I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
11
,
No
.
5
,
Octo
b
er
2
0
2
1
,
p
p
.
4
4
1
3
~
4
4
2
2
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
1
1
i
5
.
pp
4
4
1
3
-
4
4
2
2
4413
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
So
ft
w
a
re
eng
ineering
bas
ed secur
e
d
E
-
pa
y
m
ent
sy
ste
m
M
ua
y
a
d Sa
dik
Cro
o
c
k
1
,
Ra
w
a
n Ali
T
a
a
ba
n
2
1
Co
n
tr
o
l
a
n
d
S
y
ste
m
s E
n
g
in
e
e
rin
g
De
p
a
rt
m
e
n
t,
Un
iv
e
rsity
o
f
Tec
h
n
o
l
o
g
y
-
Ir
a
q
,
Ba
g
h
d
a
d
,
Ira
q
2
Im
a
m
Ja
'
a
f
a
r
A
l
-
S
a
d
iq
Un
iv
e
rsity
,
Ba
g
h
d
a
d
,
Ira
q
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
8
,
2
0
2
1
R
ev
i
s
ed
Ma
r
9
,
2
0
2
1
A
cc
ep
ted
Ma
r
1
9
,
2
0
2
1
No
w
a
d
a
y
s,
th
e
E
-
p
a
y
m
e
n
t
s
y
ste
m
s
h
a
v
e
b
e
e
n
c
o
n
sid
e
re
d
to
b
e
t
h
e
sa
fe
w
a
y
o
f
m
o
n
e
y
tran
s
f
e
r
in
m
o
st
o
f
m
o
d
e
rn
in
sti
tu
tes
a
n
d
c
o
m
p
a
n
ies
.
M
o
r
e
o
v
e
r,
th
e
se
c
u
rit
y
is
i
m
p
o
rtan
t
sid
e
o
f
th
e
se
s
y
ste
m
s
to
e
n
su
re
th
a
t
t
h
e
m
o
n
e
y
tran
sfe
r
is
d
o
n
e
sa
f
e
l
y
.
S
o
f
t
w
a
r
e
e
n
g
in
e
e
rin
g
tec
h
n
i
q
u
e
s
a
re
u
se
d
f
o
r
g
u
a
ra
n
tee
in
g
th
e
a
p
p
ly
in
g
o
f
se
c
u
rit
y
a
n
d
p
riv
a
c
y
o
f
su
c
h
s
y
ste
m
s.
In
th
is
p
a
p
e
r,
a
se
c
u
re
E
-
p
a
y
m
e
n
t
s
y
ste
m
is
p
ro
p
o
se
d
b
a
se
d
o
n
so
f
tw
a
re
e
n
g
in
e
e
rin
g
m
o
d
e
l
a
n
d
n
e
u
ra
l
n
e
tw
o
rk
tec
h
n
o
lo
g
y
.
T
h
is
sy
ste
m
u
se
s
d
iff
e
r
e
n
t
p
ro
p
o
se
d
a
lg
o
rit
h
m
s
f
o
r
a
p
p
ly
in
g
a
u
th
e
n
ti
c
a
ti
o
n
to
t
h
e
d
e
v
ice
s
o
f
u
se
rs
a
s
m
o
b
il
e
a
p
p
li
c
a
ti
o
n
.
T
h
e
y
a
r
e
u
se
d
to
c
o
n
tr
o
l
t
h
e
k
e
y
m
a
n
a
g
e
m
e
n
t
in
th
e
sy
ste
m
.
It
u
se
s th
e
n
e
u
ra
l
n
e
tw
o
rk
b
a
c
k
-
p
ro
p
a
g
a
ti
o
n
m
e
th
o
d
f
o
r
e
n
su
rin
g
t
h
e
se
c
u
rit
y
o
f
g
e
n
e
ra
ted
k
e
y
s
th
a
t
h
a
v
e
su
ff
i
c
i
e
n
t
ra
n
d
o
m
lev
e
ls.
T
h
e
p
ro
p
o
se
d
sy
ste
m
is
te
ste
d
o
v
e
r
n
u
m
e
ro
u
s
c
a
se
s
a
n
d
th
e
o
b
tai
n
e
d
re
su
lt
s
sh
o
w
a
n
e
ff
icie
n
t
p
e
rfo
rm
a
n
c
e
in
term
s
o
f
se
c
u
rit
y
a
n
d
m
o
n
e
y
tr
a
n
sf
e
r.
M
o
re
o
v
e
r,
th
e
g
e
n
e
ra
ted
k
e
y
s
a
r
e
tes
ted
a
c
c
o
rd
in
g
t
o
NIST
sta
n
d
a
r
d
s.
K
ey
w
o
r
d
s
:
B
ac
k
-
p
r
o
p
ag
atio
n
E
-
p
a
y
m
en
t
Neu
r
al
n
et
w
o
r
k
NI
ST
So
f
t
w
ar
e
en
g
i
n
ee
r
in
g
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Mu
a
y
ad
Sad
i
k
C
r
o
o
ck
Dep
ar
t
m
en
t o
f
C
o
n
tr
o
l a
n
d
S
y
s
te
m
s
E
n
g
i
n
ee
r
in
g
Un
i
v
er
s
it
y
o
f
T
ec
h
n
o
lo
g
y
B
ag
h
d
ad
,
I
r
aq
E
m
ail:
m
u
a
y
ad
.
s
.
cr
o
o
ck
@
u
o
t
ec
h
n
o
lo
g
y
.
ed
u
.
iq
1.
I
NT
RO
D
UCT
I
O
N
Af
ter
t
h
e
r
ev
o
lu
tio
n
o
f
tech
n
o
lo
g
ies,
th
e
m
o
d
er
n
i
n
f
o
r
m
at
io
n
an
d
m
an
a
g
e
m
en
t
s
y
s
te
m
s
ad
o
p
t
th
e
elec
tr
o
n
ic
co
p
ies
o
f
d
i
f
f
er
en
t
ap
p
licatio
n
s
.
T
h
is
i
s
to
r
ed
u
ce
th
e
lab
o
r
ef
f
o
r
ts
a
n
d
s
p
ee
d
u
p
th
e
p
r
o
ce
s
s
ti
m
e.
On
th
e
o
t
h
er
s
id
e,
th
ese
s
elec
tr
o
n
ic
v
er
s
io
n
s
o
f
s
y
s
te
m
s
co
n
s
id
er
th
e
s
ec
u
r
it
y
as
a
m
a
in
p
ar
t
to
en
s
u
r
e
th
e
s
af
et
y
o
f
i
m
p
le
m
en
ta
tio
n
.
T
h
e
m
en
t
io
n
ed
s
id
es
ar
e
d
esig
n
ed
u
s
in
g
s
o
f
t
w
ar
e
en
g
i
n
e
er
in
g
m
o
d
el
to
en
s
u
r
e
r
eliab
ilit
y
,
f
lex
ib
il
it
y
,
a
n
d
ex
te
n
d
ib
ilit
y
[
1
]
-
[
7
]
.
Dif
f
er
en
t
r
esear
ch
er
s
h
a
v
e
co
n
s
id
er
ed
th
e
ar
ea
o
f
e
lectr
o
n
ic
(
E
)
-
s
y
s
te
m
s
w
it
h
d
is
t
in
ct
s
u
b
j
ec
ts
,
s
u
c
h
as sec
u
r
it
y
,
m
an
a
g
e
m
en
t,
an
d
d
ata
ex
ch
a
n
g
e.
I
n
[
8
]
,
th
e
a
u
t
h
o
r
s
p
r
o
p
o
s
ed
E
-
w
all
et
s
y
s
te
m
s
w
it
h
h
ig
h
s
ec
u
r
i
t
y
u
s
i
n
g
s
m
ar
t
s
o
lid
s
tate
d
r
iv
e
(
SS
D)
.
I
t
co
u
ld
b
e
u
s
ed
in
d
if
f
er
en
t
w
eb
ap
p
licatio
n
s
.
I
n
[
9
]
,
au
th
o
r
p
r
esen
ted
a
co
m
p
r
e
h
en
s
iv
e
a
n
al
y
s
i
s
f
o
r
th
r
ea
ts
th
at
a
f
f
ec
t
th
e
E
-
w
allet
s
y
s
te
m
s
.
T
h
is
a
n
al
y
s
i
s
tack
led
all
p
o
s
s
ib
le
t
y
p
es
o
f
t
h
r
ea
ts
a
n
d
th
eir
e
f
f
ec
t
s
o
n
t
h
e
w
o
r
k
f
lo
w
o
f
m
o
n
e
y
tr
an
s
f
er
s
y
s
te
m
s
.
I
n
[
1
0
]
,
au
th
o
r
s
co
n
s
id
er
ed
d
if
f
er
e
n
t
t
y
p
es
o
f
s
ec
u
r
it
y
is
s
u
e
s
t
h
at
f
ac
e
E
-
w
allet
s
y
s
te
m
s
an
d
m
o
n
e
y
tr
an
s
f
er
p
r
o
ce
s
s
.
T
h
e
y
al
s
o
co
m
p
ar
ed
d
is
ti
n
ct
k
in
d
s
o
f
E
-
w
al
let
s
y
s
te
m
s
to
c
o
n
clu
d
e
th
e
b
est
m
o
d
el
th
at
c
an
b
e
ad
o
p
ted
.
I
n
[
1
1
]
,
au
th
o
r
s
ad
o
p
ted
a
m
o
b
ile
ap
p
licatio
n
th
a
t
u
s
ed
d
i
f
f
er
e
n
t
E
-
w
alle
t
s
y
s
te
m
s
a
n
d
m
an
a
g
ed
th
e
m
o
n
e
y
tr
an
s
f
er
b
et
w
ee
n
t
h
e
m
.
T
h
e
au
th
o
r
o
f
[
1
2
]
p
r
esen
ted
a
s
t
u
d
y
o
n
t
h
e
i
m
p
o
r
tan
ce
o
f
u
s
i
n
g
s
ec
u
r
i
t
y
i
n
th
e
i
n
f
o
r
m
atio
n
s
y
s
te
m
o
f
M
u
'
th
u
n
i
v
er
s
i
t
y
.
T
h
is
s
tu
d
y
to
o
l
ca
r
e
o
f
an
s
w
er
in
g
s
ec
u
r
i
t
y
q
u
e
s
tio
n
s
,
u
s
ed
f
o
r
p
r
o
p
o
s
in
g
a
co
m
p
lete
s
ec
u
r
it
y
s
y
s
te
m
.
I
n
[
1
3
]
,
r
is
k
a
n
d
s
ec
u
r
it
y
co
n
s
id
er
ati
o
n
w
er
e
i
n
tr
o
d
u
ce
d
f
o
r
in
f
o
r
m
atio
n
s
y
s
te
m
s
.
T
h
e
y
ad
o
p
ted
th
e
d
if
f
er
en
ce
s
b
et
w
ee
n
attac
k
s
a
n
d
t
h
e
w
o
r
k
p
r
o
ce
d
u
r
e
o
f
th
e
m
.
