row an the j-th column of B. 16
30 Chapter 4 Secret Key Generation Algorithm The framework of propose secret key generation algorithm is introuce in this chapter. First of all, a basic protocol of secret key generation is presente. In this basic protocol, a simple network incluing 3 legitimate noes (noe 1, 2, 3) is consiere. Further, the propose secret key generation algorithm for the m ( m 3 ) noe wireless network is introuce, incluing the proceure of quantizing the noes position for localization information, public iscussion consiering network topology (star, chain an hybri topology), bit extraction an secret key agreement. 4.1 Basic Protocols between Noes In the basic protocol, 3 legitimate noes are consiere, incluing noe 1, noe 2 an noe 3. Fig.4-1 shows an illustration of the 3-noe network. Step 1: In a certain time instance k, noe 1, 2 an 3 will observe an sample its localization information li ( k ). Further, the noes will calculate the istance between each other through public beacon exchange accoring to Eq.(4-1). 17
31 ( ) ( ) ( ) k k k ADV 1,2 1,3 Noe 1 Noe 2 RD ( k) 1,2 ( k ADV ) Noe 3 ( k) ( k) ( k) 1,2 ADV 3,1 Figure 4-1: Illustration of the 3-noe network of basic protocol ( k) ( k) l ( k) l ( k) 1,2 2,1 1 2 ( k) ( k) l ( k) l ( k), k(1,2,, n) 1,3 3,1 1 3 (4-1) Here l i (k) is the quantize position for noe i in time slot k. (k) is efine as the 1,2 Reference Distance (RD). An note that istance between noe 1 an 2 is ientical no matter how it is measure from noe 1 or noe 2 uring the same time interval. Step 2: Noe 1 will calculate the Aitive Distance Value (ADV) as ( k ) ADV 1,2( k ) 1,3( k ) an then forwar the ADV to noe 3, while noe 2 alreay know RD as (k). 2,1 Step 3: When noe 3 receives the ADV from noe 1, it is able to estimate the RD (istance between noe 1 an noe 2), which is 1,2 ( k) ADV ( k) 3,1( k). Since noe 2 can measure the RD from its en, 2,1( k) 1,2 ( k), the noe 1, noe 2 an noe 3 have obtaine the same localization information RD. Therefore, the secret key can be generate collaboratively 18
32 through secret bit extraction (the secret bit extraction algorithm will be explaine later) base on RD. 4.2 Secret Key Generation Algorithm Phase 1. Quantization as ( ) i First, the noes 1,2,,m quantize the fiel Φ an estimate their localization information l k, i (1,2,,m), k (1,2,, n), at time slot k an store them in their buffers. In this phase, a variety of technologies for localization estimation coul be utilize such as infrare, wireless raios, ultrasoun, Liar, Raar, an so on, which make the applicability of secret key generation over localization very robust. Phase 2. Public Discussion In this phase, a public iscussion phase is conucte for the noes to calculate their relative istance as i,j(k) j,i(k) li(k) l j(k),, (1,2,,m), k (1, 2,, n) i j at time slot k. The istance between two ranomly selecte noes 1 an 2 (k) 1,2 is terme as RD. Then ADV is calculate an istribute for secret key generation base on the topology of the wireless network. Following is the etaile protocol of public iscussion base on ifferent topologies. A. Star Topology Uner the circumstance that every noe is within the communication range of another wireless noe, a star topology is usually forme. In this case, we can easily exten the basic 19
33 protocol of 3-noe network to an m noe wireless network. See Fig.4-2 for an illustration of the star topology network. 1) In the star topology, noe 1 an noe 2 are ranomly selecte, while the istance between noe 1 an noe 2 is terme as R RD ( k). 1,2 2) Noe 1 is selecte as the central noe an it calculates the ADV for every noe i other than noe 1 an noe 2, where ADV,i( k) 1,2 ( k) 1, i( k), i (3,4,,m). Noe 2 estimates the RD as ( ) 2,1 k. An all other noe i estimates its relative istance from noe 1 as (k). i,1 3) Noe 1 istributes the ADV ( ), k for each noe i through the public iscussion. ADV i After noe i receives the ADV ( ),i k, it can calculate the RD as 1,2 ( k) ADV, i( k) ADV ( ) i,1 k. As a result, all the m noes woul obtain the RD after the public iscussion. 4) Meanwhile, note that the eavesropper E woul overhear all the public iscussion. In the star topology, the public iscussion is a set of ADV value for noe 3, 4 m. Let E ( ) pub k be the public iscussion overhear by eavesropper E. E ( k ) can be presente as: pub E ( k) [ ( k), ( k),, ( k)] pub ADV,3 ADV,4 ADV,m [( ( k) ( k)),( ( k) ( k)),,( ( k) ( k))] 1,2 1,3 1,2 1,4 1,2 1,m (4-2) 20
34 Noe 2 Noe E RD ( k) 1,2 Noe 1 ( k) ( k) ( k) ADV, i 1,2 1, i i(3,4,, m) ( ) ADV,3 k ( ) ADV,4 k ( ) ADV,m k Noe 3 Noe 4 Noe m ( k) ( k) (k) 1,2 ADV,3 3,1 ( k) ( k) ( k) 1,2 ADV,4 4,1 ( k) ( k) ( k) 1,2 ADV, m m,1 Figure 4-2: Illustration for an m noe wireless network with star topology B. Chain Topology For the situation that not every noe is within the communication range of other wireless noes, however they are interconnecte, a chain topology is suggeste. See Fig.4-3 for an illustration of the chain topology network. Noe E ( ) ( ) ( ) ADV,3 k 2,1 k 2,3 k ( k) ( k) ( k) ( k) ADV,i( k) ADV, i1 ( k) i, i1 ( k) i, i1( k) ADV,4 ADV,3 3,2 3,4 Noe 1 Noe 2 Noe 3 Noe 4 ( ) ( ) ADV,3 k ADV,4 k RD ( k) 1,2 ( k) ( k) ( k) 1,2 ADV,3 3,2 ( k) ( k) ( k) 1,2 ADV,4 4,3 ADV, i ( k) Noe m ( k) ( k) ( k) 1,2 ADV, m m,m1 Figure 4-3: Illustration for an m noe wireless network with chain topology 21
