T
E
L
K
O
M
NIKA
T
elec
o
mm
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
1
8
,
No
.
4
,
A
u
g
u
s
t
2020
,
p
p
.
2
0
0
4
~
201
1
I
SS
N:
1
6
9
3
-
6
9
3
0
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Ke
m
e
n
r
is
te
k
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/
T
E
L
KOM
NI
KA
.
v
1
8
i
4
.
1
4
7
4
8
2004
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
Q
R
co
de
ba
sed a
uthent
ica
tion
m
e
t
ho
d f
o
r Io
T a
ppli
ca
tions
using
t
hree
securi
ty la
y
ers
Abba
s
M
.
Al
-
G
ha
ili
1
,
H
a
iro
la
dena
n K
a
s
i
m
2
,
M
a
rini O
t
h
m
a
n
3
,
Wa
hid
a
h H
a
s
hi
m
4
1,
3,
4
I
n
stit
u
te
o
f
In
f
o
rm
a
ti
c
s a
n
d
C
o
m
p
u
ti
n
g
in
En
e
rg
y
,
Un
iv
e
rsiti
Ten
a
g
a
Na
sio
n
a
l,
M
a
lay
sia
2
Co
ll
e
g
e
o
f
Co
m
p
u
ti
n
g
&
In
f
o
rm
a
ti
c
s,
Un
iv
e
rsiti
T
e
n
a
g
a
N
a
sio
n
a
l,
M
a
lay
sia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Au
g
1
,
2019
R
ev
i
s
ed
J
an
1
1
,
2
0
2
0
A
cc
ep
ted
A
p
r
1
3
,
2
0
2
0
A
q
u
ick
re
sp
o
n
se
c
o
d
e
-
b
a
se
d
a
u
th
e
n
ti
c
a
ti
o
n
m
e
th
o
d
(
QRA
M
)
is
p
r
o
p
o
se
d
.
QRA
M
is
a
p
p
li
c
a
b
le
f
o
r
lo
ts
o
f
i
n
tern
e
t
o
f
th
i
n
g
s
(
Io
T
)
a
p
p
li
c
a
ti
o
n
s.
QRA
M
a
ims
to
v
e
rify
re
q
u
e
sts
o
f
su
c
h
a
n
a
c
c
e
ss
to
Io
T
a
p
p
li
c
a
ti
o
n
s.
R
e
q
u
e
sts
a
re
m
a
d
e
u
sin
g
a
q
u
ick
r
e
sp
o
n
se
c
o
d
e
(
QRC).
T
o
a
u
th
e
n
ti
c
a
te
c
o
n
te
n
t
s
o
f
QRC,
u
se
rs
w
il
l
s
c
a
n
QRC
to
a
c
c
e
ss
Io
T
a
p
p
li
c
a
ti
o
n
s.
T
o
a
u
th
e
n
ti
c
a
te
c
o
n
ten
ts
o
f
QRC,
th
re
e
p
ro
c
e
d
u
re
s
a
re
a
p
p
l
ied
.
QRA
M
c
o
n
tri
b
u
tes
t
o
I
o
T
a
u
to
m
a
ti
c
a
c
c
e
s
s
s
y
ste
m
s
o
r
sm
a
rt
a
p
p
li
c
a
ti
o
n
s
i
n
term
s
o
f
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
sa
f
e
t
y
o
f
a
c
c
e
s
s.
QR
A
M
is
e
v
a
lu
a
ted
in
term
o
f
se
c
u
rit
y
f
a
c
to
rs
(
e
.
g
.
,
a
u
th
e
n
ti
c
a
ti
o
n
).
Co
m
p
u
tatio
n
ti
m
e
o
f
a
u
th
e
n
ti
c
a
ti
o
n
p
r
o
c
e
d
u
re
s
f
o
r
se
v
e
ra
l
Io
T
a
p
p
li
c
a
ti
o
n
s
h
a
s
b
e
c
o
m
e
a
c
o
n
sid
e
ra
b
le
issu
e
.
QRA
M
a
im
s
to
re
d
u
c
e
c
o
m
p
u
t
a
ti
o
n
ti
m
e
c
o
n
su
m
e
d
to
a
u
t
h
e
n
ti
c
a
te
e
a
c
h
QRC.
S
o
m
e
a
u
th
e
n
ti
c
a
ti
o
n
tec
h
n
iq
u
e
s
stil
l
f
a
c
e
d
if
f
icu
lt
ies
w
h
e
n
a
n
Io
T
a
p
p
li
c
a
ti
o
n
re
q
u
ires
f
a
st
re
sp
o
n
se
t
o
u
se
rs;
th
e
re
f
o
re
,
QRA
M
a
i
m
s
to
e
n
h
a
n
c
e
so
to
m
e
e
t
re
a
l
-
ti
m
e
a
p
p
li
c
a
ti
o
n
s.
T
h
u
s,
QRA
M
is
c
o
m
p
a
re
d
to
se
v
e
ra
l
c
o
m
p
e
ti
ti
v
e
m
e
th
o
d
s
u
se
d
to
v
e
rify
QRC
i
n
term
o
f
c
o
m
p
u
tatio
n
t
im
e
.
Re
su
lt
s
c
o
n
f
ir
m
e
d
th
a
t
QRA
M
is
fa
ste
r
th
a
n
o
th
e
r
c
o
m
p
e
ti
ti
v
e
te
c
h
n
iq
u
e
s.
Be
sid
e
s,
re
su
lt
s
h
a
v
e
sh
o
w
n
a
h
ig
h
lev
e
l
o
f
c
o
m
p
lex
it
y
in
term
o
f
d
e
c
ry
p
ti
o
n
ti
m
e
n
e
e
d
e
d
to
d
e
d
u
c
e
p
riv
a
te
c
o
n
ten
ts
o
f
QRC.
QRA
M
a
lso
is
ro
b
u
st ag
a
in
st u
n
a
u
th
o
rize
d
re
q
u
e
sts o
f
a
c
c
e
ss
.
K
ey
w
o
r
d
s
:
Data
au
t
h
en
t
icatio
n
Data
s
ec
u
r
it
y
I
n
ter
n
et
o
f
T
h
i
n
g
s
QR
co
d
e
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
A
b
b
as M
.
A
l
-
G
h
aili
,
I
n
s
tit
u
te
o
f
I
n
f
o
r
m
atics a
n
d
C
o
m
p
u
ti
n
g
i
n
E
n
er
g
y
(
I
I
C
E
)
,
Un
i
v
er
s
iti T
en
ag
a
Na
s
io
n
al
(
UNI
T
E
N)
,
4
3
0
0
0
Kaj
an
g
,
Selan
g
o
r
,
Ma
la
y
s
ia
.
E
m
ail:
ab
b
as
@
u
n
ite
n
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
N
o
wa
d
a
y
s
,
m
a
n
y
r
e
s
e
a
r
c
h
e
s
t
h
a
t
d
e
a
l
wi
t
h
t
h
e
u
s
e
o
f
q
u
ick
r
esp
o
n
s
e
(
QR
)
co
d
e
i
n
s
e
c
u
r
i
t
y
-
r
e
l
a
t
e
d
s
e
r
v
i
c
e
s
[
1
]
h
a
v
e
b
e
e
n
r
e
v
i
e
we
d
.
S
o
m
e
o
f
t
h
e
s
e
e
x
a
m
p
l
e
s
a
r
e
i
n
c
l
u
d
e
d
i
n
[2
-
7]
.
T
h
e
t
e
c
h
n
o
l
o
g
y
o
f
q
u
ic
k
r
esp
o
n
s
e
co
d
e
(
Q
R
C
)
h
a
s
b
e
e
n
u
t
i
l
i
z
e
d
b
y
m
a
n
y
a
p
p
l
i
c
a
t
i
o
n
s
[8
-
13]
.
T
h
e
Q
R
C
i
s
s
u
i
t
a
b
l
e
f
o
r
d
ata
p
r
iv
ac
y
a
n
d
ca
n
b
e
a
g
o
o
d
to
o
l
to
p
r
o
t
ec
t
d
ata
[
1
4
]
u
s
in
g
en
cr
y
p
tio
n
s
ch
e
m
es
.
T
h
er
e
ar
e
m
a
n
y
ap
p
licatio
n
s
t
h
at
f
o
cu
s
o
n
d
ata
au
th
en
tica
tio
n
in
o
r
d
er
to
v
er
if
y
t
h
at
d
ata
ar
e
o
r
ig
in
all
y
is
s
u
ed
an
d
co
n
ten
t
s
h
av
e
n
o
t
b
ee
n
ch
an
g
ed
in
an
au
t
h
o
r
ized
m
a
n
n
er
.
Au
t
h
en
t
icatio
n
is
a
v
er
y
i
m
p
o
r
ta
n
t
co
n
s
id
er
atio
n
f
o
r
s
ev
er
al
ap
p
licatio
n
s
b
ec
au
s
e
it
af
f
ec
t
s
th
e
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
s
y
s
te
m
in
ter
m
o
f
s
ec
u
r
it
y
a
n
d
co
n
f
id
en
tialit
y
.
Ma
n
y
o
t
h
er
r
elate
d
s
ec
u
r
it
y
i
s
s
u
es
co
u
ld
also
b
e
af
f
ec
ted
i
n
s
u
c
h
a
ca
s
e
au
t
h
e
n
ticatio
n
h
as
n
o
t
b
ee
n
s
ec
u
r
el
y
a
n
d
ef
f
icie
n
tl
y
co
n
s
id
er
ed
.
T
h
er
ef
o
r
e,
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
in
th
i
s
p
ap
er
aim
s
to
v
er
i
f
y
o
n
ce
a
n
u
n
au
t
h
o
r
ized
m
o
d
i
f
icatio
n
h
as
o
cc
u
r
r
ed
o
r
n
o
t.
I
t
h
as
co
n
s
id
er
ed
a
n
u
m
b
er
o
f
v
er
if
ica
tio
n
p
r
o
ce
d
u
r
es
d
u
e
to
th
e
in
f
o
r
m
a
tio
n
e
n
cr
y
p
ted
in
s
i
d
e
th
e
QR
C
h
as
to
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
a
u
th
e
n
tica
tio
n
meth
o
d
fo
r
I
o
T
a
p
p
lica
tio
n
s
u
s
in
g
th
r
ee
s
ec
u
r
ity
la
ye
r
s
(
A
b
b
a
s
M.
A
l
-
Gh
a
ili
)
2005
b
e
al
w
a
y
s
p
r
iv
ate
a
n
d
co
n
f
i
d
en
tial.
