I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
pu
t
er
E
ng
ineering
(
I
J
E
CE
)
Vo
l.
15
,
No
.
2
,
A
p
r
il
20
25
,
p
p
.
1
9
6
1
~
1
9
6
7
I
SS
N:
2088
-
8
7
0
8
,
DOI
: 1
0
.
1
1
5
9
1
/ijece.
v
15
i
2
.
pp
1
9
6
1
-
1
9
6
7
1961
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m
Enha
ncing
da
ta s
ecurity using
a
m
ulti
-
la
y
er e
ncry
pt
io
n sy
stem
O
s
a
m
a
A
bd
Q
a
s
im
1
,
Sa
j
j
a
d
G
o
ls
ha
nn
a
v
a
z
2
1
C
o
m
p
u
t
e
r
E
n
g
i
n
e
e
r
i
n
g
D
e
p
a
r
t
me
n
t
,
F
a
c
u
l
t
y
o
f
E
l
e
c
t
r
i
c
a
l
a
n
d
C
o
m
p
u
t
e
r
E
n
g
i
n
e
e
r
i
n
g
,
U
r
mi
a
U
n
i
v
e
r
si
t
y
,
U
r
mi
a
,
I
r
a
n
2
El
e
c
t
r
i
c
a
l
E
n
g
i
n
e
e
r
i
n
g
D
e
p
a
r
t
m
e
n
t
,
F
a
c
u
l
t
y
o
f
E
l
e
c
t
r
i
c
a
l
a
n
d
C
o
mp
u
t
e
r
E
n
g
i
n
e
e
r
i
n
g
,
U
r
mi
a
U
n
i
v
e
r
si
t
y
,
U
r
mi
a
,
I
r
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
n
4
,
2
0
2
4
R
ev
is
ed
Oct
4
,
2
0
2
4
Acc
ep
ted
Oct
2
3
,
2
0
2
4
Th
is
stu
d
y
h
ig
h
li
g
h
ts
t
h
e
in
t
e
re
stin
g
p
o
ten
ti
a
l
o
f
a
n
e
w
m
u
lt
il
a
y
e
r
c
ry
p
to
g
ra
p
h
y
sc
h
e
m
e
fo
r
re
l
i
a
b
le
d
a
ta
p
r
o
tec
ti
o
n
in
th
e
field
o
f
c
y
b
e
rse
c
u
rit
y
.
To
d
o
s
o
,
a
n
in
te
n
siv
e
e
x
a
m
in
a
ti
o
n
o
f
a
m
u
lt
i
-
la
y
e
r
e
n
c
ry
p
t
io
n
m
e
c
h
a
n
ism
is
p
ro
p
o
se
d
t
o
re
in
f
o
rc
e
th
e
d
e
fe
n
se
s
in
o
p
p
o
siti
o
n
to
o
n
li
n
e
th
re
a
ts
to
to
u
c
h
y
d
a
ta.
T
h
e
stra
teg
y
is
m
u
lt
i
lev
e
l,
wi
th
a
su
p
e
rio
r
d
ig
i
tal
d
ictio
n
a
ry
se
rv
in
g
a
s
th
e
fo
u
n
d
a
ti
o
n
f
o
r
th
e
p
rima
ry
lay
e
r.
T
h
e
lab
o
ri
o
u
s
p
ro
c
e
d
u
re
s
t
h
a
t
we
n
t
in
t
o
m
a
k
in
g
th
is
d
ictio
n
a
ry
,
in
c
lu
d
i
n
g
ro
tatio
n
d
iffere
n
c
e
s,
ASCII
c
o
n
v
e
rsio
n
,
a
n
d
c
h
a
o
ti
c
m
a
tri
x
e
ra
,
u
p
l
o
a
d
to
i
ts
e
n
c
o
d
i
n
g
tr
o
u
b
le.
A
m
o
d
ifi
e
d
m
o
d
e
l
o
f
th
e
a
d
v
a
n
c
e
d
e
n
c
ry
p
t
io
n
sta
n
d
a
rd
(AES
)
a
lg
o
rit
h
m
wit
h
a
b
ra
n
d
-
n
e
w
k
e
y
g
e
n
e
ra
ti
o
n
tec
h
n
iq
u
e
,
wh
ic
h
is
b
a
se
d
o
n
t
h
e
c
h
a
o
s
i
d
e
a
is
fu
rn
ish
e
d
t
h
ro
u
g
h
lay
e
r
2
.
A
p
a
ra
m
e
ter
is
e
n
c
ry
p
ted
u
sin
g
th
e
Riv
e
st
-
S
h
a
m
ir
-
Ad
lem
a
n
(RS
A)
m
e
th
o
d
,
a
n
d
f
u
rth
e
r
p
r
e
c
a
u
ti
o
n
s
a
re
tak
e
n
to
a
ss
u
re
th
e
se
c
u
rit
y
o
f
th
e
e
n
c
ry
p
ti
o
n
k
e
y
.
W
h
e
n
i
t
c
o
m
e
s
to
e
n
c
ry
p
ti
o
n
t
ime
,
th
e
first
lay
e
r
sig
n
ifi
c
a
n
tl
y
o
u
tp
e
rfo
rm
s
t
h
e
AES
m
e
th
o
d
.
I
n
a
d
d
it
i
o
n
t
o
e
x
h
i
b
it
i
n
g
in
sta
n
tan
e
o
u
s
e
fficie
n
c
y
in
d
a
ta
p
ro
tec
ti
o
n
,
t
h
e
first
lay
e
r
o
u
t
p
e
rfo
rm
e
d
t
h
e
AES
a
lg
o
rit
h
m
i
n
term
s
o
f
e
n
c
ry
p
ti
o
n
t
i
m
e
wh
ich
to
o
k
m
o
re
t
h
a
n
3
se
c
o
n
d
s,
a
n
d
t
h
e
first
lay
e
r
t
o
o
k
les
s
t
h
a
n
0
.
0
1
se
c
o
n
d
s,
wh
il
e
b
o
t
h
a
p
p
ro
a
c
h
e
s
fu
n
c
ti
o
n
e
d
id
e
n
ti
c
a
ll
y
i
n
term
s
o
f
in
fo
rm
a
ti
o
n
d
e
c
ry
p
ti
o
n
.
In
-
d
e
p
th
talk
s
a
re
g
i
v
e
n
to
c
u
sto
m
ize
th
e
su
g
g
e
ste
d
m
e
th
o
d
'
s
p
e
rfo
rm
a
n
c
e
.
T
h
e
re
su
lt
s
d
e
m
o
n
stra
te
th
e
e
ffe
c
ti
v
e
n
e
ss
o
f
t
h
e
su
g
g
e
ste
d
m
u
lt
i
-
sta
g
e
e
n
c
ry
p
ti
o
n
a
n
d
d
e
c
ry
p
ti
o
n
s
y
ste
m
a
n
d
d
e
m
o
n
stra
te
it
s e
ffica
c
y
in
p
ro
tec
ti
n
g
te
x
t
d
o
c
u
m
e
n
ts.
K
ey
w
o
r
d
s
:
Ad
v
an
ce
d
e
n
cr
y
p
tio
n
Ad
v
an
ce
d
e
n
cr
y
p
tio
n
s
tan
d
ar
d
Dec
r
y
p
tio
n
Dig
ital d
ictio
n
ar
y
E
n
cr
y
p
tio
n
R
iv
est
-
Sh
am
ir
-
Ad
lem
an
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Sajjad
Go
ls
h
an
n
av
az
Dep
ar
tm
en
t o
f
E
lectr
ical
E
n
g
i
n
ee
r
in
g
,
Facu
lty
o
f
E
lectr
ical
an
d
C
o
m
p
u
te
r
E
n
g
i
n
ee
r
in
g
,
U
r
m
ia
Un
iv
er
s
ity
Naz
lo
C
am
p
u
s
,
1
1
-
th
k
m
,
Ser
o
R
o
ad
,
Ur
m
ia,
W
est Az
er
b
aijan
,
I
r
an
E
m
ail: s.g
o
ls
h
an
n
av
az
@
u
r
m
ia
.
ac
.
ir
1.
I
NT
RO
D
UCT
I
O
N
I
t
is
n
o
w
ess
en
tial
to
p
r
o
tect
p
r
iv
ate
an
d
s
en
s
itiv
e
in
f
o
r
m
at
io
n
f
r
o
m
c
y
b
er
th
r
ea
ts
d
u
e
to
th
e
q
u
ick
d
ev
elo
p
m
e
n
t
o
f
tech
n
o
lo
g
y
a
n
d
th
e
y
o
u
n
g
er
g
en
e
r
atio
n
.
As
attac
k
co
m
p
lex
ity
in
cr
ea
s
es,
it
will
b
e
cr
u
cial
to
d
ev
elo
p
s
tr
o
n
g
cr
y
p
to
g
r
ap
h
y
s
y
s
tem
s
th
at
ca
n
p
r
o
tect
p
r
i
v
ate
in
f
o
r
m
atio
n
f
r
o
m
u
n
au
t
h
o
r
ized
ac
ce
s
s
.
T
o
ad
d
r
ess
th
is
d
em
an
d
an
d
im
p
r
o
v
e
s
en
s
itiv
e
d
ata
s
ec
u
r
ity
,
th
is
r
esear
ch
s
u
g
g
ests
a
m
u
ltil
ay
er
en
cr
y
p
tio
n
m
eth
o
d
.
T
e
x
t
d
ata
is
p
r
o
tect
ed
b
y
f
ir
s
t
an
d
s
ec
o
n
d
-
la
y
er
en
cr
y
p
tio
n
alg
o
r
ith
m
s
,
an
d
t
h
e
ef
f
icac
y
o
f
ea
ch
s
tr
ateg
y
is
ass
es
s
ed
u
s
in
g
a
v
a
r
iety
o
f
a
n
aly
tical
to
o
ls
[
1
]
.
T
h
e
d
e
v
is
ed
en
cr
y
p
tio
n
s
ch
e
m
e'
s
f
ir
s
t
lay
er
u
s
es
a
lo
g
o
-
n
e
w
v
ir
tu
al
d
ictio
n
ar
y
th
at
m
ak
es
an
ef
f
o
r
t
to
d
u
p
licate
th
e
p
lain
tex
t
t
h
e
u
s
ag
e
o
f
d
iv
e
r
s
e
letter
s
an
d
e
m
b
lem
s
[
2
]
.
T
h
is
in
n
o
v
ativ
e
m
eth
o
d
im
p
r
o
v
es
th
e
s
ec
u
r
ity
o
f
s
en
s
itiv
e
d
ata,
s
tr
e
n
g
th
en
in
g
th
e
en
cr
y
p
tio
n
p
r
o
c
ess
o
v
er
all.
I
n
ad
d
itio
n
to
d
iv
i
d
in
g
th
e
n
u
m
er
ical
v
alu
es
in
to
h
ig
h
er
a
n
d
lo
we
r
d
im
en
s
io
n
s
an
d
s
o
r
tin
g
th
e
h
i
g
h
er
v
alu
es,
th
e
s
u
g
g
ested
d
i
g
ital
d
ictio
n
ar
y
also
co
n
v
er
ts
th
e
cip
h
e
r
tex
t
c
h
ar
a
cter
s
to
ASC
I
I
f
o
r
m
at
a
n
d
d
y
n
am
ically
a
d
ju
s
ts
th
e
lo
wer
v
alu
es
to
s
u
it
th
e
d
em
an
d
s
o
f
th
e
s
en
d
e
r
an
d
r
ec
ip
ien
t.
I
t
m
o
d
if
ies
p
ar
am
et
er
s
in
a
v
er
y
m
eth
o
d
ical
m
an
n
er
.