T
h
e
au
t
h
o
r
s
o
f
[
1
4
]
p
r
o
p
o
s
ed
in
f
o
r
m
at
io
n
s
y
s
te
m
s
ec
u
r
it
y
th
at
tack
led
n
u
m
er
o
u
s
t
y
p
e
s
o
f
th
r
ea
ts
t
h
at
ca
n
attac
k
th
ese
s
y
s
te
m
s
.
W
h
ile
i
n
[
1
5
]
,
an
in
f
o
r
m
atio
n
s
ec
u
r
it
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
5
,
Octo
b
e
r
2
0
2
1
:
4
4
1
3
-
4422
4414
s
y
s
te
m
w
as
p
r
o
p
o
s
ed
f
o
r
a
b
an
k
.
T
h
e
s
ec
u
r
it
y
m
a
n
a
g
e
m
e
n
t
w
a
s
a
d
o
p
ted
in
t
h
i
s
s
y
s
te
m
to
ad
ap
t
th
e
c
h
an
g
e
i
n
th
e
w
o
r
k
d
ir
ec
tio
n
.
I
n
[
1
6
]
,
t
h
e
au
t
h
o
r
s
p
r
esen
ted
an
as
s
e
s
s
m
en
t
m
et
h
o
d
f
o
r
ex
p
ec
ted
r
is
k
s
i
n
a
b
an
k
in
g
s
y
s
te
m
.
T
h
e
id
ea
b
eh
in
d
w
as
to
id
en
tify
th
e
r
i
s
k
s
th
a
t
ca
n
f
ac
e
b
an
k
i
n
g
s
y
s
te
m
s
i
n
clu
d
i
n
g
s
ec
u
r
it
y
i
s
s
u
es.
I
n
[
1
7
]
,
a
cl
o
u
d
co
m
p
u
ti
n
g
w
a
s
u
s
ed
f
o
r
p
r
o
p
o
s
in
g
a
n
i
n
f
o
r
m
atio
n
s
ec
u
r
it
y
s
y
s
te
m
i
n
b
an
k
i
n
g
s
y
s
te
m
.
T
h
is
s
y
s
te
m
tack
led
th
e
s
ec
u
r
it
y
t
h
r
ea
ts
a
n
d
attac
k
s
to
a
v
o
id
d
ata
lo
s
in
g
.
T
h
e
au
th
o
r
s
o
f
[
1
8
]
-
[
2
0
]
p
r
esen
ted
a
s
ec
u
r
it
y
s
y
s
te
m
f
o
r
in
f
o
r
m
ati
o
n
b
ased
o
n
th
e
co
n
ce
p
ts
o
f
s
o
f
t
w
ar
e
en
g
i
n
ee
r
in
g
to
en
s
u
r
e
th
e
co
m
p
letio
n
o
f
p
r
o
d
u
ct.
I
n
th
e
s
e
s
y
s
te
m
s
,
d
i
f
f
er
en
t
tec
h
n
iq
u
e
s
w
er
e
u
s
ed
,
in
w
h
ic
h
t
h
e
attac
k
s
ar
e
ta
ck
led
w
ell
in
th
e
in
f
o
r
m
atio
n
s
y
s
te
m
s
f
o
r
b
an
k
s
an
d
o
th
er
in
s
t
itu
tes.
2.
T
H
E
P
RO
P
O
SE
D
SYS
T
E
M
As
m
en
tio
n
ed
ea
r
lier
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
is
a
s
ec
u
r
e
m
o
n
e
y
tr
an
s
f
er
ap
p
licatio
n
t
h
at
i
s
d
esi
g
n
ed
b
ased
o
n
s
o
f
t
w
ar
e
en
g
i
n
ee
r
in
g
co
n
ce
p
ts
a
n
d
n
eu
r
al
n
et
w
o
r
k
.
Gen
er
all
y
,
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
u
s
e
s
a
s
i
m
p
le
n
eu
r
al
n
e
t
w
o
r
k
th
at
ap
p
lied
in
to
a
s
ec
u
r
ed
m
o
n
e
y
tr
a
n
s
f
er
r
i
n
g
ap
p
li
ca
tio
n
b
et
w
ee
n
t
w
o
p
ar
ties
.
A
s
s
h
o
w
n
i
n
Fig
u
r
e
1
,
a
u
s
er
ca
n
d
o
w
n
lo
ad
an
d
in
s
tall
th
e
p
r
o
p
o
s
ed
m
o
b
ile
ap
p
licatio
n
.
Usi
n
g
t
h
is
a
p
p
licatio
n
,
th
e
u
s
er
cr
ea
tes
a
n
e
w
ac
co
u
n
t
u
s
in
g
p
er
s
o
n
al
in
f
o
r
m
atio
n
(
f
u
l
l
n
a
m
e,
p
h
o
n
e
n
u
m
b
er
an
d
p
ass
w
o
r
d
)
.
P
h
o
n
e
au
th
e
n
tica
tio
n
h
a
s
b
ee
n
ad
o
p
ted
th
r
o
u
g
h
t
h
e
r
e
g
is
ter
p
r
o
ce
s
s
.
T
h
u
s
,
t
h
e
u
s
er
ca
n
r
ec
ei
v
e
a
n
S
MS
th
at
co
n
tai
n
s
a
co
d
e
to
v
er
if
y
t
h
e
p
h
o
n
e
n
u
m
b
er
a
n
d
ac
ti
v
ate
t
h
e
cr
ea
ted
ac
co
u
n
t.
I
n
ad
d
itio
n
,
a
m
a
s
ter
k
e
y
is
g
en
er
ated
a
n
d
en
cr
y
p
ted
,
e
x
p
lain
ed
i
n
s
ec
ti
o
n
2
.
3
,
f
o
r
t
h
e
u
s
e
r
to
b
e
s
e
cu
r
el
y
u
s
ed
i
n
s
id
e
th
e
m
o
b
il
e
ap
p
licatio
n
w
h
e
n
id
en
tit
y
v
er
i
f
icatio
n
is
n
ee
d
ed
.
Fig
u
r
e
1
.
Gen
er
al
b
lo
ck
d
iag
r
a
m
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
S
o
ftw
a
r
e
en
g
in
ee
r
in
g
b
a
s
ed
s
ec
u
r
ed
E
-
p
a
yme
n
t sys
tem
(
Mu
a
ya
d
S
a
d
ik
C
r
o
o
ck
)
4415
As
d
ep
icted
in
Fig
u
r
e
1
,
tr
an
s
f
er
m
o
n
e
y
p
r
o
ce
s
s
ta
k
es
p
lace
w
h
en
a
u
s
er
n
ee
d
s
to
tr
an
s
m
it
m
o
n
e
y
to
o
th
er
u
s
er
u
s
i
n
g
th
e
p
r
o
p
o
s
ed
ap
p
licatio
n
.
I
n
th
is
ca
s
e,
th
e
s
en
d
er
is
p
r
o
m
p
ted
to
en
ter
th
e
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
an
d
t
h
e
a
m
o
u
n
t
o
f
m
o
n
e
y
.
Af
ter
t
h
at,
t
h
e
s
y
s
te
m
c
r
ea
tes
a
n
e
w
in
ter
i
m
k
e
y
,
n
a
m
ed
s
es
s
io
n
k
e
y
K
s
.
An
en
cr
y
p
ted
to
k
en
co
n
tain
s
all
th
e
tr
an
s
ac
tio
n
i
n
f
o
r
m
ati
o
n
in
a
n
en
co
d
ed
f
o
r
m
(
th
e
K
s
,
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
,
tr
an
s
ac
t
io
n
d
ate
an
d
t
h
e
m
o
n
e
y
a
m
o
u
n
t)
.
T
h
e
K
s
an
d
th
e
to
k
en
ar
e
u
s
e
d
in
th
e
t
w
o
-
le
v
el
a
u
t
h
en
ticati
o
n
s
tep
s
.
T
h
e
s
es
s
io
n
k
e
y
K
s
i
s
en
co
d
ed
an
d
s
to
r
ed
in
t
h
e
d
atab
ase
an
d
s
en
t
to
th
e
r
ec
ei
v
er
as
S
MS.
T
h
e
r
ec
eiv
er
en
ter
s
t
h
is
k
e
y
i
n
t
h
e
m
o
b
il
e
ap
p
licatio
n
to
b
e
v
alid
ated
b
y
th
e
s
y
s
te
m
.
A
t
t
h
e
en
d
o
f
th
i
s
s
tep
,
th
e
f
ir
s
t
le
v
el
au
t
h
e
n
tic
atio
n
is
co
m
p
leted
.
I
n
th
e
s
ec
o
n
d
lev
e
l
o
f
au
t
h
e
n
ticatio
n
,
th
e
to
k
e
n
g
e
n
er
ate
d
b
y
th
e
s
e
n
d
er
is
ac
tiv
ated
to
b
e
u
s
ab
le
b
y
th
e
r
ec
eiv
er
.
A
t
t
h
e
r
ec
eiv
er
s
id
e,
th
e
to
k
en
i
s
d
ec
o
d
ed
to
ex
tr
ac
t
th
e
s
ec
u
r
ed
tr
an
s
ac
tio
n
i
n
f
o
r
m
atio
n
.
T
h
e
K
s,
in
cl
u
d
ed
in
th
i
s
to
k
e
n
,
is
co
m
p
ar
ed
to
th
e
last
g
e
n
er
ated
K
s
b
esid
es
co
m
p
ar
i
n
g
t
h
e
p
h
o
n
e
n
u
m
b
er
in
t
h
e
to
k
en
w
it
h
t
h
e
in
te
n
d
ed
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
.
I
f
th
e
s
e
t
w
o
o
p
er
atio
n
s
co
m
p
leted
w
it
h
o
u
t
an
y
p
r
o
b
lem
,
t
h
e
s
ec
o
n
d
au
th
e
n
tica
tio
n
lev
el
i
s
s
u
cc
es
s
f
u
ll
y
co
m
p
leted
.
Af
ter
th
at,
t
h
e
m
o
n
e
y
ca
n
n
o
w
b
e
tr
an
s
f
er
r
ed
f
r
o
m
th
e
s
e
n
d
er
to
th
e
r
ec
ei
v
er
.
T
o
s
i
m
p
li
f
y
th
e
u
n
d
er
s
ta
n
d
i
n
g
o
f
th
e
f
u
ll
p
r
o
ce
s
s
a
n
d
t
h
e
u
s
ed
alg
o
r
it
h
m
s
,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
d
iv
id
ed
in
to
f
i
v
e
p
ar
ts
as f
o
llo
w
s
:
2
.
1
.
So
f
t
w
a
re
eng
ineering
m
o
del
I
t
is
i
m
p
o
r
tan
t
to
n
o
te
th
a
t
t
h
e
s
o
f
t
w
ar
e
en
g
i
n
ee
r
in
g
h
as
a
w
id
e
ar
ea
o
f
e
m
p
lo
y
m
e
n
t
i
n
t
h
e
f
ield
o
f
s
ec
u
r
it
y
a
n
d
i
n
f
o
r
m
atio
n
s
y
s
te
m
s
.
