Symmetric Key Broadcast Encryption: State-of-the-Art
|
|
- Steven Stanley Perkins
- 5 years ago
- Views:
Transcription
1 Symmetric Key Broadcast Encryption: State-of-the-Art Palash Sarkar (Based on joint work with Sanjay Bhattacherjee) Indian Statistical Institute India Research Network Meeting on Mobile Security 2015 Samsung R&D Institute India, Bangalore Palash Sarkar Symmetric Key BE 4th Dec, / 49
2 Research in Cryptology: A Personal Perspective Cryptographically useful Boolean functions. Design & analysis of block and stream ciphers and hash functions. Modes of operations for block and stream ciphers: Low-level, in-place, disk encryption. Schemes for authentication and encryption. Symmetric key broadcast encryption. Identity-based cryptography, digital signatures. Discrete log problem on finite fields and hyperelliptic curves. Secure and efficient implementations. Information security law and practical aspects of security. or, Google Palash Sarkar Palash Sarkar Symmetric Key BE 4th Dec, / 49
3 A Fledgling Start-Up Turing Laboratory: Structure: A project at the Applied Statistics Unit presently (i.e., up to March 2016) funded by the Indian Statistical Institute. People (current): One faculty member; two post-docs; three PhD students. Number of PhD students likely to increase. Number of post-docs/visitors depend on funding. Scope: Cryptology and related areas in a broad sense. Topics at the intersection of Math, Stat, CS and Engg. Goal: Gestation of ideas. To advance the current state-of-the-art. To formulate and investigate questions of foundational nature. Palash Sarkar Symmetric Key BE 4th Dec, / 49
4 Symmetric Key Broadcast Encryption: Background Palash Sarkar Symmetric Key BE 4th Dec, / 49
5 Conventional Symmetric Key Encryption Sender message M Receiver public channel Encrypt ciphertext Decrypt secret key K adversary secret key K Palash Sarkar Symmetric Key BE 4th Dec, / 49
6 Symmetric Key Broadcast Encryption Users Users Broadcast Users Centre Palash Sarkar Symmetric Key BE 4th Dec, / 49
7 Symmetric Key BE Functionality The centre pre-distributes secret information to the users. A broadcast takes place in a session. For each session: Some users are privileged and the rest are revoked. The actual message is encrypted once using a session key. The session key undergoes a number of separate encryptions; this determines the header. F Ks (M) E k1 (K s ) E kh (K s ) body header Correctness: The privileged users are able to decrypt. Security: The coalition of all the revoked users get no information about the message. Palash Sarkar Symmetric Key BE 4th Dec, / 49
8 Parameters of Interest Size of the header. User storage: size of the secret information required to be stored by the users. Time required by the centre to encrypt. Time required by a user to decrypt. Simplicity of implementation. Hdr sz and enc time are proportional to # enc of the session key. Requirement: Reduce header size, user storage and decryption time. Calls for trade-offs. Palash Sarkar Symmetric Key BE 4th Dec, / 49
9 Applications of BE AACS standard: content protection in optical discs: Disney, Intel, Microsoft, Panasonic, Warner Bros., IBM, Toshiba and Sony. Samsung is an AACS Authorised Certification Entity. Pay-TV: BSkyB in UK and Ireland has more than 10 million users; Cable TV Networks (Regulation) Amendment Act, 2011 (India). File Sharing in Encrypted File Systems. Encrypted to Mailing Lists. Military Broadcasts: Global Broadcast Service (US), Joint Broadcast System (Europe).... Real-life parameters of interest: Pay-TV bandwidth cost, set-top box booting time, high-end military receiver storage, resource-constrained devices. Palash Sarkar Symmetric Key BE 4th Dec, / 49
10 Subset Cover Schemes Identify a collection S consisting of subsets of users. Eg. S = {{u 1, u 2 }, {u 12, u 51, u 73 }, {u 2, u 11 },...}. Assign keys to each subset in S. To each user, assign secret information such that it is able to generate secret keys for each subset in S to which it belongs; and no more. During a broadcast, form a partition {S 1,..., S h } of the set of privileged users with S i S. The session key is encrypted using the keys for S 1,..., S h. Each privileged user can decrypt; no coalition of revoked users gains any information about the session key (or the message). Palash Sarkar Symmetric Key BE 4th Dec, / 49
11 Trivial Solutions Singleton set scheme: S = N. Each user has an independent key; separate encryptions of the message are made. Header size is the number of privileged users. User storage is one key per user. Power set scheme: S = 2 N. A key is assigned to each subset of users; a single encryption of the message is made to the key of the privileged set of users. Header size is just one encryption. Each user has to store 2 n 1 keys. Palash Sarkar Symmetric Key BE 4th Dec, / 49
12 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme Singleton Set scheme Palash Sarkar Symmetric Key BE 4th Dec, / 49
13 Schemes with Non-Trivial Trade-Offs Palash Sarkar Symmetric Key BE 4th Dec, / 49
14 Subset Difference Scheme Naor-Naor-Lotspiech (2001): patented, AACS standard. Assumes an underlying full binary tree Level Numbers Palash Sarkar Symmetric Key BE 4th Dec, / 49
15 Subsets in the collection S S i,j = T i \ T j : has all users that are in T i but not in T j i j Collection S: has all subsets S i,j such that j( i) is in the subtree T i. Palash Sarkar Symmetric Key BE 4th Dec, / 49
16 NNL-SD Parameters For n users out of which r are revoked: User storage needed: O(log 2 (n)). Header length in the worst case: 2r 1. Decryption time in the worst case: O(log n). Palash Sarkar Symmetric Key BE 4th Dec, / 49
17 Layered Subset Difference Scheme Halevy-Shamir (CRYPTO, 2002) Some levels are marked as special. Special Levels Layer Layer Palash Sarkar Symmetric Key BE 4th Dec, / 49
