T
E
L
K
O
M
NIKA
T
elec
o
mm
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
18
,
No
.
4
,
A
u
g
u
s
t
2020
,
p
p
.
1
8
3
4
~
1
8
4
2
I
SS
N:
1
6
9
3
-
6930
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Ke
m
e
n
r
is
te
k
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/
T
E
L
KOM
NI
KA
.
v
1
8
i4
.
1
4
3
3
9
1834
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
Q
R
co
de bas
ed
t
w
o
-
factor a
uthent
ica
tion to v
erify
pa
per
-
ba
sed do
cu
m
en
ts
M
a
y
s
a
a
Abd Ulk
a
re
e
m
Na
s
e
r,
E
m
a
n T
a
lib
J
a
s
i
m
,
H
a
ider
M
.
Al
-
M
a
s
hh
a
di
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter In
f
o
rm
a
ti
o
n
S
y
ste
m
Co
ll
e
g
e
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
I
n
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
Un
iv
e
rsit
y
o
f
Ba
sra
h
,
Ira
q
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Oct
1
7
,
2
0
1
9
R
ev
i
s
ed
Feb
1
9
,
2
0
2
0
A
cc
ep
ted
Ma
r
2
7
,
2
0
2
0
Im
p
o
rtan
t
p
a
p
e
r
-
b
a
se
d
d
o
c
u
m
e
n
ts
e
x
p
o
se
d
t
o
f
o
rg
e
ry
su
c
h
a
s:
o
f
f
icia
l
c
e
rti
f
ic
a
tes
,
b
irt
h
,
m
a
rriag
e
,
d
e
a
th
c
e
rti
f
ica
tes
,
se
ll
in
g
a
n
d
b
u
y
in
g
d
o
c
u
m
e
n
ts
a
n
d
o
t
h
e
r
leg
a
l
d
o
c
u
m
e
n
ts
is
m
o
re
a
n
d
m
o
re
se
rio
u
s
a
n
d
so
p
h
isti
c
a
ted
.
W
it
h
th
e
p
u
r
p
o
se
s
o
f
f
r
a
u
d
,
a
p
p
r
o
p
ri
a
ti
o
n
o
f
p
ro
p
e
rty
,
jo
b
a
p
p
li
c
a
ti
o
n
a
n
d
a
ss
ig
n
m
e
n
t
in
o
rd
e
r
to
sw
in
d
le
p
u
b
li
c
a
u
th
o
rit
ies
,
t
h
is
f
o
rg
e
r
y
h
a
s
led
to
m
a
teria
l
lo
ss
,
b
e
li
e
f
d
e
terio
ra
ti
o
n
a
s
we
ll
a
s
so
c
ial
in
sta
b
i
li
ty
.
T
h
e
re
a
re
m
a
n
y
tec
h
n
iq
u
e
s
h
a
s
b
e
e
n
p
ro
p
o
se
d
to
o
v
e
rc
o
m
e
th
is
issu
e
su
c
h
a
s
:
in
k
sta
m
p
s,
li
v
e
sig
n
a
tu
re
s,
d
o
c
u
m
e
n
ted
t
h
e
tran
sa
c
ti
o
n
in
th
ir
d
p
a
rty
li
k
e
th
e
c
o
u
rt
o
r
n
o
tary
.
In
th
is
p
a
p
e
r,
it
’s
p
ro
p
o
se
d
a
f
e
a
sib
le
so
lu
ti
o
n
f
o
r
f
o
rg
e
r
y
p
re
v
e
n
ti
o
n
f
o
r
p
a
p
e
r
-
b
a
se
d
d
o
c
u
m
e
n
ts
u
sin
g
c
l
o
u
d
c
o
m
p
u
ti
n
g
a
p
p
li
c
a
ti
o
n
.
W
it
h
th
e
a
p
p
li
c
a
ti
o
n
o
f
q
u
ick
r
e
sp
o
n
se
b
i
d
irec
ti
o
n
a
l
b
a
rc
o
d
e
a
n
d
t
h
e
u
sa
g
e
o
f
h
a
sh
a
lg
o
rit
h
m
.
T
h
e
stu
d
y
a
i
m
s
a
t
d
e
v
e
lo
p
in
g
a
n
e
lec
tro
n
ic
v
e
rif
ica
ti
o
n
sy
ste
m
f
o
r
o
f
f
ici
a
l
a
n
d
issu
e
d
b
o
o
k
s
(d
o
c
u
m
e
n
ts,
e
n
d
o
rse
m
e
n
ts,
a
n
d
o
t
h
e
r
o
f
f
icia
l
b
o
o
k
s) t
o
/f
ro
m
d
iff
e
r
e
n
t
se
c
ti
o
n
s
o
f
th
e
In
st
it
u
te u
si
n
g
QR t
e
c
h
n
o
lo
g
y
.
K
ey
w
o
r
d
s
:
Au
t
h
en
t
icatio
n
m
et
h
o
d
s
C
lo
u
d
co
m
p
u
tin
g
e
-
Go
v
er
n
m
e
n
t
Hash
al
g
o
r
ith
m
QR
co
d
e
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Haid
er
M.
A
l
-
Ma
s
h
h
ad
i
,
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
I
n
f
o
r
m
atio
n
S
y
s
te
m
C
o
lle
g
e
o
f
C
o
m
p
u
ter
Scie
n
ce
a
n
d
I
n
f
o
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
,
Un
i
v
er
s
it
y
o
f
B
asra
h
,
I
r
aq
E
m
ail:
m
as
h
h
ad
0
1
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
er
e
ar
e
m
an
y
u
s
a
g
es
an
d
ap
p
licatio
n
s
w
h
er
e
q
u
ick
r
e
s
p
o
n
s
e
(
QR
)
co
d
es
ar
e
s
ig
n
if
ican
t
l
y
in
v
o
l
v
ed
s
u
c
h
as
co
m
m
er
cial
p
r
o
d
u
cts,
tr
ac
k
in
g
an
d
m
o
n
ito
r
i
n
g
lab
ele
d
g
o
o
d
s
,
m
ar
k
eti
n
g
an
d
ad
v
er
t
is
in
g
,
id
en
ti
f
icatio
n
o
f
b
u
s
i
n
es
s
ca
r
d
s
,
s
ale
o
f
g
o
o
d
s
,
b
an
k
ac
co
u
n
ts
,
p
o
s
t
m
aili
n
g
,
v
ir
t
u
al
s
to
r
e,
i
m
m
i
g
r
atio
n
s
ta
m
p
s
a
n
d
en
ter
tai
n
m
e
n
t,
as
a
r
esu
lt,
i
n
m
a
n
y
o
th
er
cir
cu
m
s
tan
ce
s
,
w
h
er
e
s
h
ar
in
g
d
ata
is
n
ee
d
ed
an
y
o
b
j
ec
t
is
w
a
n
ted
.
[
1
,
2
]
.
W
ith
th
e
ar
is
e
o
f
e
-
Go
v
er
n
m
e
n
t
an
d
th
e
n
e
w
v
ie
w
o
f
th
e
au
to
m
ated
o
f
f
ice
t
h
at
m
a
k
e
th
e
o
f
f
ice
w
o
r
k
w
it
h
o
u
t
p
ap
er
s
as
p
o
s
s
i
b
le,
d
esp
ite
o
f
t
h
is
t
h
er
e
ar
e
s
o
m
e
s
p
ec
if
ic
t
y
p
e
s
o
f
w
o
r
k
th
at
ar
e
n
ee
d
ed
to
ac
co
m
p
li
s
h
ed
b
y
u
s
in
g
p
ap
er
d
o
cu
m
e
n
ts
.
Fo
r
ex
a
m
p
le,
o
f
f
icia
l
d
o
cu
m
e
n
t
-
is
s
u
ed
an
d
m
a
n
y
o
t
h
er
leg
al
d
o
cu
m
en
ts
,
li
k
e
a
d
r
iv
i
n
g
lice
n
s
e,
i
n
s
u
r
a
n
ce
d
o
cu
m
en
t,
b
ir
t
h
ce
r
tif
icate
,
p
a
s
s
p
o
r
t,
o
r
co
n
tr
ac
t th
e
s
e
d
o
cu
m
en
ts
n
ee
d
to
s
o
m
e
f
o
r
m
o
f
a
u
t
h
en
ticatio
n
to
v
er
if
y
t
h
e
d
o
cu
m
e
n
ts
.
T
h
is
s
it
u
atio
n
s
n
ee
d
to
s
p
ec
ialis
t
to
e
n
s
u
r
e
th
e
v
er
i
f
icatio
n
p
r
o
ce
s
s
f
r
o
m
t
h
is
t
y
p
e
o
f
d
o
cu
m
e
n
ts
.
T
h
e
g
o
v
er
n
m
e
n
ts
estab
li
s
h
ed
m
a
n
y
f
o
u
n
d
atio
n
s
th
at
ca
n
b
e
r
esp
o
n
s
ib
le
o
n
w
o
r
k
in
th
e
f
ield
o
f
f
o
r
en
s
ic
s
cie
n
ce
.
T
h
is
t
y
p
e
o
f
en
ter
p
r
is
e
m
a
y
u
s
e
s
o
m
e
s
p
ec
ial
to
o
ls
lik
e
a
m
ag
n
i
f
y
in
g
g
las
s
,
a
UV
la
m
p
o
r
an
in
f
r
ar
ed
ch
ec
k
er
[
3
,
4]
.
P
r
ac
tically
,
it i
s
s
o
h
ar
d
to
co
n
tr
o
l c
o
n
s
id
er
ab
le
q
u
an
tit
y
o
f
d
o
cu
m
e
n
ts
q
u
ick
l
y
u
s
i
n
g
tr
ad
iti
o
n
al
w
a
y
s
f
o
r
th
is
t
u
r
n
.
T
ax
s
p
ec
ialis
ts
as
a
s
a
m
p
le,
au
d
it
v
ar
io
u
s
ap
p
licatio
n
s
,
f
o
r
m
s
,
r
ec
eip
t
r
ec
eip
ts
,
a
cc
o
u
n
t
s
ta
te
m
e
n
t
s
,
d
o
cu
m
en
ts
an
d
o
th
er
o
f
f
icial
p
ap
er
s
ar
e
to
b
e
u
n
d
er
ch
ec
k
in
g
t
h
r
o
u
g
h
o
t
h
er
ag
en
c
ies
a
n
d
b
o
d
ies
in
w
h
ic
h
p
r
o
f
ess
io
n
al
s
ar
e
f
o
u
n
d
to
v
ali
d
ate
th
e
leg
ali
t
y
o
f
s
u
c
h
t
h
ese
in
s
tr
u
m
en
t
s
an
d
d
o
cu
m
en
ts
.
[
5
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
tw
o
-
fa
cto
r
a
u
t
h
en
tica
tio
n
to
ve
r
ify
p
a
p
er
-
b
a
s
ed
d
o
cu
men
ts
(
Ma
ysa
a
A
b
d
Ulka
r
ee
m
N
a
s
e
r
)
1835
I
n
th
is
s
t
u
d
y
,
it
is
s
u
g
g
e
s
ted
a
n
e
w
clo
u
d
co
m
p
u
t
in
g
f
r
a
m
e
w
o
r
k
tech
n
iq
u
e
t
h
at
ca
n
ap
p
ly
ed
o
n
tr
ad
itio
n
al
w
a
y
to
v
a
lid
ate
th
e
is
s
u
an
ce
o
f
d
o
cu
m
e
n
t
b
y
a
p
p
ly
i
n
g
en
co
d
in
g
a
n
d
p
r
in
t
th
e
u
n
iq
u
e
Q
R
co
d
e
on
p
ap
er
to
p
r
o
v
e
th
e
v
alid
it
y
o
f
th
e
p
ap
er
d
o
cu
m
e
n
t
.