Fi
g
u
r
e
2
s
h
o
w
s
t
h
e
d
esi
g
n
ed
s
o
f
t
w
ar
e
e
n
g
i
n
ee
r
i
n
g
m
o
d
el
f
o
r
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
as
a
l
if
e
-
c
y
cle.
I
t
is
d
iv
id
ed
in
to
f
o
u
r
m
ai
n
p
h
a
s
es:
r
eq
u
ir
e
m
en
ts
,
d
esi
g
n
,
i
m
p
le
m
en
tatio
n
an
d
te
s
ti
n
g
[
2
1
]
-
[
2
3
]
.
I
n
th
e
r
eq
u
i
r
e
m
en
t
p
h
ase,
d
if
f
er
en
t
p
o
in
ts
h
a
v
e
b
ee
n
ac
h
ie
v
ed
in
c
lu
d
i
n
g
d
ata
co
llectio
n
,
u
s
er
in
f
o
r
m
atio
n
,
an
d
p
a
y
m
e
n
t
i
n
f
o
r
m
atio
n
.
W
h
ile
i
n
t
h
e
d
esig
n
p
h
a
s
e,
t
h
e
m
o
d
el
co
n
tain
s
d
esi
g
n
i
n
g
t
h
e
b
ac
k
p
r
o
p
ag
atio
n
,
m
a
s
ter
a
n
d
s
ess
io
n
k
e
y
g
e
n
er
atio
n
,
an
d
l
ig
h
t
-
w
ei
g
h
t
p
r
o
to
co
l
f
o
r
m
o
n
e
y
tr
an
s
f
er
al
g
o
r
ith
m
s
as
w
e
ll
as
d
esi
g
n
i
n
g
th
e
m
o
b
ile
ap
p
licatio
n
w
it
h
r
elate
d
in
ter
f
ac
es.
A
t
t
h
e
o
th
er
h
an
d
,
th
e
p
h
ase
o
f
i
m
p
le
m
en
ta
tio
n
i
n
v
o
l
v
es
t
h
e
i
m
p
le
m
e
n
tat
io
n
o
f
t
h
e
d
esi
g
n
e
d
alg
o
r
ith
m
s
.
I
n
t
h
e
test
in
g
p
h
ase,
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
s
test
ed
i
n
ter
m
s
o
f
m
o
n
e
y
tr
an
s
f
er
,
k
e
y
s
tr
o
n
g
an
d
n
eu
r
al
i
m
p
le
m
en
ta
tio
n
.
Fig
u
r
e
2
.
Desig
n
ed
s
o
f
t
w
ar
e
en
g
i
n
ee
r
i
n
g
m
o
d
el
2
.
2
.
E
m
plo
y
ed
ba
c
k
pro
pa
g
a
t
io
n a
lg
o
rit
h
m
B
ac
k
-
p
r
o
p
ag
atio
n
n
e
u
r
al
n
et
wo
r
k
co
n
s
i
s
ts
o
f
t
h
r
ee
la
y
er
s
:
a
n
i
n
p
u
t
v
ec
to
r
X,
a
h
id
d
en
la
y
er
H
a
n
d
an
o
u
tp
u
t
la
y
er
Y
in
ad
d
itio
n
t
o
th
e
w
ei
g
h
t
’
s
co
e
f
f
icien
ts
W
.
All
la
y
er
s
co
n
s
i
s
t
o
f
v
ar
iab
le
n
u
m
b
er
o
f
n
e
u
r
o
n
s
th
at
d
eter
m
i
n
ed
ac
co
r
d
in
g
to
a
p
r
o
p
o
s
ed
alg
o
r
ith
m
.
T
h
e
u
s
ed
s
tr
u
ctu
r
e
o
f
b
ac
k
-
p
r
o
p
ag
atio
n
is
v
er
y
s
i
m
p
le
a
s
it
w
il
l
b
e
ex
p
lain
ed
n
ex
tl
y
.
T
h
e
d
i
f
f
er
en
t
s
tag
e
s
o
f
b
ac
k
p
r
o
p
ag
atio
n
n
eu
r
al
n
e
t
w
o
r
k
alg
o
r
it
h
m
ca
n
b
e
s
tated
as
[
2
4
]
:
a.
I
n
itializatio
n
1)
Dete
r
m
i
n
atio
n
o
f
n
e
u
r
al
n
et
wo
r
k
p
ar
am
eter
s
:
j
is
th
e
n
u
m
b
er
o
f
h
id
d
en
la
y
er
u
n
its
,
i
i
s
th
e
in
p
u
t
la
y
e
r
n
eu
r
o
n
's n
u
m
b
er
f
o
r
ea
ch
h
id
d
en
la
y
er
u
n
i
t a
n
d
y
w
h
ic
h
is
t
h
e
o
u
tp
u
t la
y
er
n
eu
r
o
n
's n
u
m
b
e
r
.
2)
I
n
itialize
t
h
e
in
p
u
t a
n
d
o
u
tp
u
t
n
eu
r
o
n
s
'
v
a
lu
e
s
.
3)
T
h
e
n
et
w
o
r
k
w
ei
g
h
ts
h
a
v
e
b
ee
n
in
itia
lized
in
th
i
s
s
tep
to
s
m
a
ll
r
an
d
o
m
n
u
m
b
er
s
(
in
p
u
t
-
h
id
d
en
an
d
h
id
d
en
-
o
u
tp
u
t
w
eig
h
t
s
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
5
,
Octo
b
e
r
2
0
2
1
:
4
4
1
3
-
4422
4416
b.
Feed
f
o
r
w
ar
d
st
ag
e
4)
Su
m
s
w
ei
g
h
ted
in
p
u
t a
n
d
ap
p
ly
ac
tiv
a
tio
n
f
u
n
ctio
n
to
co
m
p
u
te
o
u
tp
u
t o
f
h
id
d
en
la
y
er
.
=
(
∑
)
(
1
)
W
h
er
e
: T
h
e
ac
tu
al
o
u
tp
u
t o
f
h
id
d
en
n
eu
r
o
n
j
f
o
r
in
p
u
t si
g
n
al
s
x
.
: I
n
p
u
t si
g
n
al
o
f
i
n
p
u
t
n
eu
r
o
n
(
i)
.
: W
eig
h
t b
et
w
ee
n
in
p
u
t n
e
u
r
o
n
i a
n
d
h
id
d
en
n
e
u
r
o
n
j
: T
h
e
ac
tiv
atio
n
f
u
n
ctio
n
(
Si
g
m
o
id
f
u
n
ct
io
n
)
.
5)
Su
m
s
w
ei
g
h
ted
o
u
tp
u
t o
f
h
id
d
en
la
y
er
a
n
d
ap
p
ly
ac
ti
v
atio
n
f
u
n
ct
io
n
to
co
m
p
u
te
o
u
tp
u
t o
f
o
u
tp
u
t la
y
er
.
=
(
∑
)
(
2
)
W
h
er
e
: T
h
e
ac
tu
al
o
u
tp
u
t o
f
o
u
tp
u
t
n
eu
r
o
n
k
.
: W
eig
h
t b
et
w
ee
n
h
id
d
en
n
eu
r
o
n
j
an
d
o
u
tp
u
t n
eu
r
o
n
k
.
c.
B
ac
k
p
r
o
p
ag
atio
n
s
tag
e
:
6)
C
o
m
p
u
tes b
ac
k
p
r
o
p
ag
atio
n
er
r
o
r
.
=
(
−
)
′
(
∑
)
(
3
)
W
h
er
e
′
: T
h
e
d
er
iv
ativ
e
o
f
t
h
e
ac
tiv
at
i
o
n
f
u
n
ct
io
n
.
: T
h
e
d
esire
d
o
f
o
u
tp
u
t n
e
u
r
o
n
k
.
7)
C
alcu
lates
w
ei
g
h
t c
o
r
r
ec
tio
n
ter
m
.
w
=
(
4
)
W
h
er
e,
is
th
e
lear
n
i
n
g
r
ate.
8)
Su
m
s
d
elta
i
n
p
u
t o
f
ea
c
h
h
id
d
en
n
e
u
r
o
n
an
d
ca
lc
u
late
t
h
e
er
r
o
r
ter
m
.
=
∑
′
(
∑
)
(
5
)
9)
C
alcu
lates
w
ei
g
h
t c
o
r
r
ec
tio
n
ter
m
.
w
=
(
6
)
Up
d
ates
w
ei
g
h
ts
.
(
n
e
w
)
=
(
ol
d
)
+
w
(
7
)
(
n
e
w
)
=
(
ol
d
)
+
w
(
8
)
10)
R
ep
ea
t step
(
4
)
f
o
r
a
g
iv
en
n
u
m
b
er
o
f
tr
ai
n
i
n
g
iter
atio
n
s
.
2
.
3
.
M
a
s
t
er
-
k
ey
g
ener
a
t
io
n
a
lg
o
rit
h
m
As
af
o
r
e
m
e
n
tio
n
ed
,
a
m
a
s
ter
k
e
y
is
g
en
er
ated
to
b
e
u
s
ed
w
h
er
ev
er
u
s
er
id
en
t
it
y
v
er
if
icatio
n
is
r
eq
u
ir
ed
in
t
h
e
p
r
o
p
o
s
ed
m
o
b
i
le
ap
p
licatio
n
.
I
t
i
s
g
e
n
er
ated
au
to
m
at
icall
y
d
ep
en
d
in
g
o
n
t
h
e
u
s
er
in
f
o
r
m
a
tio
n
an
d
en
cr
y
p
ted
u
s
i
n
g
b
ac
k
-
p
r
o
p
ag
atio
n
n
eu
r
al
n
et
w
o
r
k
al
g
o
r
ith
m
ex
p
lai
n
ed
ea
r
lier
.
T
h
e
alg
o
r
ith
m
,
u
s
ed
f
o
r
g
en
er
ati
n
g
an
d
en
cr
y
p
tin
g
t
h
e
m
aster
k
e
y
,
p
as
s
es t
h
r
o
u
g
h
n
u
m
b
er
o
f
s
tep
s
as il
lu
s
tr
ated
b
elo
w
:
a.
K
m
g
en
era
tio
n
:
1)
Af
ter
u
s
er
r
eg
is
tr
atio
n
,
a
u
n
iq
u
e
I
D
h
as b
ee
n
g
e
n
er
ated
f
o
r
th
e
u
s
er
.
2)
T
h
e
f
ir
s
t le
tter
o
f
t
h
e
f
ir
s
t,
s
ec
o
n
d
an
d
th
ir
d
u
s
er
n
a
m
e
ar
e
e
x
tr
ac
ted
.