35 1) Noe 1 an noe 2 are ranomly selecte, while the istance between noe 1 an noe 2 is terme as RD ( k). 1,2 2) Noe 1 is selecte as the hea noe an noe m is selecte as the tail noe of the chain topology. Noe 2 calculates the ADV for noe 3 as ADV,3( k) 2,1( k) 2,3( k). Noe 2 estimates the RD as ( k ). 2,1 3) Upon the reception of ( ),3 k, noe 3 calculates the RD as 1,2 ( k) ADV,3( k) ( k) 3,2 ADV an also passes the ADV for next noe 4 as ADV,4( k) ADV,3( k) 3,2( k) 3,4( k). Similarly, upon the reception of ( ) ADV,4 k, noe 4 calculates RD as 1,2 ( k) ADV,4( k) ( k) an also passes ADV for next noe 5 as 4,3 ADV,5( k) ADV,4( k) 4,3( k) (k). 4,5 4) In summary, noe i i(3,4,,m 1) estimates its relative istance from its neighbor noe i-1 an i+1 as ( ) ii, 1 k an ( ) ii, 1 k. Then, upon the reception of its ADV ( ) ADV, i k, noe i calculates the RD as 1,2 ( k) ADV, i( k) i, i1( k) an also passes the ADV for next noe i+1 as ADV, i 1 ( k) ADV, i( k) i, i 1 ( k) i, i 1( k). An for noe m, it only nees to calculate the RD as 1,2 ( k) ADV, m( k) m,m 1( k). 5) Also, the eavesropper E woul overhear all the public iscussion through all the public iscussion. In the chain topology, the public iscussion is also a set of ADV value for noe 3, 4 m. The public iscussion overhear by eavesropper E E ( k) can be presente as: 22 pub
36 E ( k) [ ( k), ( k),, ( k)] pub ADV,3 ADV,4 ADV,m [( ( k) ( k)),( ( k) ( k)),,( ( k) ( k))] 1,2 2,3 1,2 3,4 1,2 m1,m (4-3) C. Hybri Topology For certain circumstances like large scale wireless network, only the star an chain topology may not be aequate for the wireless network. Uner such situation, a hybri topology is suggeste as a combination of star an chain topology. Fig.4-4 illustrates the hybri topology. Noe E Noe 1 1 Noe 2 1 Noe m 1 Noe 0 Noe 1 Noe 2 Noe m Chain Topology Star Topology Noe 1 2 Noe 2 2 Noe m 2 Figure 4-4: Illustration for wireless network with hybri topology In the hybri topology shown in Fig.4-4, noe 0 is the hea noe of the hybri topology. Noe 1, 1 1, 1 2 form a star topology, as well as noe 2, 2 1, 2 2 through noe m, m 1, m 2. Meanwhile, noe 0, noe 1 through noe m form a chain topology. In such wireless network, some noes are outsie the communication range of other noes so that the star topology is not aequate. Further, a chain cannot form a Hamiltonian path [24] in the wireless network so that the chain topology is not enough as well. Here the Hamiltonian 23
37 path is a path that visits each noe in the wireless network exactly once. Therefore, a combination of star an chain topology the hybri topology is suggeste in such situation. 1) In the hybri topology, noe 0 an noe 1 is ranomly selecte while the istance between noe 0 an noe 1 is terme as RD ( k). 0,1 2) The noes on the chain except hea noe 0 (noe 1,2,,m) is selecte as the central noe for each star. Further, central noe 1 nees to calculate an forwar two ADV. One ADV is for every other noes in the 1 st star (noe 1 1, 1 2, 1 m ), assuming there 1 are m noes in the 1 st star. Here 1 j( k),1 1,0( k) j( k), j ( 1,2,, m ADV 1,1 1). Noe 1 j then coul calculate the RD as 0,1 ( k) j( k) j ( k). The other ADV is for the next,1 1,1 central noe in the chain, noe 2. Here ADV,2( k) 1,0 ( k) 1,2 ( k). ADV 3) Upon the reception of ( ),2 k at noe 2. Noe 2 can calculate the RD as ADV ( k) ( k) ( k). Noe 2 also nees to calculate an forwar two ADV. One 0,1 ADV,2 2,1 ADV is for every other noes in the 2 n star (noe 2 1,2 2, 2 m ), assuming there are 2 m noes in the 2 n star. Here 2 j( k),2 ADV,2( k) 2,1( k) j( k), j ( 1,2,, m 2,2 2). Noe ADV 2 j then coul calculate the RD as 0,1 ( k) j( k) j ( k). The other ADV is for the,2 2,2 next central noe in the chain, noe 3. Here ADV,3( k) ADV,2( k) 2,1( k) 2,3( k). ADV 4) Accoringly, noe i, i (2,3,, m) calculates the RD as 0,1 ( k) ADV,i( k) i,i 1( k) upon its ADV reception of ( ), k. Noe i also nees to calculate an forwar two ADV. ADV i One ADV is for every other noes in the i th star (noe i 1, i 2 m, i i ), assuming there 24
38 are m i noes in the i th star. Here j( k) ADV,i( k) i,i 1( k) j( k), j ( 1,2,, mi ). ADV, i i, i An noe i j then coul calculate the RD as 0,1 ( k ) ( k j ) j ( k ). The other ADV is,i,i for the next central noe in the chain, noe i+1. Here ADV,i 1 ( k) ADV,i( k) i,i 1( k) ( k) i,i 1. Especially for noe m, it oes not nee to calculate ADV for the next central noe. ADV i 5) Also, the eavesropper E woul overhear all the public iscussion through all the public iscussion. The public iscussion overhear by eavesropper E E ( k) can be presente as the combination of all ADV information incluing star an chain: pub E ( k) [ ( k),, ( k), ( k),, ( k),, ( k),, ( k)], pub 1 m1 1 m2 1 m ADV,1 ADV,1 ADV,2 ADV,2 ADV,m ADV,m m [ ( k), ( k),, ( k)] ADV,2 ADV,3 ADV,m [( ( k) ( k)),,( ( k) ( k)),( ( k) ( k)),, 0,1 1 0,1 m1 0,1 1 1,1 1,1 2,2 ( ( k) ( k)),,( ( k) ( k)),,( ( k) ( k))], (4-4) 0,1 m2 0,1 1 2,2 m,m 0,1 m m,m m [( ( k) ( k)),( ( k) ( k)),,( ( k) ( k))] 0,1 1,2 0,1 2,3 0,1 m1,m Phase 3. Secret Bit Extraction In this phase, an r bit secret key is extracte base on the RD receive by the legitimate noes in each time slot through three ifferent secret bit extraction steps. Here the bit number r can be selecte to give an aequate length to the secret key. For a single time slot r bits secret key is generate an there are totally n time slots, therefore the final generate secret key woul have a length of nr bits. Let the RD calculate by noe i be RD, 1,2@ ( ), i (1,2,, m ), (1, 2,, ) i k i k k n, where ( ) 1,2@ i k means the 1,2 value calculate by the noe i at time slot k, an for every noe 1 25