T
h
is
C
o
d
e
o
f
u
n
iq
u
e
s
y
m
b
o
ls
ar
e
d
ec
o
d
ed
g
iv
in
g
s
a
m
e
in
f
o
r
m
atio
n
Q
R
C
o
d
e
i
n
cl
u
d
e
w
h
ic
h
ar
e
ab
le
to
b
e
r
ea
d
b
y
s
m
ar
t
p
h
o
n
e
a
n
d
it
co
u
ld
h
a
v
e
r
etr
iev
ed
i
n
f
o
r
m
a
tio
n
its
g
e
n
u
i
n
e
f
o
r
m
[
6
,
7
]
.
T
h
e
p
r
o
j
ec
t
is
co
n
s
is
ted
o
f
s
eq
u
en
c
ed
s
tag
es
b
y
w
h
ic
h
it
ca
n
b
e
v
alid
ated
th
e
leg
alit
y
o
f
d
o
cu
m
e
n
t
o
r
ce
r
tif
ied
a
s
s
h
o
w
n
in
F
i
g
u
r
e
1
.
T
h
e
s
u
m
m
ar
izat
io
n
o
f
t
h
e
tec
h
n
iq
u
e
s
ta
g
es
i
s
s
h
o
w
n
in
Fi
g
u
r
e
2.
Fig
u
r
e
1
.
A
p
r
o
p
o
s
ed
s
y
s
te
m
f
o
r
QR
co
d
e
g
en
er
atio
n
an
d
v
a
l
id
atio
n
u
s
in
g
m
o
b
ile
d
ev
ice
Fig
u
r
e
2
.
T
h
e
s
tag
es o
f
p
r
o
p
o
s
ed
tech
n
iq
u
e
QR
co
d
e
is
v
er
y
i
n
ter
ested
co
d
e
th
at
ca
n
b
e
u
s
ed
i
n
a
u
t
h
e
n
tica
tio
n
a
n
d
v
er
i
f
icatio
n
o
p
er
atio
n
s
,
b
ec
au
s
e
it
h
as
th
e
ab
ilit
y
to
h
o
ld
m
a
n
y
i
n
f
o
r
m
a
tio
n
th
at
ca
n
au
th
en
ticate
th
e
o
f
f
icial
d
o
cu
m
e
n
ts
.
T
h
er
e
ar
e
m
a
n
y
r
esear
ch
es
t
h
at
u
s
in
g
QR
co
d
e
in
a
u
t
h
e
n
ticatio
n
f
ield
s
.
I
n
[
8
]
th
e
ai
m
o
f
t
h
i
s
w
o
r
k
is
to
e
x
a
m
i
n
e
a
n
d
an
al
y
ze
th
e
b
est
t
y
p
e
o
f
QR
co
d
e
im
ag
e
b
y
ca
lcu
lati
n
g
th
e
P
SNR
an
d
MSE
v
alu
e
s
.
Usi
n
g
QR
C
o
d
e
im
ag
e
s
w
it
h
v
ar
io
u
s
i
m
a
g
e
f
ile
f
o
r
m
at
(
P
NG
a
n
d
J
P
G)
.
I
n
[
9
]
th
e
p
ap
er
p
r
o
p
o
s
ed
n
e
w
Q
R
co
d
e
u
s
i
n
g
t
w
o
s
to
r
a
g
e
le
v
els to
u
s
e
it
i
n
d
o
cu
m
en
t
au
t
h
e
n
ticatio
n
.
T
h
e
n
e
w
Q
R
co
d
e,
ca
lled
t
w
o
-
le
v
e
l
QR
co
d
e,
h
as
p
u
b
lic
a
n
d
p
r
iv
ate
s
to
r
ag
e
le
v
el
s
.
T
h
e
p
u
b
lic
lev
el
is
th
e
s
ta
n
d
ar
d
QR
co
d
e
s
to
r
ag
e
lev
e
l.
T
h
e
p
r
iv
ate
lev
e
l
i
s
ar
r
an
g
ed
b
y
s
u
b
s
titu
t
in
g
t
h
e
b
lac
k
s
q
u
ar
es
b
y
s
o
m
e
s
p
ec
ial
te
x
t
u
r
ed
ty
p
es.
I
t
in
c
lu
d
es
i
n
f
o
r
m
at
io
n
en
co
d
ed
u
tili
zi
n
g
q
-
ar
r
a
y
co
d
e
w
i
th
a
n
er
r
o
r
co
r
r
ec
tio
n
ca
p
ab
ilit
y
.
I
n
[
1
0
]
th
e
au
th
o
r
s
s
u
g
g
ested
QR
co
d
e
w
it
h
E
C
DS
A
(
elli
p
tic
cu
r
v
e
d
ig
ital
s
i
g
n
at
u
r
e
alg
o
r
ith
m
)
.
T
h
e
p
r
o
p
o
s
e
m
eth
o
d
u
s
i
n
g
t
w
o
le
v
els
;
p
u
b
lic
le
v
el
o
r
t
h
e
s
tan
d
ar
d
QR
an
d
p
r
iv
ate
lev
el
in
w
h
ic
h
ad
d
in
g
E
C
DS
A
to
in
cr
ea
s
e
th
e
s
ec
u
r
it
y
o
f
t
h
e
Q
R
.
F
u
r
t
h
er
m
o
r
e,
in
[
1
1
]
th
e
s
u
g
g
e
s
t
a
s
y
s
te
m
a
tic
Q
R
co
d
e
b
ea
u
tific
atio
n
f
r
a
m
e
w
o
r
k
th
at
p
er
m
it
a
n
in
d
i
v
id
u
al
u
s
er
to
p
er
s
o
n
alize
th
e
Q
R
co
d
e
th
e
y
cr
ea
te
(
f
o
r
in
s
tan
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
18
,
No
.
4
,
A
u
g
u
s
t 2
0
2
0
:
1
8
3
4
-
1
8
4
2
1836
a
QR
co
d
e
co
n
ta
in
i
n
g
co
n
tac
t
d
etails
m
ea
n
t
to
b
e
p
r
in
ted
o
n
a
b
u
s
i
n
es
s
ca
r
d
)
b
y
s
elec
ti
n
g
v
is
u
al
l
y
m
ea
n
i
n
g
f
u
l
m
o
d
el
s
.
I
n
[
1
2
]
th
e
o
r
ig
in
al
u
s
e
o
f
Q
R
co
d
es in
th
e
au
to
m
o
b
i
le
in
d
u
s
tr
y
,
QR
co
d
es c
an
b
e
u
s
ed
in
a
n
u
m
b
er
o
f
ar
ea
s
as
a
m
ea
n
s
to
s
u
p
p
o
r
t
in
ter
ac
tio
n
i
n
co
n
tr
o
lled
s
tatu
s
s
u
ch
as
i
n
ed
u
ca
tio
n
.
E
x
a
m
p
les
in
cl
u
d
e
m
ar
k
i
n
g
ass
es
s
m
en
t.
I
n
t
h
is
p
ap
er
,
th
e
s
y
s
te
m
cr
ea
tes
t
h
e
o
f
f
ic
ial
b
o
o
k
a
n
d
g
e
n
er
ate
s
a
QR
co
d
e
f
o
r
ea
ch
o
f
f
icia
l
b
o
o
k
b
ased
o
n
a
s
et
o
f
d
ata
th
at
is
r
e
ad
f
r
o
m
t
h
e
co
n
te
n
t
s
o
f
t
h
e
o
f
f
i
cial
b
o
o
k
an
d
en
cr
y
p
t
in
g
to
e
n
s
u
r
e
co
n
f
id
e
n
tialit
y
th
r
o
u
g
h
a
s
er
v
ice
p
r
o
v
id
er
w
h
ich
p
r
o
v
id
es
a
QR
s
er
v
ice
o
n
t
h
e
clo
u
d
.
QR
i
s
en
co
d
ed
an
d
s
en
t
to
th
e
s
er
v
er
to
b
e
s
to
r
ed
in
a
p
r
iv
ate
d
atab
ase
o
v
er
th
e
clo
u
d
f
r
a
m
e
w
o
r
k
.
T
h
e
im
p
o
r
tan
ce
o
f
r
esear
ch
lie
s
in
:
Min
i
m
izi
n
g
th
e
f
r
a
u
d
an
d
i
m
p
er
s
o
n
atio
n
t
h
at
ca
n
o
cc
u
r
as
a
r
esu
lt
o
f
t
h
e
ab
s
en
ce
o
f
a
p
r
ec
is
e
an
d
p
r
ec
is
e
m
ec
h
a
n
i
s
m
to
id
en
t
if
y
t
h
e
o
w
n
er
o
f
t
h
e
o
r
ig
i
n
al
b
o
o
k
th
at
i
s
r
elate
d
to
t
h
e
d
ata
an
d
co
n
te
n
t
o
f
th
e
o
f
f
icial
b
o
o
k
.
Min
i
m
ize
t
h
e
h
u
m
a
n
ef
f
o
r
t
in
t
h
e
p
r
o
ce
s
s
o
f
elec
tr
o
n
ic
a
u
d
iti
n
g
o
f
th
e
b
o
o
k
w
h
er
e
th
e
s
y
s
te
m
ca
n
a
u
d
it
f
as
t
an
d
g
u
ar
an
teed
a
n
d
n
o
n
-
er
r
o
r
to
m
o
s
t
o
f
t
h
e
o
f
f
ic
ial
b
o
o
k
s
is
s
u
ed
an
d
r
ec
ei
v
e
d
f
r
o
m
a
n
d
to
th
e
ad
m
i
n
i
s
tr
ativ
e
u
n
its
o
f
th
e
Un
i
v
er
s
it
y
o
r
I
n
s
tit
u
te.
T
h
e
d
ata
o
f
th
e
b
o
o
k
is
e
n
cr
y
p
t
ed
b
ef
o
r
e
co
n
v
er
tin
g
it
i
n
to
a
QR
co
d
e
s
o
th
at
t
h
e
d
ata
u
s
ed
i
n
t
h
e
QR
co
d
in
g
is
n
o
t
u
s
ed
a
n
d
th
e
b
in
ar
y
v
er
if
icatio
n
tech
n
o
lo
g
y
i
s
u
s
e
d
f
o
r
th
e
o
f
f
icia
l
b
o
o
k
t
o
p
r
ev
en
t
f
r
a
u
d
an
d
i
m
p
er
s
o
n
atio
n
.
T
h
er
ef
o
r
e,
th
e
m
eth
o
d
u
s
ed
in
t
h
is
s
tu
d
y
is
v
er
y
s
a
f
e
an
d
s
ec
u
r
e,
it
is
also
o
th
er
s
ea
r
ch
b
en
e
f
it
s
th
r
o
u
g
h
:
T
h
e
i
m
p
o
r
tan
ce
o
f
r
ed
u
cin
g
t
h
e
h
u
m
a
n
e
f
f
o
r
t
in
th
e
au
d
it
a
n
d
is
s
u
an
ce
o
f
t
h
e
v
alid
it
y
o
f
th
e
is
s
u
e
c
u
r
r
en
tl
y
in
p
lace
w
h
er
e
t
h
e
s
y
s
te
m
v
er
if
ies
t
h
e
v
alid
it
y
o
f
th
e
is
s
u
a
n
ce
in
e
lectr
o
n
ic
f
o
r
m
an
d
f
as
t
d
o
es
n
o
t
e
x
ce
ed
a
f
e
w
m
in
u
tes.