T
h
e
cip
h
er
te
x
t,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
1
9
6
1
-
1
9
6
7
1962
wh
ich
s
er
v
es
as
a
s
tr
o
n
g
b
asi
s
f
o
r
th
e
in
itial
s
tep
o
f
t
h
e
cr
y
p
to
g
r
a
p
h
ic
p
r
o
ce
s
s
,
is
cr
ea
te
d
b
y
co
n
v
er
tin
g
th
e
r
esu
ltin
g
tr
an
s
f
o
r
m
ed
in
teg
e
r
s
to
ch
ar
ac
ter
s
[
3
]
.
T
h
e
s
ec
o
n
d
v
er
s
io
n
o
f
th
e
a
d
v
an
ce
d
en
c
r
y
p
tio
n
s
tan
d
ar
d
(
AE
S)
alg
o
r
ith
m
[
4
]
f
o
r
cr
y
p
to
g
r
ap
h
ic
s
y
s
tem
s
h
as
b
ee
n
m
o
d
if
ied
an
d
o
p
tim
ized
to
im
p
r
o
v
e
th
e
p
er
f
o
r
m
an
ce
o
f
s
ec
o
n
d
-
lay
er
en
cr
y
p
tio
n
.
T
h
e
192
-
b
it
en
cr
y
p
tio
n
k
ey
g
e
n
er
a
ted
b
y
ch
ao
s
th
eo
r
y
is
an
in
teg
r
al
p
ar
t
o
f
th
is
lay
er
.
T
h
e
p
r
o
p
o
s
ed
m
eth
o
d
u
s
es
a
co
llectio
n
o
f
wea
k
p
ar
am
et
er
s
with
a
v
alu
e
o
f
less
th
an
1
to
s
to
r
e
th
e
en
cr
y
p
tio
n
k
e
y
.
T
o
f
u
r
th
er
e
n
h
an
ce
s
ec
u
r
ity
,
ev
er
y
v
alu
e
n
ec
ess
ar
y
f
o
r
p
r
im
ar
y
g
en
er
atio
n
is
s
h
ar
ed
b
y
t
h
e
s
en
d
er
an
d
r
ec
eiv
er
,
ex
ce
p
t
o
n
e.
T
h
is
s
p
ec
ial
p
ar
am
eter
is
s
en
t
to
g
eth
er
with
th
e
R
iv
est
-
Sh
am
ir
-
Ad
lem
an
(
R
SA)
en
cr
y
p
t
ed
cip
h
er
tex
t.
T
h
e
en
cr
y
p
ted
d
ata
ca
n
th
en
b
e
s
u
cc
ess
f
u
lly
d
ec
r
y
p
ted
b
y
th
e
cl
ien
t
s
id
e
r
e
g
en
er
atin
g
th
e
en
c
r
y
p
tio
n
k
e
y
in
th
e
s
ec
o
n
d
lay
er
o
f
th
e
s
y
s
tem
[
5
]
.
T
h
is
p
ap
er
o
f
f
e
r
s
a
th
o
r
o
u
g
h
ev
alu
atio
n
o
f
th
e
ca
u
tio
n
ed
m
u
lti
-
lay
er
en
cr
y
p
tio
n
s
ch
em
e
b
ased
o
n
clar
if
y
in
g
th
e
s
p
ec
if
ics
o
f
ea
ch
lay
er
.
B
y
co
m
b
in
in
g
m
o
d
e
r
n
-
d
ay
AE
S
s
et
o
f
r
u
les
m
o
d
if
i
ca
tio
n
s
with
d
ig
ital
d
ictio
n
ar
y
m
eth
o
d
s
,
th
e
g
ad
g
et
aim
s
at
cr
ea
tin
g
r
o
b
u
s
t
a
n
d
d
e
p
en
d
a
b
le
p
r
o
tectio
n
ag
ain
s
t
cy
b
er
t
h
r
ea
ts
,
m
ak
in
g
s
u
r
e
th
e
b
est
lev
el
o
f
p
r
o
tectio
n
f
o
r
to
u
c
h
y
an
d
v
ita
l
d
ata
is
ac
h
iev
e
d
[
6
]
.
T
h
is
s
t
u
d
y
is
o
r
g
a
n
ized
as
f
o
llo
ws:
a
r
ev
iew
o
f
p
r
io
r
r
esear
ch
o
n
th
is
to
p
ic
is
d
o
n
e
in
s
ec
tio
n
2
.
Sectio
n
3
ex
p
lain
s
th
e
m
eth
o
d
o
l
o
g
y
,
s
tan
d
ar
d
s
,
an
d
alg
o
r
ith
m
s
u
s
e
d
in
th
e
s
tu
d
y
.
I
n
s
ec
tio
n
4
,
t
h
e
v
alu
es
o
f
th
e
s
u
g
g
ested
cr
i
ter
ia
an
d
s
tan
d
ar
d
s
ar
e
p
r
o
v
id
ed
a
n
d
d
is
cu
s
s
ed
to
g
eth
er
with
th
e
e
x
p
er
im
e
n
tal
an
d
p
r
o
ce
s
s
in
g
alg
o
r
ith
m
f
in
d
in
g
s
.
I
n
s
ec
tio
n
5
,
o
u
tco
m
es a
r
e
a
d
d
r
ess
ed
an
d
ass
ess
ed
.
Sectio
n
6
clar
if
ies th
e
o
b
tain
ed
th
e
r
esu
lt.
2.
L
I
T
E
R
A
T
U
RE
R
E
VI
E
W
A
r
ec
en
t
s
tu
d
y
o
n
attr
ib
u
te
-
b
ased
en
cr
y
p
tio
n
(
AB
E
)
is
d
o
n
e
b
y
r
esear
ch
er
s
,
aim
s
at
s
e
cu
r
in
g
d
ata
s
h
ar
in
g
with
r
estricte
d
ac
ce
s
s
b
ased
o
n
u
s
er
attr
ib
u
tes
an
d
k
ee
p
in
g
d
ata
co
n
ten
ts
s
af
e
f
r
o
m
u
n
a
u
th
o
r
ize
d
ac
ce
s
s
[
7
]
.
T
o
s
o
lv
e
th
e
is
s
u
es
with
th
e
AB
E
cip
h
er
te
x
t
k
ey
p
o
licy
'
s
ex
ec
u
tio
n
tim
e,
th
ey
s
u
g
g
ested
th
e
h
y
b
r
id
AB
E
cip
h
er
tex
t
k
e
y
p
o
licy
(
HC
KP
-
AB
E
)
[
8
]
ap
p
r
o
ac
h
.
I
n
s
ce
n
ar
io
s
wh
er
e
p
r
e
cise
ac
ce
s
s
co
n
tr
o
l
an
d
s
ec
u
r
e
d
ata
in
ter
c
h
an
g
e
a
r
e
n
ec
ess
ar
y
,
esp
ec
ially
wh
en
th
e
r
e
ar
e
f
ewe
r
u
s
er
s
in
r
elatio
n
to
th
e
f
ea
tu
r
es,
th
e
s
u
g
g
ested
HC
KP
-
A
B
E
o
u
tp
er
f
o
r
m
s
cu
r
r
en
t
s
y
s
tem
s
in
ter
m
s
o
f
k
ey
s
ize
(
5
1
2
b
its
)
an
d
ex
ec
u
tio
n
tim
e
(
0
.
0
1
8
9
s
)
.
T
h
e
s
tu
d
y
in
clu
d
es a
th
o
r
o
u
g
h
im
p
lem
en
tatio
n
a
n
aly
s
is
as we
ll a
s
a
s
y
s
tem
-
by
-
s
y
s
tem
co
m
p
ar
is
o
n
o
f
AE
S,
R
SA,
an
d
KP
-
AB
E
.
T
h
e
p
o
ten
tial
to
cr
ea
te
a
n
o
v
e
l
en
cr
y
p
tio
n
m
eth
o
d
u
s
in
g
th
e
AE
S
alg
o
r
ith
m
to
cr
ea
te
f
ast an
d
r
ea
l
-
tim
e
te
x
t d
ata
p
r
o
tectio
n
s
er
v
e
d
as th
e
im
p
etu
s
f
o
r
th
is
in
v
esti
g
atio
n
.
Seek
in
g
to
im
p
r
o
v
e
th
e
s
af
et
y
o
f
f
ile
s
to
r
a
g
e,
B
etr
an
d
et
a
l.
[
9
]
h
av
e
d
ev
el
o
p
ed
a
h
y
b
r
id
e
n
cr
y
p
tio
n
m
eth
o
d
an
d
d
is
cu
s
s
ed
th
e
s
af
e
ty
tr
o
u
b
les
with
clo
u
d
-
b
ased
l
ar
g
e
d
ata
g
a
r
ag
es.
T
h
is
s
y
s
tem
em
p
lo
y
s
th
e
r
ap
id
ap
p
licatio
n
d
ev
el
o
p
m
en
t
(
R
A
D)
m
eth
o
d
o
l
o
g
y
to
p
u
t
in
f
o
r
ce
ea
ch
s
y
m
m
etr
ic
(
AE
S)
an
d
asy
m
m
etr
ic
(
R
SA)
en
cr
y
p
tio
n
.
A
h
y
b
r
id
cr
y
p
to
g
r
ap
h
y
d
ev
ice
was
b
u
ilt
wh
ic
h
co
n
f
ir
m
e
d
q
u
ick
p
er
f
o
r
m
an
ce
an
d
r
o
b
u
s
t
s
ec
u
r
ity
th
r
o
u
g
h
c
h
ec
k
in
g
o
u
t
an
d
ev
a
lu
atio
n
.
Oth
er
h
az
a
r
d
s
,
in
th
e
m
ea
n
tim
e,
h
av
e
b
ee
n
co
n
s
id
er
ed
,
in
cl
u
d
in
g
th
e
in
ca
p
ac
ity
to
p
r
ep
a
r
e
d
ata
with
in
o
n
lin
e
ap
p
licatio
n
s
an
d
l
ar
g
er
d
o
c
u
m
en
ts
f
o
llo
win
g
e
n
cr
y
p
tio
n
.
Desp
ite
th
ese
d
r
awb
ac
k
s
,
th
e
p
r
o
p
o
s
ed
tech
n
i
q
u
e
d
r
asti
ca
lly
in
cr
ea
s
es
th
e
s
af
ety
o
f
clo
u
d
-
p
r
im
ar
ily
b
ased
d
o
cu
m
e
n
t
s
to
r
ag
e
an
d
i
n
cr
ea
s
es f
ac
ts
s
ec
u
r
ity
an
d
co
n
f
id
en
tiality
with
in
th
e
clo
u
d
s
u
r
r
o
u
n
d
in
g
s
.
T
h
e
m
eth
o
d
p
r
o
p
o
s
ed
in
[
1
0
]
ad
d
r
ess
es
s
af
ety
is
s
u
es
in
clo
u
d
-
p
r
i
m
ar
ily
-
b
ased
m
ass
iv
e
d
ata
s
to
r
ag
e
an
d
g
iv
es
a
h
y
b
r
i
d
en
cr
y
p
tio
n
tech
n
iq
u
e
to
en
h
an
ce
tex
t
f
ile
s
to
r
ag
e
an
d
r
ep
o
r
t
p
r
o
te
ctio
n
.
T
h
is
d
ev
ice
em
p
lo
y
s
th
e
r
ap
i
d
ap
p
licatio
n
d
ev
elo
p
m
en
t
(
R
AD)
tech
n
iq
u
e
to
p
u
t
in
to
ef
f
ec
t
b
o
th
s
y
m
m
etr
ic
(
AE
S)
a
n
d
asy
m
m
etr
ic
(
R
SA)
en
cr
y
p
tio
n
m
eth
o
d
s
.
A
h
y
b
r
i
d
cr
y
p
t
o
g
r
ap
h
y
g
ad
g
et
th
at
was
co
n
s
tr
u
cted
u
s
in
g
PHP,
J
av
aScr
ip
t,
an
d
L
ar
av
el
co
n
f
ir
m
ed
q
u
ick
p
er
f
o
r
m
an
ce
an
d
s
tu
r
d
y
s
af
ety
th
r
o
u
g
h
tr
y
in
g
o
u
t
an
d
ass
ess
m
en
t.