An
o
th
er
r
ea
s
o
n
t
h
at
a
s
ec
u
r
e
au
t
h
e
n
ticatio
n
m
e
th
o
d
is
i
m
p
o
r
tan
t
f
o
r
in
ter
n
et
-
of
-
t
h
i
n
g
s
(
I
o
T
)
a
p
p
licatio
n
is
th
at,
t
h
is
i
n
f
o
r
m
atio
n
i
n
cl
u
s
i
v
e
i
n
th
e
Q
R
C
is
u
s
ed
to
ac
ce
s
s
a
d
ata
-
s
e
n
s
iti
v
e
I
o
T
ap
p
licati
o
n
.
T
h
e
p
r
o
p
o
s
ed
QR
b
ased
au
th
e
n
tica
tio
n
m
et
h
o
d
(
QR
AM
)
in
th
is
p
ap
er
is
ap
p
lied
o
n
QR
C
to
v
er
if
y
s
ec
u
r
it
y
o
b
j
ec
tiv
es.
I
n
l
i
t
e
r
a
t
u
r
e
r
e
v
i
e
w,
m
a
n
y
I
o
T
a
p
p
l
i
c
a
t
i
o
n
s
h
a
v
e
b
e
e
n
p
r
o
p
o
s
e
d
s
o
m
e
o
f
wh
i
c
h
h
a
v
e
s
u
g
g
e
s
t
e
d
a
n
d
d
e
s
i
g
n
e
d
a
u
t
h
e
n
t
i
c
a
t
i
o
n
s
y
s
t
e
m
s
a
n
d
s
o
m
e
o
t
h
e
r
s
h
a
v
e
p
e
r
f
o
r
m
e
d
e
v
a
l
u
a
t
i
o
n
p
r
o
c
e
d
u
r
e
s
.
F
r
o
m
t
h
e
s
e
,
a
n
u
m
b
e
r
o
f
Q
R
C
-
b
a
s
e
d
m
e
t
h
o
d
s
h
a
v
e
b
e
e
n
p
e
r
f
o
r
m
i
n
g
s
m
a
r
t
s
e
r
v
i
c
e
s
u
t
i
l
i
z
i
n
g
t
h
e
Q
R
C
i
t
s
e
l
f
.
B
u
t
t
h
e
v
e
r
y
i
m
p
o
r
t
a
n
t
t
h
i
n
g
t
o
c
o
n
s
i
d
e
r
i
s
t
h
a
t
:
a
r
e
t
h
e
s
e
Q
RC
-
b
a
s
e
d
I
o
T
a
p
p
l
i
c
a
t
i
o
n
s
a
u
t
h
e
n
t
i
c
a
t
e
d
.
F
o
r
e
x
a
m
p
l
e
,
t
h
e
r
e
e
x
i
s
t
m
a
n
y
s
y
s
t
e
m
s
c
o
n
c
e
r
n
a
u
t
h
e
n
t
i
c
a
t
i
o
n
,
d
a
t
a
p
r
i
v
a
c
y
,
a
n
d
s
e
c
u
r
i
t
y
s
u
c
h
a
s
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
(
I
o
T
)
[
1
5
]
,
s
m
a
r
t
a
p
p
l
i
c
a
t
i
o
n
s
[
1
6
]
,
c
r
y
p
t
o
g
r
a
p
h
y
a
n
d
d
a
t
a
e
n
c
r
y
p
t
i
o
n
[
1
7
,
1
8
]
,
d
a
t
a
t
r
a
n
s
f
e
r
[
1
9
]
,
p
u
b
l
i
c
k
e
y
e
n
c
r
y
p
t
i
o
n
s
c
h
e
m
e
[
2
0
]
,
a
n
d
c
l
o
u
d
c
o
m
p
u
t
i
n
g
r
e
s
o
u
r
c
e
s
’
a
u
t
h
e
n
t
i
c
a
t
i
o
n
[
2
1
]
.
T
h
is
h
a
s
co
n
tr
ib
u
ted
to
a
s
m
ar
t li
f
e
en
v
ir
o
n
m
e
n
t
[
2
2
]
in
ter
m
s
o
f
d
ata
p
r
iv
ac
y
,
s
ec
u
r
it
y
,
a
n
d
co
m
p
u
t
atio
n
ti
m
e.
I
n
g
e
n
er
al,
th
e
s
e
p
r
o
p
o
s
ed
s
y
s
te
m
s
m
a
y
f
ail
to
ac
h
ie
v
e
a
h
ig
h
lev
e
l
o
f
s
ec
u
r
it
y
.
O
n
e
o
f
t
h
e
b
ig
g
est
is
s
u
es
i
s
w
h
e
n
t
h
e
ap
p
licatio
n
b
ec
o
m
e
s
s
u
s
ce
p
tib
le
f
o
r
u
n
u
s
u
al
ac
tio
n
s
.
Ho
w
e
v
er
,
th
er
e
e
x
is
t
s
e
v
er
al
atte
m
p
t
s
to
p
r
o
p
o
s
e
s
ec
u
r
e
ap
p
licatio
n
s
e.
g
.
,
[
2
3
,
2
4
]
in
w
h
ich
t
h
eir
ai
m
s
ar
e
to
p
r
o
tect
d
ata
an
d
att
ain
au
t
h
e
n
ticatio
n
.
T
h
ese
ex
a
m
p
les
h
av
e
d
esi
g
n
e
d
a
QR
C
b
ased
au
th
en
t
icatio
n
m
ec
h
a
n
is
m
f
o
r
u
s
er
s
in
o
r
d
er
to
p
r
ev
en
t
th
r
ea
t
s
an
d
to
in
cr
ea
s
e
s
ec
u
r
it
y
o
f
u
s
e
r
s
’
p
r
iv
ate
co
n
te
n
t
s
.
T
h
e
QR
C
i
s
a
v
er
y
e
f
f
ec
tiv
e
te
ch
n
o
lo
g
y
f
o
r
m
a
n
y
I
o
T
ap
p
licatio
n
s
i
n
ter
m
s
o
f
s
a
f
et
y
an
d
a
u
th
e
n
tic
it
y
e.
g
.
,
th
ese
r
ev
ie
w
ed
in
[
2
5
-
28]
.
T
h
u
s
,
in
[
2
1
]
a
QR
C
tec
h
n
o
lo
g
y
h
as
b
ee
n
u
s
ed
in
o
r
d
er
to
p
e
r
f
o
r
m
an
a
u
th
e
n
tica
tio
n
p
r
o
ce
d
u
r
e
f
o
r
u
s
er
s
en
g
a
g
ed
w
it
h
a
n
clo
u
d
co
m
p
u
ti
n
g
en
v
ir
o
n
m
e
n
t.
Q
R
C
h
as
a
g
o
o
d
f
ea
tu
r
e
th
at
i
s
it
ca
n
s
to
r
e
a
h
u
g
e
p
o
r
tio
n
o
f
i
n
f
o
r
m
atio
n
i
n
a
v
er
y
s
m
all
ar
ea
.
A
lo
t
o
f
I
o
T
ap
p
licati
o
n
s
ca
n
e
x
p
l
o
it
s
u
c
h
a
f
ea
t
u
r
e
an
d
r
e
-
u
s
e
i
t
b
ased
o
n
n
ee
d
s
[
2
9
]
.
Ma
n
y
e
x
a
m
p
le
s
ar
e
in
d
etailed
r
ev
ie
w
ed
i
n
[
7
,
1
9
,
3
0
-
40]
.
T
h
er
ef
o
r
e,
th
ese
co
n
ten
ts
o
f
QR
C
ca
n
b
e
v
er
if
ied
i
n
ter
m
s
o
f
au
t
h
e
n
tica
tio
n
an
d
p
r
iv
ac
y
.
Us
u
all
y
,
t
h
e
v
er
if
ica
tio
n
p
r
o
ce
s
s
co
n
ce
r
n
s
co
n
te
n
t
s
o
f
QR
C
.
I
f
co
n
ten
t
s
o
f
QR
C
h
a
v
e
n
o
t b
ee
n
ch
a
n
g
ed
i
n
an
u
n
a
u
t
h
o
r
ized
m
an
n
er
,
th
e
p
r
iv
ac
y
o
f
QR
C
ca
n
b
e
co
n
s
id
er
ed
as
attain
ed
an
d
Q
R
C
i
s
p
r
iv
ate.
T
h
er
ef
o
r
e,
r
elate
d
d
ata
n
ee
d
s
to
b
e
p
r
iv
ate
an
d
s
ec
u
r
e.
A
d
d
itio
n
all
y
,
th
e
r
elate
d
ap
p
licatio
n
s
s
h
o
u
ld
b
e
co
n
f
id
e
n
tia
l
w
it
h
th
e
h
elp
o
f
QR
C
tech
n
iq
u
e.
I
n
o
r
d
er
to
d
o
s
o
,
a
s
tr
o
n
g
s
ec
u
r
it
y
s
ch
e
m
e
n
ee
d
s
to
b
e
an
d
th
e
v
er
i
f
icatio
n
p
r
o
ce
s
s
o
f
QR
C
co
n
te
n
t
s
h
as
to
b
e
p
r
ec
is
e.
Hen
ce
,
in
th
is
p
ap
er
,
th
e
v
er
if
icatio
n
p
r
o
ce
d
u
r
e
w
it
h
s
e
v
er
al
s
ec
u
r
it
y
la
y
er
s
ar
e
co
n
s
id
er
ed
.
So
,
th
e
v
er
if
icatio
n
p
r
o
ce
d
u
r
e
co
n
s
is
ts
o
f
a
n
u
m
b
er
o
f
s
tep
s
in
o
r
d
er
to
in
cr
ea
s
e
t
h
e
s
ec
u
r
it
y
o
f
co
n
ten
ts
o
f
Q
R
C
.
T
h
e
p
r
o
p
o
s
ed
QR
A
M
i
s
ap
p
lied
o
n
Q
R
C
to
v
er
i
f
y
s
ec
u
r
i
t
y
o
b
j
ec
tiv
es.
I
n
ad
d
itio
n
,
it v
er
i
f
ies th
e
a
u
t
h
en
t
icit
y
o
f
QR
C
.
Si
m
p
l
y
,
t
h
e
Q
R
A
M
h
as
p
er
f
o
r
m
ed
t
h
r
ee
au
t
h
e
n
ticatio
n
p
r
o
ce
d
u
r
es
ea
ch
o
f
w
h
ic
h
i
s
ap
p
lied
to
a
s
i
n
g
le
p
ar
t
o
f
QR
C
co
n
te
n
t
to
p
r
o
d
u
ce
its
d
is
t
in
g
u
is
h
ed
o
u
tp
u
t.
On
c
e
th
i
s
p
r
o
ce
d
u
r
e
h
as
b
ee
n
ap
p
li
ed
,
th
e
co
m
p
u
ta
tio
n
ti
m
e
is
e
x
p
ec
ted
to
b
e
r
ed
u
c
ed
.