18 Layered SD Scheme T i special level T k T j Figure : Subset S i,j splits into S i,k (green leaves) and S k,j (grey leaves); i at a non-special level. Subsets S i,j where i and j are not in the same layer are not required any more. This results in reduction of user storage. Palash Sarkar Symmetric Key BE 4th Dec, / 49
19 HS-LSD Parameters For n users out of which r are revoked: User Storage needed: O(log 3/2 n). Maximum header length: 4r 2. Worst case decryption time: O(log n). Palash Sarkar Symmetric Key BE 4th Dec, / 49
20 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme Singleton Set scheme
21 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme Singleton Set scheme
22 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme Palash Sarkar Symmetric Key BE 4th Dec, / 49
23 Some Subsequent Schemes Goodrich, Sun and Tamassia (2004): User storage: O(log n). Header length: 2r 1. Decryption time: O(n). Cheon, Jho, Kim and Yoo (2008): A complicated scheme with a wide range of options. Header length can be reduced to below r, but, at the cost of greatly increasing the user storage. The decryption time is more than log n. Wang, Yang and Lin (2014): Header length smaller than that of the NNL-SD scheme. Increased user storage. Palash Sarkar Symmetric Key BE 4th Dec, / 49
24 An Overview of Recent Research Palash Sarkar Symmetric Key BE 4th Dec, / 49
25 Some Questions What is the expected header length of the NNL scheme? The NNL and the HS schemes are based on full binary trees; What happens if the number of users is not a power of two? Is the user storage achieved in the HS scheme the minimum possible? Is the (expected) header length achieved in the NNL scheme the minimum possible? What happens if we use trees of arity higher than 2? Palash Sarkar Symmetric Key BE 4th Dec, / 49
26 Some Answers Sanjay Bhattacherjee and Palash Sarkar. Complete tree subset difference broadcast encryption scheme and its analysis. Des. Codes Cryptography, 66(1-3): , Sanjay Bhattacherjee and Palash Sarkar. Concrete analysis and trade-offs for the (complete tree) layered subset difference broadcast encryption scheme. IEEE Transactions on Computers, 63(7): , Sanjay Bhattacherjee and Palash Sarkar. Tree based symmetric key broadcast encryption. Journal of Discrete Algorithms, 34, , Sanjay Bhattacherjee and Palash Sarkar. Reducing communication overhead of the subset difference scheme. IEEE Transactions on Computers, Palash Sarkar Symmetric Key BE 4th Dec, / 49
27 The Players Sanjay Bhattacherjee, presently post-doc at ENS-Lyon, France. PhD thesis available at: Implementations: id=0b7azs7qqqds0unb5ahp3wmjwcdq&usp=sharing_eil. Uploaded on 13th August, Palash Sarkar. Indian Statistical Institute: provided the infrastructure and the environment for carrying out the research. Palash Sarkar Symmetric Key BE 4th Dec, / 49
28 NNL-SD Scheme: Limitations and Beyond Palash Sarkar Symmetric Key BE 4th Dec, / 49
29 Complete Tree SD Scheme Question: What happens when the number of users is not a power of two? Possible answer: Add dummy users to get to the next power of two. Revoked: Disastrous effect on header length. Privileged: Better but, still a measureable deterioration of header length. Solution: Use a complete binary tree. Completes (and also subsumes) the NNL-SD scheme to work for any number of users. Conceptually simple; working out the details is involved. Palash Sarkar Symmetric Key BE 4th Dec, / 49
30 CTSD: Maximum Header Length Theorem: The maximum header length in the CTSD method for n users is min(2r 1, n 2, n r). For the NNL-SD scheme, the bound of 2r 1 was known. Complete picture: if r n/4, the bound 2r 1 is appropriate; if n/4 < r n/2, the bound n/2 is appropriate; and if r > n/2, the bound n r is appropriate. Using the CTSD method is never worse than individual transmission to privileged users. Palash Sarkar Symmetric Key BE 4th Dec, / 49
31 CTSD: Expected Header Length Random experiment: Select a random subset of r users out of n users and revoke them. Random variable X i n,r : takes the value 1 if S i,j is in the header for some j and 0 otherwise. E[X i n,r ] = Pr[X i n,r = 1]. H n,r : expected header length for n users with r revoked users. H n,r = E[X i n,r ] = Pr[X i n,r = 1] where the sum is over all the n 1 internal nodes i in the tree. H n,r can be computed in O(r log n) time and O(1) space. Palash Sarkar Symmetric Key BE 4th Dec, / 49
32 NNL-SD: Expected Header Length Theorem: For all n 1, r 1, the expected header length H n,r H r, as n increases through powers of two, where ( r 1 ( H r = 3r ) i + 2 i=1 i ( ) ) i (2 ( 1) k k 3 k ) k (2 k. 1) k=1 r H r /r Palash Sarkar Symmetric Key BE 4th Dec, / 49
33 Minimising User Storage Palash Sarkar Symmetric Key BE 4th Dec, / 49
34 Halevy-Shamir LSD Scheme Special Levels Layer Layer The root is considered to be at a special level, and in addition we consider every level of depth k log (n) for k = 1... log (n) as special (wlog, we assume that these numbers are integers). Works for 2 l 0 users with l 0 = 4, 9, 16, 25 (in the practical range). Palash Sarkar Symmetric Key BE 4th Dec, / 49
35 Generalisation: Notion of Layering Strategy A choice of special levels is called a layering strategy. A layering strategy l is denoted by the numbers of the special levels l 0 > l 1 >... > l e 1 > l e = 0. The layering strategy has (e + 1) special levels. Let l = (l 0,..., l e ). In general, the layer lengths need not be (almost) equal. It is not necessary for the root node to be special. Leads to smaller storage. Palash Sarkar Symmetric Key BE 4th Dec, / 49
36 Layering Strategy and User Storage storage 0 (l) = e 1 l i + 1 e 1 (l i l i+1 )(l i l i+1 1). 2 i=0 i=0 Recursive description: storage 0 (l 0, l 1,..., l e ) = l 0 + (l 0 l 1 )(l 0 l 1 1) 2 Layering strategy with root as a non-special layer: storage 1 (l) = storage 0 (l) l 1. + storage 0 (l 1,..., l e ). Palash Sarkar Symmetric Key BE 4th Dec, / 49