R
ed
u
ci
n
g
m
ater
ial
co
s
ts
d
u
e
t
o
th
e
p
u
r
ch
ase
o
f
eq
u
ip
m
e
n
t
o
r
eq
u
ip
m
e
n
t
f
o
r
th
e
co
d
in
g
o
f
o
f
f
icial
b
o
o
k
s
th
at
m
u
s
t b
e
p
u
r
ch
ased
f
o
r
ea
ch
ad
m
i
n
is
tr
ativ
e
u
n
it.
Min
i
m
ize
t
h
e
ti
m
e
lo
s
t i
n
th
e
v
alid
atio
n
p
r
o
ce
s
s
f
r
o
m
t
h
e
o
f
f
icial
b
o
o
k
s
i
s
s
u
ed
an
d
r
ec
eiv
e
d
.
2.
CL
O
UD
CO
M
P
UT
I
N
G
A
f
r
a
m
e
w
o
r
k
t
h
at
ca
n
p
r
o
v
id
e
a
f
it
an
d
d
e
m
an
d
-
d
r
iv
e
n
ac
ce
s
s
n
et
w
o
r
k
f
o
r
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
(
n
et
w
o
r
k
s
,
s
er
v
ices,
ap
p
licati
o
n
s
,
s
er
v
er
s
an
d
s
to
r
ag
e
s
)
th
at
ca
n
b
e
p
r
o
v
id
ed
in
q
u
ick
an
d
m
in
i
m
al
co
n
f
ig
u
r
in
g
ef
f
o
r
t
s
o
r
in
ter
ac
tio
n
,
th
er
e
a
r
e
f
o
u
r
f
r
a
m
w
o
r
k
s
:
p
r
iv
a
te,
p
u
b
lic,
co
m
m
u
n
it
y
an
d
h
y
b
r
id
clo
u
d
[
1
3
]
.
C
lo
u
d
co
m
p
u
ti
n
g
ca
n
b
e
u
s
ed
to
s
to
r
e
a
lar
g
e
a
m
o
u
n
t
o
f
d
ata
w
it
h
t
h
e
ab
ilit
y
to
ac
ce
s
s
t
h
ese
d
ata
b
y
an
y
s
m
ar
t
d
ev
ices
s
u
c
h
as
s
m
ar
t
p
h
in
e,
I
p
ad
,
tab
let
an
d
etc
f
r
o
m
an
y
p
lace
in
th
e
w
o
r
d
u
s
i
n
g
t
h
e
I
n
ter
n
et
o
r
I
n
tr
an
et
at
an
y
ti
m
e.
Mo
s
t o
f
co
m
b
an
ie
s
to
d
a
y
h
a
v
e
ten
d
ed
to
ex
p
lo
it th
e
s
er
v
ices
p
r
o
v
id
ed
b
y
clo
u
d
co
m
p
u
ti
n
g
b
ec
au
s
e
o
f
its
v
er
y
b
en
ef
it
s
s
u
ch
a
s
[
1
4
,
1
5
]
:
Ver
y
h
i
g
h
s
to
r
ag
e
ca
p
ac
it
y
.
Fas
t p
r
o
ce
s
s
i
n
g
ca
p
ab
ilit
y
.
E
ase
o
f
u
s
e.
R
e
m
o
te
ac
ce
s
s
f
r
o
m
an
y
w
h
er
e
an
d
an
y
ti
m
e.
T
h
e
p
o
s
s
ib
ilit
y
o
f
u
s
i
n
g
t
h
e
cl
o
u
d
s
er
v
ices o
f
f
er
ed
w
it
h
lo
w
co
s
t.
C
lo
u
d
co
m
p
u
ti
n
g
p
r
o
v
id
e
t
h
e
cu
s
to
m
er
s
an
d
u
s
er
s
to
w
o
r
k
w
ith
p
lat
f
o
r
m
a
s
a
s
er
v
ice
(
P
aa
S),
i.e
;
d
if
f
er
e
n
t
o
p
er
atin
g
s
y
s
te
m
s
(
OSs
)
as
u
s
er
n
ed
d
ed
,
in
f
r
astru
ctu
r
e
as
a
s
er
v
ice
(
I
aa
S),
i.e
;
s
to
r
ag
es,
s
er
v
er
s
an
d
So
f
t
w
ar
e
as
a
s
er
v
ice
(
Saa
S),
i.e
.
;
ap
p
licatio
n
lev
el
p
r
o
g
r
a
m
s
.
T
h
ese
s
er
v
ice
s
m
o
d
els
ca
n
b
e
p
r
o
v
id
ed
b
y
m
an
y
clo
u
d
v
e
n
d
o
r
s
(
e.
g
.
,
a
m
az
o
n
w
eb
s
er
v
ice
s
(
A
W
S)
f
r
o
m
Am
az
o
n
.
co
m
,
Go
o
g
le
A
p
p
E
n
g
i
n
e
f
r
o
m
Go
o
g
le.
co
m
,
an
d
A
zu
r
e
f
r
o
m
M
icr
o
s
o
f
t.c
o
m
)
b
ased
o
n
p
a
y
m
e
n
t
a
s
m
u
c
h
u
s
e
[
1
6
]
.
T
h
e
clo
u
d
co
m
p
u
ti
n
g
s
er
v
ice
m
o
d
els
ca
n
b
e
s
h
o
w
n
i
n
Fi
g
u
r
e
3.
Fig
u
r
e
3
.
C
lo
u
d
co
m
p
u
ti
n
g
m
o
d
els
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
tw
o
-
fa
cto
r
a
u
t
h
en
tica
tio
n
to
ve
r
ify
p
a
p
er
-
b
a
s
ed
d
o
cu
men
ts
(
Ma
ysa
a
A
b
d
Ulka
r
ee
m
N
a
s
e
r
)
1837
2
.
1
.
Clo
ud
co
m
pu
t
ing
s
ec
uri
t
y
C
lo
u
d
s
ec
u
r
it
y
ca
n
b
e
r
ea
ch
b
y
ap
p
lin
g
d
i
f
f
er
en
t
t
y
p
es
o
f
s
ec
u
r
it
y
tech
n
iq
u
es
to
a
v
o
id
th
e
b
r
ea
ch
s
a
n
d
h
ac
k
i
n
g
o
f
t
h
e
clo
u
d
d
ata
o
r
s
er
v
ices
t
h
is
s
o
lu
tio
n
ca
n
b
e
ac
h
iev
ed
u
s
i
n
g
cr
y
p
to
g
r
ap
h
y
[
1
7
]
.
C
r
y
p
to
g
r
ap
h
y
i
s
th
e
s
cie
n
ce
th
at
s
tu
d
y
t
h
e
i
n
f
o
r
m
atio
n
s
ec
u
r
it
y
an
d
p
r
ese
n
t
th
e
i
n
f
o
r
m
atio
n
p
r
o
tectio
n
tech
n
iq
u
es
ag
a
in
s
t
u
n
a
u
t
h
o
r
ized
ac
ce
s
s
.
T
h
e
cr
y
p
to
g
r
ap
h
y
ca
n
b
e
ap
p
lied
b
y
co
n
v
er
ti
n
g
th
e
cr
itical
d
ata
in
to
a
f
o
r
m
th
at
ca
n
n
o
t
r
ea
d
b
y
at
tck
er
s
i
f
t
h
e
attac
k
e
r
s
ca
n
g
et
th
i
s
d
ata.
T
h
er
e
ar
e
m
a
n
y
g
o
al
s
o
f
cr
y
p
to
g
r
ap
h
y
,
th
e
m
ai
n
g
o
al
is
to
m
ai
n
tai
n
d
ata
in
a
s
ec
u
r
e
w
a
y
to
k
ee
p
it
f
r
o
m
u
n
a
u
t
h
o
r
ized
u
s
er
s
.
B
y
u
s
i
n
g
cr
y
p
to
g
r
ap
h
y
,
th
e
d
ata
s
u
ch
as
tex
t
,
v
o
ice,
v
id
eo
an
d
im
ag
e
ca
n
b
e
s
to
r
ed
o
r
tr
an
s
f
er
r
ed
o
n
th
e
n
etw
o
r
k
f
r
o
m
s
id
e
to
s
id
e
in
a
s
ec
u
r
e
m
an
er
th
at
ca
n
n
o
t
b
e
r
ea
d
f
r
o
m
t
h
e
at
tack
er
s
w
h
o
m
a
y
e
v
esd
r
o
p
in
g
o
f
th
i
s
d
ata.
C
r
y
p
to
g
r
ap
h
y
p
r
o
v
id
es
m
an
y
s
ec
u
r
it
y
g
o
a
ls
s
u
c
h
as [
1
8
]
:
Au
t
h
en
t
icatio
n
:
T
h
e
p
u
r
p
o
s
e
o
f
th
e
au
th
e
n
ticat
io
n
is
to
en
s
u
r
e
u
s
er
id
en
tit
y
.
T
h
e
g
o
al
is
to
p
r
ev
en
t
u
n
a
u
t
h
o
r
ized
u
s
er
s
f
r
o
m
ac
ce
s
s
in
g
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
.
C
o
n
f
id
en
tia
lit
y
:
T
h
e
p
u
r
p
o
s
e
o
f
co
n
f
id
e
n
tialit
y
is
to
g
r
a
n
t
t
h
e
ac
ce
s
s
to
th
e
d
ata
b
y
t
h
e
au
th
o
r
ized
p
er
s
o
n
s
o
n
l
y
to
p
r
o
tect
d
ata
f
r
o
m
u
n
au
th
o
r
ized
p
er
s
o
n
s
.
Data
I
n
teg
r
it
y
:
T
h
e
g
o
al
o
f
d
ata
in
te
g
r
it
y
i
s
to
en
s
u
r
e
th
er
e
ar
e
n
o
m
o
d
i
f
icatio
n
,
f
ab
r
icatio
n
,
d
eletio
n
f
r
o
m
an
au
t
h
o
r
ized
p
er
s
o
n
s
.
No
n
-
R
ep
u
d
iatio
n
: th
e
g
o
al
is
t
o
en
s
u
r
e
a
n
d
p
r
o
v
e
th
e
p
er
s
o
n
w
h
o
s
en
d
o
r
r
ec
eiv
e
th
e
d
ata.
A
cc
e
s
s
C
o
n
tr
o
l: T
h
e
g
o
al
is
to
g
r
an
t t
h
e
p
er
m
is
s
io
n
to
ac
ce
s
s
th
e
d
ata
to
th
e
au
t
h
o
r
ized
u
s
er
o
n
l
y
.
3.
B
ASI
CS O
F
Q
R
CO
DE
QR
C
o
d
e
is
a
b
ar
co
d
e
o
f
tw
o
v
ec
to
r
s
.
i.e
.
,
it
is
s
ca
n
n
ed
b
y
t
w
o
v
ec
to
r
s
.
Ver
ticall
y
a
n
d
h
o
r
izo
n
tall
y
.
I
t
ca
n
b
e
k
ep
t
d
ate
m
o
r
e
th
an
o
n
e
v
ec
to
r
b
ar
co
d
e.
T
h
en
ce
,
it
is
s
u
g
g
e
s
ted
QR
co
d
e
n
ee
d
s
m
o
r
e
d
ev
elo
p
ed
tech
n
o
lo
g
y
o
f
r
ea
d
in
g
.
Q
R
co
d
ed
is
d
ef
in
ed
b
y
I
SO/
I
E
C
1
8
8
0
4
I
n
d
u
s
tr
ial
s
p
ec
if
icat
io
n
.