3)
C
o
n
v
er
t th
e
s
e
th
r
ee
letter
s
i
n
to
th
e
eq
u
i
v
alen
t
A
S
C
I
I
n
u
m
er
ic
al
v
alu
e
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
S
o
ftw
a
r
e
en
g
in
ee
r
in
g
b
a
s
ed
s
ec
u
r
ed
E
-
p
a
yme
n
t sys
tem
(
Mu
a
ya
d
S
a
d
ik
C
r
o
o
ck
)
4417
4)
Dete
r
m
i
n
e
th
e
m
as
ter
k
e
y
b
e
f
o
r
e
en
cr
y
p
tio
n
.
K
m
(
b
ef
o
r
e
en
cr
y
p
tio
n
)
=
(
1
s
t le
tter
A
S
C
I
I
.
2
n
d
letter
ASC
I
I
.
3
r
d
letter
A
SC
I
I
.
User
I
D)
b.
K
m
en
cryp
tio
n
1)
C
o
n
v
er
t th
e
3
A
S
C
I
I
v
alu
e
s
i
n
s
tep
(
3
)
to
8
-
b
it b
in
ar
y
n
u
m
b
e
r
s
.
2)
C
o
n
ca
te
n
ate
t
h
e
3
b
in
ar
y
n
u
m
b
er
s
f
r
o
m
last
s
tep
w
ith
u
s
er
I
D
af
ter
co
n
v
er
t i
t to
8
-
b
it b
in
a
r
y
n
u
m
b
er
.
3)
Usi
n
g
t
h
e
b
ac
k
-
p
r
o
p
ag
atio
n
e
x
p
lain
ed
i
n
5
.
1
,
a
n
eu
r
al
n
et
wo
r
k
is
tr
ain
ed
f
o
r
1
0
0
0
iter
atio
n
s
b
y
u
s
in
g
t
h
e
32
-
b
it
b
in
ar
y
n
u
m
b
er
i
n
s
tep
(
5
)
as
an
I
n
p
u
t
la
y
er
n
eu
r
o
n
s
v
alu
es.
2
6
n
e
u
r
o
n
s
ar
e
u
s
ed
i
n
t
h
e
o
u
tp
u
t
la
y
e
r
to
ex
tr
ac
t 2
6
-
b
it d
esire
d
o
u
tp
u
t.
4)
T
h
e
d
esi
r
ed
o
u
tp
u
t
(
en
cr
y
p
te
d
K
m
)
an
d
th
e
la
s
t
iter
atio
n
u
p
d
ated
w
eig
h
t
s
ar
e
s
to
r
ed
to
b
e
u
s
ed
in
v
er
if
ica
tio
n
p
r
o
ce
s
s
.
T
h
e
v
er
if
ica
tio
n
p
r
o
ce
s
s
f
o
r
th
e
co
d
e
m
e
n
tio
n
ed
in
s
tep
(
4
)
o
f
m
aster
k
e
y
g
en
er
ati
o
n
ca
n
b
e
s
u
m
m
ar
ized
in
t
h
e
f
o
llo
w
i
n
g
s
tep
s
:
c.
K
m
ve
r
ifica
tio
n
:
1)
Sp
lit th
e
e
n
ter
ed
co
d
e
b
y
th
e
u
s
er
in
to
4
p
ar
ts
: th
e
th
r
ee
letter
s
ASC
I
I
an
d
t
h
e
u
s
er
I
D.
2)
C
o
n
v
er
t e
ac
h
p
ar
t to
th
e
eq
u
i
v
alen
t 8
-
b
it b
i
n
ar
y
n
u
m
b
er
.
3)
C
o
n
ca
te
n
ate
all
n
u
m
b
er
s
to
g
et
h
er
.
R
es
u
lted
co
d
e
=
(
b
in
ar
y
o
f
f
ir
s
t A
SC
I
I
.
b
in
ar
y
o
f
f
ir
s
t
A
SC
I
I
.
b
in
ar
y
o
f
f
ir
s
t
A
S
C
I
I
.
b
in
ar
y
o
f
u
s
er
I
D)
4)
R
esto
r
e
th
e
s
a
v
ed
m
a
s
ter
k
e
y
an
d
th
e
u
p
d
ated
w
eig
h
t
s
in
s
te
p
(
8
)
o
f
K
m
e
n
cr
y
p
tio
n
.
5)
Usi
n
g
o
n
l
y
t
h
e
f
ee
d
f
o
r
w
ar
d
p
ar
t
o
f
b
ac
k
-
p
r
o
p
ag
atio
n
a
lg
o
r
ith
m
ex
p
lai
n
ed
i
n
2
.
1
.
T
h
e
3
2
-
b
it
b
in
ar
y
n
u
m
b
er
o
b
tain
ed
f
r
o
m
s
tep
(
3
)
is
u
s
ed
a
s
a
n
in
p
u
t
la
y
er
a
n
d
th
e
u
p
d
ated
w
ei
g
h
t
s
r
e
s
to
r
ed
in
s
tep
(
4
)
ar
e
u
s
ed
as i
n
p
u
t
-
h
id
d
en
an
d
h
id
d
en
-
o
u
tp
u
t
w
e
ig
h
ts
v
al
u
es.
6)
T
h
e
o
b
tain
ed
o
u
tp
u
t f
r
o
m
f
ee
d
f
o
r
w
ar
d
p
r
o
ce
s
s
is
co
m
p
ar
ed
w
it
h
t
h
e
r
esto
r
ed
K
m
i
n
s
tep
(
4
)
.
7)
I
f
th
e
co
m
p
ar
is
o
n
r
esu
lt is
tr
u
e
,
th
en
t
h
e
K
m
i
s
v
er
if
ied
a
n
d
is
b
elo
n
g
to
th
at
u
s
er
.
2
.
4
.
Ses
s
io
n
-
k
ey
g
ener
a
t
io
n a
lg
o
rit
h
m
A
t
t
h
e
b
eg
in
n
i
n
g
o
f
an
y
m
o
n
e
y
tr
a
n
s
f
er
r
in
g
p
r
o
ce
s
s
,
a
te
m
p
o
r
ar
y
k
e
y
i
s
a
u
to
m
a
ticall
y
g
en
er
ated
an
d
b
ein
g
u
s
ed
b
et
w
ee
n
t
h
e
t
w
o
p
ar
ties
(
s
en
d
er
a
n
d
r
ec
ei
v
er
)
.
T
h
e
m
ai
n
p
u
r
p
o
s
e
o
f
th
e
s
e
s
s
io
n
k
e
y
(
K
s
)
i
s
to
v
er
if
y
t
h
e
r
ec
eiv
er
id
en
tit
y
an
d
to
en
s
u
r
e
th
at
t
h
e
m
o
n
e
y
c
an
tr
an
s
f
er
s
ec
u
r
el
y
a
g
ai
n
s
t
a
n
y
attac
k
er
tr
ies
to
o
b
tain
th
at
k
e
y
a
n
d
h
ac
k
th
e
t
r
an
s
ac
tio
n
.
K
s
i
s
u
p
d
ated
r
eg
u
l
ar
l
y
f
o
r
ea
ch
s
e
s
s
io
n
.
I
n
ad
d
iti
o
n
,
p
r
ev
io
u
s
v
alu
e
o
f
K
s
i
s
u
s
ed
w
h
en
u
p
d
atin
g
K
s
to
n
e
w
v
al
u
e
in
a
n
e
w
s
e
s
s
io
n
.
T
h
u
s
,
th
e
K
s
v
a
lu
e
is
c
u
m
u
lati
v
e
an
d
th
u
s
th
e
n
e
w
K
s
d
ep
en
d
s
o
n
t
h
e
p
r
ev
i
o
u
s
o
n
e.
I
t
b
ec
o
m
es
m
o
r
e
co
m
p
licated
f
o
r
th
e
attac
k
er
to
k
ee
p
u
p
w
it
h
th
e
s
ess
io
n
k
e
y
u
p
d
ates
w
it
h
ev
e
r
y
n
e
w
s
es
s
io
n
.
A
t
th
e
f
ir
s
t
s
ess
io
n
,
an
in
i
tial
v
al
u
e
o
f
s
ess
io
n
k
e
y
(
K
is
)
is
r
an
d
o
m
l
y
g
e
n
er
ated
an
d
b
e
u
s
ed
f
o
r
g
e
n
er
atin
g
t
h
e
n
ex
t
K
s.
T
o
s
i
m
p
lify
t
h
e
p
r
o
ce
s
s
o
f
g
e
n
er
ati
n
g
K
s
,
a
n
alg
o
r
ith
m
s
tep
s
ar
e
illu
s
tr
ated
as:
R
esto
r
in
g
t
h
e
last
u
s
ed
s
e
s
s
io
n
k
e
y
K
s
.
Usi
n
g
th
e
b
ac
k
-
p
r
o
p
ag
at
io
n
e
x
p
lain
ed
i
n
s
ec
tio
n
5
.
1
,
a
n
e
u
r
al
n
et
w
o
r
k
is
tr
ain
ed
f
o
r
1
0
0
0
iter
atio
n
s
.
T
h
e
24
-
b
it
b
in
ar
y
n
u
m
b
er
o
f
last
K
s
is
u
s
ed
a
s
an
I
n
p
u
t
la
y
er
n
eu
r
o
n
s
v
al
u
es
a
n
d
a
r
a
n
d
o
m
l
y
g
e
n
er
ated
2
4
-
b
it
b
in
ar
y
n
u
m
b
er
is
u
s
ed
as o
u
tp
u
t la
y
er
n
eu
r
o
n
s
v
a
lu
e
s
.
T
h
e
last
u
p
d
at
ed
w
ei
g
h
t
s
b
et
wee
n
th
e
i
n
p
u
t a
n
d
h
id
d
en
la
y
er
s
ar
e
ex
tr
ac
ted
.
E
ac
h
n
u
m
b
er
in
t
h
e
in
p
u
t
-
h
id
d
en
w
ei
g
h
t
v
al
u
es
e
x
tr
ac
ted
in
last
s
tep
is
r
o
u
n
d
ed
to
th
e
n
ea
r
est
i
n
teg
e
r
n
u
m
b
er
.
E
n
ter
th
e
r
es
u
lted
co
d
e
th
r
o
u
g
h
NI
ST
f
r
eq
u
en
c
y
an
d
s
er
ial
t
ests
.
I
f
th
e
r
es
u
lted
k
e
y
p
ass
i
n
r
an
d
o
m
n
e
s
s
tes
ts
,
u
s
e
it a
s
t
h
e
n
e
w
s
ess
io
n
k
e
y
[
2
5
]
.
Sto
r
e
th
e
n
e
w
g
en
er
ated
s
e
s
s
io
n
k
e
y
in
d
atab
ase
to
b
e
u
s
ed
f
o
r
n
ex
t ses
s
io
n
.
2
.
5
.
L
ig
ht
-
w
eig
ht
p
ro
t
o
co
l f
o
r
m
o
ney
t
ra
ns
f
er
ring
W
h
en
tr
an
s
f
er
m
o
n
e
y
p
r
o
ce
s
s
tak
es
a
p
lace
o
v
er
a
n
et
w
o
r
k
,
all
s
ec
u
r
it
y
co
n
s
id
er
atio
n
s
m
u
s
t
b
e
co
n
s
id
er
ed
.