Oth
er
d
an
g
e
r
s
,
m
ea
n
wh
ile,
h
av
e
b
ee
n
r
e
p
o
r
ted
,
co
n
s
is
tin
g
o
f
th
e
d
is
ab
ilit
y
to
s
et
u
p
r
e
co
r
d
s
in
s
id
e
o
n
lin
e
p
ac
k
ag
es
a
n
d
lar
g
er
f
iles
f
o
llo
win
g
en
c
r
y
p
tio
n
.
Desp
ite
t
h
ese
d
r
awb
ac
k
s
,
th
e
co
u
n
s
eled
m
eth
o
d
s
ig
n
if
ican
tly
r
aised
th
e
s
af
ety
o
f
clo
u
d
-
p
r
i
m
ar
ily
-
b
ased
f
ile
s
to
r
ag
e
an
d
i
n
cr
ea
s
ed
s
tatis
tics
s
af
ety
an
d
c
o
n
f
id
en
tiality
in
t
h
e
clo
u
d
en
v
ir
o
n
m
en
t.
T
h
e
co
u
n
s
eled
d
ev
ice
p
er
f
o
r
m
s
b
e
tter
th
an
cu
r
r
en
t
m
o
d
els
in
ter
m
s
o
f
o
v
er
all
p
er
f
o
r
m
an
ce
,
d
ep
en
d
ab
ilit
y
,
a
n
d
s
tab
le
co
m
m
u
n
iq
u
e
,
ac
co
r
d
in
g
to
test
f
in
d
in
g
s
[
1
1
]
.
Giwa
et
a
l.
[
1
2
]
h
av
e
p
r
o
p
o
s
ed
a
h
y
b
r
id
m
eth
o
d
to
d
ea
l
with
v
u
ln
er
ab
ilit
ies
in
p
o
p
u
lar
en
cr
y
p
tio
n
alg
o
r
ith
m
s
lik
e
AE
S
an
d
R
SA
wh
ich
m
ig
h
t
b
e
at
r
is
k
o
f
b
r
u
te
p
r
ess
u
r
e
attac
k
s
.
T
h
e
h
y
b
r
i
d
s
y
s
tem
co
m
b
in
es
h
o
n
ey
c
o
m
b
en
cr
y
p
tio
n
(
HE
)
with
a
r
esid
u
e
-
wid
e
v
a
r
iety
s
c
h
em
e.
Usi
n
g
a
d
is
tr
ib
u
tio
n
tr
a
n
s
f
o
r
m
atio
n
d
ec
o
d
er
b
ased
o
n
t
h
e
C
h
in
ese
r
est
p
r
in
cip
le
(
C
R
T
)
an
d
HE
g
e
n
er
atio
n
,
th
e
g
a
d
g
et
p
r
o
d
u
ce
s
th
e
k
e
y
s
with
th
e
u
s
ag
e
o
f
a
tr
ad
itio
n
al
m
o
d
u
le
ar
r
ay
a
n
d
d
ec
r
y
p
ts
th
e
s
tatis
tics
.
T
h
e
p
r
o
p
o
s
ed
ap
p
r
o
ac
h
ta
r
g
ets
s
to
r
in
g
p
r
o
ce
s
s
in
g
tim
e
an
d
e
n
h
an
ce
s
p
r
o
tectio
n
u
tili
z
in
g
g
e
n
er
atin
g
f
a
k
e
r
ec
o
r
d
s
w
h
en
a
n
attac
k
er
tr
ies
to
g
et
en
tr
y
u
s
in
g
a
wag
er
k
ey
wh
ich
is
th
e
s
am
e
as
th
e
r
ea
l
k
ey
.
Acc
o
r
d
in
g
to
ex
p
e
r
im
en
tal
s
tatis
tics
,
th
e
m
ac
h
in
e
h
as
f
aster
p
r
o
ce
s
s
in
g
s
p
ee
d
s
an
d
is
m
o
r
e
r
esil
ien
t
t
o
b
r
u
te
-
f
o
r
ce
ass
au
lts
th
an
p
r
ev
io
u
s
s
y
s
tem
s
.
B
y
tak
en
in
t
o
co
n
s
id
er
atio
n
all
th
ese
m
atter
s
wo
r
k
p
r
o
p
o
s
es
a
s
ec
u
r
e
an
d
p
o
wer
f
u
l
ap
p
r
o
ac
h
to
h
y
b
r
i
d
en
cr
y
p
tio
n
.
B
ased
o
n
th
is
ap
p
r
o
ac
h
,
a
u
n
iq
u
e
h
y
b
r
i
d
tech
n
iq
u
e
is
p
r
o
p
o
s
ed
th
at
b
o
o
s
ts
s
af
ety
,
d
ec
r
ea
s
es
p
r
o
ce
s
s
in
g
tim
e,
an
d
r
e
s
o
lv
es
s
o
m
e
o
f
th
e
s
h
o
r
tco
m
in
g
s
o
f
tr
ad
itio
n
al
c
r
y
p
to
g
r
a
p
h
ic
alg
o
r
ith
m
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
E
n
h
a
n
ci
n
g
d
a
ta
s
ec
u
r
ity
u
s
in
g
a
mu
lti
-
la
ye
r
en
cryp
tio
n
s
ystem
(
Osa
ma
A
b
d
Qa
s
im
)
1963
T
h
e
p
a
p
er
s
in
v
esti
g
ated
all
c
o
p
e
with
s
ec
u
r
ity
-
ass
o
ciate
d
s
u
b
jects
in
lo
a
d
s
o
f
co
n
tex
ts
,
to
g
eth
er
with
clo
u
d
co
m
p
u
tin
g
a
n
d
s
tatis
ti
cs
s
witch
es.
Sy
s
tem
s
th
at
u
s
e
h
y
b
r
id
c
r
y
p
to
g
r
ap
h
y
ar
e
r
e
co
m
m
en
d
e
d
as
an
ef
f
ec
tiv
e
a
p
p
r
o
ac
h
t
o
e
n
h
an
c
e
p
r
o
tectio
n
[
1
3
]
.
T
h
ese
m
er
g
in
g
m
eth
o
d
s
ca
n
b
e
s
y
m
m
et
r
ic
an
d
asy
m
m
etr
ic.
Mo
d
er
n
tech
n
iq
u
es
lik
e
h
o
n
e
y
en
cr
y
p
tio
n
(
HE
)
,
q
u
a
n
tu
m
k
ey
d
is
tr
ib
u
tio
n
(
QKD)
,
an
d
r
esid
u
al
n
u
m
b
e
r
in
g
m
ay
less
en
v
u
ln
er
ab
ilit
ies,
p
ar
ticu
lar
ly
wh
en
co
n
f
r
o
n
ted
with
b
r
u
te
f
o
r
ce
attac
k
s
.
T
h
e
f
in
d
in
g
s
in
s
p
ir
e
a
s
im
ilar
lo
o
k
to
h
y
b
r
i
d
en
cr
y
p
t
io
n
s
tr
ateg
ies
an
d
ac
tu
al
g
lo
b
a
l
ap
p
licatio
n
s
to
b
ea
u
tify
r
ec
o
r
d
s
an
d
d
ata
s
af
ety
an
d
in
teg
r
ity
.
B
esid
es,
a
g
o
o
d
p
r
o
tectio
n
a
g
ain
s
t th
r
ea
ts
is
v
er
if
ied
.
3.
M
E
T
H
O
D
As
clar
if
ied
s
o
f
ar
,
d
ev
elo
p
m
e
n
t
an
d
ass
ess
m
en
t
o
f
a
m
u
lti
-
l
ay
er
en
cr
y
p
tio
n
s
y
s
tem
th
at
s
u
f
f
icien
tly
s
h
ield
s
p
r
iv
ate
s
tatis
tics
d
ata
f
r
o
m
o
n
lin
e
attac
k
s
,
is
th
e
m
il
esto
n
e
o
f
th
is
s
tu
d
y
.
T
h
e
r
ec
o
m
m
en
d
ed
ap
p
r
o
ac
h
is
s
p
lit
in
to
s
ec
tio
n
s
,
ev
er
y
o
n
e
o
f
wh
ich
will
in
cr
ea
s
e
d
at
a
p
r
o
tectio
n
with
t
h
e
aid
o
f
u
tili
zin
g
a
p
o
wer
f
u
l
en
cr
y
p
tio
n
m
ec
h
an
is
m
.
T
o
f
ac
ilit
ate
in
s
e
lectin
g
th
e
m
o
s
t e
f
f
ec
tiv
e
o
p
tio
n
,
th
is
ex
am
in
atio
n
p
r
esen
ts
a
g
r
ea
ter
th
o
r
o
u
g
h
ev
alu
atio
n
o
f
s
ev
e
r
al
tex
tu
al
c
o
n
ten
t
f
ile
e
n
cr
y
p
tio
n
tech
n
i
q
u
es.
Data
is
d
is
p
er
s
e
d
r
a
n
d
o
m
l
y
wh
ile
it
is
en
cr
y
p
ted
.
I
n
th
is
s
p
ec
ial
ap
p
r
o
ac
h
,
th
e
en
c
r
y
p
tio
n
k
ey
s
s
h
o
u
ld
b
e
o
wn
ed
b
y
b
o
th
t
h
e
s
en
d
er
an
d
th
e
r
ec
ip
ien
t.
Usi
n
g
th
e
en
cr
y
p
tio
n
k
ey
,
th
e
e
n
cr
y
p
tio
n
tech
n
iq
u
e
is
r
ev
er
s
ed
all
th
r
o
u
g
h
d
ec
r
y
p
tio
n
to
g
et
b
etter
an
d
u
n
i
q
u
e
s
tatis
tics
co
n
ten
t m
ater
ial
[
1
4
]
.
3
.
1
.
P
r
o
po
s
ed
dig
it
a
l dict
io
na
ry
A
p
r
esen
t
-
ed
g
e
d
i
g
ital
d
ictio
n
ar
y
is
in
c
o
r
p
o
r
ated
i
n
to
th
e
ca
u
tio
n
ed
m
u
lti
-
lay
er
en
cr
y
p
tio
n
s
y
s
tem
to
en
h
an
ce
th
e
p
r
o
tectio
n
o
f
s
en
s
itiv
e
d
ata
i
n
o
p
p
o
s
itio
n
to
n
et
th
r
ea
ts
.
T
h
is
n
o
v
el
lex
ico
n
is
b
u
ilt
with
th
e
u
s
e
o
f
a
m
eticu
lo
u
s
ly
n
o
tio
n
-
o
u
t
f
iv
e
-
s
tep
s
y
s
tem
.
Firs
t,
ea
ch
ch
ar
ac
ter
is
tr
an
s
lated
in
s
id
e
th
e
cip
h
er
tex
t
in
to
ASC
I
I
lay
o
u
t,
in
wh
ich
a
two
-
d
ig
it
v
ar
iety
co
r
r
esp
o
n
d
s
to
ev
er
y
in
d
iv
id
u
al
[
1
5
]
.
T
h
e
a
d
v
en
t
o
f
a
ch
ao
tic
m
atr
ix
with
p
ar
am
eter
s
th
at
ca
n
b
e
d
eter
m
in
ed
v
ia
th
e
s
en
d
er
an
d
r
ec
i
p
ien
t
is
th
e
id
ea
o
f
th
is
en
cr
y
p
tio
n
.
Nex
t,
th
e
2
-
d
ig
i
t
q
u
an
tity
is
m
eticu
lo
u
s
ly
cu
t
u
p
in
to
its
p
in
n
ac
le
an
d
b
o
tto
m
h
alv
es.
B
ec
au
s
e
it
s
er
v
es
as
a
s
et
r
ef
er
en
ce
p
o
i
n
t,
an
ex
ce
s
s
iv
e
q
u
an
tity
s
tab
ilizes
th
e
en
cr
y
p
tio
n
m
eth
o
d
.