37 Storage Minimal Layering Consider a tree of height l 0 : SML 0 (l 0 ): a layering strategy which minimises the user storage among all layering strategies; #SML 0 (l 0 ): user storage required by SML 0 (l 0 ); Root node is not special: SML 1 (l 0 ) and #SML 1 (l 0 ) correspond to the case where the root is not special. Palash Sarkar Symmetric Key BE 4th Dec, / 49
38 Computing SML Dynamic Programming: An O(l 3 ) time and O(l 2 ) space algorithm to compute #SML 0 (l 0 ). The actual layering strategy SML 0 (l 0 ) can also be recovered from the algorithm. Also possible to obtain #SML 1 (l 0 ) and SML 1 (l 0 ). Palash Sarkar Symmetric Key BE 4th Dec, / 49
39 Examples of SML Suppose there are 2 28 users, i.e., l 0 = 28: NNL-SD: layering: 28,0; storage: 406. ehs: layering: 28,22,16,10,5,0; storage: 146. SML 0 : layering: 28,21,15,10,6,3,1,0; storage: 140. SML 1 : layering: 22,16,11,7,4,2,0; storage: 119. Palash Sarkar Symmetric Key BE 4th Dec, / 49
40 Header Length Maximum Header Length: At most min (4r 2, n 2, n r). At most min (4r 3, n 2, n r) if the root level is special. Expected Header Length: The splitting of subsets complicates the analysis. An O(r log 2 n) time algorithm to compute the expected header length. A very useful tool to analyse various schemes. Palash Sarkar Symmetric Key BE 4th Dec, / 49
41 Constrained Minimisation Question: Is it possible to obtain expected header length close to that of NNL-SD, but, with lower user storage? For each level, consider the expected number of subsets arising from the nodes at that level. Suppose l is a level which maximises this quantity. Question: How to choose l? Answer: Extensive experimentation has shown that l = l 0 log 2 r is a good choice. Palash Sarkar Symmetric Key BE 4th Dec, / 49
42 Constrained Minimisation Layering Fix a value of r and set l = l 0 log 2 r. Level l is made special, so that subsets arising from level l are not split. All levels below l are made non-special. At most one level above l (mid-way between l and the root) is made special; all other levels are made non-special. l max = l 0 log 2 r Palash Sarkar Symmetric Key BE 4th Dec, / 49
43 A CML Example Number of users is n = 2 28 i.e., l 0 = 28 and suppose r min = NNL-SD: layering: 28,0; storage: 406. ehs: layering: 28,22,16,10,5,0; storage: 146; header lengths: (1.69, 1.63, 1.64, 1.67, 1.69, 1.72, 1.73, 1.74, 1.75, 1.75). CML: layering: 23, 18,0; storage: 219; header lengths: (1.14, 1.08, 1.04, 1.03, 1.01, 1.01, 1.00, 1.00, 1.00, 1.00). Header lengths for 10 equispaced values of r from 2 10 to 2 14 normalised by the header length of the NNL-SD scheme. Palash Sarkar Symmetric Key BE 4th Dec, / 49
44 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Palash Sarkar Symmetric Key BE 4th Dec, / 49
45 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme
46 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme
47 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme Palash Sarkar Symmetric Key BE 4th Dec, / 49
48 Header Length Reduction. Palash Sarkar Symmetric Key BE 4th Dec, / 49
49 Approach-I: k-ary Tree Use of a k-ary tree with k 2: Header length with k > 3 is usually lower than header length with k = 2, though this is not always true. The comparison of header lengths for k = 3 and k = 2 is very interesting. User storage grows. Palash Sarkar Symmetric Key BE 4th Dec, / 49
50 k-ary tree SD Performance Palash Sarkar Symmetric Key BE 4th Dec, / 49
51 Approach-II: Augmented Binary Tree SD Scheme To each node of the binary tree, append an additional binary tree having a levels. Leads to a clear decrease in header length compared to the NNL-SD scheme. The user storage increases. Two other parameters are introduced to obtain O(n log n) schemes with header-length/user-storage trade-offs which vary from the NNL-SD scheme to the power set scheme. Palash Sarkar Symmetric Key BE 4th Dec, / 49
52 a-abtsd Performance Palash Sarkar Symmetric Key BE 4th Dec, / 49
53 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme
54 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme
55 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme
56 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme
57 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme
58 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme SML-SD scheme CML-SD scheme a-abtsd schemes (for different values of a)
59 Pictorial Representation of S Intuition As S increases, header size decreases and user storage increases. Power Set scheme NNL-SD scheme HS-LSD scheme Singleton Set scheme k-sd schemes (for different values of k) SML-SD scheme CML-SD scheme a-abtsd schemes (for different values of a) Palash Sarkar Symmetric Key BE 4th Dec, / 49
60 Thank you for your kind attention! Palash Sarkar Symmetric Key BE 4th Dec, / 49
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code Jakub Breier, Xiaolu Hou and Yang Liu 10 September 2018 1 / 25 Table of Contents 1 Background and Motivation 2 Overview
More informationLocomotive Allocation for Toll NZ
Locomotive Allocation for Toll NZ Sanjay Patel Department of Engineering Science University of Auckland, New Zealand spat075@ec.auckland.ac.nz Abstract A Locomotive is defined as a self-propelled vehicle
More informationEnhanced Secure Data Encryption Standard (ES-DES) Algorithm Using Extended Substitution Box (S-Box)
Enhanced Secure Data Encryption Standard (ES-DES) Algorithm Using Extended Substitution Box (S-Box) T.K.Sivakumar Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore 641
More informationExpected Delay for Various Access Probabilities Access Probability Expected Delay (in broadcast units) A B C Flat (a) Skewed (b) Multi-disk (c)