Fo
r
s
ec
u
r
it
y
p
u
r
p
o
s
es,
th
e
v
er
if
icat
io
n
p
r
o
ce
d
u
r
es
w
il
l
s
to
p
i
m
m
ed
iate
l
y
an
d
w
ill
n
o
t g
o
f
o
r
th
e
n
ex
t la
y
er
’
s
v
er
if
icatio
n
i
f
th
e
f
o
llo
win
g
p
o
s
s
ib
ili
t
y
h
a
s
o
cc
u
r
r
ed
w
h
ich
i
s
: th
e
ca
s
e
th
at
o
n
e
la
y
er
h
a
s
p
r
o
d
u
ce
d
a
w
r
o
n
g
l
y
co
m
p
ar
ed
r
es
u
lt.
T
h
u
s
,
Q
R
A
M
i
n
s
ta
n
tl
y
h
al
ts
t
h
e
v
er
i
f
i
ca
tio
n
p
r
o
ce
d
u
r
e.
T
h
er
e
ar
e
h
o
w
ev
er
m
an
y
d
if
f
icu
ltie
s
an
d
ch
alle
n
g
es
s
til
l.
T
h
u
s
,
th
er
e
h
a
v
e
b
ee
n
r
esear
ch
s
t
u
d
ies
atte
m
p
ti
n
g
to
o
v
er
co
m
e
th
o
s
e
ch
allen
g
es.
An
ex
a
m
p
le
o
f
th
o
s
e
ch
alle
n
g
e
s
m
i
g
h
t
b
e
a
co
m
p
en
s
atio
n
o
f
a
tech
n
iq
u
e
to
b
e
f
ast
-
r
esp
o
n
s
i
v
e
to
r
ea
l
-
ti
m
e
I
o
T
ap
p
licat
io
n
s
an
d
r
o
b
u
s
t
en
o
u
g
h
ag
ai
n
s
t
t
h
r
ea
ts
.
T
h
u
s
,
in
o
r
d
er
to
m
ee
t
r
ea
l
-
ti
m
e
ap
p
licatio
n
s
,
f
u
r
t
h
er
e
n
h
a
n
ce
m
en
t
is
n
ee
d
ed
.
T
h
er
ef
o
r
e,
QR
AM
ai
m
s
to
en
h
a
n
ce
au
th
e
n
tica
tio
n
p
r
o
ce
d
u
r
es a
p
p
lied
to
I
o
T
ap
p
licatio
n
s
th
at
d
ep
en
d
o
n
QR
C
i
n
ter
m
s
o
f
co
m
p
u
tatio
n
ti
m
e.
T
h
e
o
r
g
an
izatio
n
o
f
th
i
s
p
ap
er
is
p
r
esen
ted
as
f
o
llo
w
s
:
i
n
s
ec
tio
n
2
,
th
e
p
r
o
p
o
s
ed
m
eth
o
d
o
lo
g
y
o
f
QR
AM
is
i
n
d
etail
e
x
p
lai
n
ed
.
R
esu
l
ts
a
n
d
Dis
c
u
s
s
io
n
w
i
ll
b
e
d
is
cu
s
s
ed
in
s
ec
tio
n
3
.
C
o
n
clu
s
io
n
i
s
d
r
a
w
n
in
s
ec
tio
n
4
.
2.
T
H
E
P
RO
P
O
SE
D
Q
R
AM
Si
m
p
l
y
,
t
h
e
p
r
o
p
o
s
ed
m
eth
o
d
o
lo
g
y
o
f
QR
AM
co
n
tai
n
s
t
h
r
ee
t
y
p
e
s
o
f
au
t
h
e
n
ticatio
n
v
er
if
ica
tio
n
p
r
o
ce
d
u
r
e.
T
h
e
f
ir
s
t
o
n
e
is
a
u
s
er
f
r
eq
u
en
tl
y
-
u
p
d
ated
i
m
a
g
e
(
UI
)
au
th
e
n
ticat
io
n
,
th
e
s
e
co
n
d
o
n
e
is
a
u
s
er
ac
tiv
it
y
-
d
er
i
v
ed
n
u
m
b
er
(
U
AN)
au
th
e
n
ticatio
n
,
an
d
th
e
t
h
i
r
d
au
t
h
en
t
icatio
n
i
s
u
s
e
r
_
I
D
(
UI
D)
.
T
h
e
y
ar
e
g
r
ap
h
icall
y
p
r
esen
ted
a
n
d
s
h
o
w
n
i
n
Fi
g
u
r
e
1
.
T
h
e
f
lo
w
c
h
ar
t
o
f
QR
A
M
i
s
ill
u
s
tr
ated
i
n
Fi
g
u
r
e
2
.
2
.
1
.
UI
a
uthent
ica
t
io
n
E
ac
h
u
s
er
w
i
ll
b
e
ass
i
g
n
ed
a
d
is
tin
cti
v
e
Q
R
C
i
n
o
r
d
er
to
b
e
au
th
en
t
icate
d
.
I
n
th
i
s
p
r
o
ce
d
u
r
e,
th
e
UI
w
i
ll
b
e
ca
p
tu
r
ed
.
T
h
e
QR
A
M
w
i
ll
p
r
o
ce
s
s
it
a
n
d
e
x
tr
ac
t
ce
r
tai
n
i
n
f
o
r
m
a
tio
n
a
n
d
d
is
tin
c
tiv
e
v
al
u
es.
T
h
ese
v
al
u
es
a
n
d
i
n
f
o
r
m
atio
n
w
il
l
b
e
s
e
n
t
to
t
h
e
Q
R
A
M
’
s
d
a
tab
ase
in
o
r
d
er
to
p
er
f
o
r
m
a
r
e
al
-
ti
m
e
co
m
p
ar
i
s
o
n
.
I
f
th
e
UI
is
id
en
tical
to
its
co
r
r
es
p
o
n
d
in
g
v
alu
e
s
w
h
ich
ar
e
s
to
r
ed
in
d
atab
ase.
T
h
e
s
y
s
te
m
w
ill
co
n
s
id
er
th
at
th
e
UI
i
s
au
t
h
e
n
ticated
a
n
d
v
alid
.
Hen
ce
,
th
e
QR
AM
ac
ce
p
ts
th
e
Q
R
C
an
d
m
o
v
e
s
f
o
r
w
ar
d
to
ch
ec
k
o
th
er
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
1
8
,
No
.
4
,
A
u
g
u
s
t
2020:
2
0
0
4
-
2
0
1
1
2006
s
ec
u
r
it
y
f
ac
to
r
s
w
it
h
UAN
an
d
UI
D.
Oth
er
w
is
e,
th
e
QR
AM
r
e
j
ec
ts
th
e
cu
r
r
en
tl
y
p
r
o
ce
s
s
ed
QR
C
an
d
s
to
p
s
th
e
w
h
o
le
p
r
o
ce
d
u
r
e
f
r
o
m
b
ei
n
g
ac
ce
s
s
ed
b
y
u
n
-
au
th
o
r
ized
p
ar
ties
.
Fig
u
r
e
1
.
A
Gr
ap
h
ical
O
v
er
v
ie
w
o
f
t
h
e
P
r
o
p
o
s
ed
QR
A
M
Fig
u
r
e
2
.
T
h
e
Pro
p
o
s
ed
QR
AM
Flo
w
c
h
ar
t
2
.
2
.
UAN
a
uthent
ica
t
io
n
UA
N
c
o
n
t
ain
s
t
w
o
s
t
e
p
s
,
w
h
i
ch
a
r
e
en
c
r
y
p
t
i
o
n
an
d
v
e
r
if
i
c
a
t
io
n
,
a
s
s
h
o
w
n
in
F
ig
u
r
e
3
.
T
h
e
p
r
o
p
o
s
e
d
Q
R
A
M
d
e
t
e
r
m
in
es
c
e
r
t
a
in
v
a
lu
es
t
o
b
e
e
n
c
r
y
p
t
e
d
f
i
r
s
t
.
Usu
a
l
ly
,
v
al
u
e
s
w
h
i
ch
a
r
e
d
e
t
e
r
m
in
e
d
f
o
r
en
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
a
r
e
s
el
e
c
t
e
d
b
as
e
d
o
n
l
at
e
s
t
a
c
t
iv
i
t
i
es
d
o
n
e
b
y
th
e
u
s
e
r
.
T
h
e
n
,
th
es
e
v
a
lu
es
a
r
e
m
a
th
em
a
t
i
c
a
lly
r
e
-
p
r
o
d
u
c
e
d
u
s
in
g
a
p
s
e
u
d
o
r
an
d
o
m
n
u
m
b
er
g
en
e
r
a
t
o
r
(
P
R
N
G
)
.
T
h
en
,
th
ey
w
il
l
b
e
f
o
r
m
a
l
i
z
e
d
a
s
a
m
a
th
em
a
ti
c
a
lly
o
r
d
e
r
e
d
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
a
u
th
e
n
tica
tio
n
meth
o
d
fo
r
I
o
T
a
p
p
lica
tio
n
s
u
s
in
g
th
r
ee
s
ec
u
r
ity
la
ye
r
s
(
A
b
b
a
s
M.
A
l
-
Gh
a
ili
)
2007
n
u
m
b
e
r
s
q
u
eu
e
d
in
a
n
a
r
r
ay
.
T
h
i
s
a
r
r
ay
w
i
ll
b
e
e
n
c
r
y
p
t
ed
t
o
p
r
o
d
u
c
e
a
n
u
n
-
k
n
o
w
n
n
u
m
b
e
r
c
a
l
l
e
d
u
s
e
r
a
c
t
iv
i
ty
-
d
e
r
iv
e
d
n
u
m
b
e
r
(
UA
N
)
.
T
h
e
w
h
o
l
e
a
b
o
v
e
-
m
en
t
i
o
n
e
d
p
r
o
c
e
s
s
in
c
lu
s
iv
e
th
e
en
c
r
y
p
t
i
o
n
s
c
h
em
e
i
s
p
e
r
f
o
r
m
e
d
p
e
r
i
o
d
i
c
al
ly
.
E
v
e
r
y
t
im
e
,
th
e
Q
R
C
i
s
g
en
e
r
at
e
d
,
th
e
n
e
w
UA
N
is
in
cl
u
d
e
d
in
o
r
d
e
r
t
o
m
a
k
e
s
u
r
e
th
a
t
t
h
e
Q
R
C
is
alw
ay
s
u
p
d
a
te
d
a
n
d
c
o
n
t
a
in
s
n
ew
i
n
p
u
t
v
alu
e
s
e
.
g
.
,
UA
N
.