T
h
e
s
u
b
s
eq
u
en
t
lev
el
with
in
th
e
cr
y
p
to
m
eth
o
d
is
to
r
o
tate
th
e
lo
wer
in
teg
er
s
lef
t
an
d
r
ig
h
t
wh
ils
t
ac
co
u
n
tin
g
f
o
r
th
e
v
alu
es
e
n
co
d
ed
i
n
t
h
e
ch
a
o
s
m
ap
.
T
h
e
en
cr
y
p
tio
n
tu
r
n
s
in
to
m
o
r
e
s
ta
te
-
of
-
th
e
-
a
r
t
an
d
c
o
m
p
licated
as
a
r
esu
lt
o
f
th
is
r
o
tatio
n
b
ei
n
g
ac
c
o
m
p
lis
h
ed
in
n
u
m
er
o
u
s
in
s
tan
ce
s
an
d
th
e
r
e
s
u
lt
o
p
tim
ized
[
1
6
]
.
T
h
e
ter
m
“c
h
ao
tic
m
atr
ix
er
a”
d
escr
ib
es
th
e
tim
e
f
r
am
e
in
wh
ich
en
cr
y
p
tio
n
is
ac
h
iev
ed
b
y
g
en
er
atin
g
a
m
atr
ix
u
s
in
g
ch
ao
tic
t
h
eo
r
y
.
“Ro
tatio
n
d
if
f
er
en
ce
s
”
ar
e
th
e
r
esu
lt o
f
ch
an
g
in
g
te
x
t c
h
ar
ac
t
er
s
'
A
SC
I
I
v
alu
es a
cc
o
r
d
in
g
t
o
v
alu
es in
a
ch
a
o
tic
m
atr
ix
.
T
h
e
c
i
p
h
e
r
t
e
x
t
i
s
f
o
r
m
e
d
w
h
e
n
t
h
e
n
e
w
l
y
c
o
n
v
e
r
t
e
d
d
i
g
i
t
a
l
v
a
l
u
e
s
a
r
e
s
m
o
o
t
h
l
y
t
r
a
n
s
f
e
r
r
e
d
i
n
t
o
c
h
a
r
a
c
t
e
r
s
at
t
h
e
e
n
d
o
f
t
h
i
s
p
r
o
c
e
s
s
.
T
h
e
p
r
o
t
e
ct
i
o
n
o
f
c
r
i
t
ic
al
d
a
t
a
is
i
m
p
r
o
v
e
d
b
y
t
h
i
s
d
y
n
a
m
i
c
a
n
d
i
n
t
e
ll
i
g
e
n
t
a
p
p
r
o
a
c
h
t
o
e
n
c
r
y
p
t
i
o
n
,
w
h
i
c
h
g
u
a
r
a
n
t
e
e
s
a
h
i
g
h
e
r
le
v
e
l
o
f
s
o
p
h
i
s
t
i
c
at
i
o
n
as
i
n
F
i
g
u
r
e
1
.
T
h
e
s
u
g
g
e
s
te
d
d
i
g
i
t
al
d
i
c
t
i
o
n
a
r
y
i
s
t
h
e
c
o
r
n
e
r
s
t
o
n
e
o
f
m
u
l
t
i
-
l
a
y
e
r
e
d
p
r
o
t
e
c
t
i
o
n
a
g
a
i
n
s
t
c
y
b
e
r
t
h
r
e
a
ts
,
o
f
f
e
r
i
n
g
a
r
o
b
u
s
t
s
h
i
e
l
d
f
o
r
s
e
n
s
i
t
i
v
e
a
n
d
i
m
p
o
r
t
a
n
t
d
a
t
a
b
y
f
u
s
i
n
g
m
a
t
h
e
m
a
t
i
c
al
p
r
e
c
i
s
i
o
n
w
i
t
h
c
h
a
o
t
i
c
d
y
n
a
m
i
c
s
[
1
7
]
.
T
h
e
f
o
l
l
o
w
i
n
g
i
s
t
h
e
p
s
e
u
d
o
-
c
o
d
e
[
1
8
]
o
f
k
e
y
c
r
e
at
io
n
a
n
d
t
h
e
e
n
c
r
y
p
ti
o
n
p
r
o
c
e
d
u
r
e
;
f
o
r
d
e
-
c
o
d
i
n
g
,
t
h
e
s
t
a
g
es
a
r
e
r
e
v
e
r
s
e
d
.
C
o
h
e
r
e
n
t
e
n
c
r
y
p
t
i
o
n
i
s
e
n
s
u
r
e
d
b
y
s
w
i
tch
i
n
g
f
r
o
m
t
h
e
d
i
g
i
t
a
l
d
i
c
t
i
o
n
a
r
y
t
o
t
h
e
m
o
d
i
f
i
e
d
A
E
S
a
l
g
o
r
i
th
m
.
U
s
i
n
g
a
d
i
g
i
t
a
l
d
i
c
t
i
o
n
a
r
y
t
o
a
l
te
r
t
h
e
t
e
x
t
,
w
e
th
e
n
p
r
o
d
u
c
e
d
y
n
a
m
i
c
A
E
S
k
e
y
s
f
o
r
s
t
r
o
n
g
e
n
c
r
y
p
t
i
o
n
.
Fig
u
r
e
1
.
T
h
e
f
ir
s
t
lay
er
e
n
cr
y
p
tio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
1
9
6
1
-
1
9
6
7
1964
Step
0
: Setu
p
Pu
t th
e
k
ey
a
n
d
ℎ
_
to
n
o
n
e
.
Step
1
:
g
en
er
atio
n
of
k
ey
s
co
n
s
tr
u
ct
th
e
en
c
r
y
p
tio
n
k
ey
,
u
s
e
th
e
_
(
)
m
eth
o
d
.
Step
2
: T
h
e
p
r
o
ce
s
s
o
f
en
c
r
y
p
t
io
n
C
all
th
e
f
u
n
ctio
n
en
c
r
y
p
t
(
p
lai
n
tex
t,
k
ey
)
.
T
r
an
s
f
o
r
m
ASC
I
I
to
p
lain
tex
t.
Use a
ch
ao
tic
m
atr
ix
to
p
r
o
ce
s
s
ASC
I
I
v
alu
es.
C
o
n
v
er
t u
p
d
ated
ASC
I
I
v
alu
e
s
to
cr
ea
te
th
e
cip
h
er
te
x
t.
Step
3
: T
h
e
d
ec
o
d
in
g
p
r
o
ce
s
s
(
th
e
en
cr
y
p
tio
n
r
ev
er
s
ed
)
is
d
o
n
e.
b
y
u
s
in
g
t
h
e
d
ec
o
d
e
(
cip
h
er
tex
t,
k
ey
)
f
u
n
ctio
n
.
Step
4
: U
s
e
ca
s
e
illu
s
tr
atio
n
Step
5
: Cre
ate
a
k
ey
f
o
r
en
c
r
y
p
tio
n
.
Step
6
: T
o
o
b
tain
cip
h
e
r
tex
t,
e
n
cr
y
p
t th
e
p
lain
tex
t.
3
.
2
.
Adv
a
nced
encr
y
ptio
n st
a
nd
a
rd
A
w
e
l
l
a
c
c
e
p
t
e
d
s
y
m
m
e
t
r
i
c
b
l
o
c
k
c
i
p
h
e
r
w
i
t
h
a
r
e
p
u
t
a
t
i
o
n
f
o
r
f
l
e
x
i
b
i
l
i
t
y
a
n
d
s
e
c
u
r
i
t
y
i
s
t
h
e
a
d
v
a
n
c
e
d
e
n
c
r
y
p
t
i
o
n
s
t
a
n
d
a
r
d
(
A
E
S
)
.
U
n
l
i
k
e
F
e
i
s
t
e
l
c
i
p
h
e
r
s
,
t
h
e
r
e
c
u
r
s
i
v
e
s
t
r
u
c
t
u
r
e
e
m
p
l
o
y
e
d
i
n
A
E
S
i
s
b
a
s
e
d
o
n
S
u
b
s
t
i
t
u
t
i
o
n
p
e
r
m
u
t
a
t
i
o
n
n
e
t
w
o
r
k
s
(
S
P
N
)
.
U
s
i
n
g
s
e
v
e
r
a
l
m
a
t
h
e
m
a
t
i
c
a
l
o
p
e
r
a
t
i
o
n
s
c
a
r
r
i
e
d
o
u
t
b
y
b
l
o
c
k
c
i
p
h
e
r
a
l
g
o
r
i
t
h
m
s
,
t
h
i
s
n
e
t
w
o
r
k
g
u
a
r
a
n
t
e
e
s
s
t
r
o
n
g
e
n
c
r
y
p
t
i
o
n
a
n
d
d
e
c
o
d
i
n
g
'
s
w
o
r
k
s
o
n
b
y
t
e
a
r
r
a
y
s
,
b
u
t
p
l
a
i
n
t
e
x
t
i
s
s
t
o
r
e
d
i
n
f
i
x
e
d
1
2
8
-
b
i
t
b
l
o
c
k
s
t
h
a
t
a
r
e
o
r
g
a
n
i
z
e
d
i
n
a
4
×
4
g
r
i
d
[
1
9
]
.
M
u
l
t
i
p
l
i
c
a
t
i
o
n
b
y
t
h
e
k
e
y
l
e
n
g
t
h
d
e
t
e
r
m
i
n
e
s
t
h
e
n
u
m
b
e
r
o
f
r
o
u
n
d
s
i
n
w
h
i
c
h
A
E
S
i
s
e
x
e
c
u
t
e
d
,
w
h
i
c
h
i
s
a
b
a
s
i
c
f
e
a
t
u
r
e
o
f
t
h
e
a
l
g
o
r
i
t
h
m
.
A
E
S
a
d
j
u
s
t
s
i
t
s
r
o
u
n
d
s
p
r
o
p
o
r
t
i
o
n
a
t
e
l
y
,
u
t
i
l
i
z
i
n
g
1
0
r
o
u
n
d
s
f
o
r
1
2
8
-
b
i
t
k
e
y
s
,
1
2
r
o
u
n
d
s
f
o
r
1
9
2
-
b
i
t
k
e
y
s
,
a
n
d
1
4
r
o
u
n
d
s
f
o
r
2
5
6
-
b
i
t
k
e
y
s
[
2
0
]
.
T
h
e
t
h
r
e
e
k
e
y
s
i
z
e
s
a
r
e
1
2
8
,
1
9
2
,
a
n
d
2
5
6
-
b
i
t
e
a
c
h
.
I
t
s
s
u
c
c
e
s
s
i
n
o
f
f
e
r
i
n
g
a
s
t
r
o
n
g
d
e
f
e
n
s
e
a
g
a
i
n
s
t
c
y
b
e
r
t
h
r
e
a
t
s
i
s
d
e
m
o
n
s
t
r
a
t
e
d
b
y
t
h
e
w
i
d
e
s
p
r
e
a
d
u
s
e
o
f
t
h
i
s
a
l
g
o
r
i
t
h
m
i
n
h
a
r
d
w
a
r
e
a
n
d
s
o
f
t
w
a
r
e
w
o
r
l
d
w
i
d
e
a
s
i
n
F
i
g
u
r
e
2
.
I
t
h
a
s
b
e
e
n
d
i
s
c
o
v
e
r
e
d
t
h
a
t
t
h
e
a
b
s
e
n
c
e
o
f
e
v
i
d
e
n
c
e
o
f
h
a
c
k
i
n
g
a
g
a
i
n
s
t
t
h
e
s
e
c
u
r
i
t
y
o
f
A
E
S
[
2
1
]
.