H
o
w
e
v
er
,
it is
cr
ea
ted
an
d
p
r
o
tecte
d
b
y
Den
s
o
W
av
e
J
ap
an
ese
C
o
r
p
o
r
atio
n
1
9
9
4
.
T
h
e
m
ai
n
ai
m
i
s
to
d
ev
elo
p
th
is
tec
h
n
o
lo
g
y
i
s
to
s
u
p
p
o
r
t u
s
er
s
to
en
co
d
e
an
d
r
ea
d
th
eir
o
w
n
in
f
o
r
m
at
io
n
ea
s
il
y
[
19
]
.
A
s
s
h
o
w
n
i
n
F
i
g
u
r
e
4
.
Fig
u
r
e
4
.
Stru
ct
u
r
e
an
d
co
m
p
o
n
en
t
s
o
f
Q
R
co
d
e
3
.
1
.
T
ec
hn
o
lo
g
y
QR
co
d
e
ch
a
n
g
ed
th
e
p
r
o
b
ab
le
u
s
a
g
e
a
n
d
p
u
r
p
o
s
e
o
f
th
e
co
d
ed
s
ig
n
[
2
0
]
.
I
t
co
n
tai
n
s
b
i
-
v
ec
to
r
s
in
f
o
r
m
atio
n
w
h
ile
t
h
e
tr
ad
iti
o
n
al
b
ar
co
d
e
w
as
co
n
s
i
s
ted
o
f
to
n
e
v
ec
to
r
o
f
d
ata;
th
at
i
s
,
th
e
v
e
r
tica
l
o
n
e.
T
h
e
p
r
o
ce
s
s
to
r
ec
o
g
n
ize
b
ar
co
d
e
ar
e
[
2
1
]
:
Dete
ctin
g
o
u
ter
p
o
in
t
R
ec
o
g
n
ize
s
h
ap
e.
I
d
en
tify
co
n
tr
o
l b
ar
o
f
b
ar
co
d
e
.
Dis
co
v
er
b
ar
co
d
e
aim
.
Vec
to
r
s
an
d
b
it in
te
n
s
it
y
to
u
s
e
b
ar
co
d
e
.
C
o
m
p
u
tin
g
v
alu
e
o
f
b
ar
co
d
e.
T
h
e
f
o
llo
w
i
n
g
p
o
in
ts
ar
e
in
cl
u
d
ed
w
ith
i
n
Q
R
co
d
e
;
C
o
n
f
i
g
u
r
atio
n
P
atter
n
is
u
s
e
d
to
r
ec
tif
y
m
is
s
tate
m
e
n
t
in
QR
co
d
e
m
a
y
o
cc
u
r
b
y
i
n
p
u
t
co
d
es
o
n
cu
r
v
ed
p
lan
s
.
T
im
i
n
g
p
atter
n
i
s
u
s
ed
to
ap
p
o
in
t
m
ai
n
co
o
r
d
in
ate
o
f
ea
c
h
ce
l
l
w
ith
in
QR
co
d
e
b
y
b
lac
k
a
n
d
w
h
ite
u
n
it
s
ar
e
o
r
d
er
e
d
alter
n
ativ
el
y
f
o
r
th
is
t
u
r
n
.
No
is
eless
Z
o
n
e:
it
i
s
a
v
er
g
e
s
p
ac
e
m
ak
e
s
d
etec
tio
n
o
f
Q
R
c
o
d
e
m
o
s
t
ea
s
e.
Fo
u
r
ce
lls
ar
e
to
b
e
f
o
u
n
d
f
o
r
th
is
z
o
n
e.
Data
ar
ea
:
W
ith
in
QR
co
d
e,
t
h
er
e
is
ar
ea
co
n
tain
s
d
ata
ar
e
en
co
d
ed
b
y
B
in
ar
y
n
u
m
b
er
s
(
s
u
c
h
as
UR
L
)
an
d
also
in
cl
u
d
e
r
ee
d
-
s
o
lo
m
o
n
co
d
e
to
c
o
r
r
ec
t e
r
r
o
r
s
.
[
2
2
,
2
3
]
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
18
,
No
.
4
,
A
u
g
u
s
t 2
0
2
0
:
1
8
3
4
-
1
8
4
2
1838
3
.
2
.
Q
R
co
de
cha
ra
ct
er
is
t
ics
(
2
D)
b
ar
c
o
d
es
u
s
u
al
l
y
h
a
v
e
h
ig
h
-
d
en
s
it
y
d
ata
s
to
r
ag
e
ca
p
ac
it
y
f
o
r
a
lar
g
e
v
o
l
u
m
e
o
f
d
ata
w
i
th
i
n
a
tin
y
v
o
lu
m
e.
Q
R
co
d
e,
”
is
r
o
b
u
s
t sin
ce
it
i
s
ap
p
licatio
n
,
th
e
ap
p
licatio
n
is
w
o
r
k
o
n
a
n
y
d
e
v
ice
a
n
d
w
o
r
k
w
i
t
h
an
y
d
ata,
an
d
w
it
h
p
r
o
ce
ed
in
g
c
h
ar
ac
ter
is
tics
i
n
ter
m
s
o
f
s
ec
u
r
it
y
,
er
r
o
r
d
etec
tio
n
,
a
n
d
c
o
r
r
ec
tio
n
ca
p
ab
ilit
y
,
as
w
e
ll
as
th
e
ab
ili
t
y
to
en
co
d
e
d
if
f
er
e
n
t
lan
g
u
ag
e
s
”.
[
2
4
]
Q
R
co
d
e
is
a
2
D
b
ar
co
d
e
th
at
w
a
s
d
ev
elo
p
ed
b
y
Den
s
o
W
a
v
e
i
n
1994
f
o
r
tr
ac
k
in
g
p
ar
ts
i
n
v
eh
ic
le
m
an
u
f
a
ctu
r
in
g
.
T
h
e
d
ec
o
d
in
g
is
e
x
e
cu
ted
au
to
m
atica
ll
y
an
d
ea
s
il
y
:
s
o
m
e
f
r
ee
ad
d
-
o
n
s
o
f
t
w
ar
e
(
e.
g
.
,
Qu
ick
Ma
r
k
an
d
E
n
ig
m
a
R
ea
d
er
s
)
ca
n
test
,
r
ea
d
,
an
d
d
ec
o
d
e
QR
co
d
e
ea
s
il
y
b
y
p
u
tti
n
g
th
e
d
ev
ice
b
ef
o
r
e
co
d
e
.
[
2
5
]
.
QR
is
co
n
s
is
ted
o
f
3
6
0
d
eg
r
ee
leg
ib
le
b
lack
an
d
w
h
ite
q
u
ad
r
an
g
le
s
.
T
h
e
q
u
ic
k
r
esp
o
n
s
e
co
d
e
ca
n
b
e
s
a
v
ed
in
s
e
v
er
al
m
o
d
es
s
u
c
h
as
co
m
m
u
n
i
ca
tio
n
d
ata,
i
m
ag
e
an
d
v
id
eo
lin
k
s
,
p
lain
tex
t,
etc.
I
t
is
also
r
ec
o
g
n
ized
as
UR
L
.
T
h
e
s
to
r
ag
e
lev
el
o
f
QR
co
d
es
ca
n
b
e
s
o
r
ted
u
p
to
7
,
0
8
9
ch
ar
ac
ter
s
o
f
in
f
o
r
m
a
tio
n
,
w
h
ich
is
v
er
y
lar
g
e
i
n
co
m
p
ar
i
s
o
n
w
ith
1
D
(
o
n
e
v
ec
to
r
)
b
ar
co
d
e
.
E
n
co
d
in
g
p
r
o
ce
s
s
ab
le
to
tr
ea
t
s
tr
in
g
s
e
t
o
f
QR
co
d
e,
an
d
Nu
m
b
er
s
(
0
-
9
)
,
A
lp
h
ab
ets
(
u
p
p
er
ca
s
e
A
-
Z
)
,
Nin
e
Sp
ec
ial
ch
ar
ac
ter
s
(
%
*
+
-
/ _
$
)
an
d
Kan
j
i c
h
ar
ac
ter
s
[
2
6
,
2
7
]
.
3
.3
.
Adv
a
nt
a
g
es o
f
a
pp
ly
ing
Q
R
Co
de
Op
en
s
o
u
r
ce
tech
n
iq
u
es
Fre
e
ap
p
licatio
n
s
.
Si
m
p
le
r
u
n
n
i
n
g
p
r
o
ce
d
u
r
e.
User
ea
s
y
p
r
o
ce
s
s
.
I
t
n
ee
d
s
n
o
co
m
p
le
x
n
o
r
s
p
ec
ial
ac
q
u
ain
ta
n
ce
o
f
u
s
er
s
to
ap
p
ly
Q
R
co
d
e,
lik
e
s
m
ar
t
p
h
o
n
es
ar
e
n
ee
d
to
ac
tiv
ate
QR
co
d
e.
I
n
ad
d
it
io
n
to
QR
co
d
e
s
ca
n
n
er
,
it
is
also
b
ein
g
u
s
ed
to
m
a
k
e
d
el
iv
er
y
s
er
v
ices
t
h
at
av
ailab
le
b
y
in
f
o
r
m
a
tics
lib
r
a
r
ies.
Fu
r
t
h
er
,
it
is
also
w
o
r
t
h
y
to
d
is
tr
ib
u
te
in
f
o
r
m
a
tio
n
a
n
d
last
tech
n
o
lo
g
y
k
n
o
w
led
g
e
f
o
r
all
u
s
er
s
.
I
t
ca
n
b
e
u
s
ed
to
lin
k
i
n
s
tan
t
l
y
w
it
h
all
n
ec
es
s
ar
y
r
eso
u
r
ce
s
li
k
e
(
in
s
tit
u
tio
n
al
d
i
g
ital
r
ep
o
s
i
to
r
y
,
W
eb
-
OP
AC
,
e
-
R
e
s
o
u
r
ce
s
,
lib
r
ar
y
w
eb
s
ite,
lib
r
ar
y
g
u
id
e
)
.
Ne
w
ac
ce
s
s
w
a
y
s
a
n
d
r
est
o
f
v
al
u
ab
le
p
r
o
p
er
ties
o
f
th
e
lib
r
ar
y
q
u
ick
l
y
an
d
th
e
ti
m
e
o
f
u
s
er
s
d
o
es
n
o
t
w
a
s
te,
it
p
r
o
v
id
es
also
s
m
all
s
p
ac
e
th
at
ca
n
b
e
s
to
r
e
a
h
u
g
e
d
ata
s
ize.
4.
CRYP
T
O
G
RAP
H
I
C
H
A
SH
F
UNCTI
O
N
A
h
a
s
h
f
u
n
ct
io
n
ca
n
b
e
ac
ce
p
tin
g
v
ar
iab
le
-
le
n
g
th
m
es
s
ag
e
a
n
d
p
r
o
d
u
ce
s
co
n
s
tan
t
le
n
g
th
h
as
h
m
e
s
s
a
g
e
d
ig
est,
it
d
o
es
n
o
t
n
ee
d
an
y
k
e
y
i
n
it
s
w
o
r
k
[
2
8
]
.
T
h
e
h
ash
f
u
n
ct
io
n
n
ec
e
s
s
ar
y
f
o
r
s
ec
u
r
it
y
i
m
p
le
m
e
n
tatio
n
s
is
m
en
tio
n
ed
to
as
a
R
o
le
o
f
E
n
c
o
d
in
g
H
as
h
f
u
n
ctio
n
,
t
h
at
h
a
s
h
f
u
n
ctio
n
i
s
co
m
p
u
ta
tio
n
all
y
i
n
f
ea
s
ib
le
to
d
is
co
v
er
a
m
e
s
s
a
g
e
o
r
th
e
h
ash
v
al
u
e
th
at
is
id
en
tical
f
o
r
t
w
o
[
2
9
]
.