Organization of Broadcast Data Source: [2]: S. Acharya, et al. Broadcast disks: data management for asymmetric communication environments," ACM SIGMOD International Conference on Management of Data (SIGMOD
More informationSEED 128 Algorithm Specification
SEED 128 Algorithm Specification SEED 128 Algorithm Specification Abstract SEED is a 128-bit symmetric key block cipher that had been developed by KISA (Korea Information Security Agency) and a group of
More informationSuburban bus route design
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Suburban bus route design Shuaian Wang University
More informationPorting Applications to the Grid
Porting Applications to the Grid Charles Loomis Laboratoire de l Accélérateur Linéaire, Université Paris-Sud 11, Orsay, France Lecture given at the Joint EU-IndiaGrid/CompChem GRID Tutorial on Chemical
More informationCapacity-Achieving Accumulate-Repeat-Accumulate Codes for the BEC with Bounded Complexity
Capacity-Achieving Accumulate-Repeat-Accumulate Codes for the BEC with Bounded Complexity Igal Sason 1 and Henry D. Pfister 2 Department of Electrical Engineering 1 Techion Institute, Haifa, Israel Department
More informationNational Conference on Latest Trends in Design & Testing of Transmission Line Components
Book-Post National Conference on Latest Trends in Design & Testing of Transmission Line Components 22-23 November 2010 To, Mr. M. Selvaraj Engineering Officer / Co-ordinator Mechanical Engineering Division
More informationCHAPTER 8 A LARGE BLOCK CIPHER HAVING A KEY ON ONE SIDE OF THE PLAINTEXT MATRIX AND ITS INVERSE ON THE OHTER SIDE AS MULTIPLICANTS
127 CHAPTER 8 A LARGE BLOCK CIPHER HAVING A KEY ON ONE SIDE OF THE PLAINTEXT MATRIX AND ITS INVERSE ON THE OHTER SIDE AS MULTIPLICANTS 128 8.1. Introduction In a recent investigation, we have modified
More informationNetLogo and Multi-Agent Simulation (in Introductory Computer Science)
NetLogo and Multi-Agent Simulation (in Introductory Computer Science) Matthew Dickerson Middlebury College, Vermont dickerso@middlebury.edu Supported by the National Science Foundation DUE-1044806 http://ccl.northwestern.edu/netlogo/
More informationGPRS Charging Schemes
GPRS Charging Schemes Annukka Ahonen Networking Laboratory, HUT annukka.ahonen@iki.fi Abstract This paper studies different charging schemes possible in GPRS networks. The existing and future charging
More informationIMA Preprint Series # 2035
PARTITIONS FOR SPECTRAL (FINITE) VOLUME RECONSTRUCTION IN THE TETRAHEDRON By Qian-Yong Chen IMA Preprint Series # 2035 ( April 2005 ) INSTITUTE FOR MATHEMATICS AND ITS APPLICATIONS UNIVERSITY OF MINNESOTA
More informationSAFETY AND RELIABILITY ANALYSIS OF ELECTRIC POWER STEERING SYSTEM USED IN AUTOMOBILES
SAFETY AND RELIABILITY ANALYSIS OF ELECTRIC POWER STEERING SYSTEM USED IN AUTOMOBILES A.Vanaja 1, H.Gargama 2, B. Sarvesh 3 1 M.Tech, Reliability Engg. Student, JNTUACEA Anantapuramu, Andhra Pradesh (India)
More informationAging of the light vehicle fleet May 2011
Aging of the light vehicle fleet May 211 1 The Scope At an average age of 12.7 years in 21, New Zealand has one of the oldest light vehicle fleets in the developed world. This report looks at some of the
More informationGeneration of a pool of variable size symmetric keys through Image
Generation of a pool of variable size symmetric keys through Image Prerna Garg B.S.A.I.T.M. Faridabad Haryana, India prerna.it.mittal@gmail.com Deepak Garg Senior Software engineer Stryker Global Technology
More informationDynamics of Machines. Prof. Amitabha Ghosh. Department of Mechanical Engineering. Indian Institute of Technology, Kanpur. Module No.
Dynamics of Machines Prof. Amitabha Ghosh Department of Mechanical Engineering Indian Institute of Technology, Kanpur Module No. # 04 Lecture No. # 03 In-Line Engine Balancing In the last session, you
More informationINTELLIGENT DC MICROGRID WITH SMART GRID COMMUNICATIONS: CONTROL STRATEGY CONSIDERATION AND DESIGN
INTELLIGENT DC MICROGRID WITH SMART GRID COMMUNICATIONS: CONTROL STRATEGY CONSIDERATION AND DESIGN Presented by: Amit Kumar Tamang, PhD Student Smart Grid Research Group-BBCR aktamang@uwaterloo.ca 1 Supervisor
More informationEEEE 524/624: Fall 2017 Advances in Power Systems
EEEE 524/624: Fall 2017 Advances in Power Systems Lecture 6: Economic Dispatch with Network Constraints Prof. Luis Herrera Electrical and Microelectronic Engineering Rochester Institute of Technology Topics
More informationTopic 5 Lecture 3 Estimating Policy Effects via the Simple Linear. Regression Model (SLRM) and the Ordinary Least Squares (OLS) Method
Econometrics for Health Policy, Health Economics, and Outcomes Research Topic 5 Lecture 3 Estimating Policy Effects via the Simple Linear Regression Model (SLRM) and the Ordinary Least Squares (OLS) Method
More informationElectricity Innovations for Sustainable Development
Electricity Innovations for Sustainable Development Our Mission We are a dynamic, visionary and ambitious company committed to improving the way electricity is supplied and consumed. reducing greenhouse
More informationA simulator for the control network of smart grid architectures
A simulator for the control network of smart grid architectures K. Mets 1, W. Haerick 1, C. Develder 1 1 Dept. of Information Technology - IBCN, Faculty of applied sciences, Ghent University - IBBT, G.
More informationResponse of the Road Haulage Association to Transport for London s Consultation. Changes to the Ultra Low Emission Zone and Low Emission Zone.
Response of the Road Haulage Association to Transport for London s Consultation Changes to the Ultra Low Emission Zone and Low Emission Zone. Summary 27 Feb 2018 1. The London Mayor is consulting on changing
More information1) The locomotives are distributed, but the power is not distributed independently.