UAN
is
v
er
i
f
ied
b
y
th
e
QR
A
M
to
m
a
k
e
s
u
r
e
th
at
U
A
N
is
cr
ea
ted
u
s
i
n
g
r
ec
en
tl
y
ac
t
iv
e
v
al
u
es
.
I
f
th
e
U
A
N
h
as
b
ee
n
e
n
cr
y
p
te
d
u
s
i
n
g
r
ec
e
n
t
v
alu
e
s
,
th
a
t
m
e
an
s
t
h
e
Q
R
C
i
s
n
e
w
an
d
s
u
r
el
y
is
d
i
f
f
er
en
t
f
r
o
m
th
e
cu
r
r
en
t
l
y
u
s
ed
o
n
e.
T
h
at
is
b
ec
au
s
e
th
e
U
A
N
is
o
n
e
o
f
t
h
e
QR
C
’
s
i
n
p
u
ts
.
T
h
u
s
,
th
e
d
atab
ase
is
u
p
d
ated
an
d
th
e
au
t
h
e
n
ticatio
n
p
r
o
ce
s
s
co
m
p
ar
e
s
its
n
e
w
v
al
u
es
to
QR
C
v
al
u
es
o
n
ce
t
h
e
u
s
er
is
r
eq
u
ir
ed
b
y
th
e
s
y
s
te
m
to
s
en
d
r
eq
u
est
s
.
Fig
u
r
e
3
.
T
h
e
UA
N
Flo
w
c
h
ar
t
(
en
cr
y
p
tio
n
le
f
t
-
h
a
n
d
s
id
e
an
d
v
er
if
icat
io
n
r
ig
h
t
-
h
an
d
s
id
e)
2
.
3
.
UID
a
uthent
ica
t
io
n
I
n
th
is
p
r
o
ce
d
u
r
e
,
th
er
e
w
i
ll
b
e
a
l
o
o
ku
p
ta
b
le
d
esig
n
ed
to
s
to
r
e
all
en
cr
y
p
ted
in
f
o
r
m
a
tio
n
s
u
c
h
as
U
A
N,
E
(
k
e
y
,
A
F
)
,
T
a
,
an
d
T
QRC
.
T
h
ese
v
alu
e
s
ar
e
r
ec
alle
d
o
n
ce
an
ac
ce
s
s
h
as
b
ee
n
m
a
d
e
b
y
th
e
u
s
er
an
d
w
h
e
n
th
e
QR
C
is
s
ca
n
n
ed
.
T
h
e
UI
D
v
er
if
icatio
n
w
i
ll
b
e
ca
r
r
ied
o
u
t
u
s
i
n
g
t
h
is
tab
le.
Sele
cted
v
alu
e
s
w
ill
b
e
ch
o
s
en
to
p
er
f
o
r
m
a
co
m
p
ar
is
o
n
b
et
w
ee
n
UI
D
s
to
r
ed
in
th
is
tab
le
to
UI
D
en
cr
y
p
ted
in
s
i
d
e
th
e
QR
C
.
T
h
is
is
d
is
cu
s
s
ed
as f
o
llo
w
s
:
E
ac
h
u
s
er
is
as
s
i
g
n
ed
a
d
is
tin
c
t
iv
e
UI
D
th
at
w
as
p
r
ev
io
u
s
l
y
p
r
o
d
u
ce
d
.
T
h
is
UI
D
is
s
to
r
ed
in
th
e
o
f
f
lin
e
d
atab
ase.
T
o
m
ak
e
s
u
r
e
w
h
et
h
er
th
e
u
s
er
h
a
s
en
ter
ed
th
e
co
r
r
ec
t
UI
D
o
r
n
o
t,
a
m
at
h
e
m
atica
l
p
r
o
ce
d
u
r
e
is
ap
p
lied
.
T
h
e
f
o
llo
w
i
n
g
s
tep
s
c
an
ad
d
m
o
r
e
cl
ar
i
f
icatio
n
,
e
x
p
lain
ed
as f
o
llo
w
s
:
-
T
w
o
n
e
ig
h
b
o
r
in
g
u
s
er
s
UI
Ds
l
o
ca
ted
as
a
p
r
ed
ec
ess
o
r
an
d
s
u
cc
ess
o
r
w
ith
in
d
e
x
-
v
al
u
es
a
s
:
_
(
−
1
)
an
d
_
(
+
1
)
,
r
esp
ec
tiv
el
y
,
ar
e
s
elec
ted
;
m
ar
k
ed
i
n
Fi
g
u
r
e
4
.
-
E
x
tr
ac
t b
in
ar
y
v
al
u
es
(
UI
D
b
-
1
,
an
d
UI
D
b+
1
)
f
o
r
(
−
1
)
an
d
(
+
1
)
,
r
esp
ec
ti
v
el
y
,
b
y
ap
p
l
y
i
n
g
(
1
)
an
d
(
2
)
:
−
1
=
(
(
−
1
)
)
(
1)
+
1
=
(
(
+
1
)
)
(
2)
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
1
8
,
No
.
4
,
A
u
g
u
s
t
2020:
2
0
0
4
-
2
0
1
1
2008
-
A
p
p
l
y
(
3
)
an
d
(
4
)
to
n
o
r
m
aliz
e
b
in
ar
y
v
al
u
es to
a
ce
r
tain
le
n
g
th
o
f
d
ig
it
s
:
_
1
=
(
−
1
)
(
3)
_
2
=
(
+
1
)
(
4)
w
h
e
n
th
e
−
1
b
ein
g
n
o
r
m
alize
d
,
t
h
e
v
al
u
e
w
ill b
e
co
m
p
ar
ed
to
a
ll v
alu
e
s
s
to
r
ed
in
lo
o
k
u
p
tab
l
e
in
o
r
d
er
t
o
g
u
ar
a
n
tee
th
er
e
w
ill
b
e
n
o
s
i
m
ilar
it
y
b
et
w
ee
n
an
y
t
w
o
d
ig
i
ta
l
n
u
m
b
er
s
.
Me
an
in
g
ea
ch
_
w
i
l
l
b
e
d
is
tin
cti
v
e
f
r
o
m
all
i
t
h
v
a
lu
e
s
f
o
r
an
y
_
ℎ
v
alu
e;
th
u
s
:
∀
∈
{
_
|
0
≤
≤
}
.
w
h
er
e,
-
_
i
r
ep
r
esen
ts
th
e
UI
D
n
u
m
b
er
f
o
r
th
e
u
s
er
(
i)
,
-
us
e
r
s
max
is
th
e
n
u
m
b
er
o
f
u
s
er
s
r
eg
i
s
te
r
ed
in
d
atab
ase.
The
f
o
llo
w
in
g
i
n
eq
u
atio
n
b
ec
o
m
e
s
tr
u
e
to
s
to
r
e
r
elate
d
v
al
u
es in
t
h
e
lo
o
k
u
p
tab
le
f
o
r
au
th
en
ticatio
n
p
u
r
p
o
s
es.
_
(
−
2
)
≠
_
(
−
1
)
≠
_
(
)
≠
_
(
+
1
)
≠
_
(
+
2
)
≠
⋯
≠
_
(
)
ℎ
T
h
is
is
to
p
r
o
d
u
ce
a
d
is
tin
ctiv
e
h
as
h
v
al
u
e
i
n
th
e
n
ex
t step
.
-
A
p
p
l
y
(
5
)
o
n
th
e
s
e
t
w
o
i
n
d
ex
-
v
alu
e
s
to
o
b
tain
h
a
s
h
v
al
u
es:
_
ℎ
ℎ
=
ℎ
(
_
1
⨁
_
2
⨁
)
(
5)
UID
v
a
lue
i
-
3
i
-
2
i
-
1
i
i+
1
i+
2
i+
3
0
►v
al
u
e
(
UID
(
i)
)
=3
1
2
3
4
5
6
Fig
u
r
e
4
.
UI
D
(
i)
an
d
its
Neig
h
b
o
r
in
g
UI
Ds
’
tab
le
3.
RE
SU
L
T
S
AND
D
I
SCU
SS
I
O
N
I
n
th
i
s
s
ec
tio
n
,
th
e
p
er
f
o
r
m
a
n
ce
o
f
th
e
p
r
o
p
o
s
ed
QR
A
M
w
i
ll
b
e
an
la
y
s
ed
.
T
h
e
o
b
tain
ed
r
esu
lt
s
af
ter
th
e
Q
R
A
M
h
as
b
ee
n
ap
p
lied
w
i
ll
b
e
d
is
c
u
s
s
ed
a
n
d
ev
al
u
ated
.
T
h
e
QR
A
M
w
ill
b
e
e
v
alu
ated
i
n
ter
m
o
f
au
th
e
n
tica
tio
n
a
n
d
co
m
p
u
tatio
n
ti
m
e.
3
.
1
.
Aut
hentic
a
t
io
n
T
h
e
QR
C
c
o
n
t
en
ts
a
r
e
v
e
r
if
i
e
d
a
n
d
au
th
en
t
ic
a
t
e
d
.
U
s
u
al
ly
c
o
n
t
en
ts
o
f
QR
C
s
t
o
r
e
d
in
d
at
a
b
a
s
e
w
i
ll
b
e
c
o
m
p
a
r
e
d
t
o
QR
C
o
w
n
e
d
b
y
th
e
u
s
e
r
.
T
h
e
c
o
n
t
en
t
o
f
UA
N
-
b
as
e
d
v
e
r
if
i
ca
t
i
o
n
w
i
ll
b
e
c
o
n
s
i
d
er
e
d
.
T
h
i
s
p
r
o
c
e
d
u
r
e
t
a
k
es
in
t
o
a
c
c
o
u
n
t
th
e
f
o
l
l
o
w
in
g
c
o
n
s
i
d
e
r
a
t
i
o
n
s
w
h
i
le
th
e
QR
C
is
au
th
en
t
ic
a
t
e
d
,
w
h
ich
a
r
e
as
f
o
l
l
o
w
s
:
-
T
im
e
o
f
i
s
s
u
e
o
f
Q
R
C
; T
QRC
-
T
im
e
o
f
u
s
er
ac
ti
v
ities
r
ec
o
r
d
in
g
s
; T
a
-
UAN
databa
se
is
co
m
p
ar
ed
to
U
AN
s
to
r
ed
in
s
id
e
th
e
u
s
er
’
s
Q
R
C
,
U
A
N
user
;
-
E
n
cr
y
p
ted
v
al
u
es
w
i
ll b
e
d
ec
r
y
p
ted
;
T
h
e
p
s
eu
d
o
-
co
d
e
o
f
th
e
UAN
-
b
ased
au
th
en
ticatio
n
is
s
h
o
w
n
in
A
lg
o
r
it
h
m
2
to
ad
d
m
o
r
e
ex
p
lan
atio
n
o
f
s
ec
u
r
it
y
f
ac
to
r
an
al
y
s
i
s
; i.
e.