T
h
e
f
o
l
l
o
w
i
n
g
i
s
t
h
e
p
s
e
u
d
o
c
o
d
e
u
s
e
d
i
n
t
h
e
e
n
c
r
y
p
t
i
o
n
a
n
d
k
e
y
c
r
e
a
t
i
o
n
p
r
o
c
e
s
s
e
s
:
T
h
e
p
h
a
s
e
s
a
r
e
i
n
v
e
r
t
e
d
f
o
r
d
e
c
o
d
i
n
g
.
a.
Star
t
b.
Key
m
ak
in
g
p
r
o
ce
s
s
c.
C
r
ea
te
a
p
u
b
lic
k
ey
d.
Ma
k
e
a
p
r
iv
ate
k
ey
.
e.
Pro
ce
d
u
r
e
o
f
en
c
r
y
p
tio
n
f.
Pu
b
lic
k
ey
is
(
,
)
o
r
is
f
o
r
p
u
b
lic
g.
=
(
^
)
(
)
h.
T
h
er
e
is
en
cr
y
p
ted
d
ata
i
n
th
e
p
ac
k
et
i.
Sto
p
.
Fig
u
r
e
2
.
T
h
e
s
ec
o
n
d
lay
er
e
n
cr
y
p
tio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
E
n
h
a
n
ci
n
g
d
a
ta
s
ec
u
r
ity
u
s
in
g
a
mu
lti
-
la
ye
r
en
cryp
tio
n
s
ystem
(
Osa
ma
A
b
d
Qa
s
im
)
1965
3
.
3
.
Co
m
pu
t
a
t
io
na
l
e
x
ec
utio
n t
im
e
T
h
e
e
f
f
i
c
i
e
n
c
y
o
f
t
h
e
m
e
t
h
o
d
i
s
d
e
t
e
r
m
i
n
e
d
i
n
p
a
r
t
b
y
h
o
w
q
u
i
c
k
l
y
d
a
t
a
i
s
e
n
c
r
y
p
t
e
d
a
n
d
d
e
c
r
y
p
t
e
d
.
T
h
e
s
y
s
t
e
m
’
s
d
ep
en
d
ab
ilit
y
a
n
d
s
e
c
u
r
i
t
y
i
m
p
r
o
v
e
w
h
e
n
t
h
e
a
l
g
o
r
i
t
h
m
c
o
m
p
l
e
t
e
s
i
t
s
t
a
s
k
s
i
n
r
e
a
l
-
t
i
m
e
.
A
f
t
e
r
1
0
s
u
c
c
e
s
s
i
v
e
t
r
i
e
s
t
o
y
i
e
l
d
s
t
e
a
d
y
r
e
s
u
l
t
s
,
t
h
e
e
l
a
p
s
e
d
e
x
e
c
u
t
i
o
n
t
i
m
e
i
s
c
o
m
p
u
t
e
d
a
n
d
t
h
e
e
x
e
c
u
t
i
o
n
t
i
m
e
i
s
b
a
l
a
n
c
e
d
[
2
2
]
.
I
n
t
h
i
s
c
o
n
t
e
x
t
,
e
x
e
c
u
t
i
o
n
t
i
m
e
e
n
c
o
m
p
a
s
s
e
s
a
t
h
o
r
o
u
g
h
e
v
a
l
u
a
t
i
o
n
o
f
m
u
l
t
i
p
l
e
c
r
i
t
e
r
i
a
t
h
a
t
i
n
d
i
c
a
t
e
s
t
h
e
e
f
f
e
c
t
i
v
e
n
e
s
s
a
n
d
g
e
n
e
r
a
l
f
u
n
c
t
i
o
n
i
n
g
o
f
t
h
e
c
r
y
p
t
o
s
y
s
t
e
m
.
T
h
e
g
o
a
l
o
f
t
h
i
s
a
p
p
r
o
a
c
h
i
s
t
o
b
a
l
a
n
c
e
m
u
l
t
i
-
l
a
y
e
r
e
n
c
r
y
p
t
i
o
n
w
h
i
l
e
i
n
c
r
e
a
s
i
n
g
t
a
s
k
p
r
o
c
e
s
s
i
n
g
t
i
m
e
a
t
v
a
r
i
o
u
s
l
e
v
e
l
s
[
2
3
]
.
A
s
t
h
e
m
a
t
h
e
m
a
t
i
c
a
l
m
o
d
e
l
b
e
l
o
w
:
e
xe
c
=
1
10
∑
(
e
n
c
ry
p
t
,
+
d
e
c
ry
p
t
,
)
10
=
1
(
1
)
4.
E
XP
E
R
I
M
E
N
T
A
L
RE
SUL
T
AND
DI
SCU
SS
I
O
N
T
h
e
q
u
ality
o
f
en
c
r
y
p
tio
n
is
ch
ec
k
e
d
b
y
ca
lcu
latin
g
th
e
ar
ea
o
f
t
h
e
tex
t
f
ile
b
e
f
o
r
e
an
d
af
ter
en
cr
y
p
tio
n
to
d
eter
m
in
e
t
h
e
e
x
ten
t
to
wh
ich
th
e
f
ile
s
ize
c
h
an
g
es
af
te
r
with
d
r
awin
g
t
h
e
cip
h
er
tex
t
d
ata
a
n
d
th
e
k
ey
.
T
h
e
clo
s
er
th
e
f
ile
s
ize
af
ter
en
cr
y
p
tio
n
is
to
th
e
f
i
le
s
ize
o
f
th
e
p
lain
tex
t,
th
e
h
i
g
h
er
th
e
en
cr
y
p
tio
n
q
u
ality
,
an
d
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
is
co
n
s
is
ten
t
wi
th
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
es
[
2
4
]
.
T
h
is
is
s
u
e
is
o
u
tlin
ed
in
T
ab
le
1
.
I
t
i
s
s
e
e
n
t
h
a
t
t
h
e
f
i
l
e
'
s
s
i
z
e
r
e
m
a
i
n
s
u
n
c
h
a
n
g
e
d
a
n
d
r
e
t
u
r
n
s
t
o
i
t
s
i
n
i
t
i
a
l
s
i
z
e
o
n
c
e
t
h
e
d
e
c
r
y
p
t
i
o
n
p
r
o
c
e
d
u
r
e
i
s
c
o
m
p
l
e
t
e
.
I
t
m
a
y
b
e
c
o
n
c
l
u
d
e
d
t
h
a
t
t
h
e
e
n
c
r
y
p
t
i
o
n
l
a
y
e
r
s
a
r
e
c
o
n
s
t
a
n
t
i
n
t
h
e
i
r
l
e
v
e
l
s
a
n
d
s
t
a
g
e
s
.
I
n
a
d
d
i
t
i
o
n
t
o
r
e
v
e
r
s
i
n
g
t
h
e
e
n
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
t
o
r
e
c
o
v
e
r
t
h
e
o
r
i
g
i
n
a
l
t
e
x
t
i
s
t
o
t
a
l
l
y
r
i
g
h
t
[
5
]
.
T
h
e
c
o
m
p
u
t
e
r
s
p
ec
if
icatio
n
s
u
s
ed
ar
e:
a.
Har
d
d
is
k
ca
p
ac
ity
:
1
T
B
b.
Op
er
atin
g
s
y
s
tem
: Wi
n
d
o
ws 1
1
c.
Pro
ce
s
s
o
r
m
o
d
el
: Co
r
e
i7
1
1
th
g
en
er
atio
n
d.
Gr
ap
h
ics
p
r
o
ce
s
s
in
g
u
n
it
(
GPU)
: N
VI
DI
A
R
T
X
e.
R
an
d
o
m
ac
ce
s
s
m
em
o
r
y
(
R
AM
)
s
ize
: 1
6
GB
T
ab
le
1
.
T
e
x
t f
ile
an
d
s
ize
m
an
ag
em
en
t
b
y
en
c
r
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es
P
l
a
i
n
t
e
x
t
f
i
l
e
C
i
p
h
e
r
t
e
x
t
f
i
l
e
D
e
c
i
p
h
e
r
t
e
x
t
f
i
l
e
1
4
4
B
y
t
e
s
1
4
4
B
y
t
e
s
1
4
4
B
y
t
e
s
4
.
1
.
Co
m
pu
t
a
t
io
na
l
e
x
ec
utio
n
t
im
e
T
h
e
av
er
a
g
e
tim
e
f
o
r
k
ey
g
e
n
er
atio
n
a
n
d
s
u
g
g
ested
d
ictio
n
ar
y
o
p
er
atio
n
s
ar
e
s
h
o
wn
in
T
ab
le
2
.
Acc
o
r
d
in
g
to
a
b
r
o
ad
r
an
g
e,
t
h
e
AE
S
alg
o
r
ith
m
p
er
f
o
r
m
s
f
aster
in
th
e
en
cr
y
p
tio
n
an
d
d
e
cr
y
p
tio
n
p
r
o
ce
d
u
r
es
th
an
th
e
R
SA
m
eth
o
d
[
2
5
]
.
B
ased
o
n
th
e
r
esu
lts
in
T
ab
le
2
an
d
T
ab
le
3
,
it is
co
n
clu
d
e
d
th
a
t th
e
co
m
p
u
tatio
n
al
tim
e
p
er
s
ec
o
n
d
an
d
m
illi
-
s
ec
o
n
d
en
cr
y
p
tio
n
f
o
r
th
e
p
r
o
p
o
s
ed
d
ictio
n
ar
y
is
f
aster
th
an
f
o
r
t
h
e
AE
S.
T
h
e
av
er
ag
e
ela
p
s
ed
tim
e
s
h
o
u
ld
b
e
p
u
t
u
n
d
e
r
in
v
esti
g
atio
n
in
n
u
m
er
ical
an
al
y
s
is
.
T
o
th
is
en
d
,
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
n
ee
d
s
to
b
e
co
m
p
leted
.
As
s
h
o
wn
in
T
ab
le
4
,
it
is
n
o
ticed
th
at
th
e
a
v
er
ag
e
elap
s
ed
tim
e
in
s
ec
o
n
d
s
an
d
m
illi
s
ec
o
n
d
s
f
o
r
b
o
th
th
e
AE
S a
lg
o
r
ith
m
a
n
d
th
e
d
ictio
n
ar
y
a
r
e
v
er
y
clo
s
e.
Acc
o
r
d
in
g
t
o
th
e
s
u
g
g
ested
alg
o
r
ith
m
s
,
n
u
m
er
ical
s
im
u
latio
n
s
,
an
d
s
tu
d
ies,
th
e
m
u
lti
-
lev
el
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
s
u
cc
es
s
f
u
lly
en
cr
y
p
ts
tex
t
f
iles
in
0
.
0
1
s
ec
o
n
d
s
.
T
h
e
f
ir
s
t
lev
el
o
f
th
e
s
u
g
g
ested
m
eth
o
d
o
u
t
p
er
f
o
r
m
s
th
e
AE
S
alg
o
r
ith
m
in
ter
m
s
o
f
en
cr
y
p
tio
n
tim
e,
wh
ich
t
o
o
k
m
o
r
e
th
an
3
s
ec
.
R
eg
ar
d
in
g
th
e
d
ec
r
y
p
tio
n
p
r
o
c
ed
u
r
e,
b
o
th
e
x
h
ib
it a
v
e
r
y
s
im
i
lar
r
ate
o
f
elap
s
ed
tim
e.
T
ab
le
2
.
C
o
m
p
u
tatio
n
al
tim
e
f
o
r
k
ey
g
en
e
r
atio
n
an
d
d
ictio
n
a
r
y
A
t
t
e
m
p
t
N
u
m
b
e
r
K
e
y
g
e
n
e
r
a
t
i
o
n
t
i
m
e
(
s)
D
i
c
t
i
o
n
a
r
y
t
i
m
e
(
s)
1
0
.
0
0
0
4
7
0
.
0
0
0
0
0
9
2
0
.
0
0
0
5
7
0
.
0
0
0
0
1
5
3
0
.
0
0
0
1
3
0
.
0
0
0
0
1
0
4
0
.
0
0
0
4
7
0
.
0
0
0
0
0
9
5
0
.