Chapter 1 Introduction 1.1 Background The railway is believed to be the most economical among all transportation means, especially for the transportation of mineral resources. In South Africa, most mines
More informationHow to generate the Sbox of Luffa
How to generate the Sbox of Luffa ESC2010@Remich (Jan.11.2010) Dai Watanabe SDL, Hitachi Luffa is a registered trademark of Hitachi, Ltd. 1 Outline Topic How to find an 4-bit sbox optimized for bit slice
More informationLecture 2. Review of Linear Regression I Statistics Statistical Methods II. Presented January 9, 2018
Review of Linear Regression I Statistics 211 - Statistical Methods II Presented January 9, 2018 Estimation of The OLS under normality the OLS Dan Gillen Department of Statistics University of California,
More informationNOWADAYS, among all transportation modes,
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Online Cruising Mile Reduction in Large-Scale Taxicab Networks Desheng Zhang, Student Member, IEEE, Tian He, Senior Member, IEEE, Shan Lin, Member,
More informationLondon 2050 Infrastructure Plan
London 2050 Infrastructure Plan RTPI London Future City Summit Michèle Dix 23 rd October 2014 The background to the 2050 London Infrastructure Plan is the city s expected strong population growth.. By
More informationAutomatic Optimization of Wayfinding Design Supplementary Material
TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL.??, NO.??,???? 1 Automatic Optimization of Wayfinding Design Supplementary Material 1 ADDITIONAL EXAMPLES We use our approach to generate wayfinding
More informationSemi-Active Suspension for an Automobile
Semi-Active Suspension for an Automobile Pavan Kumar.G 1 Mechanical Engineering PESIT Bangalore, India M. Sambasiva Rao 2 Mechanical Engineering PESIT Bangalore, India Abstract Handling characteristics
More informationThe design and implementation of a simulation platform for the running of high-speed trains based on High Level Architecture
Computers in Railways XIV Special Contributions 79 The design and implementation of a simulation platform for the running of high-speed trains based on High Level Architecture X. Lin, Q. Y. Wang, Z. C.
More informationLevel of Service Classification for Urban Heterogeneous Traffic: A Case Study of Kanapur Metropolis
Level of Service Classification for Urban Heterogeneous Traffic: A Case Study of Kanapur Metropolis B.R. MARWAH Professor, Department of Civil Engineering, I.I.T. Kanpur BHUVANESH SINGH Professional Research
More informationHigh Speed S&C Design and Maintenance
High Speed S&C Design and Maintenance Dr Sin Sin Hsu Head of Track Engineering, NRHS 1 st March 2018 What is a High Speed Turnout? Three main parts: Switch Geometry, profile, components Intermediate Part
More informationTABLE OF CONTENTS. Table of contents. Page ABSTRACT ACKNOWLEDGEMENTS TABLE OF TABLES TABLE OF FIGURES
Table of contents TABLE OF CONTENTS Page ABSTRACT ACKNOWLEDGEMENTS TABLE OF CONTENTS TABLE OF TABLES TABLE OF FIGURES INTRODUCTION I.1. Motivations I.2. Objectives I.3. Contents and structure I.4. Contributions
More informationA Viewpoint on the Decoding of the Quadratic Residue Code of Length 89
International Journal of Networks and Communications 2012, 2(1): 11-16 DOI: 10.5923/j.ijnc.20120201.02 A Viewpoint on the Decoding of the Quadratic Residue Code of Length 89 Hung-Peng Lee Department of
More informationX Infotech Digital Tachograph
X Infotech Digital Tachograph What is a digital or smart tachograph? A digital tachograph is a device fitted to a vehicle that digitally records its speed and distance, together with the driver's activity
More informationTHE alarming rate, at which global energy reserves are
Proceedings of the 12th International IEEE Conference on Intelligent Transportation Systems, St. Louis, MO, USA, October 3-7, 2009 One Million Plug-in Electric Vehicles on the Road by 2015 Ahmed Yousuf
More informationAdaptive Routing and Recharging Policies for Electric Vehicles
Adaptive Routing and Recharging Policies for Electric Vehicles Timothy M. Sweda, Irina S. Dolinskaya, Diego Klabjan Department of Industrial Engineering and Management Sciences Northwestern University
More informationRespect for customers, partners and staff. Service: another name for the respect that a company owes its customers, partners and staff.