A
t
m
o
s
t
ti
m
e
s
th
e
h
as
h
v
al
u
e
is
s
ec
u
r
ed
b
y
u
s
in
g
en
cr
y
p
tio
n
tec
h
n
iq
u
es.
T
h
e
ter
m
r
o
le
o
f
en
co
d
in
g
th
at
h
a
s
b
ee
n
u
s
ed
in
co
m
p
u
ter
ap
p
licatio
n
f
r
o
m
r
ea
s
o
n
ab
l
y
lo
n
g
ti
m
e
is
r
e
f
er
r
ed
to
a
r
o
le
u
s
e
s
s
tr
in
g
o
f
ar
b
itra
r
y
i
n
p
u
t t
o
a
s
tr
in
g
o
f
f
i
x
ed
len
g
th
.
Ho
w
e
v
er
,
s
h
o
u
ld
it
m
ee
t
s
o
m
e
ex
tr
a
n
ee
d
s
(
as d
etailed
f
u
r
t
h
er
)
,
th
e
n
it c
an
b
e
ap
p
lied
f
o
r
en
co
d
in
g
ap
p
licatio
n
s
w
h
i
ch
is
k
n
o
w
n
a
s
r
o
le
o
f
en
co
d
in
g
h
a
s
h
.
R
o
les
o
f
e
n
co
d
in
g
h
a
s
h
ar
e
o
n
e
o
f
th
e
m
o
s
t
i
m
p
o
r
tan
t
to
o
ls
in
t
h
e
f
ield
o
f
en
co
d
in
g
an
d
ar
e
ap
p
lied
to
r
ea
lize
g
r
o
u
p
o
f
co
n
f
id
en
ce
s
ec
u
r
e
p
u
r
p
o
s
es s
u
c
h
as a
u
t
h
e
n
ticit
y
,
d
i
g
ital
m
o
n
o
g
r
a
m
s
,
q
u
asi
n
u
m
b
er
g
en
er
atio
n
,
d
ig
i
tal
h
id
in
g
s
ec
r
et
d
ata
in
s
o
r
tin
g
m
o
d
e,
an
d
r
e
al
ti
m
e
s
ta
m
p
i
n
g
,
Fi
g
u
r
e
5
s
h
o
w
s
t
h
e
s
tr
u
ct
u
r
e
o
f
MD
5
r
o
le
o
f
h
ash
f
u
n
ctio
n
;
i.e
.
,
it
is
ap
p
lied
f
o
r
m
i
n
th
e
p
r
o
p
o
s
ed
r
esear
ch
[
3
0
]
.
T
h
e
en
cr
y
p
t
io
n
tech
n
iq
u
es
ca
n
b
e
ad
d
in
g
to
en
cr
y
p
t th
e
Ha
s
h
f
u
n
ctio
n
; a
n
y
m
et
h
o
d
s
ca
n
b
e
u
s
ed
to
en
cr
y
p
t t
h
e
h
a
s
h
f
u
n
ct
i
o
n
.
Fig
u
r
e
5
.
Stru
ct
u
r
e
o
f
MD
5
h
a
s
h
f
u
n
ctio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
tw
o
-
fa
cto
r
a
u
t
h
en
tica
tio
n
to
ve
r
ify
p
a
p
er
-
b
a
s
ed
d
o
cu
men
ts
(
Ma
ysa
a
A
b
d
Ulka
r
ee
m
N
a
s
e
r
)
1839
Def
i
n
itio
n
:
A
h
a
s
h
f
u
n
ct
io
n
is
a
f
u
n
ctio
n
h
: D
→
R,
w
h
er
e
th
e
d
o
m
ai
n
,
D
=
{0
,
1
}
*
a
nd
R
=
{0
,
1
}
n f
o
r
s
o
m
e
n >=
1
(
1
)
r
o
le
o
f
h
as
h
f
u
n
c
tio
n
ar
e
ap
p
r
o
x
i
m
atel
y
d
iv
id
ed
i
n
to
t
w
o
k
in
d
s
;
i.e
.
,
Ma
i
n
e
R
o
le
s
o
f
h
as
h
f
u
n
ctio
n
;
th
e
o
n
e
t
h
at
u
s
e
s
ec
r
et
k
e
y
,
an
d
h
a
s
h
w
it
h
o
u
t
k
e
y
.
T
h
e
f
ir
s
t
t
y
p
e
is
k
n
o
w
n
a
s
m
e
s
s
a
g
e
o
f
au
t
h
e
n
ticati
o
n
co
d
e
.
Gen
er
ally
,
th
e
ter
m
h
as
h
f
u
n
ctio
n
s
r
e
f
er
to
h
as
h
th
at
d
o
es
n
o
t
u
s
ed
k
e
y
s
.
I
n
t
h
i
s
p
ap
er
,
w
e
w
ill
f
o
cu
s
o
n
h
as
h
o
n
l
y
n
o
t
MA
C
.
Has
h
f
u
n
ct
io
n
(
s
o
m
e
ti
m
e
also
k
n
o
w
n
as
MD
C
-
Me
s
s
ag
e
Dec
o
d
in
g
C
o
d
e)
ca
n
d
iv
id
ed
in
to
OW
HF
(
o
n
e
d
ir
ec
tio
n
h
as
h
f
u
n
ct
io
n
)
,
C
R
HF
(
co
llis
io
n
r
e
s
is
ta
n
t
h
o
d
g
ep
o
d
g
e
)
an
d
UOW
HF
(
u
n
i
v
er
s
a
l
o
n
e
d
ir
ec
tio
n
h
as
h
f
u
n
ctio
n
)
[
3
1
,
3
2
]
.
5.
AUTHE
NT
I
CA
T
I
O
N
T
E
C
H
NIQ
U
E
I
n
th
i
s
w
o
r
k
t
h
e
d
ata
b
ase
h
as
b
ee
n
cr
ea
te
to
h
o
ld
th
e
d
ata
o
f
all
d
o
cu
m
e
n
ts
,
t
h
e
d
atab
ase
i
s
s
to
r
ed
o
v
er
th
e
clo
u
d
to
ex
ec
u
te
th
e
s
ec
u
r
i
t
y
p
r
o
ce
s
s
es o
n
l
in
e.
T
h
e
tab
le
o
f
d
ata
co
n
tain
s
th
e
f
o
llo
w
i
n
g
f
ield
s
:
User
n
a
m
e
T
itle o
f
th
e
d
o
cu
m
e
n
t
I
s
s
u
e
d
ate
I
D
Nu
m
b
er
f
o
r
d
o
cu
m
en
t
T
h
e
n
a
m
e
o
f
t
h
e
s
id
e
it
m
a
y
c
o
n
s
id
er
R
an
d
o
m
n
u
m
b
er
QR
C
o
d
e
5
.1
.
Aut
hentic
a
t
io
n
ph
a
s
e
T
h
e
s
y
s
tem
u
s
in
g
c
l
o
u
d
c
o
m
p
u
t
i
n
g
t
o
s
av
e
t
h
e
d
a
t
a
o
f
o
f
f
i
c
i
al
d
o
c
u
m
en
ts
an
d
p
r
o
c
e
s
s
in
g
th
e
o
p
e
r
a
t
i
o
n
s
f
o
r
p
r
o
d
u
c
in
g
th
e
QR
,
t
o
v
e
r
if
i
ca
t
i
o
n
th
e
o
f
f
i
c
ia
l
d
o
c
u
m
en
ts
.
B
y
u
s
in
g
t
h
e
QR
in
th
e
a
d
m
in
is
t
r
at
iv
e
u
n
i
ts
in
t
h
e
u
n
iv
e
r
s
i
ty
w
il
l
p
r
o
v
i
d
e
th
e
a
b
i
l
i
ty
t
o
s
a
v
e
a
u
t
h
e
n
t
i
c
at
e
d
d
at
a
i
n
t
h
e
s
e
r
v
e
r
o
n
th
e
cl
o
u
d
w
i
t
h
s
e
cu
r
e
a
c
c
es
s
t
o
u
s
e
r
d
o
cu
m
en
ts
.
T
h
e
I
n
t
e
r
n
e
t
c
o
n
jo
i
n
tly
f
a
ci
l
it
a
t
es
th
e
ex
ch
an
g
e
o
f
d
o
c
u
m
en
t
s
w
it
h
r
eg
is
t
er
e
d
e
x
t
e
r
n
a
l
a
s
p
ec
t
t
h
r
o
u
g
h
e
n
c
r
y
p
t
e
d
QR
s
h
a
r
i
n
g
C
o
d
e
.
T
a
b
l
e
1
s
h
o
w
s
t
h
e
n
o
t
a
t
i
o
n
s
u
s
e
d
th
r
o
u
g
h
o
u
t
o
u
r
p
r
o
p
o
s
e
d
t
e
c
h
n
i
q
u
e.
T
h
e
s
t
e
p
s
p
r
o
c
e
d
u
r
e
o
f
th
e
p
r
o
p
o
s
e
d
s
y
s
t
em
is
a
s
f
o
l
l
o
w
s
:
I
n
p
u
t P
h
ase
(
C
r
ea
te
Q
R
)
S
tep
1:
A
t
t
h
is
s
tag
e,
i
n
f
o
r
m
atio
n
ab
o
u
t
th
e
d
o
cu
m
e
n
t
(
N,
D,
A
D,
AT
,
X)
,
as
Sh
o
w
n
in
T
ab
le
1
ar
e
en
cr
y
p
ted
u
s
i
n
g
Has
h
alg
o
r
it
h
m
Step
2
:
co
m
p
u
te
=
(
∥
∥
∥
)
Step
3
:
I
n
th
is
s
tep
,
XOR
Op
er
atio
n
b
et
w
ee
n
th
e
n
a
m
e
o
f
th
e
p
er
s
o
n
an
d
th
e
r
an
d
o
m
n
u
m
b
er
an
d
th
e
p
r
o
ce
s
s
o
u
tp
u
t is e
n
cr
y
p
ted
u
s
i
n
g
t
h
e
Hash
A
l
g
o
r
it
h
m
T
h
u
s
en
s
u
r
i
n
g
co
n
f
id
en
tia
lit
y
o
f
in
f
o
r
m
a
tio
n
in
t
h
e
s
er
v
er
.
C
o
m
p
u
te
=
ℎ
(
⨁
)
Step
4
:
Af
ter
co
m
p
leti
n
g
t
h
e
p
r
ev
io
u
s
s
tep
,
th
e
d
o
cu
m
e
n
t
i
n
f
o
r
m
atio
n
i
s
en
cr
y
p
ted
b
y
h
as
h
alg
o
r
ith
m
an
d
th
e
r
an
d
o
m
n
u
m
b
er
is
m
e
r
g
ed
in
o
r
d
er
t
o
s
to
r
e
it
in
QR
.
b
ec
au
s
e
w
e
n
ee
d
it
later
to
en
cr
y
p
ted
n
a
m
e
i
n
th
e
n
e
x
t s
tep
s
.
C
o
m
p
u
te
=
(
ℎ
(
)
)
∥
)
Step
5
:
Gen
er
ate
w
ith
in
f
o
r
m
atio
n
Step
6
:
P
r
in
t
o
n
th
e
d
o
cu
m
e
n
t
Step
7
:
Sav
e
&
to
clo
u
d
s
er
v
er
.