T
h
er
ef
o
r
e,
a
lig
h
t
-
w
ei
g
h
t
m
ec
h
a
n
is
m
h
a
s
b
ee
n
p
r
o
p
o
s
ed
in
th
is
w
o
r
k
.
I
n
t
h
i
s
m
ec
h
an
i
s
m
,
w
h
ile
tr
an
s
f
er
r
in
g
p
r
o
ce
s
s
,
e
v
er
y
u
s
e
r
h
as 2
k
e
y
s
: M
a
s
ter
k
e
y
K
m
a
n
d
Ses
s
io
n
k
e
y
K
s
.
A
s
i
m
p
le
i
n
ter
f
ac
e
is
i
n
cl
u
d
ed
in
t
h
e
d
esig
n
ed
ap
p
licatio
n
.
B
esid
es,
a
s
p
ec
ial
ac
ti
v
it
y
p
a
g
e
is
p
ar
ticu
lar
ize
d
f
o
r
tr
an
s
f
er
m
o
n
e
y
.
T
h
u
s
,
w
h
e
n
a
u
s
er
n
ee
d
s
to
tr
a
n
s
f
er
m
o
n
e
y
to
an
o
th
er
u
s
er
all
h
e/
s
h
e
n
ee
d
s
is
to
en
ter
th
e
r
ec
ei
v
er
p
h
o
n
e
n
u
m
b
er
a
n
d
th
e
a
m
o
u
n
t
o
f
m
o
n
e
y
w
a
n
t
to
b
e
t
r
an
s
f
er
r
ed
.
A
ll
t
h
e
r
est
o
f
p
r
o
ce
s
s
s
tep
s
ar
e
r
elied
o
n
t
h
e
s
y
s
t
e
m
it
s
elf
.
Fig
u
r
e
3
(
s
ee
in
ap
p
en
d
i
x
)
,
th
e
w
h
o
le
p
r
o
ce
s
s
b
eg
in
s
w
it
h
g
en
er
at
in
g
a
n
e
w
s
e
s
s
io
n
k
e
y
(
e
x
p
lain
ed
in
s
ec
t
io
n
2
.
3
)
w
h
ic
h
i
s
s
p
ec
i
f
ied
a
n
d
d
ed
icate
d
o
n
l
y
f
o
r
t
h
e
c
u
r
r
en
t
s
ess
io
n
.
A
t
th
e
e
n
d
o
f
t
h
is
s
es
s
io
n
t
h
e
u
s
ed
K
s
b
ec
o
m
e
s
id
le
an
d
th
e
o
n
l
y
p
u
r
p
o
s
e
o
f
k
ee
p
in
g
it
in
d
atab
ase
i
s
to
u
s
e
i
t in
t
h
e
n
e
x
t se
s
s
io
n
f
o
r
th
e
g
e
n
er
atio
n
o
f
n
e
w
K
s
.
T
h
e
K
s
p
ass
es th
r
o
u
g
h
n
u
m
b
er
o
f
s
tep
s
to
b
e
r
ea
d
y
f
o
r
en
s
u
r
i
n
g
r
ec
ei
v
er
au
t
h
en
ticatio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
5
,
Octo
b
e
r
2
0
2
1
:
4
4
1
3
-
4422
4418
Fig
u
r
e
3
.
T
h
e
w
h
o
le
m
o
n
e
y
tr
an
s
f
er
r
in
g
s
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
S
o
ftw
a
r
e
en
g
in
ee
r
in
g
b
a
s
ed
s
ec
u
r
ed
E
-
p
a
yme
n
t sys
tem
(
Mu
a
ya
d
S
a
d
ik
C
r
o
o
ck
)
4419
First
o
f
all,
th
e
K
s
is
s
p
lit
i
n
to
s
i
x
b
lo
c
k
s
o
f
4
-
b
it
b
in
a
r
y
f
o
llo
w
ed
b
y
co
n
v
er
ti
n
g
e
ac
h
b
lo
ck
s
ep
ar
atel
y
to
h
e
x
ad
ec
i
m
al
v
a
lu
e.
B
y
co
n
ca
te
n
ati
n
g
t
h
ese
s
ix
r
es
u
lted
h
e
x
ad
ec
i
m
al
v
al
u
es,
a
n
e
w
co
d
e
is
o
b
tain
ed
to
b
e
s
e
n
t
i
n
SMS
to
t
h
e
r
ec
ei
v
er
p
h
o
n
e
n
u
m
b
er
to
b
e
u
s
ed
f
o
r
f
u
r
t
h
er
p
r
o
ce
s
s
es
at
th
e
r
ec
eiv
er
s
id
e.
I
n
f
ac
t,
t
h
e
p
r
o
ce
s
s
at
t
h
e
s
e
n
d
er
s
id
e
is
n
o
t
li
m
ited
to
o
n
l
y
g
en
er
ati
n
g
,
p
r
o
ce
s
s
in
g
h
an
d
li
n
g
a
n
d
s
e
n
d
in
g
t
h
e
K
s
h
o
w
e
v
er
,
it
e
x
ce
ed
s
th
at
t
o
h
as
h
i
n
g
th
e
tr
an
s
ac
tio
n
i
n
f
o
r
m
atio
n
an
d
p
as
s
it
to
t
h
e
r
ec
eiv
er
s
ec
u
r
el
y
o
v
er
n
et
w
o
r
k
.
T
o
k
en
izatio
n
m
ec
h
a
n
is
m
h
as
b
ee
n
u
s
ed
f
o
r
th
at
p
u
r
p
o
s
e,
w
h
ic
h
is
t
h
e
p
r
o
ce
s
s
o
f
s
en
d
i
n
g
s
e
n
s
it
iv
e
d
ata
v
ia
a
m
o
b
ile
ap
p
licatio
n
c
all
o
r
b
atch
f
ile
to
a
to
k
en
iza
ti
o
n
p
r
o
v
id
er
th
at
th
e
n
r
ep
lace
s
th
at
d
ata
w
it
h
n
o
n
-
s
en
s
iti
v
e
p
lace
h
o
ld
er
s
ca
lled
to
k
en
s
.
Si
m
p
l
y
,
i
t
s
w
ap
s
o
u
t
s
en
s
iti
v
e
d
ata
-
t
y
p
icall
y
p
a
y
m
en
t
ca
r
d
o
r
b
an
k
ac
co
u
n
t
n
u
m
b
er
s
-
w
it
h
a
r
an
d
o
m
ized
n
u
m
b
er
i
n
th
e
s
a
m
e
f
o
r
m
at
b
u
t
w
i
th
n
o
in
tr
i
n
s
ic
v
al
u
e
o
f
its
o
w
n
.
I
t
is
w
o
r
t
h
m
e
n
tio
n
in
g
th
at
HS2
5
6
(
HM
AC
w
i
t
h
SH
A
2
5
6
)
alg
o
r
ith
m
h
as
b
ee
n
u
s
ed
i
n
o
b
tain
in
g
to
k
en
f
r
o
m
o
u
r
s
en
s
iti
v
e
tr
a
n
s
ac
tio
n
i
n
f
o
r
m
atio
n
.
T
h
u
s
,
th
e
K
s
,
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
,
tr
an
s
ac
tio
n
d
ate
a
n
d
th
e
m
o
n
e
y
a
m
o
u
n
t
ar
e
tr
a
n
s
f
o
r
m
ed
in
to
a
s
ec
u
r
ed
to
k
en
.
T
h
e
r
ec
eiv
er
s
id
e
p
r
o
ce
s
s
b
e
g
i
n
s
w
h
e
n
t
h
e
SM
S
t
h
at
in
cl
u
d
es
th
e
en
co
d
ed
K
s
is
r
ec
eiv
ed
.
A
s
p
ec
ial
d
ialo
g
b
o
x
is
ap
p
ea
r
e
d
in
th
e
p
r
o
p
o
s
ed
m
o
b
ile
ap
p
licatio
n
to
an
y
u
s
er
h
a
v
e
a
m
o
n
e
y
to
r
ec
e
iv
e.
T
h
is
ca
n
p
r
o
m
p
t
h
i
m
/h
er
t
o
en
ter
th
e
r
ec
ei
v
ed
co
d
e
in
t
h
e
SMS.
Af
ter
t
h
at,
th
e
s
y
s
te
m
d
ec
o
d
es
th
e
e
n
ter
e
d
co
d
e
to
ex
tr
ac
t
th
e
o
r
ig
i
n
al
K
s
.
Dec
o
d
in
g
p
r
o
ce
s
s
is
d
o
n
e
b
y
s
p
litt
i
n
g
t
h
e
co
d
e
b
ac
k
i
n
to
s
i
x
b
lo
ck
s
a
n
d
co
n
v
er
tin
g
ea
ch
b
lo
ck
f
r
o
m
h
e
x
ad
e
ci
m
al
to
b
in
ar
y
.
T
h
en
,
t
h
e
al
g
o
r
ith
m
co
n
ca
te
n
ates
all
o
f
t
h
e
m
to
g
et
h
er
i
n
s
eq
u
en
t
m
a
n
n
er
,
in
w
h
ich
t
h
e
o
r
ig
i
n
al
K
s
ca
n
b
e
o
b
tai
n
ed
.
T
o
en
s
u
r
e
r
ec
ei
v
er
au
th
e
n
tic
it
y
an
d
d
ea
li
n
g
w
i
th
th
e
i
n
te
n
d
ed
u
s
er
,
th
e
last
l
y
o
b
tain
ed
K
s
i
s
co
m
p
ar
ed
w
it
h
t
h
e
s
to
r
ed
K
s
.
I
f
t
h
e
y
ar
e
id
en
tical,
th
e
f
ir
s
t
le
v
el
o
f
au
t
h
e
n
ticatio
n
is
s
u
cc
es
s
f
u
l
l
y
co
m
p
leted
.
T
h
e
s
ec
o
n
d
lev
el
o
f
au
t
h
en
ticatio
n
b
eg
in
s
w
i
th
ac
ti
v
ati
n
g
t
h
e
to
k
en
(
b
u
i
ld
at
t
h
e
s
e
n
d
er
s
id
e)
at
th
e
r
ec
eiv
er
s
id
e.
T
h
u
s
,
t
h
e
to
k
en
is
d
ec
o
d
ed
an
d
th
e
tr
an
s
ac
tio
n
i
n
f
o
r
m
atio
n
ca
n
b
e
o
b
tain
ed
w
h
ic
h
ar
e:
K
s
,
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
,
tr
an
s
ac
tio
n
d
ate
an
d
th
e
m
o
n
e
y
a
m
o
u
n
t.