39 to noe m, n time slot RD measurements are mae as RD. Three types of bit extraction ik, steps are utilize for each RD measurement collaboratively to achieve an r bit secret key Sik, ( ), (1,2,,r) for each time slot k. Let the mean value of, RD be ik m i k R Di, k n an F( RD ik, ) be the cumulative istribution function of RD ik,. The following secret bit etermination algorithm presents the propose secret bit extraction protocol for S ik, (). For a set of RD measurements RD, i(1,2,, m ), k (1, 2,, n) ik, 0, if RD i, k i i) Sik, (1) 1, if RD m 0 (4-5) ik, m 0 i 0, if RDi, k RDi, k1 0 ii) Sik, (2) 1, if RDi, k RDi, k1 0 (4-6) iii) S, ( ), (3,4,, r), here 2 r-2 quantization levels are use where ik q min( RD ), q max( RD ) (4-7) 0 i, k r2 2 i, k 1 u r 2 an q u F ( ),u 1, 2,, 2 1 (4-8) r2 2 Here u is to make sure that qu is selecte base on the same 2 1 q u F ( ) r2 istribution function of RD. The u th quantization bin is efine as the interval ik, [q,q ], an Gray coing is employe for bit extraction. u 1 u 1) For a single observe RDik, 1,2, the value is mainly ecie by the istance between noe 1 an noe 2. Let the threshol base on RD minus the mean istance m ik, i 26
40 coul reuce the influence of noe istance an amplify the ranomness of the RD in step i. 2) For step ii, the evaluation of RDi, k RDi, k implies the moving tren of noe 1 an 1 noe 2. 3) Step iii, secret key bit number r is selecte by the user in orer to give an aequate length to the generate secret key S ik, (). By increasing the secret key bit number r, the secrecy privilege of the legitimate noes over the eavesropper is increase since it is harer for the eavesropper to ecipher the same secret key. However, it will also make the secret bit extraction algorithm more vulnerable to the noise an thus increase the bit mismatch rate of the legitimate noes. In this thesis, r is selecte as 4 consiering this traeoff an the simplicity for simulation. 4) Finally, by combining all the S ik, () extracte from n time slots, noe i is able to generate the secret key as S i (), (1,2,, n*r). Since RD is ientical for each noe, all the m noes are then able to agree on a synchronize secret key S i (). Example: Let the RD of {98m, 99m, 100m, 101m, 102m, 103m} is receive in n = 6 time slots at noe i. RD follows a uniform istribution that the probability for each RD value is ientical. Base on each receive RD value, an r = 4 bit secret key nees to be extracte. Here the mean value of RD is Since RD is uniformly istribute, the 2 r- 2 =4 quantization bins are [98, 99.25], [99.25, ], [100.50, ], [101.75, 103]. The corresponing 2 bit Gray coe is [00, 01, 11, 10]. 27
41 1) For time slot k = 1, RDi,1 98 is less than mean value mi = , therefore S (1) 0 i,1. Since RD is the first RD value, i,1 S (2) 0 i,1. RD falls in the first quantization bin [98, i, ] so that Si,1 (3,4) 00. Thus, the generate secret key S () for time slot 1 is 0000.,1 i 2) For time slot k = 2, RDi,2 99 is less than mean value mi = , therefore S (1) 0 i,2. Since RDi,2 RD, i,1 S (2) 1 i,2. RD i,2 falls in the first quantization bin [98, 99.25] an Si,2 (3,4) 00. Thus, the generate secret key S (),2 for time slot 2 is i 3) For time slot k = 3, RDi,3 100 is less than mean value mi = , therefore S (1) 0 i,3. Since RDi,3 RD, S (2) 1 i,2 i,3. RD i,3 falls in the secon quantization bin [99.25, ] an Si,3 (3,4) 01. Thus, the generate secret key S (),3 for time slot 3 is i 4) Repeat the previous proceure for each time slot an combine all the S () together i,k an then noe i coul generate the secret key as In summary, the propose secret key generation algorithm is presente in this chapter, incluing m noe wireless network topology esign an secret bit extraction metho. Later, the maximum secret key generation rate for the propose algorithm will be erive in Chapter 5. 28
42 Chapter 5 Theoretical Analysis for MSR A theoretical analysis for the Maximum achievable Secret key generation Rate (MSR) is conucte in this chapter. Base on ifferent network topology, the MSR is ifferent from each other. Therefore, the theoretical analysis is conucte base on star, chain an hybri topology respectively. 5.1 Star Topology Base MSR Following is a brief review of the star topology: Step 1: Noe 1 an noe 2 is ranomly selecte to get Reference Distance (RD) as RD ( k). Noe 1 an noe 2 estimate RD as ( k ) an ( k ) respectively. 1,2 1,2 2,1 Step 2: Noe 1 publishes the ADV to noe i, i (3,4,,m) as ADV,i( k) 1,2 ( k) 1,i ( k). Noe i calculates istance from noe 1 as ( ) i,1 k. Step 3: Noe i estimates RD as 1,2 ( k) ADV, i( k) i,1( k). Step 4: Secret bit extraction base on RD is processe to generate final secret key. Accoring to the theoretical analysis propose by Maurer an other researchers in [6-8], secret key generation rate is the mutual information between two noes. Since they only 29
43 propose the MSR base on 3-noe network, the mutual information between central noe 1 an all other noe i incluing eavesropper, Noe 2 Noe 1 Noe E i(2,3,,m,e) shoul be examine for the star topology wireless network. For simplicity, let s assume that all Noe 3 Noe 4 Noe m Figure 5-1: Brief on star topology information sequences are inepenent ientically istribute (i.i.). Let any ranom sequence z(k) through time slot 1, 2,, n be Z [z(1), z(2),, z(n)]. Then the localization information sequence acquire for noe 1 shoul be D1 [ D1,2, D1,3,, D1,m ] [ 1,2 (1),, 1,2 ( n),, (1),, (n)]. For noe 2, RD 1,2 2,1 is given. All other noe i, i (3,4,,m) have 1,m 1,m to calculate RD through ADV public iscussion an may suffer from noise or other istractions. Therefore, secret key generation rate for noe 2 is higher than any other noes an the MSR is base on the mutual information between noe 1 an noe i, i (3,4,,m). Let s consier noe i, i (3,4,,m). Noe 1 broacasts the ADV to all noes with ADV sequence in the public iscussion. Thus noe i overhear all ADV public iscussion as Epub ( k) [ ADV,3( k), ADV,4( k),, ADV,m( k) ] [ 1,2 ( k) 1,3 ( k), 1,2 ( k) 1,4 ( k),, ( k) ( k)] an E [ E (1), E (2),, E ( n)]. Noe i then estimate the RD 1,2 1,m pub pub pub pub with its own localization sequence D an the ADV sequence E i,1 pub. Therefore the information for noe i is the joint information of [ Di,1, E pub ]. The ADV sequence E pub is also overhear by eavesropper noe e. Here, noe e is consiere to overhear the 30