0
0
0
1
0
0
.
0
0
0
0
0
8
6
0
.
0
0
0
1
0
0
.
0
0
0
0
0
9
7
0
.
0
0
0
1
0
0
.
0
0
0
0
0
9
8
0
.
0
0
0
0
9
0
.
0
0
0
0
1
0
9
0
.
0
0
0
2
2
0
.
0
0
0
6
4
1
10
0
.
0
0
0
0
9
0
.
0
0
0
0
0
8
C
o
m
p
u
t
a
t
i
o
n
a
l
t
i
m
e
(
s)
0
.
0
0
0
2
3
0
.
0
0
0
0
7
C
o
m
p
u
t
a
t
i
o
n
a
l
t
i
m
e
(
ms)
0
.
2
3
7
m
s
0
.
0
7
3
m
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8
7
0
8
I
n
t J E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
15
,
No
.
2
,
Ap
r
il
20
25
:
1
9
6
1
-
1
9
6
7
1966
T
ab
le
3
.
C
o
m
p
u
tatio
n
al
tim
e
p
er
s
ec
o
n
d
f
o
r
AE
S
en
cr
y
p
tio
n
A
ES
e
n
c
r
y
p
t
i
o
n
t
i
me
(
o
n
e
b
l
o
c
k
)
To
t
a
l
e
n
c
r
y
p
t
i
o
n
t
i
me
(
s)
0
.
0
0
4
0
0
.
0
0
4
0
0
.
0
0
2
7
0
.
0
0
2
7
0
.
0
0
2
6
0
.
0
0
2
6
0
.
0
0
2
5
0
.
0
0
2
5
0
.
0
0
2
3
0
.
0
0
2
3
0
.
0
0
2
5
0
.
0
0
2
5
0
.
0
0
2
3
0
.
0
0
2
3
0
.
0
0
2
9
0
.
0
0
2
9
0
.
0
0
2
3
0
.
0
0
2
3
0
.
0
0
2
9
0
.
0
0
2
9
C
o
m
p
u
t
a
t
i
o
n
a
l
(
0
.
0
0
2
7
4
)
C
o
m
p
u
t
a
t
i
o
n
a
l
(
0
.
0
0
2
7
5
)
To
t
a
l
(
2
.
7
4
8
ms)
To
t
a
l
(
2
.
7
5
4
ms)
T
ab
le
4
.
C
o
m
p
u
tatio
n
al
tim
e
p
er
s
ec
o
n
d
f
o
r
AE
S a
n
d
d
ictio
n
ar
y
d
ec
r
y
p
tio
n
D
i
c
t
i
o
n
a
r
y
d
e
c
r
y
p
t
i
o
n
t
i
me
(
s)
A
ES
d
e
c
r
y
p
t
i
o
n
t
i
me
(
s)
To
t
a
l
d
e
c
r
y
p
t
i
o
n
t
i
me
(
s)
0
.
0
0
0
2
2
7
5
0
.
0
0
1
5
3
0
.
0
0
1
7
6
0
.
0
0
0
0
0
8
9
0
.
0
0
0
4
6
0
.
0
0
0
4
7
0
.
0
0
0
0
0
9
6
0
.
0
0
0
2
6
0
.
0
0
0
2
7
0
.
0
0
0
0
0
8
5
0
.
0
0
0
2
9
0
.
0
0
0
2
9
0
.
0
0
0
0
0
8
3
0
.
0
0
0
2
7
0
.
0
0
0
2
8
0
.
0
0
0
0
0
7
6
0
.
0
0
0
2
8
0
.
0
0
0
2
9
0
.
0
0
0
0
0
7
6
0
.
0
0
0
2
9
0
.
0
0
0
3
0
0
.
0
0
0
0
0
8
0
.
0
0
0
2
8
0
.
0
0
0
2
9
0
.
0
0
0
0
1
0
9
0
.
0
0
0
2
9
0
.
0
0
0
3
0
0
.
0
0
0
0
0
7
8
0
.
0
0
0
2
9
0
.
0
0
0
2
9
C
o
m
p
u
t
a
t
i
o
n
a
l
0
.
0
0
0
0
3
(
s)
C
o
m
p
u
t
a
t
i
o
n
a
l
(
s)
0
.
0
0
0
4
2
C
o
m
p
u
t
a
t
i
o
n
a
l
(
s)
0
.
0
0
0
4
5
C
o
m
p
u
t
a
t
i
o
n
a
l
0
.
0
3
0
4
(
ms)
C
o
m
p
u
t
a
t
i
o
n
a
l
0
.
4
2
9
ms
C
o
m
p
u
t
a
t
i
o
n
a
l
0
.
4
5
9
ms
5.
CO
NCLU
SI
O
N
A
s
tr
o
n
g
en
cr
y
p
tio
n
m
eth
o
d
was
cr
ea
ted
to
p
r
o
tect
p
r
iv
at
e
d
ata
f
r
o
m
in
ter
n
et
th
r
ea
ts
.
I
n
th
e
f
ir
s
t
lay
er
o
f
th
e
p
r
o
p
o
s
ed
m
u
lti
-
la
y
er
tech
n
iq
u
e,
a
n
ew
d
ig
ital
d
ictio
n
ar
y
was
co
n
s
tr
u
cted
,
an
d
v
ar
i
o
u
s
p
r
o
ce
s
s
es
s
u
ch
as
ASC
I
I
co
n
v
er
s
io
n
,
c
h
ao
tic
m
atr
ix
g
e
n
er
atio
n
,
a
n
d
r
o
tatio
n
al
tr
an
s
f
o
r
m
atio
n
s
wer
e
u
s
ed
to
r
aise
th
e
co
d
in
g
co
m
p
lex
ity
.
T
o
g
u
ar
a
n
tee
k
ey
co
n
f
id
en
tiality
an
d
p
r
o
v
id
e
u
n
iq
u
e
k
ey
s
b
ased
o
n
ch
ao
s
th
eo
r
y
,
th
e
s
ec
o
n
d
lay
er
o
f
f
er
e
d
a
m
o
d
if
i
ed
v
er
s
io
n
o
f
th
e
AE
S
alg
o
r
ith
m
b
ased
o
n
th
e
R
SA
m
eth
o
d
.
I
t
is
ev
id
en
t
f
r
o
m
th
e
d
is
cu
s
s
io
n
th
at
th
e
m
u
lti
-
lev
el
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
ti
o
n
p
r
o
ce
d
u
r
e
s
u
cc
ess
f
u
lly
s
e
cu
r
es
tex
t
f
iles
.
I
n
co
m
p
ar
is
o
n
to
th
e
AE
S
alg
o
r
ith
m
,
th
e
f
ir
s
t
lay
er
d
em
o
n
s
tr
ated
b
etter
en
cr
y
p
tio
n
ti
m
e
at
0
.
0
1
s
ec
o
n
d
s
ef
f
icien
cy
th
a
n
th
e
AE
S
alg
o
r
ith
m
wh
ich
to
o
k
m
o
r
e
th
an
3
s
ec
o
n
d
s
,
d
em
o
n
s
tr
atin
g
its
in
s
tan
t
ef
f
icien
cy
i
n
d
ata
p
r
o
tectio
n
.
B
o
th
ap
p
r
o
ac
h
es
d
is
p
lay
ed
s
im
ilar
elap
s
ed
p
er
io
d
s
d
u
r
in
g
th
e
d
ec
o
d
in
g
p
r
o
ce
s
s
,
s
u
g
g
esti
n
g
th
at
at
th
is
s
tag
e
th
eir
lev
els
wer
e
s
im
ilar
.
T
h
is
ef
f
ec
tiv
e
m
u
lti
-
lay
er
en
cr
y
p
tio
n
im
p
le
m
en
tatio
n
is
a
v
iab
le
s
tr
ateg
y
f
o
r
s
tr
o
n
g
d
ata
p
r
o
tect
io
n
ag
ain
s
t c
y
b
e
r
attac
k
s
.
RE
F
E
R
E
NC
E
S
[
1
]
C
.
M
a
n
t
h
i
r
a
mo
o
r
t
h
y
,
K
.
M
.
S
.
K
h
a
n
,
a
n
d
N
.
A
.
A
,
“
C
o
mp
a
r
i
n
g
s
e
v
e
r
a
l
e
n
c
r
y
p
t
e
d
c
l
o
u
d
s
t
o
r
a
g
e
p
l
a
t
f
o
r
ms
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
M
a
t
h
e
m
a
t
i
c
s,
S
t
a
t
i
st
i
c
s,
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
2
,
p
p
.
4
4
–
6
2
,
A
u
g
.
2
0
2
3
,
d
o
i
:
1
0
.
5
9
5
4
3
/
i
j
m
scs.
v
2
i
.
7
9
7
1
.
[
2
]
S
.
A
.
R
.
S
h
i
r
a
z
i
,
A
.
W
a
h
a
b
,
S
.
A
.
S
h
a
h
,
A
.
A
n
w
a
r
,
R
.
A
k
h
t
a
r
,
a
n
d
N
.
Y
o
u
s
a
f
,
“
Q
u
a
n
t
u
m
s
h
i
e
l
d
f
o
r
I
o
T:
En
h
a
n
c
i
n
g
B
l
u
e
t
o
o
t
h
sec
u
r
i
t
y
w
i
t
h
a
n
o
v
e
l
h
y
b
r
i
d
e
n
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
m,”
T
h
e
As
i
a
n
B
u
l
l
e
t
i
n
o
f
Bi
g
D
a
t
a
M
a
n
a
g
e
m
e
n
t
,
v
o
l
.
4
,
n
o
.
1
,
F
e
b
.
2
0
2
4
,
d
o
i
:
1
0
.
6
2
0
1
9
/
a
b
b
d
m.
v
4
i
1
.
9
1
.
[
3
]
X
.
Zh
a
n
g
a
n
d
F
.
Z
h
o
u
,
“
A
n
e
n
c
o
d
i
n
g
t
a
b
l
e
c
o
r
r
e
s
p
o
n
d
i
n
g
t
o
A
S
C
I
I
c
o
d
e
s
f
o
r
D
N
A
d
a
t
a
st
o
r
a
g
e
a
n
d
a
n
e
w
e
r
r
o
r
c
o
r
r
e
c
t
i
o
n
met
h
o
d
H
M
S
A
,
”
I
EEE
T
ra
n
s
a
c
t
i
o
n
s
o
n
N
a
n
o
b
i
o
sc
i
e
n
c
e
,
v
o
l
.
2
3
,
n
o
.
2
,
p
p
.
3
4
4
–
3
5
4
,
A
p
r
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
TN
B
.
2
0
2
4
.
3
3
5
6
5
2
2
.
[
4
]
N
.
A
.
A
r
i
f
f
i
n
M
o
h
d
a
n
d
A
.
Y
.
A
h
m
e
d
A
sh
a
w
e
s
h
,
“
E
n
h
a
n
c
e
d
A
ES
a
l
g
o
r
i
t
h
m
b
a
s
e
d
o
n
1
4
r
o
u
n
d
s i
n
s
e
c
u
r
i
n
g
d
a
t
a
a
n
d
m
i
n
i
mi
z
i
n
g
p
r
o
c
e
ss
i
n
g
t
i
m
e
,
”
J
o
u
rn
a
l
o
f
P
h
y
si
c
s:
C
o
n
f
e
re
n
c
e
S
e
r
i
e
s
,
v
o
l
.
1
7
9
3
,
n
o
.
1
,
F
e
b
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
8
8
/
1
7
4
2
-
6
5
9
6
/
1
7
9
3
/
1
/
0
1
2
0
6
6
.
[
5
]
M
.
Y
.
S
h
a
k
o
r
,
M
.
I
.
K
h
a
l
e
e
l
,
M
.
S
a
f
r
a
n
,
S
.
A
l
f
a
r
h
o
o
d
,
a
n
d
M
.