,
au
t
h
en
t
ica
tio
n
.
A
l
g
o
r
ith
m
1
:
U
A
N
a
u
t
h
en
t
icat
io
n
p
s
eu
d
o
-
co
d
e
as a
v
er
i
f
icati
o
n
to
o
l
set variables as T=0, QRC=False;
call following functions: f
(
T
QRC
), f
(
T
a
),
f
(
E
(
key, AF
);
decrypt QRC owned by the user; //QRC
user
decrypt QRC stored inside database; //QRC
database
extract UAN
user
extract UAN
database
If
(
UAN
user
==UAN
database
)
{/
/ to ensure if QRC is old
If
(
T
QRC
<T
a
)
If
(
Timer==True) {
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
a
u
th
e
n
tica
tio
n
meth
o
d
fo
r
I
o
T
a
p
p
lica
tio
n
s
u
s
in
g
th
r
ee
s
ec
u
r
ity
la
ye
r
s
(
A
b
b
a
s
M.
A
l
-
Gh
a
ili
)
2009
T=1;
QRC=True
;}
Else
T=0;
Else
QRC is true but QRC is old and no more is used
;}
Else
QRC is expired;
End If
If
(
T==1)
message="Request is Accepted";
Else
messa
ge="Request is Rejected";
End If
A
l
g
o
r
ith
m
1
e
n
s
u
r
es
th
at
th
er
e
is
n
o
m
o
d
if
icatio
n
o
n
co
n
te
n
ts
o
f
Q
R
C
in
ter
m
s
o
f
its
d
at
e
o
f
is
s
u
e
.
T
h
er
ef
o
r
e,
it
a
d
d
s
an
if
-
s
tate
m
en
t
b
ased
co
n
d
itio
n
:
if
(
T
i
m
er
==
T
r
u
e)
.
I
f
th
is
co
n
d
itio
n
is
tr
u
e,
th
e
n
T
=1
an
d
au
th
e
n
ticat
io
n
is
ac
ce
p
ted
in
ter
m
s
o
f
v
alid
it
y
a
n
d
ex
p
ir
y
d
ate.
T
h
at
s
u
r
el
y
m
ea
n
s
th
e
QR
C
is
s
u
cc
e
s
s
f
u
ll
y
u
p
d
ated
.
3
.
2
.
Co
m
p
uta
t
io
n t
i
m
e
QR
A
M
in
ter
m
o
f
co
m
p
u
tat
i
o
n
ti
m
e
i
s
e
v
al
u
ated
.
T
h
e
co
m
p
u
tat
io
n
t
i
m
e
n
ee
d
ed
to
p
e
r
f
o
r
m
o
n
e
o
p
er
atio
n
(
i.e
.
,
in
clu
s
iv
e
UI
,
UAN,
an
d
UI
D
au
t
h
en
tica
tio
n
)
o
n
a
s
in
g
le
Q
R
C
i
s
co
n
s
id
er
ed
.
Si
m
p
l
y
,
r
elate
d
co
m
p
u
tatio
n
ti
m
e
(
s
)
ar
e
ca
lcu
lated
u
s
i
n
g
C
++
time
f
u
n
c
tio
n
s
.
T
h
e
o
b
tain
ed
co
m
p
u
tatio
n
t
i
m
e
is
co
m
p
ar
ed
to
s
ev
er
al
co
m
p
etit
iv
e
tec
h
n
iq
u
e
s
as s
h
o
w
n
i
n
T
ab
le
1
.
As
n
o
ticea
b
le
in
T
ab
le
1
,
th
e
c
o
m
p
u
tatio
n
ti
m
e
o
f
QR
AM
is
less
th
a
n
c
er
tif
ica
te
an
d
[
2
3
]
’
s
m
et
h
o
d
s
.
T
h
e
b
lu
e
co
lo
r
f
ield
s
s
h
o
w
t
h
e
tech
n
iq
u
es
h
av
e
u
s
ed
in
co
m
p
ar
i
s
o
n
.
T
h
e
g
r
ee
n
co
lo
r
f
ie
ld
s
s
h
o
w
h
o
w
m
a
n
y
QR
co
d
es
h
av
e
b
ee
n
u
s
ed
in
e
x
p
er
i
m
e
n
t,
i.e
.
,
s
a
m
p
les
s
ize.
T
h
e
y
ello
w
co
lo
r
f
ield
s
s
h
o
w
t
h
e
co
m
p
u
tatio
n
ti
m
e
co
n
s
u
m
ed
f
o
r
ea
ch
tec
h
n
iq
u
e
p
er
ev
er
y
s
a
m
p
le
s
ize.
T
h
e
r
ed
co
lo
r
f
ield
s
s
h
o
w
th
e
a
v
er
ag
e
d
co
m
p
u
tatio
n
ti
m
e
f
o
r
all
tec
h
n
iq
u
es.
I
t
i
s
o
b
v
io
u
s
l
y
clea
r
t
h
at
t
h
e
p
r
o
p
o
s
ed
QR
AM
co
m
es
in
th
e
2
nd
r
a
n
k
a
m
o
n
g
s
t
o
th
er
tec
h
n
iq
u
e
s
w
it
h
a
n
av
er
g
ed
co
m
p
u
tatio
n
t
i
m
e
eq
u
al
s
to
2
9
3
.
6
4
m
S
w
it
h
1
.
6
9
6
tim
e
s
f
a
s
ter
th
a
n
th
e
c
e
r
tif
icate
tec
h
n
iq
u
e.
Fo
r
a
m
o
r
e
cl
ar
if
icatio
n
,
p
er
f
o
r
m
an
ce
e
v
al
u
atio
n
o
f
t
h
e
p
r
o
p
o
s
ed
QR
A
M
i
s
p
r
o
v
id
ed
in
wh
ich
it
is
co
m
p
ar
ed
to
o
th
er
co
m
p
eti
tiv
e
tech
n
iq
u
es
as
s
h
o
w
n
i
n
Fi
g
u
r
e
5
.
As
s
h
o
w
n
i
n
Fi
g
u
r
e
5
,
th
e
p
r
o
p
o
s
ed
QR
AM
’
s
co
m
p
u
tatio
n
ti
m
e
is
lo
ca
ted
in
th
e
s
ec
o
n
d
r
an
k
.
T
ab
le
1
.
QR
A
M
co
m
p
u
tatio
n
ti
m
e
co
m
p
ar
ed
to
o
th
er
tech
n
i
q
u
es
;
ti
m
e
i
n
m
i
llis
ec
o
n
d
(
m
S
)
T
e
c
h
n
i
q
u
e
N
u
m
b
e
r
o
f
QR
c
o
d
e
s us
e
d
i
n
e
x
p
e
r
i
m
e
n
t
s
10
50
1
0
0
1
5
0
3
0
0
C
o
m
p
u
t
a
t
i
o
n
t
i
m
e
i
n
mS
A
v
e
r
a
g
e
d
c
o
m
p
u
t
a
t
i
o
n
t
i
m
e
Pa
ss
w
o
r
d
2
4
.
9
1
1
5
.
6
2
0
5
.
1
3
4
6
.
7
6
2
2
.
2
2
6
2
.
9
[
2
3
]
3
1
.
4
1
4
9
.
0
3
1
3
.
3
4
4
4
.
5
8
0
7
.
8
3
4
9
.
2
C
e
r
t
i
f
i
c
a
t
e
4
5
.
2
2
1
2
.
6
4
5
2
.
2
6
3
7
.
1
1
1
4
3
.
9
4
9
8
.
2
Pr
o
p
o
sed
QR
A
M
2
8
.
6
1
3
2
.
1
2
2
6
.
7
3
9
0
.
6
6
9
0
.
2
2
9
3
.
6
4
Fig
u
r
e
5
.
P
er
f
o
r
m
a
n
ce
ev
al
u
at
io
n
in
ter
m
s
o
f
co
m
p
u
tat
io
n
ti
m
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6930
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
,
Vo
l.
1
8
,
No
.
4
,
A
u
g
u
s
t
2020:
2
0
0
4
-
2
0
1
1
2010
3
.
3
.
Ro
bu
s
t
nes
s
ba
s
ed
o
n
k
e
y
le
ng
t
h a
g
a
ins
t
brute
f
o
rc
e
a
t
t
a
ck
L
e
n
g
t
h
o
f
s
ec
r
et
k
e
y
is
e
v
al
u
at
ed
.
T
h
e
QR
A
M
h
a
s
ad
o
p
ted
tw
o
d
if
f
er
en
t
k
e
y
-
len
g
t
h
s
w
i
th
s
izes
o
f
3
2
0
an
d
3
8
4
b
its
.
T
h
is
ev
alu
atio
n
s
u
p
p
o
s
es
t
h
at
w
h
e
n
th
e
Q
R
AM
h
as
u
s
ed
a
k
e
y
o
f
le
n
g
th
eq
u
als
to
3
2
0
an
d
3
8
4
b
its
,
th
e
d
ec
r
y
p
tio
n
ti
m
e
o
f
b
r
u
te
f
o
r
ce
attac
k
-
b
ased
s
ch
e
m
e
n
ee
d
s
ab
o
u
t
3
.
4
×1
0
76
a
n
d
6
.
3
×1
0
95
y
ea
r
s
,
r
esp
ec
tiv
el
y
.
T
h
u
s
,
QR
AM
is
r
o
b
u
s
t.
4.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
h
as
p
r
o
p
o
s
ed
a
s
im
p
le
v
er
i
f
icatio
n
m
et
h
o
d
u
til
izin
g
QR
C
to
au
th
e
n
ticate
it
s
co
n
ten
ts
.
QR
A
M
p
u
r
p
o
s
e
is
to
ap
p
ly
s
ev
er
al
s
tep
s
ap
p
lied
o
n
s
ev
er
al
lay
er
s
to
in
cr
ea
s
e
s
ec
u
r
it
y
o
f
co
n
te
n
t
s
o
f
an
I
o
T
ap
p
licatio
n
.
T
h
er
e
w
ill
b
e
th
r
e
e
v
er
if
ica
tio
n
p
r
o
ce
d
u
r
es
i
m
p
l
e
m
en
ted
to
d
o
s
o
w
h
ic
h
ar
e:
UI
,
UA
N,
a
n
d
UI
D.
T
h
is
p
r
o
p
o
s
ed
m
ec
h
a
n
is
m
al
s
o
ai
m
s
to
r
ed
u
ce
t
h
e
co
m
p
u
tat
io
n
ti
m
e.