44 localization information as well. Let the localization information acquire by noe e be D [ D, D,, D ]. Next, the MSR is erive as T. A same approach is mae as time e e,1 e,2 e,m slot n, which yiels MSR, uner large enough time scale. MSR (bits/sample) for noe i can be presente as: R i 1 lim I( D1; Di,1, E pub) (5-1) n n MSR for the m noe wireless network is limite by the worst noe (eg. the noe has higher noise interference than others), which can be presente as: R noe min R (5-2) 3 i m i Consiering the presence of eavesropper, the final MSR can be presente as the information obtaine by noes minus the information obtaine by eavesroppers: R 1 R lim I( D ; D, E ) (5-3) n final noe 1 e pub n Since the i.i. assumption has been mae for all information sequence, R i for any noe i (3,4,,m) is ientical. Therefore, an arbitrary noe 3 is consiere for MSR. Further, base on the i.i. assumption an the simplicity of erivation, a single time slot is consiere. Base on former assumptions, the final MSR can be expane as: R I([,,, ];, E ) I([,,, ];[,,, ], E ) final 1,2 1,3 1,m 3,1 pub 1,2 1,3 1,m e,1 e,2 e,m pub I([,,, ]; E ) I([,,, ]; E ) 1,2 1,3 1,m pub 1,2 1,3 1,m 3,1 I([ 1,2, 1,3,, 1,m ]; Epub 1,2 1,3 1,m e,1 e,2 e,m pub I([,,, ]; E ) 1,2 1,3 1,m 3,1 = I( ; E ) I([,, ];, E ]) 1,2 3,1 pub 1,3 1,m 3,1 1,2 ) I([,,, ];[,,, ] E ) pub 31 pub..(5-4)...(5-5)....(5-6) pub..(5-7)
45 = I( ; E ) 1,2 3,1 pub = h( E ) h(, E ) 1,2 pub 1,2 3,1...(5-8)..(5-9) = h( E ) h( E ) h( ) (h(, E ) h(, E ) h( )).(5-10) pub 1,2 pub 1,2 3,1 pub 1,2 3,1 pub 1,2 = h([,, ] 1,2 1,3 1,2 1,4, 1,2 1,m 1,2 1,2 1,3 1,2 1,4 1,2 1,m ) h([,,, ]).(5-11) h(,,,, ) h(,,,, )... (5-12) Here, Eq.(5-5) follows Eq.(3-9) such that I(X; Y, Z) I(X; Z) I(X; Y Z). Eq.(5-6) is ue to the i.i. assumption, i, j is inepenent from e,i. Eq.(5-7) follows the chain rule. Eq.(5-8) is because, given that 1,2 an E, pub 1,3,, 1,m are etermine, the entropy is 0. Eq.(5-9) follows Eq.(3-8) since I(X;Y Z) H(X Z) H(X Y, Z). Eq.(5-10) follows Eq.(3-10) since H(Y X ) H(X Y) H(X) H(Y). Eq.(5-11) is the expansion of Eq.(5-10). Eq.(5-12) is because, for given 1,2, the ranomness in [ 1,2 1,3, 1,2 1,4,, 1,2 1,m ] can be simply presente as [ 1,3, 1,4,, 1,m ]. pub h(,[,,, ] ) h(,[,,, ]) 3,1 1,2 1,3 1,2 1,4 1,2 1,m 1,2 3,1 1,2 1,3 1,2 1,4 1,2 1,m = h([,, ]) h([, 1,3 1,4, 1,m 1,2 1,3 1,2 1,4, 1,2 1,m, ]) 3,1 1,3 1,4 1,m 3,1 1,2 1,3 1,2 1,4 1,2 1,m Next, the MSR is further estimate through Gaussian istribution assumption that all observations of istance terms are consiere as i.i. Gaussian processes. In real wireless communication environment, the istance information can be presente as the sum of noe istance an noise: (k) (k) w (k), where w (k) i, j is an aitive Gaussian noise. ` i,j i,j i,j ` The istance measure at both en i an j shoul be ientical, so (k) i,j ` j,i (k). However the noise at ifferent noe is uncorrelate, hence w (k) an i, j w (k) j,i are inepenent. Since the entropy of Gaussian istribution `i, (k) is only a function of its variance 2 j as is efine in Eq.(3-11) that ` h ( i, j(k)) 1 2 ln(2 e ), the mean value oes not affect the MSR 2 32
Review Article Statistical methods and common problems in medical or biomedical science research
Int J Physiol Pathophysiol Pharmacol 017;9(5):157-163 www.ijppp.org /ISSN:1944-8171/IJPPP006608 Review Article Statistical methos an common problems in meical or biomeical science research Fengxia Yan
More informationPERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS
PERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS Wing Ho Yuen WINLAB Rutgers University Piscataway, NJ 8854 anyyuen@winlab.rutgers.eu Roy D. Yates WINLAB Rutgers University Piscataway, NJ
More informationA FORMATION BEHAVIOR FOR LARGE-SCALE MICRO-ROBOT FORCE DEPLOYMENT. Donald D. Dudenhoeffer Michael P. Jones
Proceeings of the 2000 Winter Simulation Conference J. A. Joines, R. R. Barton, K. Kang, an P. A. Fishwick, es. A FORMATION BEHAVIOR FOR LARGE-SCALE MICRO-ROBOT FORCE DEPLOYMENT Donal D. Duenhoeffer Michael
More informationReporting Checklist for Nature Neuroscience
Corresponing Author: Manuscript Number: Manuscript Type: Kathryn V. Anerson an SongHai Shi NNA4806B Article Reporting Checklist for Nature Neuroscience # Main Figures: 7 # Supplementary Figures: 1 # Supplementary
More informationStudies With Staggered Starts: Multiple Baseline Designs and Group-Randomized Trials
Stuies With Staggere Starts: Multiple Baseline Designs an Group-Ranomize Trials Dale A. Rhoa, MAS, MS, MPP, Davi M. Murray, PhD, Rebecca R. Anrige, PhD, Michael L. Pennell, PhD, an Erinn M. Hae, MS The
More informationSince many political theories assert that the
Improving Tests of Theories Positing Interaction William D. Berry Matt Goler Daniel Milton Floria State University Pennsylvania State University Brigham Young University It is well establishe that all
More informationA DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. & B.
A DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. George Maria Selvam* & B. Bavya** Sacre Heart College, Tirupattur, Vellore, Tamilnau Abstract: The stability of a iscrete-time
More informationA Vital Sign and Sleep Monitoring Using Millimeter Wave
A Vital Sign an Sleep Monitoring Using Millimeter Wave ZHICHENG YANG, University of California, Davis PARTH H. PATHAK, George Mason University YUNZE ZENG, University of California, Davis XIXI LIRAN, University
More informationPerceptions of harm from secondhand smoke exposure among US adults,
Perceptions of harm from seconhan smoke exposure among US aults, 2009-2010 Juy Kruger, Emory University Roshni Patel, Centers for Disease Control an Prevention Michelle Kegler, Emory University Steven
More informationStatic progressive and dynamic elbow splints are often
694 COPYRIGHT Ó 2012 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED A Prospective Ranomize Controlle Trial of Dynamic Versus Static Progressive Elbow Splinting for Posttraumatic Elbow Stiffness
More information6dB SNR improved 64 Channel Hearing Aid Development using CSR8675 Bluetooth Chip
016 International Conference on Computational Science an Computational Intelligence 6B SNR improve 64 Channel Hearing Ai Development using CSR8675 Bluetooth Chip S. S. Jarng Dept. of Electronics Eng. Chosun
More informationAnalyzing the impact of modeling choices and assumptions in compartmental epidemiological models
Simulation Special Section on Meical Simulation Analyzing the impact of moeling choices an assumptions in compartmental epiemiological moels Simulation: Transactions of the Society for Moeling an Simulation
More informationReporting Checklist for Nature Neuroscience
Corresponing Author: Manuscript Number: Manuscript Type: Albert La Spaa NNA4471A Article Reporting Checklist for Nature Neuroscience # Main Figures: 8 # Supplementary Figures: 9 # Supplementary Tables:
More informationUSING BAYESIAN NETWORKS TO MODEL AGENT RELATIONSHIPS
Ó Applie ArtiÐcial Intelligence, 14 :867È879, 2000 Copyright 2000 Taylor & Francis 0883-9514 /00 $12.00 1.00 USING BAYESIAN NETWORKS TO MODEL AGENT RELATIONSHIPS BIKRAMJIT BANERJEE, ANISH BISWAS, MANISHA
More informationA PRELIMINARY STUDY OF MODELING AND SIMULATION IN INDIVIDUALIZED DRUG DOSAGE AZATHIOPRINE ON INFLAMMATORY BOWEL DISEASE
This is a correcte version of the corresponing paper publishe in SIMS 26: Proceeings of the 47th Conference on Simulation an Moelling. Errata: equations.3 an.4 have been change to timecontinuous form an
More informationDynamic Modeling of Behavior Change
Dynamic Moeling of Behavior Change H. T. Banks, Keri L. Rehm, Karyn L. Sutton Center for Research in Scientific Computation Center for Quantitative Science in Biomeicine North Carolina State University
More informationModeling Latently Infected Cell Activation: Viral and Latent Reservoir Persistence, and Viral Blips in HIV-infected Patients on Potent Therapy
Moeling Latently Infecte Cell Activation: Viral an Latent Reservoir Persistence, an Viral Blips in HIV-infecte Patients on Potent Therapy Libin Rong, Alan S. Perelson* Theoretical Biology an Biophysics,
More informationCompetitive Helping in Online Giving
Report Competitive Helping in Online Giving Graphical Abstract Authors Nichola J. Raihani, Sarah Smith Corresponence nicholaraihani@gmail.com In Brief Raihani an Smith show competitive helping in onations
More informationFully Heterogeneous Collective Regression
Fully Heterogeneous Collective Regression ABSTRACT Davi J. Lietka Department of Computer Science Unite States Naval Acaemy Annapolis, Marylan lietka@gmail.com Prior work has emonstrate that multiple methos
More informationUC Berkeley UC Berkeley Previously Published Works
UC Berkeley UC Berkeley Previously Publishe Works Title Variability in Costs Associate with Total Hip an Knee Replacement Implants Permalink https://escholarship.org/uc/item/67z1b71r Journal The Journal
More informationA Prospective Randomized Study of Minimally Invasive Total Knee Arthroplasty Compared with Conventional Surgery
This is an enhance PDF from The Journal of Bone an Joint Surgery The PDF of the article you requeste follows this cover page. A Prospective Ranomize Stuy of Total Knee Arthroplasty Compare with Conventional
More informationAn Adaptive Load Sharing Algorithm for Heterogeneous Distributed System
An Aaptive Loa Sharing Algorithm for Heterogeneous Distribute System P.Neelakantan, A.Rama Mohan Rey Abstract Due to the restriction of esigning faster an faster computers, one has to fin the ways to maximize
More informationAnalyzing the Impact of Modeling Choices and Assumptions in Compartmental Epidemiological Models
Analyzing the Impact of Moeling Choices an Assumptions in Compartmental Epiemiological Moels Journal Title XX(X):1 11 c The Author(s) 2016 Reprints an permission: sagepub.co.uk/journalspermissions.nav
More informationAnalysis of Observational Studies: A Guide to Understanding Statistical Methods
50 COPYRIGHT Ó 2009 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Analysis of Observational Stuies: A Guie to Unerstaning Statistical Methos By Saam Morshe, MD, MPH, Paul Tornetta III, MD, an
More informationMathematical Beta Cell Model for Insulin Secretion following IVGTT and OGTT
Annals of Biomeical Engineering, Vol. 3, No. 8, August 2006 ( C 2006) pp. 33 35 DOI: 0.007/s039-006-95-0 Mathematical Beta Cell Moel for Insulin Secretion following IVGTT an OGTT RUNE V. OVERGAARD,, 2,
More informationIntention-to-Treat Analysis and Accounting for Missing Data in Orthopaedic Randomized Clinical Trials
2137 COPYRIGHT Ó 2009 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Intention-to-Treat Analysis an Accounting for Missing Data in Orthopaeic Ranomize Clinical Trials By Amir Herman, MD, MSc, Itamar
More informationStatistical Consideration for Bilateral Cases in Orthopaedic Research
1732 COPYRIGHT Ó 2010 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Statistical Consieration for Bilateral Cases in Orthopaeic Research By Moon Seok Park, MD, Sung Ju Kim, MS, Chin Youb Chung,
More informationBinary Increase Congestion Control (BIC) for Fast Long-Distance Networks
Binary Increase Congestion Control () for Fast Long-Distance Networks Lisong Xu, Khale Harfoush, an Injong Rhee Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 lxu2,
More informationthe Orthopaedic forum Is There Truly No Significant Difference? Underpowered Randomized Controlled Trials in the Orthopaedic Literature