Zh
u
,
“
D
y
n
a
mi
c
A
ES
e
n
c
r
y
p
t
i
o
n
a
n
d
b
l
o
c
k
c
h
a
i
n
k
e
y
ma
n
a
g
e
m
e
n
t
:
A
n
o
v
e
l
s
o
l
u
t
i
o
n
f
o
r
c
l
o
u
d
d
a
t
a
se
c
u
r
i
t
y
,
”
I
E
EE
A
c
c
e
ss
,
v
o
l
.
1
2
,
p
p
.
2
6
3
3
4
–
2
6
3
4
3
,
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
4
.
3
3
5
1
1
1
9
.
[
6
]
K
.
I
q
b
a
l
,
M
.
U
.
Ja
t
o
i
,
M
.
S
u
l
a
m
a
n
,
a
n
d
M
.
S
.
A
b
i
d
,
“
R
o
b
u
st
m
u
l
t
i
-
p
a
r
t
y
c
o
m
p
u
t
a
t
i
o
n
i
n
c
r
i
t
i
c
a
l
i
n
f
r
a
s
t
r
u
c
t
u
r
e
p
r
o
t
e
c
t
i
o
n
u
s
i
n
g
h
y
b
r
i
d
R
S
A
-
A
ES a
l
g
o
r
i
t
h
m fo
r
e
n
h
a
n
c
e
d
se
c
u
r
i
t
y
,
”
Ja
n
.
2
0
2
4
,
d
o
i
:
1
0
.
2
1
2
0
3
/
r
s.
3
.
r
s
-
3
8
8
4
9
4
6
/
v
1
.
[
7
]
A
.
S
.
S
.
R
a
n
i
,
K
.
R
o
h
i
n
i
,
K
.
P
a
v
a
n
i
,
J
.
R
.
S
.
S
r
e
e
,
T.
P
.
K
u
m
a
r
,
a
n
d
P
.
Y
e
l
l
a
mm
a
,
“
H
y
b
r
i
d
c
i
p
h
e
r
-
t
e
x
t
k
e
y
p
o
l
i
c
y
a
t
t
r
i
b
u
t
e
-
b
a
se
d
e
n
c
r
y
p
t
i
o
n
(
H
C
K
P
-
A
B
E)
:
T
h
e
p
e
r
f
o
r
man
c
e
a
n
a
l
y
s
i
s
a
n
d
sc
a
l
a
b
i
l
i
t
y
i
n
v
i
r
t
u
a
l
m
a
c
h
i
n
e
s
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
t
e
l
l
i
g
e
n
t
S
y
s
t
e
m
s
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s i
n
En
g
i
n
e
e
r
i
n
g
,
v
o
l
.
1
2
,
n
o
.
1
9
,
p
p
.
4
6
0
–
4
7
0
,
2
0
2
4
.
[
8
]
W
.
W
a
n
g
,
R
.
Li
u
,
a
n
d
S
.
C
h
e
n
g
,
“
P
r
i
v
a
c
y
p
r
o
t
e
c
t
i
o
n
o
f
c
o
m
mu
n
i
c
a
t
i
o
n
n
e
t
w
o
r
k
s
u
si
n
g
f
u
l
l
y
h
o
mo
m
o
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
b
a
se
d
o
n
n
e
t
w
o
r
k
sl
i
c
i
n
g
a
n
d
a
t
t
r
i
b
u
t
e
s
,
”
S
c
i
e
n
t
i
f
i
c
R
e
p
o
r
t
s
,
v
o
l
.
1
4
,
n
o
.
1
,
p
p
.
1
–
1
8
,
A
u
g
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
3
8
/
s4
1
5
9
8
-
024
-
6
9
5
0
1
-
5.
[
9
]
C
.
U
.
B
e
t
r
a
n
d
,
C
.
G
.
O
n
u
k
w
u
g
h
a
,
M
.
E.
B
e
n
s
o
n
-
Em
e
n
i
k
e
,
C
.
i
f
e
a
n
y
i
O
f
o
e
g
b
u
,
a
n
d
N
.
M
.
A
w
a
j
i
,
“
F
i
l
e
st
o
r
a
g
e
sec
u
r
i
t
y
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
u
si
n
g
h
y
b
r
i
d
e
n
c
r
y
p
t
i
o
n
,
”
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
a
n
d
C
l
o
u
d
C
o
m
p
u
t
i
n
g
,
Ja
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
6
4
8
/
j
.
i
o
t
c
c
.
2
0
2
4
1
2
0
1
.
1
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8
7
0
8
E
n
h
a
n
ci
n
g
d
a
ta
s
ec
u
r
ity
u
s
in
g
a
mu
lti
-
la
ye
r
en
cryp
tio
n
s
ystem
(
Osa
ma
A
b
d
Qa
s
im
)
1967
[
1
0
]
A
n
i
r
u
d
h
a
,
B
.
P
.
S
a
h
u
,
C
h
i
r
a
g
,
V
.
P
i
l
l
a
i
,
a
n
d
N
.
C
.
G
o
w
d
a
,
“
D
e
si
g
n
a
n
d
d
e
v
e
l
o
p
m
e
n
t
o
f
p
e
e
r
-
to
-
p
e
e
r
d
i
st
r
i
b
u
t
e
d
c
o
m
p
u
t
i
n
g
a
n
d
st
o
r
a
g
e
,
”
i
n
AI
P
C
o
n
f
e
r
e
n
c
e
Pr
o
c
e
e
d
i
n
g
s
,
A
I
P
P
u
b
l
i
s
h
i
n
g
,
2
0
2
4
,
d
o
i
:
1
0
.
1
0
6
3
/
5
.
0
1
8
4
2
8
8
.
[
1
1
]
J.
S
i
v
a
k
u
mar
a
n
d
S
.
G
a
n
a
p
a
t
h
y
,
“
A
n
e
f
f
e
c
t
i
v
e
d
a
t
a
s
e
c
u
r
i
t
y
me
c
h
a
n
i
sm
f
o
r
se
c
u
r
e
d
d
a
t
a
c
o
m
mu
n
i
c
a
t
i
o
n
s
u
s
i
n
g
h
y
b
r
i
d
c
r
y
p
t
o
g
r
a
p
h
i
c
t
e
c
h
n
i
q
u
e
a
n
d
q
u
a
n
t
u
m
k
e
y
d
i
s
t
r
i
b
u
t
i
o
n
,
”
W
i
re
l
e
ss
P
e
rso
n
a
l
C
o
m
m
u
n
i
c
a
t
i
o
n
s
,
v
o
l
.
1
3
3
,
n
o
.
3
,
p
p
.
1
3
7
3
–
1
3
9
6
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s1
1
2
7
7
-
0
2
3
-
1
0
8
1
3
-
6.
[
1
2
]
T.
A
.
G
i
w
a
,
O
.
I
.
A
b
i
o
d
u
n
,
A
.
E.
O
mo
l
a
r
a
,
a
n
d
R
.
M
.
I
si
a
k
a
,
“
A
h
y
b
r
i
d
i
z
e
d
h
o
n
e
y
e
n
c
r
y
p
t
i
o
n
f
o
r
d
a
t
a
se
c
u
r
i
t
y
u
si
n
g
r
e
s
i
d
u
e
n
u
m
b
e
r
sy
s
t
e
m
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
I
n
f
o
rm
a
t
i
o
n
S
e
c
u
r
i
t
y
a
n
d
C
y
b
e
r
c
ri
m
e
,
v
o
l
.
1
2
,
n
o
.
2
,
p
p
.
9
–
2
2
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
9
1
0
7
/
i
j
i
sc
.
2
0
2
3
.
0
2
.
0
1
.
[
1
3
]
M
.
A
l
h
a
y
a
n
i
a
n
d
M
.
A
l
-
K
h
i
z
a
’
a
y
,
“
A
n
a
l
y
z
e
s
y
mm
e
t
r
i
c
a
n
d
a
sy
m
me
t
r
i
c
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
s
b
y
s
e
c
u
r
i
n
g
f
a
c
i
a
l
r
e
c
o
g
n
i
t
i
o
n
sy
st
e
m,
”
i
n
L
e
c
t
u
re
N
o
t
e
s
o
n
D
a
t
a
E
n
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
m
u
n
i
c
a
t
i
o
n
s
T
e
c
h
n
o
l
o
g
i
e
s
,
v
o
l
.
1
4
7
,
S
p
r
i
n
g
e
r
I
n
t
e
r
n
a
t
i
o
n
a
l
P
u
b
l
i
s
h
i
n
g
,
2
0
2
3
,
p
p
.
9
7
–
1
0
5
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
0
3
1
-
1
5
1
9
1
-
0
_
1
0
.
[
1
4
]
R
.
K
.
G
u
p
t
a
,
H
.
S
.
L
a
mk
u
c
h
e
,
a
n
d
S
.
P
r
a
s
a
d
,
“
En
h
a
n
c
i
n
g
t
h
e
s
e
c
u
r
i
t
y
o
f
sen
s
i
t
i
v
e
d
a
t
a
i
n
c
l
o
u
d
u
si
n
g
e
n
h
a
n
c
e
d
c
r
y
p
t
o
g
r
a
p
h
i
c
sch
e
me,
”
i
n
S
t
u
d
i
e
s
i
n
S
y
s
t
e
m
s,
D
e
c
i
s
i
o
n
a
n
d
C
o
n
t
r
o
l
,
v
o
l
.
5
0
3
,
S
p
r
i
n
g
e
r
N
a
t
u
r
e
S
w
i
t
z
e
r
l
a
n
d
,
2
0
2
4
,
p
p
.
3
8
7
–
3
9
9
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
0
3
1
-
4
3
4
9
0
-
7
_
2
9
.
[
1
5
]
Y
.
Li
,
H
.
Y
u
,
B
.
S
o
n
g
,
a
n
d
J
.
C
h
e
n
,
“
I
mag
e
e
n
c
r
y
p
t
i
o
n
b
a
se
d
o
n
a
si
n
g
l
e
-
r
o
u
n
d
d
i
c
t
i
o
n
a
r
y
a
n
d
c
h
a
o
t
i
c
se
q
u
e
n
c
e
s
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
,
”
C
o
n
c
u
rre
n
c
y
a
n
d
C
o
m
p
u
t
a
t
i
o
n
:
Pr
a
c
t
i
c
e
a
n
d
Ex
p
e
r
i
e
n
c
e
,
v
o
l
.
3
3
,
n
o
.
7
,
M
a
r
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
0
2
/
c
p
e
.
5
1
8
2
.
[
1
6
]
M
.
A
l
h
a
y
a
n
i
,
N
.
A
l
a
l
l
a
q
,
a
n
d
M
.
A
l
-
K
h
i
z
a
’
a
y
,
“
O
p
t
i
mi
z
e
o
n
e
ma
x
p
r
o
b
l
e
m
b
y
P
S
O
a
n
d
C
S
A
,
”
i
n
L
e
c
t
u
re
N
o
t
e
s
i
n
N
e
t
w
o
r
k
s
a
n
d
S
y
s
t
e
m
s
,
v
o
l
.
6
9
3
,
S
p
r
i
n
g
e
r
N
a
t
u
r
e
S
i
n
g
a
p
o
r
e
,
2
0
2
3
,
p
p
.
8
2
9
–
8
3
9
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
9
8
1
-
99
-
3
2
4
3
-
6
_
6
6
.
[
1
7
]
W
.
A
.
A
w
a
d
h
,
A
.
S
.
A
l
a
s
a
d
y
,
a
n
d
M
.
S
.
H
a
sh
i
m,
“
A
m
u
l
t
i
l
a
y
e
r
m
o
d
e
l
t
o
e
n
h
a
n
c
e
d
a
t
a
s
e
c
u
r
i
t
y
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
,
”
I
n
d
o
n
e
s
i
a
n
J
o
u
rn
a
l
o
f
E
l
e
c
t
r
i
c
a
l
En
g
i
n
e
e
r
i
n
g
a
n
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
3
2
,
n
o
.