T
h
e
h
ash
v
alu
e
h
is
ca
n
b
e
s
to
r
ed
in
a
QR
co
d
e
Sav
e
Q
R
in
d
o
cu
m
e
n
t
'
s
T
ab
le
1
.
T
h
e
n
o
tatio
n
s
u
s
ed
th
r
o
u
g
h
o
u
t o
u
r
p
r
o
p
o
s
ed
tech
n
i
q
u
e
N
o
t
a
t
i
o
n
D
e
scri
p
t
i
o
n
N
o
t
a
t
i
o
n
D
e
scri
p
t
i
o
n
Q
u
i
c
k
e
s
p
o
n
se
c
o
d
e
'
Q
R
c
u
r
r
e
n
t
I
D
N
u
mb
e
r
o
f
D
o
c
u
me
n
t
s
Q
R
i
n
c
l
o
u
d
se
r
v
e
r
D
a
t
e
o
f
D
o
c
u
me
n
t
N
a
me
o
f
u
se
r
T
i
t
l
e
o
f
D
o
c
u
me
n
t
'
N
a
me
o
f
u
se
r
c
u
r
r
e
n
t
A
d
d
r
e
ss T
o
=
?
C
o
mp
a
r
i
so
n
b
e
t
w
e
e
n
t
w
o
si
d
e
∥
C
o
n
c
a
t
e
n
a
t
i
o
n
o
p
e
r
a
t
i
o
n
R
a
n
d
o
m
n
u
m
b
e
r
⨁
X
O
R
o
p
e
r
a
t
i
o
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
18
,
No
.
4
,
A
u
g
u
s
t 2
0
2
0
:
1
8
3
4
-
1
8
4
2
1840
5
.
2
.
Ver
if
ica
t
io
n
ph
a
s
e
Au
t
h
en
t
icatio
n
clo
u
d
s
er
v
er
o
f
f
er
s
s
tr
o
n
g
au
t
h
e
n
ticatio
n
an
d
v
alid
atio
n
o
f
d
ata,
th
e
d
ata
au
t
h
en
t
icate
d
is
u
s
i
n
g
QR
co
d
e
th
at
allo
w
s
f
o
r
th
e
e
lev
ated
u
s
er
s
u
itab
ilit
y
w
h
ile
m
ai
n
tai
n
i
n
g
t
h
e
ele
v
a
ted
s
ec
u
r
it
y
.
Her
e
co
n
ce
al
m
e
n
t
s
ec
r
et
i
n
f
o
r
m
ati
o
n
b
ased
o
n
b
it
tech
n
iq
u
e
ca
n
n
o
t
c
h
a
n
g
e
b
y
t
h
e
attac
k
s
.
I
f
an
attac
k
er
o
b
tain
s
th
e
h
id
d
en
d
ata
i
n
th
e
s
er
v
er
,
i
t is i
m
p
o
s
s
ib
le
to
r
ec
o
v
er
th
e
s
ec
r
et
in
f
o
r
m
atio
n
.
Step
1:
B
ef
o
r
e
v
er
if
icat
io
n
p
r
o
ce
s
s
th
e
o
r
ig
in
al
d
o
cu
m
e
n
t
is
h
a
s
h
ed
an
d
s
to
r
ed
in
QR
a
n
d
s
av
e
it
i
n
th
e
clo
u
d
s
er
v
er
.
Step
2:
Af
ter
Step
1
th
e
v
er
if
ica
tio
n
p
r
o
ce
s
s
n
ee
d
s
to
s
ca
n
th
e
Q
R
f
r
o
m
t
h
e
p
r
o
d
u
ce
d
d
o
cu
m
e
n
ts
f
r
o
m
s
tep
1
(
u
s
i
n
g
s
ca
n
n
er
o
r
s
m
ar
t
p
h
o
n
e
Q
R
co
d
e
s
ca
n
ap
p
licatio
n
)
an
d
c
h
ec
k
t
h
e
r
es
u
lt
o
f
t
h
e
s
ca
n
n
in
g
QR
o
f
th
e
d
o
cu
m
en
t
w
i
th
th
e
s
to
r
ed
QR
in
th
e
clo
u
d
s
er
v
er
an
d
th
en
v
er
i
f
y
t
h
at
t
h
e
s
e
n
d
i
n
g
QR
co
r
r
esp
o
n
d
s
to
th
e
d
o
cu
m
e
n
t
s
to
r
ed
in
th
e
clo
u
d
s
er
v
er
.
Scan
'
:
m=
{(HC
)
}
Step
3:
C
o
m
p
u
te
′
=
ℎ
(
′
⨁
)
Step
4:
I
n
ca
s
e
th
e
t
w
o
d
o
cu
m
e
n
ts
(
t
h
e
s
en
d
er
an
d
th
e
s
to
r
ed
QR
)
m
atc
h
,
it
w
ill
b
e
test
ed
if
t
h
e
h
as
h
i
n
th
e
d
o
cu
m
e
n
t i
s
th
e
s
a
m
e
h
as
h
in
Ser
v
er
.
Step
5:
T
o
s
u
p
p
o
r
t
th
e
s
ec
u
r
it
y
an
d
to
ad
d
m
o
r
e
s
ec
u
r
it
y
le
v
el,
th
e
m
e
th
o
d
u
s
i
n
g
th
e
n
a
m
e
o
f
t
h
e
o
r
ig
in
a
l
o
w
n
er
o
f
d
o
cu
m
e
n
t
to
ch
ec
k
o
n
th
e
a
u
th
e
n
ticat
io
n
o
f
t
h
e
d
o
cu
m
e
n
t.
T
h
e
n
a
m
e
o
f
o
r
ig
i
n
a
l
o
w
n
er
is
s
to
r
ed
in
se
r
v
er
an
d
if
an
y
m
an
a
g
e
m
e
n
t
u
n
i
t
w
a
n
t
to
v
er
if
icat
io
n
o
f
th
e
d
o
cu
m
en
t
it
u
s
i
n
g
Q
R
b
esid
e
th
e
n
a
m
e
o
f
p
er
s
o
n
.
I
f
th
e
t
w
o
-
Na
m
e
p
er
s
o
n
m
atc
h
,
th
en
NP
'
s
Do
cu
m
en
t
=N
P
'
Ser
v
er
,
th
e
d
o
cu
m
e
n
t
an
d
u
s
e
r
ar
e
v
alid
.
Fig
u
r
e
6
s
h
o
w
s
t
h
e
p
r
o
p
o
s
ed
s
ch
e
m
a.
Fig
u
r
e
6
.
T
h
e
p
r
o
p
o
s
ed
s
ch
em
e
6.
CRYP
T
AN
AL
Y
SI
S O
F
T
H
E
T
E
CH
NI
Q
U
E
User
an
o
n
y
m
it
y
I
n
th
i
s
tec
h
n
iq
u
e
w
h
ic
h
is
b
a
s
ed
o
n
QR
,
w
h
er
e
all
cr
itical
i
n
f
o
r
m
atio
n
s
e
n
t
to
s
a
v
e
i
n
clo
u
d
s
er
v
er
as
en
cr
y
p
tio
n
b
y
h
a
s
h
f
u
n
ctio
n
af
ter
co
n
ca
ten
ate
o
p
er
atio
n
e.
g
.
=
(
∥
∥
∥
)
.
T
h
e
co
m
p
u
te
=
(
ℎ
(
)
)
∥
)
f
r
o
m
t
h
ese
o
p
er
atio
n
s
,
s
o
s
ev
er
is
d
if
f
ic
u
lt
to
k
n
o
w
a
n
y
in
f
o
r
m
at
io
n
ab
o
u
t
an
y
th
e
au
t
h
o
r
izatio
n
d
o
cu
m
e
n
t.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
tw
o
-
fa
cto
r
a
u
t
h
en
tica
tio
n
to
ve
r
ify
p
a
p
er
-
b
a
s
ed
d
o
cu
men
ts
(
Ma
ysa
a
A
b
d
Ulka
r
ee
m
N
a
s
e
r
)
1841
Fo
r
w
ar
d
s
ess
io
n
I
n
th
is
s
itu
a
tio
n
,
I
f
t
h
e
attac
k
e
r
co
u
ld
r
ev
ea
l t
h
e
s
er
v
er
's s
ec
r
et
k
e
y
,
b
u
t it
’
s
d
i
f
f
icu
lt g
e
tti
n
g
a
n
o
t
h
er
in
f
o
r
m
atio
n
a
f
ter
it
h
av
e
b
ee
n
ac
h
iev
ed
u
s
er
an
o
n
y
m
it
y
,
s
o
t
h
is
attac
k
ca
n
n
o
t r
u
n
w
it
h
j
u
s
t
k
n
o
w
.
Or
g
er
y
attac
k
s
An
attac
k
er
tr
ies
to
ch
a
n
g
e
s
en
s
iti
v
e
d
ata
to
i
m
p
er
s
o
n
ate
as
t
h
e
le
g
al
u
s
er
o
r
s
er
v
er
to
ac
ce
s
s
th
e
r
eso
u
r
ce
o
n
th
e
r
e
m
o
te
s
y
s
te
m
.
A
s
to
co
m
p
u
te
th
e
d
y
n
a
m
ic
NP
N
its
n
o
t o
n
l
y
u
s
ed
XO
R
o
p
er
atio
n
b
u
t
also
co
n
ca
ten
ate
o
p
er
atio
n
e.
g
.
=
(
∥
∥
∥
)
,
an
d
=
(
ℎ
(
)
)
∥
).
P
ass
w
o
r
d
g
u
es
s
in
g
attac
k
I
t
is
d
if
f
ic
u
lt
to
g
u
es
s
th
e
s
e
n
s
iti
v
e
d
ata
o
f
d
o
cu
m
e
n
t,
b
ec
au
s
e
th
is
p
r
o
p
o
s
al
s
ch
e
m
e
b
ased
o
n
QR
,
h
id
d
en
,
,
b
y
an
d
b
y
.
Mu
t
u
al
au
t
h
e
n
ticatio
n
T
o
s
av
e
r
elian
ce
b
et
w
ee
n
an
d
,
th
e
p
r
o
p
o
s
ed
tech
n
iq
u
e
b
ased
o
n
Q
R
i
s
p
er
f
o
r
m
e
d
m
u
t
u
a
l
au
th
e
n
tica
tio
n
o
f
to
g
et
h
er
co
m
m
u
n
icat
io
n
p
ar
ties
.
W
h
er
e
t
h
e
s
er
v
er
s
e
n
d
{HC,
NP
N}
to
an
d
ca
lcu
la
ted
th
e
v
al
u
e
o
f
NP
N
b
y
N,
x
w
h
i
ch
is
o
n
l
y
k
n
o
w
to
a
n
d
.
7.
CO
NCLU
SI
O
N
Au
t
h
en
t
icit
y
o
f
p
ap
er
-
b
ased
d
o
cu
m
e
n
ts
ai
m
s
to
d
ev
elo
p
an
elec
tr
o
n
ic
v
er
i
f
icat
io
n
s
y
s
te
m
.
Usi
n
g
Q
R
tech
n
o
lo
g
y
.
T
h
e
s
y
s
te
m
cr
ea
te
s
th
e
o
f
f
icial
b
o
o
k
a
n
d
g
e
n
er
at
es
a
Q
R
co
d
e
f
o
r
ea
ch
o
f
f
icial
b
o
o
k
b
ased
o
n
a
s
et
o
f
d
ata
t
h
at
i
s
r
ea
d
f
r
o
m
t
h
e
co
n
ten
t
o
f
th
e
o
f
f
icial
b
o
o
k
an
d
en
cr
y
p
ted
to
en
s
u
r
e
co
n
f
id
en
tialit
y
t
h
r
o
u
g
h
a
s
er
v
ice
p
r
o
v
id
er
w
o
r
k
i
n
g
to
p
r
o
v
id
e
a
QR
s
er
v
ice.