QR
AM
b
y
t
h
en
m
a
k
es
a
d
ec
is
io
n
ei
th
er
to
ac
ce
p
t
o
r
r
e
j
ec
t
s
u
ch
a
r
eq
u
e
s
t
o
f
an
ac
ce
s
s
to
th
e
r
elate
d
I
o
T
ap
p
licatio
n
.
A
r
eq
u
est
o
f
an
ac
ce
s
s
is
m
ad
e
u
s
i
n
g
a
Q
R
C
an
d
t
h
er
e
f
o
r
e
th
e
Q
R
A
M
s
ec
u
r
el
y
a
u
t
h
en
ti
ca
te
s
co
n
te
n
t
s
o
f
QR
C
.
R
e
s
u
lts
co
n
f
ir
m
ed
t
h
at
th
e
Q
R
A
M
i
s
f
aster
th
a
n
o
t
h
er
co
m
p
etiti
v
e
tec
h
n
iq
u
e
s
.
I
n
ad
d
itio
n
,
r
es
u
lt
s
h
av
e
s
h
o
w
n
a
h
i
g
h
lev
e
l
o
f
co
m
p
le
x
it
y
i
n
ter
m
s
o
f
d
ec
r
y
p
tio
n
ti
m
e
n
ee
d
ed
to
d
ed
u
ce
t
h
e
Q
R
C
’
s
s
ec
r
et
k
e
y
.
Ob
tai
n
e
d
r
esu
lts
co
n
f
ir
m
ed
th
at
t
h
e
Q
R
A
M
is
r
o
b
u
s
t
a
g
ai
n
s
t
u
n
u
s
u
a
l
th
r
ea
t
s
an
d
p
o
ten
t
i
al
ac
tio
n
s
.
T
h
e
QR
AM
is
i
m
p
o
r
tan
t
to
w
o
r
k
w
it
h
ap
p
licatio
n
s
w
h
ic
h
r
e
q
u
ir
e
o
n
l
in
e
v
er
if
ica
tio
n
p
r
o
ce
s
s
e
s
.
F
u
t
u
r
e
w
o
r
k
s
ar
e
d
ed
icate
d
to
en
h
an
ce
co
m
p
u
ta
tio
n
ti
m
e
to
w
o
r
k
i
n
a
f
as
ter
en
v
i
r
o
n
m
e
n
t
u
n
d
er
co
m
p
le
x
s
ce
n
ar
io
s
e.
g
.
,
w
h
e
n
th
er
e
ar
e
m
o
r
e
th
an
t
w
o
p
ar
ties
r
eq
u
ir
in
g
a
r
esp
o
n
s
e
in
a
s
a
m
e
ti
m
e.
ACK
NO
WL
E
D
G
E
M
E
NT
T
h
is
r
esea
r
ch
is
f
u
n
d
ed
b
y
Un
i
v
er
s
i
ti
T
en
ag
a
Na
s
io
n
al
(
UNI
T
E
N)
w
it
h
g
r
a
n
t
co
d
e
:
(
B
OL
D2
0
2
5
-
1
0
4
3
6
4
9
4
/B
/2
0
1
9
1
1
5
)
RE
F
E
R
E
NC
E
S
[1
]
R.
F
o
c
a
rd
i
,
F
.
L
.
L
u
c
c
io
,
a
n
d
H.
A
.
M
.
W
a
h
sh
e
h
,
"
Us
a
b
le
se
c
u
rit
y
f
o
r
QR
c
o
d
e
,
"
J
o
u
rn
a
l
o
f
In
f
o
rm
a
ti
o
n
S
e
c
u
rity
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
v
o
l
.
4
8
,
p
.
1
0
2
3
6
9
,
1
Oc
to
b
e
r
2
0
1
9
.
[2
]
Y.
W
a
n
g
,
C.
S
u
n
,
P
.
K
u
a
n
,
C.
L
u
,
a
n
d
H.
W
a
n
g
,
"
S
e
c
u
re
d
g
ra
p
h
ic
QR
c
o
d
e
w
it
h
in
f
ra
re
d
w
a
ter
m
a
rk
,
"
i
n
2
0
1
8
I
E
E
E
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
A
p
p
l
i
e
d
S
y
s
t
e
m
I
n
v
e
n
t
i
o
n
(
I
C
A
S
I
)
,
p
p
.
6
9
0
-
6
9
3
,
2
0
1
8
.
[3
]
Y.
Ch
e
n
g
,
Z.
F
u
,
a
n
d
B.
Yu
,
"
Im
p
r
o
v
e
d
V
isu
a
l
S
e
c
re
t
S
h
a
rin
g
S
c
h
e
m
e
f
o
r
QR
Co
d
e
A
p
p
li
c
a
ti
o
n
s,"
IE
EE
T
r
a
n
sa
c
ti
o
n
s
o
n
I
n
fo
rm
a
ti
o
n
F
o
re
n
sic
s a
n
d
S
e
c
u
rity
,
v
o
l.
1
3
,
n
o
.
9
,
p
p
.
2
3
9
3
-
2
4
0
3
,
2
0
1
8
.
[4
]
Z.
F
u
,
Y.
C
h
e
n
g
,
a
n
d
B.
Yu
,
"
V
isu
a
l
Cry
p
to
g
ra
p
h
y
S
c
h
e
m
e
W
it
h
M
e
a
n
in
g
f
u
l
S
h
a
re
s
Ba
se
d
o
n
QR
Co
d
e
s,"
IEE
E
Acc
e
ss
,
v
o
l.
6
,
p
p
.
5
9
5
6
7
-
5
9
5
7
4
,
2
0
1
8
.
[5
]
J.
S
o
n
g
,
K.
G
a
o
,
X.
S
h
e
n
,
X.
Qi,
R.
L
iu
,
a
n
d
K.
-
K.
R.
C
h
o
o
,
"
QRFen
c
e
:
A
f
lex
ib
le
a
n
d
sc
a
lab
le
QR
li
n
k
se
c
u
rit
y
d
e
tec
ti
o
n
f
ra
m
e
w
o
rk
f
o
r
A
n
d
ro
id
d
e
v
ice
s,"
Fu
tu
re
Ge
n
e
ra
ti
o
n
C
o
m
p
u
ter
S
y
st
e
ms
,
v
o
l.
8
8
,
p
p
.
6
6
3
-
6
7
4
,
2
0
1
8
.
[6
]
Y.
Qin
,
Z.
W
a
n
g
,
H.
W
a
n
g
,
a
n
d
Q.
G
o
n
g
,
"
Bin
a
r
y
i
m
a
g
e
e
n
c
r
y
p
ti
o
n
i
n
a
jo
in
t
tra
n
sf
o
rm
c
o
rre
lato
r
sc
h
e
m
e
b
y
a
id
o
f
ru
n
-
len
g
t
h
e
n
c
o
d
in
g
a
n
d
QR co
d
e
,
"
Op
ti
c
s
&
L
a
se
r T
e
c
h
n
o
lo
g
y
,
v
o
l.
1
0
3
,
p
p
.
9
3
-
9
8
,
2
0
1
8
.
[7
]
Y.
W
e
i,
A
.
Ya
n
,
J.
Do
n
g
,
Z
.
Hu
,
a
n
d
J.
Z
h
a
n
g
,
"
Op
ti
c
a
l
im
a
g
e
e
n
c
ry
p
ti
o
n
u
sin
g
QR
c
o
d
e
a
n
d
m
u
lt
il
e
v
e
l
f
in
g
e
rp
rin
ts
in
g
y
ra
to
r
tran
sf
o
r
m
d
o
m
a
in
s,"
O
p
ti
c
s Co
mm
u
n
ica
t
i
o
n
s
,
v
o
l.
4
0
3
,
p
p
.
6
2
-
6
7
,
2
0
1
7
.
[8
]
P
.
Na
z
e
m
z
a
d
e
h
,
D.
F
o
n
ta
n
e
ll
i,
D.
M
a
c
ii
,
a
n
d
L
.
P
a
lo
p
o
li
,
"
In
d
o
o
r
L
o
c
a
li
z
a
ti
o
n
o
f
M
o
b
il
e
Ro
b
o
ts
T
h
ro
u
g
h
QR
Co
d
e
De
tec
ti
o
n
a
n
d
De
a
d
Re
c
k
o
n
in
g
Da
ta
F
u
si
o
n
,
"
IE
EE
/A
S
M
E
T
ra
n
sa
c
ti
o
n
s
o
n
M
e
c
h
a
tro
n
i
c
s
,
v
o
l.
2
2
,
n
o
.
6
,
p
p
.
2
5
8
8
-
2
5
9
9
,
2
0
1
7
.
[9
]
S
.
De
m
ir,
R.
Ka
y
n
a
k
,
a
n
d
K.
A
.
De
m
ir,
"
Us
a
g
e
Lev
e
l
a
n
d
F
u
tu
re
In
te
n
t
o
f
Us
e
o
f
Qu
ick
Re
sp
o
n
se
(
QR)
Co
d
e
s
f
o
r
M
o
b
il
e
M
a
rk
e
ti
n
g
a
m
o
n
g
Co
ll
e
g
e
S
tu
d
e
n
ts
in
T
u
rk
e
y
,
"
Pro
c
e
d
ia
-
S
o
c
ia
l
a
n
d
Beh
a
v
i
o
ra
l
S
c
ien
c
es
,
v
o
l.
1
8
1
,
p
p
.
4
0
5
-
4
1
3
,
2
0
1
5
.
[1
0
]
M
.
K.
S
c
h
u
l
tz,
"
A
c
a
s
e
stu
d
y
o
n
t
h
e
a
p
p
r
o
p
riate
n
e
ss
o
f
u
sin
g
q
u
ick
re
sp
o
n
se
(
QR)
c
o
d
e
s
i
n
li
b
ra
ries
a
n
d
m
u
se
u
m
s,
"
L
ib
ra
r
y
&
In
f
o
r
m
a
ti
o
n
S
c
ien
c
e
Re
se
a
rc
h
,
v
o
l.
3
5
,
n
o
.
3
,
p
p
.
2
0
7
-
2
1
5
,
2
0
1
3
.
[1
1
]
S
.
G
o
y
a
l,
S
.
Ya
d
a
v
,
a
n
d
M
.
M
a
th
u
ria,
"
Ex
p
lo
rin
g
c
o
n
c
e
p
t
o
f
QR
c
o
d
e
a
n
d
it
s
b
e
n
e
f
it
s
in
d
ig
it
a
l
e
d
u
c
a
ti
o
n
sy
ste
m
,
"
in
2
0
1
6
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Ad
v
a
n
c
e
s
in
Co
m
p
u
t
in
g
,
Co
mm
u
n
ic
a
ti
o
n
s
a
n
d
In
fo
rm
a
ti
c
s
(
ICACCI)
,
p
p
.