2068 COPYRIGHT Ó 2015 BY THE JOURNAL OF BONE AN JOINT SURGERY, INCORPORATE the Orthopaeic forum Is There Truly No Significant ifference? Unerpowere Ranomize Controlle Trials in the Orthopaeic Literature
More informationA Comparative Effectiveness Study. Tiffany A. Radcliff, PhD, Elizabeth Regan, MD, PhD, Diane C. Cowper Ripley, PhD, and Evelyn Hutt, MD
833 COPYRIGHT Ó 2012 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Increase Use of Intrameullary Nails for Intertrochanteric Proximal Femoral Fractures in Veterans Affairs Hospitals A Comparative
More informationGary L. Grove, PhD, and Chou I. Eyberg, MS. Investigation performed at cyberderm Clinical Studies, Broomall, Pennsylvania
1187 COPYRIGHT Ó 2012 BY THE OURNAL OF BONE AND OINT SURGERY, INCORPORATED Comparison of Two Preoperative Skin Antiseptic Preparations an Resultant Surgical Incise Drape Ahesion to Skin in Healthy Volunteers
More informationA Clinical Decision Support Tool for Familial Hypercholesterolemia Based on Physician Input
ORIGINAL ARTICLE A Clinical Decision Support Tool for Familial Hypercholesterolemia Base on Physician Input Ali A. Hasnie, MD; Ashok Kumbamu, PhD; Maya S. Safarova, MD, PhD; Pero J. Caraballo, MD; an Iftikhar
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeare in a journal publishe by Elsevier. The attache copy is furnishe to the author for internal non-commercial research an eucation use, incluing for instruction at the authors institution
More informationCost-Effectiveness of Antibiotic-Impregnated Bone Cement Used in Primary Total Hip Arthroplasty
This is an enhance PDF from The Journal of Bone an Joint Surgery The PDF of the article you requeste follows this cover page. Cost-Effectiveness of Antibiotic-Impregnate Bone Cement Use in Primary Total
More informationFactorial HMMs with Collapsed Gibbs Sampling for Optimizing Long-term HIV Therapy
Factorial HMMs with Collapse Gibbs Sampling for ptimizing Long-term HIV Therapy Amit Gruber 1,, Chen Yanover 1, Tal El-Hay 1, Aners Sönnerborg 2 Vanni Borghi 3, Francesca Incarona 4, Yaara Golschmit 1
More informationAPPLICATION OF GOAL PROGRAMMING IN FARM AGRICULTURAL PLANNING
APPLICATION OF GOAL PROGRAMMING IN FARM AGRICULTURAL PLANNING Dr.P.K.VASHISTHA, Dean Acaemics, Vivekanan Institute of Technology & Science, Ghaziaba vashisthapk@gmail.com ABSTRACT In this paper we present
More informationAudiological Bulletin no. 35
Auiological Bulletin no. 35 Ensuring the correct in-situ gain News from Auiological Research an Communication 9 502 1041 001 / 05-07 Introuction Hearing ais are commonly fitte accoring to ata base on a
More informationAudiological Bulletin no. 31
Auiological Bulletin no. 31 The effect - an introuction News from Auiological Research an Communication 9 502 1043 001 / 05-07 Introuction Venting in earmouls has been use for many years to control the
More informationA Propensity-Matched Cohort Study
380 COPYRIGHT Ó 2014 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Delaye Woun Closure Increases Deep-Infection Rate Associate with Lower-Grae Open Fractures A Propensity-Matche Cohort Stuy Richar
More informationA simple mathematical model of the bovine estrous cycle: follicle development and endocrine interactions
Konra-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany H.M.T.BOER, C.STÖTZEL, S.RÖBLITZ, P.DEUFLHARD, R.F.VEERKAMP, H.WOELDERS A simple mathematical moel of the bovine
More informationAudiological Bulletin no. 32
Auiological Bulletin no. 32 Estimating real-ear acoustics News from Auiological Research an Communication 9 502 1040 001 / 05-07 Introuction When eveloping an testing hearing ais, the hearing professional
More informationOn the Expected Connection Lifetime and Stochastic Resilience of Wireless Multi-hop Networks
On the Expecte Cnecti Lifetime an Stochastic Resilience of Wireless Multi-hop Networks Fei Xing Wenye Wang Department of Electrical an Computer Engineering North Carolina State University, Raleigh, NC
More informationAs information technologies and applications
COMPUTING PRACTICES Using Coplink to Analyze Criminal-Justice Data The Coplink system applies a concept space a statistics-base, algorithmic technique that ientifies relationships between suspects, victims,
More informationIdentifying Factors Related to the Survival of AIDS Patients under the Follow-up of Antiretroviral Therapy (ART): The Case of South Wollo
International Journal of Data Envelopment Analysis an *Operations Research*, 014, Vol. 1, No., 1-7 Available online at http://pubs.sciepub.com/ijeaor/1// Science an Eucation Publishing DOI:10.1691/ijeaor-1--
More informationc 2007 Society for Industrial and Applied Mathematics
SIAM J. APPL. MATH. Vol. 7, No. 3, pp. 73 75 c 27 Society for Inustrial an Applie Mathematics MATHEMATICAL ANALYSIS OF AGE-STRUCTURED HIV- DYNAMICS WITH COMBINATION ANTIRETROVIRAL THERAPY LIBIN RONG, ZHILAN
More informationThree-Dimensional Analysis of Acute Scaphoid Fracture Displacement: Proximal Extension Deformity of the Scaphoid
141 COPYRIGHT Ó 2017 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Three-Dimensional Analysis of Acute Scaphoi Fracture Displacement: Proximal Extension Deformity of the Scaphoi Yonatan Schwarcz,
More informationSubsampling for Efficient and Effective Unsupervised Outlier Detection Ensembles
Subsampling for Efficient an Effective Unsupervise Outlier Detection Ensembles Arthur Zime, Matthew Gauet, Ricaro J. G. B. Campello, Jörg Saner Department of Computing Science, University of Alberta, Emonton,
More informationInfluence of Neural Delay in Sensorimotor Systems on the Control Performance and Mechanism in Bicycle Riding
Neural Information Processing Letters an Reviews Vol. 12, Nos. 1-3, January-March 28 Influence of Neural Delay in Sensorimotor Systems on the Control Performance an Mechanism in Bicycle Riing Yusuke Azuma
More informationA simple mathematical model of the bovine estrous cycle: follicle development and endocrine interactions
A simple mathematical moel of the bovine estrous cycle: follicle evelopment an enocrine interactions H.M.T.Boer a,b,, C.Stötzel c, S.Röblitz c, P.Deuflhar c, R.F.Veerkamp a, H.Woelers a a Animal Breeing
More informationClustered Encouragement Designs with Individual Noncompliance: Bayesian Inference with Randomization, and Application to Advance Directive Forms.
To appear in Biostatistics (with Discussion). Clustere Encouragement Designs with Iniviual Noncompliance: Bayesian Inference with Ranomization, an Application to Avance Directive Forms. CONSTANTINE E.