T
h
e
QR
is
en
co
d
ed
an
d
s
en
t
to
th
e
s
er
v
er
f
o
r
r
eten
tio
n
in
a
p
r
iv
ate
d
atab
ase.
I
n
th
is
p
ap
er
,
B
o
o
k
d
ata
is
en
cr
y
p
ted
b
ef
o
r
e
b
ein
g
co
n
v
er
ted
to
a
QR
co
d
e
in
o
r
d
er
n
o
t
to
k
n
o
w
th
e
d
ata
u
s
ed
in
t
h
e
en
c
o
d
in
g
o
f
t
h
e
Q
R
a
n
d
th
e
u
s
e
o
f
d
u
al
v
er
i
f
icat
io
n
tec
h
n
o
lo
g
y
o
f
t
h
e
o
f
f
icial
b
o
o
k
to
p
r
ev
en
t f
r
a
u
d
an
d
i
m
p
er
s
o
n
atio
n
.
T
h
er
ef
o
r
e,
th
e
m
et
h
o
d
u
s
ed
in
th
is
s
t
u
d
y
i
s
v
er
y
s
a
f
e
a
n
d
s
ec
u
r
e.
ACK
NO
WL
E
D
G
M
E
NT
T
h
is
p
r
o
j
ec
t
is
s
u
b
m
it
ted
as
a
s
tu
d
y
to
th
e
Oil
T
r
ain
in
g
I
n
s
ti
tu
te
in
t
h
e
p
r
o
v
in
ce
o
f
B
asra
i
n
th
e
Stat
e
o
f
I
r
aq
.
I
t w
as a
p
p
r
o
v
ed
in
p
r
in
cip
le.
RE
F
E
R
E
NC
E
S
[1
]
O
m
a
r
L
o
p
e
z
-
Rin
c
o
n
,
Ole
g
S
tar
o
ste
n
k
o
,
“
Bi
n
a
ry
L
a
r
g
e
Ob
jec
t
-
Ba
se
d
A
p
p
ro
a
c
h
f
o
r
QR
Co
d
e
De
tec
ti
o
n
i
n
Un
c
o
n
tr
o
ll
e
d
En
v
iro
n
m
e
n
ts,
”
Hin
d
a
wi
J
o
u
rn
a
l
o
f
E
lec
trica
l
a
n
d
C
o
mp
u
ter
E
n
g
in
e
e
rin
g
,
v
o
l.
2
0
1
7
,
p
p
.
1
-
1
5
,
2
0
1
7
.
[2
]
IS
O/IEC,
“
A
u
to
m
a
ti
c
id
e
n
ti
f
ica
ti
o
n
a
n
d
d
a
ta
c
a
p
tu
re
tec
h
n
iq
u
e
s
-
QR
Co
d
e
b
a
r
c
o
d
e
se
m
io
lo
g
y
sp
e
c
i
f
ica
ti
o
n
,
”
ICS
>
0
1
>
0
1
.
0
8
0
>
0
1
.
0
8
0
.
5
0
,
2
0
1
5
.
[O
n
li
n
e
]
.
A
v
a
il
a
b
le
:
h
tt
p
s://
w
e
b
sto
re
.
a
n
si.o
rg
/
P
re
v
iew
s/P
REV
IEW
.
[3
]
Ro
b
i
n
A
sh
f
o
rd
,
“
QR
c
o
d
e
s
a
n
d
a
c
a
d
e
m
ic
li
b
ra
ries
re
a
c
h
in
g
m
o
b
il
e
u
se
rs,
”
Co
ll
e
g
e
&
Res
e
a
rc
h
L
ib
ra
rie
s
Ne
ws
,
v
o
l
.
7
1
,
no
.
1
0
,
p
p
.
5
2
6
-
3
0
,
2
0
1
0
.
[4
]
M
o
h
a
m
m
a
d
Zain
u
d
d
in
,
D.
Ba
sw
a
ra
j,
S
.
M
.
Riy
a
z
o
d
d
in
,
“
G
e
n
e
ra
ti
n
g
S
M
S
(S
h
o
rt
M
e
ss
a
g
e
S
e
rv
ic
e
)
in
th
e
f
o
rm
o
f
Qu
ick
Re
sp
o
n
se
Co
d
e
(QR
-
c
o
d
e
),
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ter
S
c
ien
c
e
a
n
d
M
o
b
il
e
Co
m
p
u
t
in
g
,
v
o
l.
1
,
no
.
1
,
p
p
.
1
0
-
14
,
2
0
1
2
.
[5
]
M
d
.
S
a
n
a
u
l
Ha
q
u
e
,
Ric
h
a
rd
Dy
b
o
w
s
k
i,
“
A
d
v
a
n
c
e
d
QR
Co
d
e
Ba
se
d
Id
e
n
ti
ty
Ca
rd
:
A
Ne
w
Era
f
o
r
G
e
n
e
ra
ti
n
g
S
tu
d
e
n
t
ID
Ca
rd
in
De
v
e
lo
p
i
n
g
Co
u
n
tr
ies
,
”
IEE
E
Fi
rs
t
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
y
ste
ms
In
f
o
rm
a
ti
c
s,
M
o
d
e
ll
i
n
g
a
n
d
S
imu
l
a
ti
o
n
,
p
p
.
9
7
-
1
0
3
,
2
0
1
4
.
[6
]
M
a
y
k
in
W
a
ra
s
a
r
t,
P
ra
m
o
te
Ku
a
c
h
a
ro
e
n
,
“
P
a
p
e
r
-
b
a
se
d
D
o
c
u
m
e
n
t
A
u
th
e
n
ti
c
a
ti
o
n
u
si
n
g
Dig
it
a
l
S
ig
n
a
tu
re
a
n
d
Q
R
Co
d
e
,
”
4
T
H In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
mp
u
ter
En
g
in
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
,
2
0
1
2
.
[7
]
J.
Z.
G
a
o
,
“
Un
d
e
rsta
n
d
i
n
g
2
D
-
b
a
r
c
o
d
e
tec
h
n
o
l
o
g
y
a
n
d
a
p
p
li
c
a
ti
o
n
s
in
M
-
c
o
m
m
e
r
c
e
-
d
e
sig
n
a
n
d
im
p
lem
e
n
tatio
n
o
f
a
2
D b
a
rc
o
d
e
p
ro
c
e
ss
in
g
so
l
u
ti
o
n
,
”
Pro
c
.
In
t
.
Co
n
f.
o
n
Co
m
p
u
te.
S
o
ft
wa
re
a
n
d
A
p
p
li
c
a
te,
p
p
.
4
9
-
56
,
2
0
0
7
.
[8
]
S
a
ro
j
G
o
y
a
l,
S
u
re
n
d
ra
Ya
d
a
v
,
M
a
n
ish
M
a
th
u
ria,
“
Ex
p
lo
ri
n
g
c
o
n
c
e
p
t
o
f
QR
c
o
d
e
a
n
d
it
s
b
e
n
e
f
it
s
i
n
d
i
g
it
a
l
e
d
u
c
a
ti
o
n
s
y
ste
m
,
”
IEE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Ad
v
a
n
c
e
s in
C
o
mp
u
ti
n
g
,
Co
mm
u
n
ica
ti
o
n
s
a
n
d
In
f
o
rm
a
ti
c
s
,
2
0
1
6
.
[9
]
Iu
li
ia
T
k
a
c
h
e
n
k
o
,
W
il
li
a
m
P
u
e
c
h
,
C
h
risto
p
h
e
De
stru
e
l,
Oliv
ier
S
trau
ss
,
Je
a
n
-
M
a
rc
G
a
u
d
in
,
C
h
ri
stian
G
u
ich
a
rd
,
“
Tw
o
-
L
e
v
e
l
QR
Co
d
e
f
o
r
P
riv
a
te
M
e
ss
a
g
e
S
h
a
rin
g
a
n
d
D
o
c
u
m
e
n
t
A
u
th
e
n
ti
c
a
ti
o
n
,
”
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
fo
rm
a
t
io
n
F
o
re
n
sic
s a
n
d
S
e
c
u
rity
,
v
o
l.
1
1
,
n
o
.
3
,
p
p
.
5
7
1
-
5
8
3
,
2
0
1
6
.
[1
0
]
Ne
h
a
M
a
li
k
,
Bh
a
rti
Jo
sh
i,
“
ECDS
A
A
p
p
ro
a
c
h
f
o
r
Re
li
a
b
le
Da
ta
S
h
a
rin
g
a
n
d
Do
c
u
m
e
n
t
V
e
rif
ica
ti
o
n
u
sin
g
Tw
o
lev
e
l
QR co
d
e
,
”
2
n
d
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
I
-
S
M
AC
,
2
0
1
8
.
[1
1
]
L
in
Y.
-
H.,
C
h
a
n
g
Y.
-
P
.
&
W
u
J.
-
L
.
,
“
A
p
p
e
a
ra
n
c
e
b
a
s
e
d
QR
c
o
d
e
b
e
a
u
ti
f
ier.
M
u
lt
im
e
d
ia
,”
IEE
E
T
r
a
n
sa
c
ti
o
n
s
o
n
M
u
lt
ime
d
ia
,
v
o
l.
1
5
,
n
o
.
8
,
p
p
.
2
1
9
8
-
2
2
0
7
,
2
0
1
3
.
[1
2
]
Bh
a
tu
rk
a
r
K.
P
.
&
Ba
g
d
e
K.
G
.
,
“
QR
c
o
d
e
b
a
se
d
d
ig
it
ize
d
m
a
rk
sh
e
e
t
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
M
a
n
a
g
e
me
n
t,
IT
a
n
d
En
g
i
n
e
e
rin
g
,
v
o
l.
4
,
n
o
.
5
7
,
2
0
1
4
.
[1
3
]
P
e
ter M
e
ll
,
T
im
o
th
y
G
r
a
n
c
e
,
“
T
h
e
NIST
d
e
f
in
it
io
n
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
,
”
S
p
e
c
ia
l
P
u
p
l
ica
ti
o
n
8
0
0
-
145
,
2
0
1
1
.
[1
4
]
Ha
id
e
r
M
.
A
l
-
M
a
sh
h
a
d
i,
A
la'
a
A
.
Kh
a
laf
,
“
H
y
b
rid
Ho
m
o
m
o
rp
h
ic
C
ry
p
to
s
y
ste
m
f
o
r
S
e
c
u
re
T
r
a
n
sfe
r
o
f
Co
lo
r
Im
a
g
e
o
n
P
u
b
l
ic
Clo
u
d
,
J
o
u
rn
a
l
o
f
T
h
e
o
re
ti
c
a
l
a
n
d
Ap
p
li
e
d
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
”
v
o
l
.
96
,
n
o
1
9
,
p
p
.
6
4
7
4
-
6
4
8
6
,
2
0
1
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
18
,
No
.
4
,
A
u
g
u
s
t 2
0
2
0
:
1
8
3
4
-
1
8
4
2
1842
[1
5
]
S
.
Ka
m
b
o
j
a
n
d
M
.
N.
S
.
G
h
u
m
m
a
n
,
“
A
S
u
rv
e
y
o
n
Cl
o
u
d
C
o
m
p
u
ti
n
g
a
n
d
1
st
T
y
p
e
s,
”
IEE
E
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
C
o
mp
u
ti
n
g
f
o
r S
u
sta
i
n
a
b
le Gl
o
b
a
l
De
v
e
lo
p
me
n
t,
v
o
l.