1
1
4
1
-
1
1
4
7
,
2
0
1
6
.
[1
2
]
A
.
M
.
A
l
-
G
h
a
il
i,
H.
Ka
si
m
,
F
.
A
.
Ra
h
im
,
Z.
A
.
Ib
r
a
h
im
,
M
.
Oth
m
a
n
,
a
n
d
Z
.
Ha
ss
a
n
,
"
S
m
a
rt
v
e
ri
f
ica
t
io
n
a
lg
o
rit
h
m
f
o
r
Io
T
a
p
p
li
c
a
ti
o
n
s u
si
n
g
QR t
a
g
,
"
L
e
c
tu
re
No
tes
in
El
e
c
trica
l
En
g
in
e
e
rin
g
,
v
o
l
.
4
8
1
,
p
p
.
1
0
7
-
1
1
6
,
2
0
1
9
.
[1
3
]
A
.
M
.
A
l
-
G
h
a
il
i,
H.
Ka
si
m
,
M
.
Ot
h
m
a
n
,
a
n
d
Z.
Ha
ss
a
n
,
"
S
e
c
u
rit
y
F
a
c
to
rs
Ba
se
d
Ev
a
lu
a
ti
o
n
o
f
V
e
rif
i
c
a
ti
o
n
A
lg
o
rit
h
m
f
o
r
a
n
Io
T
A
c
c
e
ss
S
y
ste
m
,
"
in
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
f
Relia
b
le
In
f
o
rm
a
ti
o
n
a
n
d
Co
mm
u
n
ica
t
io
n
T
e
c
h
n
o
lo
g
y
,
2
0
1
8
:
S
p
ri
n
g
e
r,
p
p
.
3
8
4
-
3
9
5
,
2
0
1
8
.
[1
4
]
T
.
Kirk
h
a
m
,
D.
A
r
m
stro
n
g
,
K.
Dje
m
a
m
e
,
a
n
d
M
.
Jia
n
g
,
"
Risk
d
riv
e
n
S
m
a
rt
Ho
m
e
re
so
u
rc
e
m
a
n
a
g
e
m
e
n
t
u
sin
g
c
lo
u
d
se
rv
ice
s,"
Fu
tu
re
Ge
n
e
ra
ti
o
n
C
o
mp
u
ter
S
y
ste
ms
,
v
o
l.
3
8
,
p
p
.
1
3
-
2
2
,
2
0
1
4
.
[1
5
]
A
.
Čo
lak
o
v
ić
a
n
d
M
.
Ha
d
ž
ialić,
"
In
tern
e
t
o
f
T
h
in
g
s
(
Io
T
):
A
re
v
ie
w
o
f
e
n
a
b
li
n
g
tec
h
n
o
lo
g
ies
,
c
h
a
ll
e
n
g
e
s,
a
n
d
o
p
e
n
re
se
a
rc
h
issu
e
s,"
Co
mp
u
ter
Ne
tw
o
rk
s
,
v
o
l.
1
4
4
,
p
p
.
1
7
-
3
9
,
2
0
1
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
K
A
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l
C
o
n
tr
o
l
QR
co
d
e
b
a
s
ed
a
u
th
e
n
tica
tio
n
meth
o
d
fo
r
I
o
T
a
p
p
lica
tio
n
s
u
s
in
g
th
r
ee
s
ec
u
r
ity
la
ye
r
s
(
A
b
b
a
s
M.
A
l
-
Gh
a
ili
)
2011
[1
6
]
S
.
Ra
n
e
,
A
.
Du
b
e
y
,
a
n
d
T
.
P
a
rid
a
,
"
De
si
g
n
o
f
Io
T
b
a
s
e
d
in
telli
g
e
n
t
p
a
rk
in
g
s
y
ste
m
u
sin
g
i
m
a
g
e
p
ro
c
e
s
sin
g
a
lg
o
rit
h
m
s,
"
in
2
0
1
7
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
m
p
u
t
in
g
M
e
th
o
d
o
l
o
g
ies
a
n
d
Co
mm
u
n
ic
a
ti
o
n
(
ICCM
C)
,
p
p
.
1
0
4
9
-
1
0
5
3
,
2
0
1
7
.
[1
7
]
A
.
P
a
v
e
rd
e
t
a
l.
,
"
O
m
n
iS
h
a
re
:
En
c
ry
p
ted
Clo
u
d
S
t
o
ra
g
e
f
o
r
th
e
M
u
lt
i
-
De
v
ice
Era,
"
IEE
E
In
ter
n
e
t
Co
mp
u
ti
n
g
,
v
o
l.
2
2
,
n
o
.
4
,
p
p
.
2
7
-
3
6
,
2
0
1
8
.
[1
8
]
A
.
M
.
A
l
-
G
h
a
il
i,
H.
Ka
sim
,
M
.
Oth
m
a
n
,
a
n
d
Z.
Ha
ss
a
n
,
"
A
Ne
w
En
c
r
y
p
ti
o
n
S
c
h
e
m
e
M
e
th
o
d
(
ES
M
)
Us
i
n
g
Ca
p
su
late
d
-
L
a
y
e
rs
Co
n
c
e
p
ti
o
n
f
o
r
V
e
rif
i
e
d
QR
-
Tag
f
o
r
Io
T
-
B
a
se
d
S
m
a
rt
Ac
c
e
ss
S
y
st
e
m
s,"
in
In
tern
e
t
o
f
T
h
in
g
s
a
n
d
Big
Da
ta
A
n
a
l
y
ti
c
s
f
o
r
S
m
a
rt
Ge
n
e
ra
ti
o
n
,
V.
E.
Ba
las
,
V
.
K
.
S
o
la
n
k
i,
R.
Ku
m
a
r,
a
n
d
M
.
Kh
a
ri
Ed
s
.
Ch
a
m
:
S
p
rin
g
e
r
In
ter
n
a
t
io
n
a
l
Pu
b
li
sh
i
n
g
,
p
p
.
7
7
-
103
,
2
0
1
9
.
[1
9
]
N.
V
.
A
k
h
il
,
A
.
V
ij
a
y
,
a
n
d
D.
S
.
Ku
m
a
r,
"
QR
c
o
d
e
se
c
u
rit
y
u
sin
g
p
ro
x
y
re
-
e
n
c
r
y
p
ti
o
n
,
"
in
2
0
1
6
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Circ
u
it
,
Po
we
r
a
n
d
Co
m
p
u
ti
n
g
T
e
c
h
n
o
lo
g
ies
(
ICCPCT
)
,
p
p
.
1
-
5
,
2
0
1
6
.
[2
0
]
S
.
S
u
n
,
S
.
Ha
n
,
D.
G
u
,
a
n
d
S
.
L
iu
,
"
P
u
b
li
c
k
e
y
c
r
y
p
to
s
y
ste
m
s
s
e
c
u
re
a
g
a
in
st
m
e
m
o
r
y
lea
k
a
g
e
a
tt
a
c
k
s,"
IET
In
f
o
rm
a
ti
o
n
S
e
c
u
rity
,
v
o
l.
1
0
,
n
o
.
6
,
p
p
.
4
0
3
-
4
1
2
,
2
0
1
6
.
[2
1
]
D.
-
S
.
Oh
,
B.
-
H.
Kim
,
a
n
d
J.
-
K.
L
e
e
,
"
A
S
tu
d
y
o
n
A
u
th
e
n
ti
c
a
ti
o
n
S
y
ste
m
Us
in
g
QR
Co
d
e
f
o
r
M
o
b
il
e
Clo
u
d
Co
m
p
u
ti
n
g
En
v
iro
n
m
e
n
t,
"
Be
rli
n
,
He
id
e
lb
e
rg
,
2
0
1
1
:
S
p
ri
n
g
e
r B
e
rli
n
He
id
e
lb
e
rg
,
in
F
u
tu
re
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
,
p
p
.
5
0
0
-
507
,
2
0
1
1
.
[2
2
]
S
.
S
.
I
.
S
a
m
u
e
l,
"
A
re
v
ie
w
o
f
c
o
n
n
e
c
ti
v
it
y
c
h
a
ll
e
n
g
e
s
in
I
o
T
-
s
m
a
rt
h
o
m
e
,
"
in
2
0
1
6
3
rd
M
EC
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
B
ig
D
a
ta
a
n
d
S
ma
rt Ci
ty
(
ICBDS
C)
,
p
p
.
1
-
4
,
2
0
1
6
.
[2
3
]
Y.
G
.
Ki
m
a
n
d
M
.
S
.
Ju
n
,
"
A
d
e
sig
n
o
f
u
se
r
a
u
th
e
n
ti
c
a
ti
o
n
sy
ste
m
u
sin
g
QR
c
o
d
e
i
d
e
n
ti
f
y
in
g
m
e
th
o
d
,
"
in
2
0
1
1
6
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
m
p
u
ter
S
c
ien
c
e
s
a
n
d
Co
n
v
e
rg
e
n
c
e
In
fo
rm
a
t
io
n
T
e
c
h
n
o
lo
g
y
(
ICCIT
)
,
p
p
.
3
1
-
35
,
2
0
1
1
.
[2
4
]
G
.
Ja
sp
h
e
r,
W
.
Ka
th
e
rin
e
,
E.
Kir
u
b
a
k
a
ra
n
,
a
n
d
P
.
P
ra
k
a
sh
,
"
S
m
a
r
t
c
a
rd
b
a
se
d
re
m
o
te
u
se
r
a
u
th
e
n
ti
c
a
ti
o
n
sc
h
e
m
e
s:
S
u
rv
e
y
,
"
in
Co
mp
u
t
in
g
Co
mm
u
n
i
c
a
ti
o
n
&
Ne
two
rk
in
g
T
e
c
h
n
o
lo
g
i
e
s
(
ICCCNT
),
T
h
ird
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
2
0
1
2
,
p
p
.
1
-
5
,
2
0
1
2
.
[2
5
]
J.
S
u
e
t
a
l
.
,
"
i
-
L
o
g
isti
c
s:
A
n
in
telli
g
e
n
t
L
o
g
isti
c
s
s
y
ste
m
b
a
se
d
o
n
I
n
t
e
rn
e
t
o
f
th
i
n
g
s,"
in
2
0
1
7
I
n
ter
n
a
t
i
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
A
p
p
li
e
d
S
y
ste
m In
n
o
v
a
ti
o
n
(
ICAS
I)
,
p
p
.
3
3
1
-
3
3
4
,
2
0
1
7
.
[2
6
]
L
.
Ru
ss
e
ll
,
R.
G
o
u
b
ra
n
,
a
n
d
F
.