More informationHow to Design a Good Case Series
21 COPYRIGHT Ó 2009 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED How to Design a Goo Case Series By Bauke Kooistra, BSc, Bernaette Dijkman, BSc, Thomas A. Einhorn, MD, an Mohit Bhanari, MD, MSc,
More informationPublic perception regarding anterior cruciate ligament reconstruction
Washington University School of eicine Digital Commons@Becker Open Access Publications 2014 Public perception regaring anterior cruciate ligament reconstruction atthew J. atava Washington University School
More informationDevelopment of a questionnaire to measure impact and outcomes of brachial plexus injury
Washington University School of Meicine Digital Commons@Becker Open Access Publications 2018 Development of a questionnaire to measure impact an outcomes of brachial plexus injury Carol A. Mancuso Weill
More informationAmerican Academy of Periodontology Best Evidence Consensus Statement on Selected Oral Applications for Cone-Beam Computed Tomography
J Perioontol October 2017 American Acaemy of Perioontology Best Evience Consensus Statement on Selecte Oral Applications for Cone-Beam Compute Tomography George A. Manelaris,* E. To Scheyer, Marianna Evans,
More informationLegg-Calvé-Perthes Disease: A Review of Cases with Onset Before Six Years of Age
This is an enhance PF from The Journal of Bone an Joint Surgery The PF of the article you requeste follows this cover page. Legg-Calvé-Perthes isease: A Review of Cases with Onset Before Six Years of Age
More informationUNIVERSITY OF MALTA SECONDARY EDUCATION CERTIFICATE SEC BIOLOGY. May 2013 EXAMINERS REPORT
UNIVERSITY OF MALTA SECONDARY EDUCATION CERTIFICATE SEC BIOLOGY May 2013 EXAMINERS REPORT MATRICULATION AND SECONDARY EDUCATION CERTIFICATE EXAMINATIONS BOARD SEC Biology May 2013 Session Examiners Report
More informationReverse Shoulder Arthroplasty for the Treatment of Rotator Cuff Deficiency
1895 COPYRIGHT Ó 2017 BY THE JOURAL OF BOE AD JOIT SURGERY, ICORPORATED Reverse Shouler Arthroplasty for the Treatment of Rotator Cuff Deficiency A Concise Follow-up, at a Minimum of 10 Years, of Previous
More informationX 2. s 1 n 1 s 2. n 2. s 2. 2 r 12
Homework for t-tests -- one sample, two inepenent samples, an correlate samples Formulas X One sample t-test: t s/ n Two inepenent samples t-test: t X SE X s 1 s n 1 n Correlate samples t-test: t X SE
More informationA reduced ODE model of the bovine estrous cycle
Konra-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany C. STÖTZEL, M. APRI, S. RÖBLITZ A reuce ODE moel of the bovine estrous cycle ZIB Report 14-33 (August 2014)
More informationA Trivariate Weibull Model For Oestradiol Plus Progestrone Treatment During The Preovulatory Period In Normal Premenopasual Women
American Journal of Engineering Research (AJER) 7 American Journal of Engineering Research (AJER) e-issn: -847 p-issn : -96 Volume-6, Issue-, pp-6- www.ajer.org Research Paper Open Access A Trivariate
More informationMETA-ANALYSIS. Topic #11
ARTHUR PSYC 204 (EXPERIMENTAL PSYCHOLOGY) 16C LECTURE NOTES [11/09/16] META-ANALYSIS PAGE 1 Topic #11 META-ANALYSIS Meta-analysis can be escribe as a set of statistical methos for quantitatively aggregating
More informationSinger-Loomis Report
Name/Coename: Agent X Singer-Loomis Report TM Base On: Singer-Loomis Type Deployment Inventory (SL-TDI ) DEVELOPED BY June Singer, Ph.D. Elizabeth Kirkhart, Ph.D. Mary Loomis, Ph. D. Larry Kirkhart, Ph.
More informationEvaluation of Cool Season Grass Haylage Fermented with Small Grains (Vermont Mini-Silo Experiment) MATERIALS AND METHODS
Evaluation of Cool Season Grass Haylage Fermente with Small Grains (Vermont Mini-Silo Experiment) Dairy farmers are always looking for strategies to reuce input costs. Grain purchase is an area of significant
More informationOptimal Precoding and MMSE Receiver Designs for MIMO WCDMA
Optimal Precoing an MMSE Receiver Designs for MIMO WCDMA Shakti Prasa Shenoy, Irfan Ghauri, Dirk T.M. Slock Infineon Technologies France SAS, GAIA, 26 Route es Crêtes, 656 Sophia Antipolis Cee, France
More informationThe use of controlled hypotension during shoulder arthroscopy
1284 COPYRIGHT Ó 2012 BY THE OURNAL OF BONE AND OINT SURGERY, INCORPORATED The Safety of Controlle Hypotension for Shouler Arthroscopy in the Beach-Chair Position Robert Gillespie, MD, Yousef Shishani,
More informationExtensor Mechanism Allograft Reconstruction for Extensor Mechanism Failure Following Total Knee Arthroplasty
279 COPYRIGHT Ó 2015 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED A commentary by Robert Booth Jr., MD, is linke to the online version of this article at jbjs.org. Extensor Mechanism Allograft
More informationComparison of protocol based cancer therapies and discrete controller based treatments in the case of endostatin administration
Comparison of protocol base cancer therapies an iscrete controller base treatments in the case of enostatin aministration Johanna Sápi *, Dániel Anrás Drexler **, Levente Kovács * * Research an Innovation
More informationGenetics. 128 A CHAPTER 5 Heredity Stewart Cohen/Stone/Getty Images. Figure 1 Note the strong family resemblance among these four generations.
Genetics Explain how traits are inherite. Ientify Menel s role in the history of genetics. Use a Punnett square to preict the results of crosses. Compare an contrast the ifference between an iniviual s
More informationTraumatic injuries leading to glenohumeral joint instability. History of Shoulder Instability and Subsequent Injury During Four Years of Follow-up
439 COPYRIGHT Ó 2013 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED History of Shouler Instability an Subsequent Injury During Four Years of Follow-up A Survival Analysis Kenneth L. Cameron, PhD,
More informationBiomarkers of Nutritional Exposure and Nutritional Status
Biomarkers of Nutritional Exposure an Nutritional Status Laboratory Issues: Use of Nutritional Biomarkers 1 Heii Michels Blanck,* 2 Barbara A. Bowman, y Geral R. Cooper, z Gary L. Myers z an Dayton T.
More informationMathematical modeling of follicular development in bovine estrous cycles
Konra-Zuse-Zentrum für Informationstechnik Berlin akustraße 7 D-495 Berlin-Dahlem Germany MANON BONDOUY AND SUSANNA RÖBLIZ Mathematical moeling of follicular evelopment in bovine estrous cycles ZIB-Report
More informationVolume 5, Issue 4, April 2017 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 4, April 2017 International Journal of Avance Research in Computer Science an Management Stuies Research Article / Survey
More informationA cost-effective junior resident training and assessment simulator for orthopaedic surgical skills via Fundamentals of Orthopaedic Surgery
Washington University School of Meicine Digital Commons@Becker Open Access Publications 2015 A cost-effective junior resient training an assessment simulator for orthopaeic surgical skills via Funamentals
More informationDownloaded from:
Eames, KTD (2007) Contact tracing strategies in heterogeneous populations. Epiemiology an infection, 135 (3). pp. 443-454. ISSN 0950-2688 DOI: https://oi.org/10.1017/s0950268806006923 Downloae from: http://researchonline.lshtm.ac.uk/6930/
More informationCS738: Advanced Compiler Optimizations. Flow Graph Theory. Amey Karkare