Respect for customers, partners and staff Service: another name for the respect that a company owes its customers, partners and staff. Vehicle glass KEY FIGURES (in EUR million) 2004 2003 % change Total
More informationThe Grainger Center for Electric Machinery and Electromechanics Update, May 2002
The Grainger Center for Electric Machinery and Electromechanics Update, May 2002 May 2002 P. T. Krein, Director Grainger Center for Electric Machinery and Electromechanics Dept. of Electrical and Computer
More informationModeling Strategies for Design and Control of Charging Stations
Modeling Strategies for Design and Control of Charging Stations George Michailidis U of Michigan www.stat.lsa.umich.edu/ gmichail NSF Workshop, 11/15/2013 Michailidis EVs and Charging Stations NSF Workshop,
More informationUnited Power Flow Algorithm for Transmission-Distribution joint system with Distributed Generations
rd International Conference on Mechatronics and Industrial Informatics (ICMII 20) United Power Flow Algorithm for Transmission-Distribution joint system with Distributed Generations Yirong Su, a, Xingyue
More informationFuel Cells and Hydrogen 2 Joint Undertaking (FCH 2 JU) Frequently Asked Questions
Fuel Cells and Hydrogen 2 Joint Undertaking (FCH 2 JU) Frequently Asked Questions Background information: The Fuel Cells and Hydrogen Joint Undertaking was established in 2008-2013, as the first publicprivate
More informationPRODUCT PORTFOLIO. Electric Vehicle Infrastructure ABB Ability Connected Services
PRODUCT PORTFOLIO Electric Vehicle Infrastructure ABB Ability Connected Services 2 ABB ABILITY CONNECTED SERVICES FOR EV INFRASTRUCTURE PRODUCT PORTFOLIO To successfully run a commercial charging network
More informationCFD Analysis and Comparison of Fluid Flow Through A Single Hole And Multi Hole Orifice Plate
CFD Analysis and Comparison of Fluid Flow Through A Single Hole And Multi Hole Orifice Plate Malatesh Barki. 1, Ganesha T. 2, Dr. M. C. Math³ 1, 2, 3, Department of Thermal Power Engineering 1, 2, 3 VTU
More informationCapacity-Achieving Accumulate-Repeat-Accumulate Codes for the BEC with Bounded Complexity
Capacity-Achieving Accumulate-Repeat-Accumulate Codes for the BEC with Bounded Complexity Igal Sason 1 and Henry D. Pfister 2 Department of Electrical Engineering 1 Techion Institute, Haifa, Israel School
More informationReCoSoC Experimental Fault Injection based on the Prototyping of an AES Cryptosystem
ReCoSoC 2010 5th International Workshop on Reconfigurable Communication-centric Systems on Chip Experimental Fault Injection based on the Prototyping of an AES Cryptosystem Jean- Baptiste Rigaud Jean-Max
More informationOrganized by Hosted by In collaboration with Supported by
technische universität dortmund Communication Networks Institute Evaluation of OCPP and IEC 61850 for Smart 1, Claus AmtrupAndersen 2, Christian Wietfeld 1 1 Dortmund University of Technology, Communication
More informationResearch in hydraulic brake components and operational factors influencing the hysteresis losses
Research in hydraulic brake components and operational factors influencing the hysteresis losses Shreyash Balapure, Shashank James, Prof.Abhijit Getem ¹Student, B.E. Mechanical, GHRCE Nagpur, India, ¹Student,
More informationDesign and Implementation of a Charging and Accounting Architecture for QoS-differentiated VPN Services to Mobile Users
Design and Implementation of a Charging and Accounting Architecture for QoS-differentiated VPN Services to Mobile Users Thanasis Papaioannou and George D. Stamoulis Athens University of Economics & Business
More informationA Magneto-rheological Fluid Squeeze Film Damper for Rotor Vibration Control
A Magneto-rheological Fluid Squeeze Film Damper for Rotor Vibration Control Changsheng Zhu Department of Electrical Engineering, Zhejiang University Hangzhou, 310027, Zhejiang, P. R. of China David A.
More informationOn Using Storage and Genset for Mitigating Power Grid Failures
1 / 27 On Using Storage and Genset for Mitigating Power Grid Failures Sahil Singla ISS4E lab University of Waterloo Collaborators: S. Keshav, Y. Ghiassi-Farrokhfal 1 / 27 Outline Introduction Background
More informationCRITICAL SPEED ANALYSIS FOR DUAL ROTOR SYSTEM USING FINITE ELEMENT METHOD
CRITICAL SPEED ANALYSIS FOR DUAL ROTOR SYSTEM USING FINITE ELEMENT METHOD Kai Sun, Zhao Wan, Huiying Song, Shaohui Wang AVIC Commercial Aircraft Engine Co. Ltd, 3998 South Lianhua Road, 201108 Shanghai,
More informationGlobal Metering Pump Market Research Report - Forecast to 2023
Report Information More information from: https://www.marketresearchfuture.com/reports/2913 Global Metering Pump Market Research Report - Forecast to 2023 Report / Search Code: MRFR/E&P/2137-HCRR Publish
More informationINCREASING electrical network interconnection is
Analysis and Quantification of the Benefits of Interconnected Distribution System Operation Steven M. Blair, Campbell D. Booth, Paul Turner, and Victoria Turnham Abstract In the UK, the Capacity to Customers
More informationSmart Grid What is it all about? Smart Grid Scenarios. Incorporation of Electric Vehicles. Vehicle-to-Grid Interface applying ISO/IEC 15118
Corporate Technology Security Considerations for the Electric Vehicle Charging Infrastructure Rainer Falk Siemens AG, CT RTC ITS : +49 89 636 51653 : rainer.falk@siemens.com Steffen Fries Siemens AG, CT
More informationTECHNICAL REPORTS from the ELECTRONICS GROUP at the UNIVERSITY of OTAGO. Table of Multiple Feedback Shift Registers
ISSN 1172-496X ISSN 1172-4234 (Print) (Online) TECHNICAL REPORTS from the ELECTRONICS GROUP at the UNIVERSITY of OTAGO Table of Multiple Feedback Shift Registers by R. W. Ward, T.C.A. Molteno ELECTRONICS
More informationThe way to a global standard
The way to a global standard 17.08.2016 Technology Where we are The evolution of driving systems Fastned, Roos Korthals ltesa Volkswagen AG ABB maurogrigollo Phoenix Contact Volkswagen AG Olga Galushko
More informationSmarter Bus Information in Leeds
Smarter Bus Information in Leeds Thomas Forth project demonstration url : www.tomforth.co.uk/dynamicbusmaps email : thomas.forth@gmail.com twitter : @thomasforth Executive summary: Leeds, an English city
More informationIntroduction to Patents & other Intellectual Properties (IP)
Introduction to Patents & other Intellectual Properties (IP) Bijan Tadayon, Ph.D., J.D. Saied Tadayon, Ph.D., J.D. bijantadayon@maxvalueip.com saiedtadayon@maxvalueip.com MaxValueIP LLC 11204 Albermyrtle
More informationResponse of the Road Haulage Association to the Scottish Government. Removal, Storage & Disposal of Vehicles Regulations.