T
h
e
n
ex
t
s
tep
is
to
en
s
u
r
e
th
e
s
es
s
io
n
ac
ti
v
it
y
b
esid
es,
an
o
th
er
lev
e
l
o
f
au
th
e
n
tica
tio
n
,
d
o
n
e
b
y
co
m
p
ar
i
n
g
t
h
e
p
h
o
n
e
n
u
m
b
er
in
th
e
to
k
en
w
it
h
th
e
u
s
er
p
h
o
n
e
n
u
m
b
er
an
d
th
e
K
s
w
it
h
th
e
K
s
in
th
e
SMS.
Af
ter
th
a
t,
th
e
f
i
n
al
g
o
al
is
ac
h
iev
ed
w
h
ic
h
is
tr
a
n
s
f
er
r
in
g
t
h
e
m
o
n
e
y
f
r
o
m
s
en
d
e
r
to
r
ec
eiv
e
r
.
3.
E
XP
E
R
I
M
E
NT
A
L
RE
SUL
T
S
I
n
o
r
d
er
to
test
th
e
o
p
er
atio
n
an
d
p
er
f
o
r
m
a
n
ce
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
,
d
i
f
f
er
en
t
ex
p
er
i
m
en
ts
h
a
v
e
b
ee
n
co
n
s
id
er
ed
.
Fo
r
ea
s
in
g
t
h
e
r
ea
d
in
g
f
lo
w
,
t
h
e
o
b
tain
ed
r
esu
lt
s
ca
n
b
e
d
iv
id
ed
in
to
t
h
r
ee
p
ar
ts
as f
o
llo
w
:
3
.
1
.
B
a
ck
-
pro
pa
g
a
t
io
n r
esu
lt
s
T
h
e
p
r
o
p
o
s
ed
A
N
N
i
s
v
er
y
s
i
m
p
le
a
n
d
ab
s
o
l
u
tel
y
w
o
r
k
s
w
it
h
n
o
er
r
o
r
s
i
n
th
e
o
u
tp
u
t
an
d
t
h
is
i
s
p
r
o
v
ed
b
y
test
in
g
it
f
o
r
d
if
f
er
en
t
n
u
m
b
er
s
an
d
e
v
er
y
ti
m
e
i
t
s
h
o
w
s
v
er
y
co
d
e
r
es
u
lts
.
F
ig
u
r
e
4
s
h
o
w
s
a
b
r
ie
f
d
escr
ip
tio
n
ab
o
u
t
th
e
f
in
al
r
e
s
u
lt
s
o
f
tes
tin
g
t
h
e
p
r
o
p
o
s
ed
b
ac
k
-
p
r
o
p
ag
atio
n
al
g
o
r
ith
m
s
ep
ar
ately
f
r
o
m
t
h
e
ap
p
licatio
n
p
r
o
ce
s
s
.
T
h
e
u
s
ed
n
et
w
o
r
k
i
n
clu
d
e
s
2
4
-
b
it
in
p
u
t
m
atr
i
x
(
th
e
o
r
an
g
e
r
ec
tan
g
le)
th
at
r
ep
r
esen
t
s
th
e
in
p
u
t
n
e
u
r
o
n
s
la
y
er
.
I
t
al
s
o
i
n
v
o
lv
e
s
2
6
-
b
it
d
esire
d
o
u
tp
u
t
m
atr
i
x
(
th
e
b
lu
e
r
ec
ta
n
g
le)
w
h
ich
co
n
s
id
er
ed
to
b
e
th
e
o
u
tp
u
t
la
y
er
n
eu
r
o
n
s
v
al
u
es.
th
e
in
p
u
t
-
h
id
d
en
an
d
h
id
d
en
-
o
u
tp
u
t
w
ei
g
h
ts
(
th
e
g
r
ee
n
r
ec
tan
g
le
s
)
m
atr
ices
ar
e
r
an
d
o
m
l
y
g
e
n
er
ated
v
al
u
e
s
b
et
w
ee
n
1
a
n
d
-
1
.
Af
ter
1
0
0
0
tr
ain
in
g
i
ter
atio
n
s
a
n
d
b
y
u
s
in
g
lear
n
i
n
g
r
at
e
o
f
ab
o
u
t
1
.
0
,
th
e
ac
tu
al
o
u
tp
u
t
(
t
h
e
r
ed
r
ec
tan
g
le)
o
b
tain
ed
at
th
e
las
t
tr
ain
in
g
s
ta
g
e
i
s
al
m
o
s
t
th
e
s
a
m
e
as
t
h
e
d
esire
d
o
u
tp
u
t
(
th
e
b
lu
e
r
ec
ta
n
g
le)
.
T
h
e
y
ello
w
r
ec
ta
n
g
le
r
ep
r
esen
ts
th
e
o
u
tp
u
t
m
a
tr
ix
a
f
ter
r
o
u
n
d
ed
its
v
al
u
es
to
th
e
n
ea
r
est i
n
te
g
er
n
u
m
b
e
r
w
h
ic
h
is
t
h
e
id
en
tica
l o
f
th
e
d
e
s
ir
ed
o
u
tp
u
t.
Fig
u
r
e
4
.
T
h
e
b
ac
k
-
p
r
o
p
ag
atio
n
p
r
o
ce
s
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
5
,
Octo
b
e
r
2
0
2
1
:
4
4
1
3
-
4422
4420
3
.
2
.
R
eg
is
t
ra
t
io
n
a
nd
m
a
s
t
e
r
-
k
ey
g
ener
a
t
io
n
As
m
en
t
io
n
ed
b
ef
o
r
e,
t
h
e
m
ast
er
k
e
y
is
g
e
n
er
ated
at
t
h
e
r
eg
i
s
tr
atio
n
s
ta
g
e
to
b
e
u
s
ed
f
o
r
u
s
e
r
id
en
tit
y
v
er
if
ica
tio
n
.
T
h
e
r
eg
is
tr
at
io
n
p
r
o
ce
s
s
s
i
m
p
l
y
p
r
o
m
p
ts
t
h
e
u
s
er
to
en
ter
th
e
f
u
ll
n
a
m
e,
p
ass
w
o
r
d
an
d
th
e
p
h
o
n
e
n
u
m
b
er
.
P
h
o
n
e
n
u
m
b
er
au
t
h
e
n
ticatio
n
h
as
b
ee
n
u
s
ed
in
t
h
i
s
s
tag
e
to
v
er
i
f
y
u
s
er
p
h
o
n
e
n
u
m
b
er
.
A
t
th
e
o
th
er
h
an
d
,
th
e
m
as
ter
k
e
y
(
K
m
)
is
g
en
er
ated
af
ter
r
eg
i
s
tr
at
io
n
p
r
o
ce
s
s
u
s
i
n
g
o
f
f
u
ll
u
s
er
n
a
m
e.
T
h
e
g
en
er
ated
m
aster
k
e
y
le
n
g
th
,
b
ef
o
r
e
e
n
cr
y
p
tio
n
,
i
s
m
o
r
e
th
a
n
9
d
i
g
i
ts
w
h
er
ea
s
t
h
e
e
n
cr
y
p
ted
v
er
s
io
n
o
f
it
is
2
6
-
b
it
len
g
th
.
Fo
r
i
n
s
ta
n
ce
,
th
e
f
u
ll
n
a
m
e
o
f
t
h
e,
u
s
er
r
e
g
is
ter
ed
i
n
Fi
g
u
r
e
5
,
is
“
R
a
w
an
Ali
T
ab
an
”
,
b
y
t
ak
i
n
g
th
e
ASC
I
I
o
f
f
ir
s
t
let
ter
s
o
f
ea
c
h
n
a
m
e
(
R
=1
1
4
,
A
=9
7
,
T
=
1
1
6
)
an
d
b
y
co
n
ca
ten
a
tin
g
t
h
e
m
w
it
h
ea
c
h
o
th
er
i
n
ad
d
itio
n
to
th
e
u
s
er
u
n
iq
u
e
I
D
(
E
x
:5
5
f
o
r
t
h
is
u
s
er
)
in
d
at
ab
ase,
th
e
r
es
u
lted
K
m
i
s
(
1
1
4
9
7
1
1
6
5
5
)
.
Fig
u
r
e
6
s
h
o
w
s
t
h
e
s
tr
u
ct
u
r
e
o
f
d
atab
ase
af
te
r
t
h
e
u
s
er
s
u
cc
e
s
s
f
u
ll
y
r
eg
is
ter
ed
i
n
t
h
e
ap
p
licatio
n
.
T
h
e
m
aster
k
e
y
in
cl
u
d
ed
in
Fi
g
u
r
e
5
is
t
h
e
en
c
r
y
p
ted
v
er
s
io
n
o
f
(
1
1
4
9
7
1
1
6
5
5
)
af
ter
a
p
p
ly
b
ac
k
p
r
o
p
ag
atio
n
alg
o
r
it
h
m
.
(
a)
(
b
)
(
c)
Fig
u
r
e
5
.
Mo
n
e
y
tr
an
s
m
itti
n
g
ac
tiv
itie
s
; (
a)
an
d
(
b
)
at
s
en
d
er
s
id
e
an
d
(
c)
at
r
ec
eiv
er
s
id
e
Fig
u
r
e
6
.
T
h
e
d
atab
ase
s
tr
u
ctu
r
e
af
ter
r
eg
is
tr
atio
n
3
.
3
.
M
o
ney
t
ra
ns
m
it
t
ing
re
s
ults
W
e
h
av
e
d
o
n
e
a
ca
r
e
f
u
l,
s
ec
u
r
e
an
d
r
eliab
le
tech
n
iq
u
e
f
o
r
s
en
s
iti
v
e
d
ata
e
x
c
h
an
g
e
l
ik
e
m
o
n
e
y
tr
an
s
f
er
.
Dep
en
d
i
n
g
o
n
b
o
th
m
aster
an
d
s
es
s
io
n
k
e
y
s
i
n
t
h
e
tr
an
s
ac
tio
n
p
r
o
v
id
es
b
etter
s
e
cu
r
it
y
as
it
in
cr
ea
s
es
th
e
d
if
f
ic
u
lt
y
f
o
r
th
e
at
tack
er
s
to
d
er
iv
e
b
o
th
k
e
y
s
.
Mo
r
eo
v
er
,
ev
er
y
tr
an
s
ac
tio
n
is
d
o
n
e
w
it
h
a
n
e
w
s
es
s
io
n
k
e
y
d
if
f
er
en
t
f
r
o
m
p
r
ev
io
u
s
k
e
y
s
a
n
d
g
e
n
er
ated
w
it
h
t
h
e
h
elp
o
f
la
s
t
s
ess
io
n
k
e
y
.
T
h
er
ef
o
r
e,
if
th
e
attac
k
er
g
ets t
h
e
s
e
s
s
io
n
k
e
y
o
n
e
ti
m
e,
h
e/s
h
e
can
n
o
t b
e
ab
le
to
u
s
e
it
f
o
r
n
ex
t
s
es
s
io
n
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
S
o
ftw
a
r
e
en
g
in
ee
r
in
g
b
a
s
ed
s
ec
u
r
ed
E
-
p
a
yme
n
t sys
tem
(
Mu
a
ya
d
S
a
d
ik
C
r
o
o
ck
)
4421
Fig
u
r
e
5(
a
)
s
h
o
w
s
t
h
e
h
o
m
e
p
ag
e
o
f
th
e
u
s
er
th
at
co
n
tai
n
s
d
if
f
er
en
t
ac
tiv
it
ies
li
k
e
tr
an
s
f
er
m
o
n
e
y
,
ch
ar
g
e
m
o
n
e
y
an
d
c
u
r
r
en
t
tr
a
n
s
ac
tio
n
s
.