CS738: Avance Compiler Optimizations Flow Graph Theory Amey Karkare karkare@cse.iitk.ac.in http://www.cse.iitk.ac.in/~karkare/cs738 Department of CSE, IIT Kanpur Agena Speeing up DFA Depth of a flow graph
More informationAccording to the National Cancer Institute, in 2008
Breast-Specific g-imaging: Molecular Imaging of the Breast Using 99m Tc-Sestamibi an a Small-Fiel-of-View g-camera* Elizabeth A. Jones, Trinh D. Phan, Deborah A. Blanchar, an Abbe Miley Cancer Services,
More informationCoding Companion for OB/GYN. A comprehensive illustrated guide to coding and reimbursement
Coing Companion for OB/GYN A comprehensive illustrate guie to coing an reimbursement 2009 Contents Getting Starte with Coing Companion... i Skin...1 Pilonial Cyst...11 Implant...12 Repair...14 Destruction...22
More informationYounger Age Is Associated with a Higher Risk of Early Periprosthetic Joint Infection and Aseptic Mechanical FailureAfterTotalKneeArthroplasty
529 COPYRIGHT Ó 2014 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED Younger Age Is Associate with a Higher Risk of Early Periprosthetic Joint Infection an Aseptic Mechanical FailureAfterTotalKneeArthroplasty
More informationOpportunistic Osteoporosis Screening Gleaning Additional Information from Diagnostic Wrist CT Scans
1095 COPYRIGHT Ó 2015 BY THE OURNAL OF BONE AND OINT SURGERY, INCORPORATED Opportunistic Osteoporosis Screening Gleaning Aitional Information from Diagnostic Wrist CT Scans oseph. Schreiber, MD, Elizabeth
More informationSouth West Midlands Neonatal Network Parenteral Nutrition Guideline. May 2017
South West Milans Neonatal Network Parenteral Nutrition Guieline May 2017 Prouce for SWMNN by Dr Gemma Holer, Consultant Neonatologist, CH, Dr Gill Preston, Clinical Fellow, CH, Louise Whitticase, Lea
More informationManagement of Modifiable Risk Factors Prior to Primary Hip and Knee Arthroplasty
1921 COPYRIGHT Ó 2015 BY THE JOURNAL OF BONE AN JOINT SURGERY, INCORPORATE Management of Moifiable Risk Factors Prior to Primary Hip an Knee Arthroplasty A Reamission Risk Assessment Tool Sreevathsa Boraiah,
More informationMultisociety Task Force Recommendations
Multisociety Task Force Recommenations Multisociety Task Force Recommenations of Competencies in Pulmonary an Critical Care Meicine John D. Buckley 1, Doreen J. Arizzo-Harris 2, Alison S. Clay 3, J. Ranall
More informationAnalysis and Simulations of Dynamic Models of Hepatitis B Virus
Analysis an Simulations of Dynamic Moels of Hepatitis B Virus Xisong Dong (Corresponing author) National Engineering Laboratory for Disaster Backup an Recovery Beijing University of Posts an Telecommunications
More informationOverseas Observations of the Physiotherapist in the Work Place
Overseas Observations of the Physiotherapist in the Work Place A recent overseas stuy tour provie an opportunity for observation of the physiotherapist as one of a team concerne with health care in the
More informationDynamic radiographic criteria for detecting pseudarthrosis following anterior cervical arthrodesis
Washington University School of Meicine Digital Commons@Becker Open Access Publications 2014 Dynamic raiographic criteria for etecting pseuarthrosis following anterior cervical arthroesis Kwang-Sup Song
More informationCAN Tree Routing for Content-Addressable Network
Sensors & Transucers 2014 by IFSA Publishing, S. L. htt://www.sensorsortal.com CAN Tree Routing for Content-Aressable Network Zhongtao LI, Torben WEIS University Duisburg-Essen, Universität Duisburg-Essen
More informationBy Jae Kwang Kim, MD, PhD, Young-Do Koh, MD, PhD, and Nam-Hoon Do, MD
1 COPYRIGHT Ó 2010 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED A commentary by Moheb S. Moneim, MD, is available at www.jbjs.org/commentary an as supplemental material to the online version
More informationCorticosteroid injection in diabetic patients with trigger finger: A prospective, randomized, controlled double-blinded study
Washington University School of Meicine igital Commons@Becker Open Access Publications 12-1-2007 Corticosteroi injection in iabetic patients with trigger finger: A prospective, ranomize, controlleouble-bline
More informationStatistical Power and Optimal Design in Experiments in Which Samples of Participants Respond to Samples of Stimuli
Journal of Exerimental Psychology: General 014 American Psychological Association 014, Vol. 143, No. 5, 000 0096-3445/14/$1.00 htt://x.oi.org/10.1037/xge0000014 Statistical Power an Otimal Design in Exeriments
More informationSupplementary Methods Enzyme expression and purification
Supplementary Methos Enzyme expression an purification he expression vector pjel236 (18) encoing the full length S. cerevisiae topoisomerase II enzyme fuse to an intein an a chitin bining omain was kinly
More informationExperimental Study on Strength Evaluation Applied for Teeth Extraction: An In Vivo Study
Sen Orers of Reprints at reprints@benthamscience.net 2 The Open Dentistry Journal, 213, 7, 2-26 Open Access Experimental Stuy on Strength Evaluation Applie for Teeth Extraction: An In Vivo Stuy Marco Cicciù
More informationHost-vector interaction in dengue: a simple mathematical model
Host-vector interaction in engue: a simple mathematical moel K Tennakone, L Ajith De Silva (Inex wors: engue, engue moel, engue Sri Lanka, enemic equilibrium, engue virus iversity) Abstract Introuction
More informationTrend Toward High-Volume Hospitals and the Influence on Complications in Knee and Hip Arthroplasty
707 COPYRIGHT Ó 2016 BY THE JOURNAL OF BONE AND JOINT SURGERY, INCORPORATED A commentary by Davi W. Manning, MD, is linke to the online version of this article at jbjs.org. Tren Towar High-Volume Hospitals
More informationRecurrent Neural Networks for Multivariate Time Series with Missing Values
www.nature.com/scientificreports Receive: 1 November 2017 Accepte: 26 March 2018 Publishe: xx xx xxxx OPEN Recurrent Neural Networks for Multivariate Time Series with Missing Values Zhengping Che 1, Sanjay
More informationA Complex Mathematical Model of the Human Menstrual Cycle
Konra-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany ISABEL REINECKE, PETER DEUFLHARD A Complex Mathematical Moel of the Human Menstrual Cycle ZIB-Report 06-18 (June
More informationVELDA: Relating an Image Tweet s Text and Images
VELDA: Relating an Image Tweet s Text an Images Tao Chen 1 Hany M. SalahEleen 2 Xiangnan He 1 Min-Yen Kan 1,3 Dongyuan Lu 1 1 School of Computing, ational University of Singapore 2 Department of Computer
More informationBy Thomas K. Fehring, MD, Susan M. Odum, MEd, CCRC, Josh Hughes, BS, Bryan D. Springer, MD, and Walter B. Beaver Jr., MD
2335 CPYRIGHT Ó 2009 BY THE JURNAL F BNE AND JINT SURGERY, INCRPRATED Differences Between the Sexes in the Anatomy of the Anterior Conyle of the Knee By Thomas K. Fehring, MD, Susan M. um, ME, CCRC, Josh
More informationWANTED Species Survival Plan Coordinator
WANTED Species Survival Plan Coorinator Knowlegeable zoo or aquarium professional to manage propagation of hunres of animals locate in several states an countries. Must be verse in genetics, sophisticate
More informationEffect of Radiofrequency Energy on Glenohumeral Fluid Temperature During Shoulder Arthroscopy
This is an enhance PDF from The Journal of Bone an Joint Surgery The PDF of the article you requeste follows this cover page. Effect of Raiofrequency Energy on Glenohumeral Flui Temperature During Shouler
More information