1
5
,
p
p
.
7
4
3
5
-
7
4
4
3
,
2
0
1
6
.
[1
6
]
N.
M
.
G
o
n
z
a
lez
,
C.
M
iers
,
F
.
F
.
R
e
d
ig
o
lo
,
M
.
A
.
S
im
p
li
c
io
Jr,
T
.
C.
M
.
Ca
rv
a
lh
o
,
M
.
Na
slu
n
d
,
e
t
a
l.
,
“
A
T
a
x
o
n
o
m
y
M
o
d
e
l
f
o
r
Clo
u
d
C
o
m
p
u
ti
n
g
S
e
r
v
ice
s
,
”
P
ro
c
e
e
d
in
g
s
o
f
th
e
1
st
In
t
e
rn
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Clo
u
d
Co
m
p
u
ti
n
g
a
n
d
S
e
rv
ice
s S
c
ien
c
e
,
p
p
.
5
6
-
65
,
2
0
1
1
.
[1
7
]
Ha
id
e
r
M
.
A
l
-
M
a
sh
h
a
d
i,
Im
a
n
Q.
A
b
d
u
lj
a
lee
l,
“
Co
l
o
r
Im
a
g
e
En
c
r
y
p
ti
o
n
u
si
n
g
Ch
a
o
ti
c
M
a
p
s,
T
rian
g
u
l
a
r
S
c
ra
m
b
li
n
g
,
w
it
h
DN
A
S
e
q
u
e
n
c
e
s,
”
IEE
E
I
n
te
rn
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Cu
rr
e
n
t
Res
e
a
rc
h
in
C
o
mp
u
ter
S
c
ien
c
e
a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(
ICCIT
),
p
p
:
9
3
-
98
,
2
0
1
7
.
[1
8
]
P
a
ss
e
n
t
M
.
El
-
Ka
f
ra
wy
,
A
z
z
a
A
.
A
b
d
o
,
A
m
r.
F
.
S
h
a
w
ish
,
"
S
e
c
u
rit
y
Iss
u
e
s
Ov
e
r
S
o
m
e
Clo
u
d
M
o
d
e
ls,
”
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mm
u
n
ica
t
io
n
,
M
a
n
a
g
e
me
n
t
a
n
d
I
n
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(
ICCM
IT
),
2
0
1
5
.
[1
9
]
S
h
a
n
t
h
i`
Ku
m
a
r
a
g
u
ru
,
P
ro
f
.
Dr.D.
S
.
Bo
rm
a
n
e
,
“
Id
e
n
ti
f
ica
ti
o
n
o
f
QR
Co
d
e
b
a
se
d
o
n
P
a
tt
e
r
n
Re
c
o
g
n
i
ti
o
n
w
it
h
M
o
b
il
e
P
h
o
n
e
s,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
M
o
d
e
rn
E
n
g
i
n
e
e
rin
g
Res
e
a
rc
h
(
IJ
M
ER
),
v
o
l.
2
,
no
.
5
,
p
p
.
3
5
4
4
-
3
5
4
7
,
2
0
1
2
.
[2
0
]
Jo
sé
Ro
u
i
ll
a
rd
,
“
Co
n
tex
tu
a
l
QR
C
o
d
e
s
,
”
2
0
0
8
T
h
e
T
h
ird
In
ter
n
a
ti
o
n
a
l
M
u
lt
i
-
Co
n
fer
e
n
c
e
o
n
Co
m
p
u
ti
n
g
i
n
t
h
e
Glo
b
a
l
In
fo
rm
a
t
io
n
T
e
c
h
n
o
l
o
g
y
(
icc
g
i
2
0
0
8
),
2
0
0
8
.
[2
1
]
Re
il
ly
,
D.,
S
m
o
ly
n
,
G
.
a
n
d
C
h
e
n
,
H.,
“
T
o
w
a
rd
f
lu
id
,
m
o
b
il
e
,
a
n
d
u
b
iq
u
it
o
u
s
in
tera
c
ti
o
n
w
it
h
p
a
p
e
r
u
sin
g
re
c
u
rsiv
e
2
D b
a
rc
o
d
e
s,
”
Per
v
a
siv
e
M
o
b
il
e
I
n
ter
a
c
ti
o
n
De
v
ice
s 2
0
0
7
(
Per
M
I
D 2
0
0
7
),
wo
rk
sh
o
p
a
t
Per
v
a
siv
e
,
2
0
0
7
.
[2
2
]
Iv
a
n
Je
li
ć
,
Din
a
V
rk
ić,
“
QR
c
o
d
e
s
in
li
b
ra
ry
-
d
o
e
s
a
n
y
o
n
e
u
se
th
e
m
?
”
Co
n
fer
e
n
c
e
:
In
fo
rm
a
ti
o
n
&
Co
mm
u
n
ica
ti
o
n
T
e
c
h
n
o
l
o
g
y
E
lec
tro
n
ics
&
M
icr
o
e
lec
tro
n
ics
(
M
IPR
O),
2
0
1
3
.
[2
3
]
A
.
W
il
so
n
,
“
QR
c
o
d
e
s
i
n
t
h
e
li
b
ra
ry
:
a
re
th
e
y
w
o
rth
th
e
e
f
f
o
rt?
A
n
a
l
y
sis
o
f
a
QR
c
o
d
e
p
i
lo
t
p
r
o
jec
t
a
c
c
e
se
d
,
”
J
o
u
rn
a
l
o
f
Acc
e
ss
S
e
rv
ice
s
,
v
o
l.
9
,
n
o
.
3
,
p
p
.
1
0
1
-
1
1
0
,
2
0
1
2
.
[2
4
]
Kin
jal
H.
P
a
n
d
y
a
,
Hire
n
J.
G
a
l
iy
a
w
a
la,
“
A
S
u
rv
e
y
o
n
QR
Co
d
e
s:
in
c
o
n
tex
t
o
f
Re
se
a
rc
h
a
n
d
A
p
p
li
c
a
ti
o
n
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Eme
rg
i
n
g
T
e
c
h
n
o
l
o
g
y
a
n
d
Ad
v
a
n
c
e
d
En
g
i
n
e
e
rin
g
Ce
rtif
ied
J
o
u
r
n
a
l
,
v
o
l.
4
,
no.
3
,
2
0
1
4
.
[2
5
]
S
h
in
taro
Ok
a
z
a
k
i,
“
Cro
ss
-
M
e
d
ia
In
teg
ra
ti
o
n
o
f
QR
Co
d
e
:
A
P
r
e
li
m
in
a
r
y
Ex
p
lo
ra
ti
o
n
,
”
J
o
u
r
n
a
l
o
f
E
lec
tro
n
ic
Co
mm
e
rc
e
Res
e
a
rc
h
,
v
o
l.
1
4
,
n
o
.
2
,
p
p
.
1
3
7
-
1
4
8
,
2
0
1
3
.
[2
6
]
Hire
n
R.
Ka
d
a
m
,
Nik
e
tan
R.
S
u
tar,
Bh
u
m
il
S
.
Ug
le,
M
rs.
Kish
o
ri
S
h
e
k
o
k
a
r,
“
G
e
n
u
in
e
A
u
to
m
o
b
il
e
P
a
rts
S
c
a
n
n
e
r
Us
in
g
QR
-
Co
d
e
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
A
d
v
a
n
c
e
En
g
in
e
e
rin
g
a
n
d
Res
e
a
rc
h
De
v
e
lo
p
me
n
t
,
v
o
l.
S
IEI
CON
,
p
p
.
1
-
6
,
2
0
1
7
.
[2
7
]
S
a
n
g
e
e
ta
S
in
g
h
,
“
QR
C
o
d
e
A
n
a
ly
sis,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
i
n
Co
m
p
u
te
r
S
c
ien
c
e
a
n
d
S
o
ft
w
a
re
En
g
in
e
e
rin
g
,
v
o
l
.
6
,
n
o
.
5
,
2
0
1
6
.
[2
8
]
Ha
id
e
r
M
.
A
l
-
M
a
sh
h
a
d
i,
H
.
B
.
A
b
d
u
l
-
W
a
h
a
b
,
R
.
F
.
Ha
ss
a
n
,
“
S
e
c
u
re
a
n
d
ti
m
e
e
ff
icie
n
t
h
a
sh
-
b
a
se
d
m
e
ss
a
g
e
a
u
th
e
n
ti
c
a
ti
o
n
a
lg
o
rit
h
m
f
o
r
w
irele
ss
se
n
so
r
n
e
tw
o
rk
s,
”
Co
n
fer
e
n
c
e
s:
Glo
b
a
l
S
u
mm
it
o
n
C
o
mp
u
ter
&
In
fo
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(
GS
CIT
),
p
p
.
1
-
7
,
2
0
1
4
.
[2
9
]
G
o
h
Kh
a
i
H
o
n
g
a
n
d
S
h
a
ra
d
S
in
h
a
,
“
T
ra
c
k
in
g
V
u
l
n
e
ra
b
le
P
e
o
p
le
Us
in
g
B
o
d
y
W
o
rn
QR
Co
d
e
,
”
A
F
in
a
l
S
tu
d
e
n
t
A
p
p
li
c
a
ti
o
n
P
a
p
e
r
P
re
se
n
ted
to
I
EE
E
S
tan
d
a
r
d
s
A
ss
o
c
iatio
n
in
P
a
rti
a
l
F
u
lf
il
m
e
n
t
o
f
th
e
Re
q
u
irem
e
n
ts
f
o
r
th
e
IEE
E
S
tan
d
a
rd
s U
n
iv
e
rsity
S
tu
d
e
n
t
G
ra
n
t
A
p
p
li
c
a
ti
o
n
,
2
0
1
8
.
[
On
li
n
e
]
.
A
v
a
il
a
b
le:
h
tt
p
s:/
/www
.
sta
n
d
a
rd
su
n
iv
e
rsity
.
o
rg
[3
0
]
B.
V
.
Ro
m
p
a
y
,
“
A
n
a
l
y
sis
a
n
d
De
sig
n
o
f
Cry
p
to
g
ra
p
h
ic
Ha
sh
f
u
n
c
ti
o
n
s,
”
M
A
C
a
lg
o
rit
h
m
s
a
n
d
B
lo
c
k
Cip
h
e
rs,
P
h
.
D.
T
h
e
sis
,
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
De
p
a
rtm
e
n
t,
Ka
th
o
li
e
k
e
Un
iv
e
r
siti
e
s,
L
e
u
v
e
n
,
Be
lg
iu
m
,
2
0
0
4
.
[3
1
]
Ra
jee
v
S
o
b
ti
,
G
e
e
th
a
G
a
n
e
sa
n
,
“
Cr
y
p
to
g
ra
p
h
ic
Ha
sh
F
u
n
c
ti
o
n
s:
A
Re
v
ie
w
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
,
v
o
l.
9
,
no.
2,
p
p
.
4
6
1
-
7
9
,
2
0
1
2
.
[3
2
]
Em
a
n
T
.
Ja
si
m
,
Ha
m
e
e
d
A
.
Yo
u
n
is,
“
Cry
p
tan
a
l
y
sis
a
n
d
S
e
c
u
rit
y
En
h
a
n
c
e
m
e
n
t
o
f
a
Kh
a
n
e
t
a
l.
'
s
S
c
h
e
m
e
,
”
IOS
R
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
E
n
g
i
n
e
e
rin
g
,
v
o
l.
1
7
,
n
o
.
2
,
pp.
08
-
16
,
2
0
1
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.