Response of the Road Haulage Association to the Scottish Government. Removal, Storage & Disposal of Vehicles Regulations. 06/08/2018 Summary 1. This consultation document seeks views on changes to the
More informationRenewable Energy Transmission through Multiple Routes in a Mobile Electrical Grid
Renewable Energy Transmission through Multiple Routes in a Mobile Electrical Grid Ping Yi, Yixiong Tang, Yijie Hong, Yuzhe Shen, Ting Zhu, Qingquan Zhang, Miroslav M. Begovic Shanghai Jiao Tong University,
More informationinter.noise 2000 The 29th International Congress and Exhibition on Noise Control Engineering August 2000, Nice, FRANCE
Copyright SFA - InterNoise 2000 1 inter.noise 2000 The 29th International Congress and Exhibition on Noise Control Engineering 27-30 August 2000, Nice, FRANCE I-INCE Classification: 7.6 ROLLING NOISE FROM
More informationSession 5 Wind Turbine Scaling and Control W. E. Leithead
SUPERGEN Wind Wind Energy Technology Session 5 Wind Turbine Scaling and Control W. E. Leithead Supergen 2 nd Training Seminar 24 th /25 th March 2011 Wind Turbine Scaling and Control Outline Introduction
More informationNon-volatile STT-RAM: A True Universal Memory
Non-volatile STT-RAM: A True Universal Memory Farhad Tabrizi Grandis Inc., Milpitas, California August 13 th, 2009 Santa Clara, CA, USA, August 2009 1 Outline Grandis Corporation Overview Current Flash
More informationEPA MANDATE WAIVERS CREATE NEW UNCERTAINTIES IN BIODIESEL MARKETS
2nd Quarter 2011 26(2) EPA MANDATE WAIVERS CREATE NEW UNCERTAINTIES IN BIODIESEL MARKETS Wyatt Thompson and Seth Meyer JEL Classifications: Q11, Q16, Q42, Q48 Keywords: Biodiesel, Biofuel Mandate, Waivers
More informationA Battery Smart Sensor and Its SOC Estimation Function for Assembled Lithium-Ion Batteries
R1-6 SASIMI 2015 Proceedings A Battery Smart Sensor and Its SOC Estimation Function for Assembled Lithium-Ion Batteries Naoki Kawarabayashi, Lei Lin, Ryu Ishizaki and Masahiro Fukui Graduate School of
More information7 The revised IS 8034:2002 and revised STI be implemented w.e.f. 1 Feb 2005.
BUREAU OF INDIAN STANDARDS (CENTRAL MARKS DEPARTMENT-III) Our Ref: CMD-III/16:8034 25 Oct 2004 Subject: Implementation of revised IS 8034:2002 Submersible Pump Sets and revised STI (Doc:STI/8034/5 ) IS
More informationRotorcraft Gearbox Foundation Design by a Network of Optimizations
13th AIAA/ISSMO Multidisciplinary Analysis Optimization Conference 13-15 September 2010, Fort Worth, Texas AIAA 2010-9310 Rotorcraft Gearbox Foundation Design by a Network of Optimizations Geng Zhang 1
More informationOStrich: Fair Scheduler for Burst Submissions of Parallel Jobs. Krzysztof Rzadca Institute of Informatics, University of Warsaw, Poland
Krzysztof Rzadca Institute of Informatics, University of Warsaw, Poland! joint work with: Filip Skalski (U Warsaw / Google)! based on work with: Vinicius Pinheiro (Grenoble) Denis Trystram (Grenoble) http://www.flickr.com/photos/bobjagendorf/345683620/
More informationBIOFUELS DEMAND FORECASTS
BIOFUELS DEMAND FORECASTS Issue N 4 February 23, 2018 1.0 SUMMARY Warning Main changes between November and February forecasts: 2017 numbers All the changes mentioned below have been made based on the
More informationCLS Bank Protocol for FX. Overview
CLS Bank Protocol for FX Overview Joe Halberstadt Senior Product Manager CLS Services Ltd. www.cls-group.com CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd 2007 CLS
More informationResponsive Bus Bridging Service Planning Under Urban Rail Transit Line Emergency
2016 3 rd International Conference on Vehicle, Mechanical and Electrical Engineering (ICVMEE 2016) ISBN: 978-1-60595-370-0 Responsive Bus Bridging Service Planning Under Urban Rail Transit Line Emergency
More informationE-Mobility in Planning and Operation of future Distribution Grids. Michael Schneider I Head of Siemens PTI
E-Mobility in Planning and Operation of future Distribution Grids Michael Schneider I Head of Siemens PTI Unrestricted Siemens AG Österreich 2017 siemens.at/future-of-energy Siemens Power Technologies
More informationRole of Digitisation and e-commerce in Indian Economic Growth
Role of Digitisation and e-commerce in Indian Economic Growth Ashok Jhunjhunwala, IIT Madras (on sabbatical) Principal Advisor, Minister of Power and NRE ashok@tenet.res.in Three engines of e-commerce
More informationThe Highways Agency is working to improve the M3 between junctions 2 to 4a.
Welcome The Highways Agency is working to improve the M3 between junctions 2 to 4a. The M3 Junctions 2 to 4a is part of a major strategic road network connecting people, communities and businesses, carrying
More informationComputer Aided Transient Stability Analysis
Journal of Computer Science 3 (3): 149-153, 2007 ISSN 1549-3636 2007 Science Publications Corresponding Author: Computer Aided Transient Stability Analysis Nihad M. Al-Rawi, Afaneen Anwar and Ahmed Muhsin
More informationAUTONOMOUS VEHICLE SYSTEMS AND A CONNECTED FUTURE
AUTONOMOUS VEHICLE SYSTEMS AND A CONNECTED FUTURE IoT Summit RWW 2018 SERGIO PACHECO SYSTEMS AND APPLICATIONS INFOTAINMENT AND DRIVER ASSISTANCE PUBLIC USE LEVELS OF AUTONOMATION IN CARS Level 0-2 Human
More informationInformal document No. 1
Distr.: General 26 April 2018 Original: English only Economic Commission for Europe Inland Transport Committee Global Forum for Road Traffic Safety Special session Geneva, 3-4 May 2018 Agenda item 2 (i)
More informationVibration Reduction in Aerospace Bracket through Structural Design
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN: 2278-1684 Volume 4, Issue 5 (Nov. - Dec. 2012), PP 47-51 Vibration Reduction in Aerospace Bracket through Structural Design Murali Mohan
More informationBACHELOR THESIS Optimization of a circulating multi-car elevator system
BACHELOR THESIS Kristýna Pantůčková Optimization of a circulating multi-car elevator system Department of Theoretical Computer Science and Mathematical Logic Supervisor of the bachelor thesis: Study programme:
More informationProxy Lookup Service of the Bank of Lithuania. Market Infrastructure Department Banking Service
Proxy Lookup Service of the Bank of Lithuania Market Infrastructure Department Banking Service 30 May 2018 About us One Access Point To Access to European payment systems: STEP2, RT1 & TIPS Full SEPA service
More informationA Theoretical, Computational, and Experimental Analysis of an Interdigital Armature in a High Velocity Railgun
A Theoretical, Computational, and Experimental Analysis of an Interdigital Armature in a High Velocity Railgun Robert MacGregor and Sikhanda Satapathy August, 2002 Institute for Advanced Technology The
More informationMinimizing Transmix With FuellCheck
Minimizing Transmix With FuellCheck What is Transmix? Those who have to deal with transmix best answer this question. Below are 2 different perspectives, the first from an engineering consulting firm,
More informationDriver survey: Republic of Ireland 2017
Driver survey: Republic of Ireland 2017 Contents 1. Why Ireland? 2. What is the Irish driver survey? 3. How can I access the Irish driver survey? 2 1. GiPA coverage throughout the world GiPA operates in
More information1.1 All testing apparatus shall be periodically checked and calibrated and records of such checks/calibration shall be maintained.