T
h
e
m
o
s
t
i
m
p
o
r
ta
n
t
p
ag
e
i
s
t
h
e
“
tr
an
s
f
er
m
o
n
e
y
”
p
ag
e.
T
h
e
p
ag
e
in
Fig
u
r
e
5
(
b
)
is
a
s
i
m
p
le
d
esig
n
ed
o
n
ly
p
r
o
m
p
t
th
e
u
s
er
to
en
ter
th
e
r
ec
eiv
er
p
h
o
n
e
n
u
m
b
er
an
d
th
e
a
m
o
u
n
t
o
f
m
o
n
e
y
.
Fi
g
u
r
e
5(
c
)
,
is
a
s
cr
ee
n
s
h
o
t
at
th
e
r
ec
eiv
er
s
id
e
wh
en
t
h
e
s
e
n
d
er
b
eg
in
s
a
tr
an
s
ac
tio
n
w
it
h
h
i
m
/
h
er
w
h
ic
h
p
r
o
m
p
t t
h
e
u
s
er
to
en
ter
th
e
tr
an
s
ac
tio
n
K
s
r
ec
eiv
ed
i
n
SMS.
3
.
4
.
NIS
T
t
ests
A
ll
Ses
s
io
n
k
e
y
s
,
g
en
er
ated
i
n
th
e
ap
p
licatio
n
,
ar
e
p
ass
ed
th
r
o
u
g
h
NI
ST
f
r
eq
u
en
c
y
an
d
s
er
ial
test
s
.
T
h
is
is
d
o
n
e
b
y
c
h
ec
k
in
g
t
h
e
r
an
d
o
m
n
e
s
s
o
f
t
h
e
k
e
y
.
I
f
t
h
e
k
e
y
i
s
v
alid
,
t
h
e
n
it
p
ass
e
s
th
e
t
est.
Ot
h
er
w
is
e,
it
is
f
ailed
an
d
n
o
t
r
ea
d
y
f
o
r
u
s
e.
I
n
th
is
ca
s
e,
a
n
o
th
er
k
e
y
i
s
g
e
n
er
ated
an
d
th
e
w
h
o
le
te
s
t
p
r
o
ce
s
s
is
r
ep
ea
ted
[
2
5
]
.
Fig
u
r
e
7
s
h
o
w
s
t
h
e
r
es
u
lts
o
f
test
i
n
g
t
w
o
k
e
y
s
.
On
e
o
f
t
h
e
m
is
p
ass
in
f
r
eq
u
e
n
c
y
a
n
d
f
aile
d
in
s
er
ial
test
a
n
d
th
e
o
th
er
is
f
ailed
in
b
o
th
te
s
ts
.
T
h
is
is
b
ec
au
s
e
t
h
e
o
b
tain
ed
test
v
al
u
e
is
lar
g
er
th
a
n
th
e
s
p
ec
if
ied
test
th
r
es
h
o
ld
.
Fig
u
r
e
7
.
NI
ST
test
s
r
esu
lts
4.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
p
r
o
p
o
s
ed
a
s
ec
u
r
ed
m
o
n
e
y
tr
a
n
s
f
er
s
y
s
te
m
b
ased
o
n
s
o
f
t
w
ar
e
en
g
i
n
ee
r
in
g
tec
h
n
o
lo
g
y
a
n
d
n
eu
r
al
n
et
w
o
r
k
.
T
h
e
s
y
s
te
m
w
a
s
p
r
esen
ted
i
n
a
m
o
b
ile
ap
p
licatio
n
an
d
a
s
er
v
er
s
id
e.
S
o
f
t
w
ar
e
en
g
i
n
ee
r
in
g
m
o
d
el
w
a
s
ad
o
p
ted
to
g
u
ar
an
tee
th
e
r
eliab
ili
t
y
,
a
v
ailab
ili
t
y
an
d
au
th
e
n
ticat
io
n
p
h
a
s
es
f
o
r
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
.
Ne
u
r
al
n
e
t
w
o
r
k
w
as
u
s
ed
in
k
e
y
g
e
n
er
atio
n
f
o
r
in
cr
ea
s
in
g
th
e
s
ec
u
r
it
y
o
f
t
h
e
s
y
s
te
m
.
T
h
e
o
b
t
ain
ed
ex
p
er
i
m
e
n
t
r
esu
l
ts
s
h
o
w
ed
t
h
e
h
i
g
h
e
f
f
icien
c
y
o
f
th
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
n
ter
m
s
o
f
s
ec
u
r
it
y
a
n
d
m
o
n
e
y
tr
an
s
f
er
.
RE
F
E
R
E
NC
E
S
[1
]
F
ra
n
ç
o
is Ch
o
ll
e
t,
“
De
e
p
L
e
a
rn
in
g
w
it
h
P
y
th
o
n
,
”
M
a
n
n
in
g
,
2
0
1
8
.
[2
]
M
.
T
h
o
m
a
,
“
A
n
a
l
y
sis
a
n
d
Op
ti
m
iza
ti
o
n
o
f
Co
n
v
o
lu
ti
o
n
a
l
Ne
u
ra
l
Ne
t
w
o
rk
A
rc
h
it
e
c
tu
re
s
,
”
a
rXiv
p
re
p
rin
t
a
rXiv:1
7
0
7
.
0
9
7
2
5
,
2
0
1
7
.
[3
]
J.
Ay
u
b
a
,
H.
S
a
fw
a
n
a
,
a
n
d
Y.
A
b
d
u
laz
e
e
z
,
a
n
d
D.
M
a
'
a
z
u
,
“
S
o
f
tw
a
r
e
De
v
e
lo
p
m
e
n
t
o
f
In
teg
ra
ted
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
s
F
o
r
Re
a
lT
i
m
e
M
o
n
it
o
r
in
g
o
f
Oil
a
n
d
G
a
s
F
lo
w
Ra
te
M
e
terin
g
In
f
ra
stru
c
tu
re
,
”
J
o
u
rn
a
l
o
f
In
fo
rm
a
t
io
n
T
e
c
h
n
o
l
o
g
y
a
n
d
S
o
ft
w
a
re
En
g
in
e
e
rin
g
,
v
o
l
.
8
,
n
o
.
2
,
pp
. 1
-
1
0
,
2
0
1
8
,
d
o
i:
1
0
.
4
1
7
2
/2
1
6
5
-
7
8
6
6
.
1
0
0
0
2
3
3
.
[4
]
A
.
M
u
n
e
m
,
a
n
d
M
.
Cro
o
c
k
,
“
S
m
a
rt
T
ra
ff
ic
L
i
g
h
t
Co
n
tro
l
S
y
st
e
m
f
o
r
E
m
e
rg
e
n
c
y
Am
b
u
lan
c
e
,
”
In
t.
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Res
e
a
rc
h
in
Co
mp
u
ter
En
g
i
n
e
e
rin
g
a
n
d
T
e
c
h
n
o
lo
g
y
(
IJ
A
RCE
T
)
,
v
o
l
.
5
,
n
o
.
8
,
p
p
.
2
2
4
7
-
2
2
5
5
,
2
0
1
6
.
[5
]
L
.
D.
Ng
u
y
e
n
,
D.
L
in
,
Z.
L
in
,
J.
Ca
o
,
“
De
e
p
CNN
s
f
o
r
M
icro
sc
o
p
ic
Im
a
g
e
Clas
si
f
ic
a
ti
o
n
b
y
E
x
p
lo
it
in
g
T
ra
n
sfe
r
L
e
a
rn
in
g
a
n
d
F
e
a
tu
re
Co
n
c
a
ten
a
ti
o
n
,
”
IEE
E
In
ter
n
a
ti
o
n
a
l
S
y
mp
o
siu
m
o
n
Circ
u
it
s
a
n
d
S
y
ste
ms
(
IS
CAS
)
,
p
p
.
1
–
5
,
2
0
1
8
,
d
o
i:
1
0
.
1
1
0
9
/I
S
C
A
S
.
2
0
1
8
.
8
3
5
1
5
5
0
.
[6
]
J
.
M
a
s a
n
d
C
.
M
a
tu
e
,
“
In
tr
o
d
u
c
ti
o
n
t
o
W
e
b
A
p
p
li
c
a
ti
o
n
De
v
e
lo
p
m
e
n
t
,
”
Eu
re
c
a
M
e
d
ia,
2
0
1
5
.
[7
]
M
.
S
.
Cr
o
o
c
k
,
S
.
A
l
-
Qa
ra
a
w
i
a
n
d
R.
A
.
T
a
b
a
n
,
“
G
a
z
e
Dir
e
c
ti
o
n
b
a
se
d
M
o
b
il
e
A
p
p
li
c
a
ti
o
n
f
o
r
Qu
a
d
rip
leg
ia
W
h
e
e
lch
a
ir
Co
n
tro
l
S
y
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
A
d
v
a
n
c
e
d
Co
mp
u
ter
S
c
ien
c
e
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
v
o
l.
9
,
n
o
.
5
,
p
p
.
4
1
5
-
4
2
6
,
2
0
1
8
.
[8
]
I.
Y.
Ju
n
g
,
a
n
d
G
.
J.
Ja
n
g
,
“
A
S
e
c
u
re
a
n
d
Re
li
a
b
le
e
-
W
a
ll
e
t
u
sin
g
a
S
m
a
rt
S
S
D
,
”
L
if
e
S
c
ien
c
e
J
o
u
rn
a
l
,
v
o
l.
11
,
n
o
.
7
,
p
p
.
1
1
7
-
1
2
1
,
2
0
1
4
.
[9
]
M
.
P
.
Bo
sa
m
ia,
“
M
o
b
il
e
W
a
ll
e
t
P
a
y
m
e
n
ts
Re
c
e
n
t
P
o
ten
ti
a
l
T
h
re
a
ts
a
n
d
Vu
ln
e
ra
b
il
it
ies
w
it
h
it
s
p
o
ss
ib
le
se
c
u
rit
y
M
e
a
su
re
s
,
”
CM
P
ICA
,
2
0
1
7
.
[1
0
]
G
.
K
a
n
im
o
z
h
i
,
a
n
d
K.S
.
Ka
m
a
tch
i,
“
S
e
c
u
rit
y
As
p
e
c
ts
o
f
M
o
b
il
e
Ba
se
d
E
Wallet
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
n
Rec
e
n
t
a
n
d
In
n
o
v
a
ti
o
n
T
re
n
d
s i
n
Co
m
p
u
t
in
g
a
n
d
C
o
mm
u
n
ic
a
ti
o
n
,
v
o
l.