Kw
a
m
e
n
a
,
"
S
e
n
sin
g
in
stru
m
e
n
tatio
n
u
si
n
g
sm
a
rtp
h
o
n
e
s:
S
e
c
u
rin
g
im
p
a
c
t
a
n
d
a
w
a
re
n
e
s
s,"
in
2
0
1
8
IE
EE
I
n
ter
n
a
ti
o
n
a
l
I
n
stru
me
n
t
a
ti
o
n
a
n
d
M
e
a
su
re
me
n
t
T
e
c
h
n
o
lo
g
y
Co
n
fer
e
n
c
e
(
I2
M
T
C)
,
p
p
.
1
-
5
,
2
0
1
8
.
[2
7
]
M
.
T
o
g
a
n
,
B.
Ch
if
o
r,
I.
F
lo
re
a
,
a
n
d
G
.
G
u
g
u
lea
,
"
A
s
m
a
rt
-
p
h
o
n
e
b
a
se
d
p
riv
a
c
y
-
p
re
s
e
rv
in
g
se
c
u
rit
y
f
ra
m
e
w
o
r
k
f
o
r
Io
T
d
e
v
ice
s,"
in
2
0
1
7
9
th
In
te
rn
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
El
e
c
tro
n
ics
,
Co
mp
u
ter
s a
n
d
Arti
fi
c
i
a
l
I
n
te
ll
ig
e
n
c
e
(
ECA
I)
,
p
p
.
1
-
7
,
2
0
1
7
.
[2
8
]
M
.
S
u
re
sh
,
P
.
S
.
Ku
m
a
r,
a
n
d
T
.
V.
P
.
S
u
n
d
a
ra
ra
jan
,
"
Io
T
Ba
se
d
A
irp
o
rt
P
a
rk
in
g
S
y
ste
m
,
"
in
2
0
1
5
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
In
n
o
v
a
ti
o
n
s i
n
In
f
o
rm
a
ti
o
n
,
Emb
e
d
d
e
d
a
n
d
Co
mm
u
n
ica
ti
o
n
S
y
ste
ms
(
ICIIE
CS
)
,
p
p
.
1
-
5
,
2
0
1
5
.
[2
9
]
A
.
M
.
A
l
-
G
h
a
il
i,
F
.
A
.
Ra
h
im
,
F
.
A
z
m
a
n
,
a
n
d
H.
Ka
sim
,
"
E
ff
ic
ien
t
Im
p
lem
e
n
tatio
n
o
f
2
D
Ba
rc
o
d
e
V
e
rif
ica
ti
o
n
A
l
g
o
rit
h
m
f
o
r
Io
T
A
p
p
li
c
a
ti
o
n
s,"
in
2
0
1
9
IEE
E
5
th
I
n
tl
C
o
n
fer
e
n
c
e
o
n
B
ig
D
a
ta
S
e
c
u
rity
o
n
Cl
o
u
d
(
Bi
g
Da
ta
S
e
c
u
rity),
IEE
E
I
n
tl
C
o
n
fer
e
n
c
e
o
n
Hi
g
h
Pe
rfo
rm
a
n
c
e
a
n
d
S
m
a
rt
C
o
mp
u
ti
n
g
,
(
HPS
C)
a
n
d
I
EE
E
I
n
tl
Co
n
fer
e
n
c
e
o
n
I
n
telli
g
e
n
t
Da
ta
a
n
d
S
e
c
u
ri
ty
(
IDS
)
,
p
p
.
2
8
2
-
2
8
7
,
27
-
2
9
M
a
y
2
0
1
9
.
[3
0
]
C.
Ya
o
,
"
Co
n
s
tru
c
ti
n
g
a
Us
e
r
-
F
rie
n
d
ly
a
n
d
S
m
a
rt
Ub
iq
u
it
o
u
s
P
e
rso
n
a
li
z
e
d
L
e
a
rn
in
g
En
v
iro
n
m
e
n
t
b
y
Us
in
g
a
Co
n
tex
t
-
Aw
a
re
M
e
c
h
a
n
is
m
,
"
IEE
E
T
ra
n
s
a
c
ti
o
n
s o
n
L
e
a
r
n
in
g
T
e
c
h
n
o
l
o
g
ies
,
v
o
l.
1
0
,
n
o
.
1
,
p
p
.
1
0
4
-
1
1
4
,
2
0
1
7
.
[3
1
]
M
.
E
d
in
g
e
r,
D
.
Ba
r
-
S
h
a
lo
m
,
N.
S
a
n
d
ler,
J.
Ra
n
ta
n
e
n
,
a
n
d
N.
G
e
n
in
a
,
"
QR en
c
o
d
e
d
sm
a
rt
o
ra
l
d
o
sa
g
e
f
o
rm
s b
y
in
k
jet
p
rin
ti
n
g
,
"
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Ph
a
rm
a
c
e
u
ti
c
s
,
v
o
l.
5
3
6
,
n
o
.
1
,
p
p
.
1
3
8
-
1
4
5
,
2
0
1
8
.
[3
2
]
P.
-
C.
Hu
a
n
g
,
C.
-
C
.
Ch
a
n
g
,
Y.
-
H
.
L
i,
a
n
d
Y.
L
iu
,
"
Eff
icie
n
t
a
c
c
e
ss
c
o
n
tro
l
sy
ste
m
b
a
se
d
o
n
a
e
st
h
e
ti
c
QR
c
o
d
e
,
"
Per
so
n
a
l
U
b
iq
u
it
o
u
s C
o
mp
u
t
.,
v
o
l.
2
2
,
n
o
.
1
,
p
p
.
8
1
-
9
1
,
2
0
1
8
.
[3
3
]
T
.
Ko
b
a
y
a
sh
i,
R.
Na
k
a
sh
i
m
a
,
R.
Uc
h
id
a
,
a
n
d
K.
A
ra
i,
"
S
NS
Do
o
r
P
h
o
n
e
a
s
Ro
b
o
ti
c
P
r
o
c
e
ss
A
u
to
m
a
ti
o
n
,
"
p
re
se
n
ted
a
t
t
h
e
Pro
c
e
e
d
i
n
g
s o
f
t
h
e
2
0
1
8
ACM
In
ter
n
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
In
ter
a
c
ti
v
e
S
u
rfa
c
e
s a
n
d
S
p
a
c
e
s
,
T
o
k
y
o
,
Ja
p
a
n
,
2
0
1
8
.
[3
4
]
Y.
Zh
o
u
e
t
a
l.
,
"
M
e
th
o
d
o
f
m
u
lt
ip
le
-
im
a
g
e
h
id
in
g
in
QR
c
o
d
e
b
a
se
d
o
n
c
o
m
p
re
ss
e
d
se
n
sin
g
a
n
d
o
rt
h
o
g
o
n
a
l
m
o
d
u
latio
n
,
"
Op
ti
k
,
v
o
l.
1
5
9
,
p
p
.
2
6
5
-
2
7
4
,
2
0
1
8
.
[3
5
]
J.
Qia
n
,
X
.
D
u
,
B.
Z
h
a
n
g
,
B.
F
a
n
,
a
n
d
X
.
Ya
n
g
,
"
Op
ti
m
iza
ti
o
n
o
f
QR
c
o
d
e
re
a
d
a
b
il
it
y
in
m
o
v
e
m
e
n
t
sta
t
e
u
sin
g
re
sp
o
n
se
su
rf
a
c
e
m
e
th
o
d
o
lo
g
y
f
o
r
im
p
le
m
e
n
ti
n
g
c
o
n
ti
n
u
o
u
s
c
h
a
in
trac
e
a
b
il
it
y
,
"
Co
mp
u
ter
s
a
n
d
El
e
c
tro
n
ics
in
A
g
ric
u
lt
u
re
,
v
o
l.
1
3
9
,
p
p
.
5
6
-
6
4
,
2
0
1
7
.
[3
6
]
D.
Ro
sa
rio
-
Ra
y
m
u
n
d
o
a
n
d
M
.
R
o
w
e
n
a
,
"
QR
c
o
d
e
s
a
s
m
o
b
il
e
lea
rn
in
g
t
o
o
ls
f
o
r
lab
o
r
r
o
o
m
n
u
rse
s
a
t
th
e
S
a
n
P
a
b
l
o
Co
ll
e
g
e
s M
e
d
ica
l
Ce
n
ter,"
In
ter
a
c
ti
v
e
T
e
c
h
n
o
l
o
g
y
a
n
d
S
m
a
rt E
d
u
c
a
ti
o
n
,
v
o
l
.
1
4
,
n
o
.
2
,
p
p
.
1
3
8
-
1
5
8
,
2
0
1
7
.
[3
7
]
C.
L
iu
e
t
a
l.
,
"
DN
A
Ba
rc
o
d
e
Go
e
s
T
w
o
-
Di
m
e
n
sio
n
s:
DN
A
QR
Co
d
e
W
e
b
S
e
rv
e
r,
"
P
L
OS
ON
E,
v
o
l.
7
,
n
o
.
5
,
p
.
e
3
5
1
4
6
,
2
0
1
2
,
d
o
i:
1
0
.
1
3
7
1
/j
o
u
rn
a
l.
p
o
n
e
.
0
0
3
5
1
4
6
.
[3
8
]
T
.
M
.
F
e
rn
a
n
d
e
z
-
Ca
ra
m
é
s
a
n
d
P
.
F
ra
g
a
-
L
a
m
a
s,
"
A
Re
v
ie
w
o
n
Hu
m
a
n
-
Ce
n
tere
d
Io
T
-
Co
n
n
e
c
te
d
S
m
a
rt
L
a
b
e
ls
f
o
r
th
e
In
d
u
stry
4
.
0
,
"
IEE
E
Acc
e
ss
,
v
o
l.
6
,
p
p
.
2
5
9
3
9
-
2
5
9
5
7
,
2
0
1
8
.
[3
9
]
S
.
T
iw
a
ri,
"
A
n
In
tro
d
u
c
ti
o
n
to
Q
R
Co
d
e
T
e
c
h
n
o
l
o
g
y
,
"
in
2
0
1
6
I
n
t
e
rn
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(
ICIT
)
,
p
p
.
3
9
-
4
4
,
2
0
1
6
.
[4
0
]
N.
T
a
v
e
e
r
a
d
a
n
d
S
.
Vo
n
g
p
ra
d
h
ip
,
"
De
v
e
lo
p
m
e
n
t
o
f
Co
lo
r
QR
Co
d
e
f
o
r
In
c
re
a
sin
g
Ca
p
a
c
it
y
,
"
in
2
0
1
5
1
1
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
ig
n
a
l
-
Ima
g
e
T
e
c
h
n
o
lo
g
y
&
In
ter
n
e
t
-
Ba
se
d
S
y
ste
ms
(
S
IT
IS
)
,
p
p
.
6
4
5
-
6
4
8
,
2
0
1
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.