SCHEME OF TESTING AND INSPECITON FOR CERTIFICATION OF ELECTRICAL ACCESSORIES CIRCUIT BREAKERS FOR OVER CURRENT PROTECTION FOR HOUSEHOLD AND SIMILAR INSTALLATIONS PART1 CIRCUIT BREAKERS FOR ac OPERATION
More informationAnalysis of Fuel Economy and Battery Life depending on the Types of HEV using Dynamic Programming
World Electric Vehicle Journal Vol. 6 - ISSN 2032-6653 - 2013 WEVA Page Page 0320 EVS27 Barcelona, Spain, November 17-20, 2013 Analysis of Fuel Economy and Battery Life depending on the Types of HEV using
More informationOptimization of Design Based on Tip Radius and Tooth Width to Minimize the Stresses on the Spur Gear with FE Analysis.
Optimization of Design Based on Tip Radius and Tooth Width to Minimize the Stresses on the Spur Gear with FE Analysis. K.Ruthupavan M. Tech Sigma Consultancy Service 7-1-282/C/A/1, 104, First Floor Rajaiah
More informationComparison Of Multibody Dynamic Analysis Of Double Wishbone Suspension Using Simmechanics And FEA Approach
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 2 Issue 4 ǁ April. 214 ǁ PP.31-37 Comparison Of Multibody Dynamic Analysis Of
More informationHIGH VOLTAGE vs. LOW VOLTAGE: POTENTIAL IN MILITARY SYSTEMS
2013 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM POWER AND MOBILITY (P&M) MINI-SYMPOSIUM AUGUST 21-22, 2013 TROY, MICHIGAN HIGH VOLTAGE vs. LOW VOLTAGE: POTENTIAL IN MILITARY SYSTEMS
More informationContents. Solar Select TM Frequently Asked Questions
Solar Select TM Frequently Asked Questions Contents Program Overview and How Solar Select Works... 1 Participation Requirements... 3 Cost and Payment... 4 Solar Production... 5 Development, Equipment,
More informationRhode Island Division of Public Utilities and Carriers & Office of Energy Resources. Power Sector Transformation
1 Rhode Island Division of Public Utilities and Carriers & Office of Energy Resources Power Sector Transformation Notice of Inquiry into the Electric Utility Business Model and Request for Stakeholder
More informationInstitute for Cyber Security. Multi-Tenant Access Control for Collaborative Cloud Services
Institute for Cyber Security Multi-Tenant Access Control for Collaborative Cloud Services CS6393 Spring 2014 PhD Seminar Bo Tang April 11, 2014 ICS at UTSA World-Leading Research with Real-World Impact!
More informationRouting and Planning for the Last Mile Mobility System
Routing and Planning for the Last Mile Mobility System Nguyen Viet Anh 30 October 2012 Nguyen Viet Anh () Routing and Planningfor the Last Mile Mobility System 30 October 2012 1 / 33 Outline 1 Introduction
More informationEffect of driving pattern parameters on fuel-economy for conventional and hybrid electric city buses
EVS28 KINTEX, Korea, May 3-6, 2015 Effect of driving pattern parameters on fuel-economy for conventional and hybrid electric city buses Ming CHI 1, Hewu WANG 1, Minggao OUYANG 1 1 Author 1 State Key Laboratory
More informationDynamic characteristics of railway concrete sleepers using impact excitation techniques and model analysis
Dynamic characteristics of railway concrete sleepers using impact excitation techniques and model analysis Akira Aikawa *, Fumihiro Urakawa *, Kazuhisa Abe **, Akira Namura * * Railway Technical Research
More informationMadison, NJ March 10th, 2016 Ceskaa Market Research
Global Switchgear Market to reach $137.4 billion by 2021, says a New Research Report at Ceskaa Market Research ============================================================== Madison, NJ March 10th, 2016
More informationApplications for energy storage flywheels in vehicles of Deutsche Bahn AG
Applications for energy storage flywheels in vehicles of Deutsche Bahn AG Introduction It is necessary to introduce effective energy saving measures in the operation of rail vehicles for economic and environmental
More informationEVSE Load Balancing VS Load Shedding 1: Largest number of 30 Amps EVSEs that can be fed as per the code from the 600 volts feeder
EVSE Load Balancing VS Load Shedding 1: Largest number of 30 Amps EVSEs that can be fed as per the code from the 1600A @ 600 volts feeder The schematics shows that the 1600A feeder is split in 7 branches
More informationAcademic Course Description
BEE305- ELECTRICAL MACHINES Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electrical and Electronics Engineering BEE305- ELECTRICAL MACHINES Third Semester,
More information