5
,
n
o
.
6
,
pp
.
1
2
2
3
-
1
2
2
8
,
2
0
1
7
.
[1
1
]
D
.
Ku
m
a
r,
a
n
d
U
.
S
h
a
rm
a
,
“
D
e
si
g
n
E
-
W
a
ll
e
t
a
s
a
Ce
n
tralize
d
E
-
wa
ll
e
t
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
i
n
e
e
rin
g
a
n
d
Ad
v
a
n
c
e
d
T
e
c
h
n
o
lo
g
y
(
IJ
EA
T
)
,
v
o
l.
9
,
n
o
.
2
,
pp
.
2
2
4
9
-
8
9
5
8
,
2
0
1
9
,
doi
:
1
0
.
3
5
9
4
0
/
ij
e
a
t.
B
2
6
8
4
.
1
2
9
2
1
9
.
[1
2
]
A
.
J
.
A
ln
a
w
a
is
e
h
,
“
S
e
c
u
rit
y
In
fo
rm
a
ti
o
n
S
y
ste
m
o
f
T
h
e
Co
m
p
u
ter
Ce
n
ter
I
n
M
u
’tah
Un
iv
e
rsi
ty
,
”
Eu
ro
p
e
a
n
S
c
ien
ti
fi
c
J
o
u
rn
a
l
,
v
o
l
.
10
,
n
o
.
2
7
,
P
.
P
.
2
9
2
-
3
0
2
,
2
0
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
11
,
No
.
5
,
Octo
b
e
r
2
0
2
1
:
4
4
1
3
-
4422
4422
[1
3
]
K
.
S
u
b
ra
h
m
a
n
y
a
m
,
M
.
Ha
rit
h
a
,
V
.
T
e
jas
w
in
i,
Ch
.
Ba
lara
m
,
a
n
d
C.
Dh
e
e
ra
j,
“
In
f
o
rm
a
ti
o
n
S
e
c
u
rit
y
a
n
d
Risk
M
a
n
a
g
e
m
e
n
t
f
o
r
Ba
n
k
in
g
S
y
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
mp
u
ter
T
re
n
d
s
a
n
d
T
e
c
h
n
o
lo
g
y
(
IJ
CT
T
)
,
v
o
l.
10
,
n
o
.
3
,
pp
.
1
7
1
-
1
7
6
,
2
0
1
4
.
[1
4
]
S
.
Al
-
Dh
a
h
ri
,
M.
Al
-
S
a
rti
,
a
n
d
A
.
A
b
d
u
l
A
z
iz,
“
In
f
o
rm
a
ti
o
n
S
e
c
u
r
it
y
M
a
n
a
g
e
m
e
n
t
S
y
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
A
p
p
l
ica
ti
o
n
s
,
v
o
l.
1
5
8
,
n
o
.
7
,
p
p
.
29
-
33
,
2
0
1
7
,
d
o
i
:
1
0
.
5
1
2
0
/i
jca
2
0
1
7
9
1
2
8
5
1
.
[1
5
]
X
iao
f
e
i
T
a
n
g
,
“
De
v
e
lo
p
m
e
n
t
o
f
Co
m
m
e
rc
ial
Ba
n
k
In
f
o
r
m
a
ti
o
n
S
y
ste
m
Ba
s
e
d
o
n
Risk
M
a
n
a
g
e
m
e
n
t
Re
se
a
rc
h
,
”
4
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
Ed
u
c
a
ti
o
n
,
M
a
n
a
g
e
me
n
t
a
n
d
C
o
mp
u
ti
n
g
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
5
8
,
n
o
.
7
,
p
p
.
7
1
0
-
7
1
4
,
2
0
1
7
,
d
o
i:
1
0
.
2
9
9
1
/
ice
m
c
t
-
1
7
.
2
0
1
7
.
1
5
2
.
[1
6
]
S
.
S
h
o
k
o
u
h
y
a
r,
F
.
P
a
n
a
h
if
a
r,
A
.
Ka
ri
m
ise
f
a
t
a
n
d
M
.
Ne
z
a
f
a
tb
a
k
h
sh
,
“
A
n
in
f
o
r
m
a
ti
o
n
s
y
ste
m
r
isk
a
ss
e
ss
m
e
n
t
m
o
d
e
l:
a
c
a
se
stu
d
y
in
o
n
li
n
e
b
a
n
k
in
g
sy
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
El
e
c
tro
n
ic
S
e
c
u
rity
a
n
d
Dig
it
a
l
F
o
re
n
sic
s
,
v
o
l.
1
0
,
n
o
.
1
,
pp
.
3
9
-
5
9
,
2
0
1
8
,
d
o
i
:
1
0
.
1
5
0
4
/IJES
DF
.
2
0
1
8
.
0
8
9
2
0
5
.
[1
7
]
A
.
M
a
h
a
ll
e
,
J
.
Yo
n
g
,
X
.
T
a
o
,
a
n
d
J
.
S
h
e
n
,
“
Da
ta
P
riv
a
c
y
a
n
d
S
y
s
tem
S
e
c
u
rit
y
f
o
r
Ba
n
k
in
g
a
n
d
F
in
a
n
c
ial
S
e
rv
ice
s
In
d
u
stry
b
a
se
d
o
n
Cl
o
u
d
Co
m
p
u
ti
n
g
I
n
f
ra
stru
c
tu
re
,
”
2
0
1
8
IEE
E
2
2
n
d
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
C
o
mp
u
ter
S
u
p
p
o
rte
d
Co
o
p
e
ra
ti
v
e
W
o
rk
in
De
sig
n
(
(
CS
CW
D))
,
p
p
.
4
0
7
-
4
1
3
,
2
0
1
8
,
d
o
i:
1
0
.
1
1
0
9
/C
S
CW
D.2
0
1
8
.
8
4
6
5
3
1
8
.
[1
8
]
P
.
G
io
rg
in
i1
a
n
d
F
.
M
.
J
.
M
y
lo
p
o
u
lo
s
,
“
Re
q
u
irem
e
n
t
En
g
in
e
e
ri
n
g
M
e
e
ts
S
e
c
u
rit
y
:
A
Ca
s
e
S
tu
d
y
o
n
M
o
d
e
l
li
n
g
S
e
c
u
re
El
e
c
tro
n
ic
T
ra
n
sa
c
ti
o
n
s
b
y
V
IS
A
a
n
d
M
a
ste
rc
a
rd
,
”
2
2
n
d
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
n
c
e
p
tu
a
l
M
o
d
e
li
n
g
,
S
p
rin
g
e
r,
2
0
0
3
,
p
p
.
2
6
3
-
2
7
6
.
[1
9
]
P
.
T
.
De
v
a
n
b
u
,
a
n
d
S
.
S
t
u
b
b
leb
i
n
e
,
“
S
o
f
t
w
a
r
e
En
g
in
e
e
rin
g
f
o
r
S
e
c
u
rit
y
:
a
Ro
a
d
m
a
p
,
”
Co
n
fer
e
n
c
e
o
n
T
h
e
Fu
tu
re
o
f
S
o
ft
w
a
re
En
g
in
e
e
rin
g
,
2
0
0
0
,
pp
.
2
2
7
–
2
3
9
,
d
o
i
:
1
0
.
1
1
4
5
/3
3
6
5
1
2
.
3
3
6
5
5
9
.
[2
0
]
S
.
U.
Re
h
m
a
n
,
a
n
d
V
.
G
ru
h
n
,
“
A
n
Eff
e
c
ti
v
e
S
e
c
u
rit
y
Re
q
u
ire
m
e
n
ts
En
g
in
e
e
rin
g
F
ra
m
e
w
o
rk
f
o
r
Cy
b
e
r
-
P
h
y
sic
a
l
S
y
st
e
m
s
,
”
T
e
c
h
n
o
lo
g
ies
,
v
o
l.
6
,
n
o
.
3
,
2
0
1
8
,
A
rt.
No
.
6
3
,
d
o
i
:
1
0
.
3
3
9
0
/t
e
c
h
n
o
l
o
g
ies
6
0
3
0
0
6
5
.
[2
1
]
Ia
n
S
o
m
m
e
rv
il
le,
“
S
o
f
t
w
a
r
e
e
n
g
in
e
e
rin
g
,
”
10
th
Ed
i
ti
o
n
,
P
e
a
rso
n
E
d
u
c
a
ti
o
n
,
I
n
c
,
2
0
1
7
.
[2
2
]
M
.
Ku
u
ti
laa
,
M
.
M
a
n
ty
laa
,
U
.
F
a
ro
o
q
a
,
a
n
d
M
.
Clae
s,
“
T
i
m
e
P
re
ss
u
re
in
S
o
f
t
w
a
r
e
En
g
in
e
e
rin
g
:
A
S
y
ste
m
a
ti
c
Re
v
ie
w
,
”
El
se
v
i
er
,
v
o
l.
1
2
1
,
2
0
2
0
,
d
o
i:
1
0
.
1
0
1
6
/
j.
i
n
f
so
f
.
2
0
2
0
.
1
0
6
2
5
7
.
[2
3
]
V
.
V.
P
h
o
h
a
a
n
d
S
.
P
h
o
h
a
,
“
S
it
u
a
ti
o
n
-
A
wa
re
S
o
f
t
w
a
re
En
g
in
e
e
rin
g
f
o
r
S
e
n
so
r
Ne
tw
o
rk
s
,
”
2
n
d
I
n
ter
n
a
ti
o
n
a
l
C
o
n
f
.
o
n
C
o
mm
u
n
ica
ti
o
n
S
y
ste
ms
S
o
ft
w
a
re
a
n
d
M
id
d
lewa
re
,
p
p
.
1
-
7
,
2
0
0
7
,
d
o
i:
1
0
.
1
1
0
9
/COM
S
W
A
.
2
0
0
7
.
3
8
2
4
2
6
.
[2
4
]
C.
Ch
a
ru
A
g
g
a
r
w
a
l,
“
N
e
u
ra
l
Ne
tw
o
rk
s a
n
d
De
e
p
L
e
a
rn
in
g
,
”
S
p
ri
n
g
e
r,
1
st
E
d
it
i
o
n
,
2
0
1
8
.
[2
5
]
M
.
S
.
Cro
o
c
k
,
Z.
A
.
Ha
s
sa
n
a
n
d
S
.
D.
Kh
u
d
e
r
,
“
A
d
a
p
ti
v
e
k
e
y
g
e
n
e
ra
ti
o
n
a
l
g
o
rit
h
m
b
a
se
d
o
n
so
f
twa
re
e
n
g
in
e
e
rin
g
m
e
th
o
d
o
lo
g
y
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
E
n
g
i
n
e
e
rin
g
(
IJ
ECE
)
,
v
o
l.
1
1
,
n
o
.
1
,
p
p
.
5
8
9
-
5
9
5
,
2
0
2
1
,
d
o
i:
1
0
.
1
1
5
9
1
/i
jec
e
.
v
1
1
i
1
.
p
p
5
8
9
-
5
9
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.