2
,
p
p
.
1
1
0
5
–
1
1
1
4
,
N
o
v
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
e
c
s.
v
3
2
.
i
2
.
p
p
1
1
0
5
-
1
1
1
4
.
[
1
8
]
G
.
Y
a
n
g
,
Y
.
Z
h
o
u
,
X
.
C
h
e
n
,
a
n
d
C
.
Y
u
,
“
F
i
n
e
-
g
r
a
i
n
e
d
p
se
u
d
o
-
c
o
d
e
g
e
n
e
r
a
t
i
o
n
met
h
o
d
v
i
a
c
o
d
e
f
e
a
t
u
r
e
e
x
t
r
a
c
t
i
o
n
a
n
d
t
r
a
n
sf
o
r
mer,
”
i
n
P
ro
c
e
e
d
i
n
g
s
-
As
i
a
-
Pa
c
i
f
i
c
S
o
f
t
w
a
r
e
En
g
i
n
e
e
r
i
n
g
C
o
n
f
e
ren
c
e
,
AP
S
E
C
,
I
EEE,
D
e
c
.
2
0
2
1
,
p
p
.
2
1
3
–
2
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
P
S
EC
5
3
8
6
8
.
2
0
2
1
.
0
0
0
2
9
.
[
1
9
]
K
.
J
a
n
g
,
A
.
B
a
k
s
i
,
H
.
K
i
m,
G
.
S
o
n
g
,
H
.
S
e
o
,
a
n
d
A
.
C
h
a
t
t
o
p
a
d
h
y
a
y
,
“
Q
u
a
n
t
u
m
a
n
a
l
y
s
i
s
o
f
A
ES
,
”
C
ry
p
t
o
l
o
g
y
e
Pri
n
t
Arc
h
i
v
e
,
2
0
2
2
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
981
-
97
-
0
0
2
5
-
7
_
6
.
[
2
0
]
S
.
A
.
A
j
a
g
b
e
,
O
.
D
.
A
d
e
n
i
j
i
,
A
.
A
.
O
l
a
y
i
w
o
l
a
,
a
n
d
S
.
F
.
A
b
i
o
n
a
,
“
A
d
v
a
n
c
e
d
e
n
c
r
y
p
t
i
o
n
st
a
n
d
a
r
d
(
A
ES)
-
b
a
se
d
t
e
x
t
e
n
c
r
y
p
t
i
o
n
f
o
r
n
e
a
r
f
i
e
l
d
c
o
mm
u
n
i
c
a
t
i
o
n
(
N
F
C
)
u
si
n
g
H
u
f
f
m
a
n
c
o
m
p
r
e
ssi
o
n
,
”
S
N
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
,
v
o
l
.
5
,
n
o
.
1
,
Ja
n
.
2
0
2
4
,
d
o
i
:
1
0
.
1
0
0
7
/
s
4
2
9
7
9
-
0
2
3
-
0
2
4
8
6
-
6.
[
2
1
]
Y
.
O
r
t
a
k
c
i
a
n
d
M
.
Y
.
A
b
d
u
l
l
a
h
,
“
P
e
r
f
o
r
ma
n
c
e
a
n
a
l
y
s
e
s
o
f
A
ES
a
n
d
3
D
ES
a
l
g
o
r
i
t
h
ms
f
o
r
e
n
c
r
y
p
t
i
o
n
o
f
s
a
t
e
l
l
i
t
e
i
ma
g
e
s
,
”
i
n
L
e
c
t
u
re
N
o
t
e
s
i
n
N
e
t
w
o
r
k
s
a
n
d
S
y
s
t
e
m
s
,
v
o
l
.
1
8
3
,
S
p
r
i
n
g
e
r
I
n
t
e
r
n
a
t
i
o
n
a
l
P
u
b
l
i
s
h
i
n
g
,
2
0
2
1
,
p
p
.
8
7
7
–
890
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
030
-
6
6
8
4
0
-
2
_
6
7
.
[
2
2
]
N
.
B
h
a
t
i
a
a
n
d
S
.
B
h
a
t
i
a
,
“
C
h
a
n
g
e
s
i
n
g
e
n
d
e
r
s
t
e
r
e
o
t
y
p
e
s
o
v
e
r
t
i
m
e
:
A
c
o
m
p
u
t
a
t
i
o
n
a
l
a
n
a
l
y
si
s
,
”
Ps
y
c
h
o
l
o
g
y
o
f
W
o
m
e
n
Q
u
a
rt
e
r
l
y
,
v
o
l
.
4
5
,
n
o
.
1
,
p
p
.
1
0
6
–
1
2
5
,
D
e
c
.
2
0
2
1
,
d
o
i
:
1
0
.
1
1
7
7
/
0
3
6
1
6
8
4
3
2
0
9
7
7
1
7
8
.
[
2
3
]
J.
W
a
n
g
a
n
d
J.
L
i
,
“
B
l
o
c
k
c
h
a
i
n
a
n
d
a
c
c
e
ss
c
o
n
t
r
o
l
e
n
c
r
y
p
t
i
o
n
-
e
m
p
o
w
e
r
e
d
I
o
T
k
n
o
w
l
e
d
g
e
sh
a
r
i
n
g
f
o
r
c
l
o
u
d
-
e
d
g
e
o
r
c
h
e
st
r
a
t
e
d
p
e
r
s
o
n
a
l
i
z
e
d
p
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
f
e
d
e
r
a
t
e
d
l
e
a
r
n
i
n
g
,
”
A
p
p
l
i
e
d
S
c
i
e
n
c
e
s
(
S
w
i
t
zer
l
a
n
d
)
,
v
o
l
.
1
4
,
n
o
.
5
,
F
e
b
.
2
0
2
4
,
d
o
i
:
1
0
.
3
3
9
0
/
a
p
p
1
4
0
5
1
7
4
3
.
[
2
4
]
S
.
M
.
M
o
h
d
e
t
a
l
.
,
“
T
h
e
p
e
r
f
o
r
ma
n
c
e
o
f
t
h
e
3
D
ES
a
n
d
F
e
r
n
e
t
e
n
c
r
y
p
t
i
o
n
i
n
s
e
c
u
r
i
n
g
d
a
t
a
f
i
l
e
s,”
J
o
u
rn
a
l
o
f
T
h
e
o
r
e
t
i
c
a
l
a
n
d
Ap
p
l
i
e
d
I
n
f
o
rm
a
t
i
o
n
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
0
2
,
n
o
.
3
,
p
p
.
8
1
2
–
8
2
0
,
2
0
2
4
.
[
2
5
]
N
.
Y
a
o
e
t
a
l
.
,
“
Ef
f
i
c
i
e
n
t
l
i
g
h
t
c
o
u
p
l
i
n
g
b
e
t
w
e
e
n
a
n
u
l
t
r
a
-
l
o
w
l
o
ss
l
i
t
h
i
u
m
n
i
o
b
a
t
e
w
a
v
e
g
u
i
d
e
a
n
d
a
n
a
d
i
a
b
a
t
i
c
a
l
l
y
t
a
p
e
r
e
d
si
n
g
l
e
mo
d
e
o
p
t
i
c
a
l
f
i
b
e
r
,
”
O
p
t
i
c
s
Ex
p
res
s
,
v
o
l
.
2
8
,
n
o
.
8
,
A
p
r
.
2
0
2
0
,
d
o
i
:
1
0
.
1
3
6
4
/
o
e
.
3
9
1
2
2
8
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
O
sa
m
a
A
bd
Q
a
si
m
re
c
e
iv
e
d
h
is
M
.
S
c
.
d
e
g
re
e
in
c
o
m
p
u
ter
e
n
g
in
e
e
rin
g
tec
h
n
o
l
o
g
y
in
2
0
1
9
fro
m
M
id
d
l
e
Tec
h
n
ica
l
Un
iv
e
rsit
y
a
n
d
B.
E.
in
c
o
m
p
u
ter
e
n
g
in
e
e
rin
g
tec
h
n
o
l
o
g
y
in
2
0
1
1
fro
m
Tec
h
n
ica
l
En
g
i
n
e
e
rin
g
Co
ll
e
g
e
o
f
M
o
su
l
fro
m
No
rth
e
rn
Tec
h
n
ica
l
Un
iv
e
rsity
,
w
o
rk
i
n
g
n
o
w
a
s
a
ss
ist
lec
tu
re
r
in
Co
m
p
u
ter
En
g
i
n
e
e
rin
g
Tec
h
n
o
l
o
g
y
De
p
a
rtme
n
t
,
a
n
d
h
e
is
a
ls
o
re
sp
o
n
sib
le
f
o
r
th
e
s
y
ste
m
s
a
n
d
so
ftwa
re
d
iv
isio
n
a
t
th
e
c
o
m
p
u
ter
c
e
n
ter
-
NTU.
p
u
b
li
sh
e
d
o
n
e
in
ter
n
a
ti
o
n
a
l
p
a
p
e
r
i
n
W
S
N
fo
r
i
n
d
o
o
r
lo
c
a
li
z
a
ti
o
n
.
in
tere
ste
d
i
n
c
o
m
p
u
ter
e
n
g
i
n
e
e
rin
g
,
c
o
m
p
u
ter
c
o
m
m
u
n
ica
ti
o
n
,
n
e
two
rk
s,
M
AT
LAB
p
r
o
g
ra
m
s
,
Io
T
f
u
tu
r
e
wo
rld
.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
o
sa
m
a
.
h
a
ss
a
n
i@n
tu
.
e
d
u
.
iq
.
S
a
jja
d
G
o
lsh
a
n
n
a
v
a
z
wa
s
b
o
rn
in
Urm
ia,
Ira
n
,
in
1
9
8
6
.
He
re
c
e
iv
e
d
th
e
B.
S
c
.
(Ho
n
o
rs)
a
n
d
M
.
S
c
.
(Ho
n
o
rs)
d
e
g
re
e
s
in
e
lec
tri
c
a
l
e
n
g
i
n
e
e
rin
g
fro
m
Urm
ia
Un
i
v
e
rsity
,
Urm
ia,
Ira
n
,
in
2
0
0
9
a
n
d
2
0
1
1
,
re
sp
e
c
ti
v
e
ly
.
He
re
c
e
iv
e
d
h
is P
h
.
D.
d
e
g
re
e
in
e
lec
tri
c
a
l
p
o
we
r
e
n
g
in
e
e
rin
g
fro
m
S
c
h
o
o
l
o
f
E
lec
tri
c
a
l
a
n
d
Co
m
p
u
ter
En
g
in
e
e
ri
n
g
,
Un
i
v
e
rsity
o
f
Teh
ra
n
,
Teh
ra
n
,
Ira
n
,
i
n
2
0
1
5
.
Cu
rre
n
tl
y
,
h
e
is
a
n
a
ss
o
c
iate
p
ro
fe
ss
o
r
in
El
e
c
tri
c
a
l
En
g
i
n
e
e
rin
g
De
p
a
rtme
n
t,
Urm
ia
Un
i
v
e
rsity
,
Urm
ia,
Ira
n
.
S
in
c
e
2
0
1
4
h
e
h
a
s
b
e
e
n
c
o
l
lab
o
ra
ti
n
g
wit
h
t
h
e
S
m
a
rt
El
e
c
tri
c
G
rid
Re
se
a
rc
h
Lab
o
ra
to
r
y
,
De
p
a
rtme
n
t
o
f
In
d
u
stri
a
l
En
g
in
e
e
rin
g
,
U
n
iv
e
rsit
y
o
f
S
a
lern
o
,
S
a
lern
o
,
Ital
y
.
His
re
se
a
rc
h
in
tere
sts
a
re
in
sm
a
rt
d
istri
b
u
ti
o
n
g
ri
d
o
p
e
ra
ti
o
n
a
n
d
p
lan
n
in
g
stu
d
ies
,
d
e
sig
n
o
f
d
istri
b
u
t
io
n
m
a
n
a
g
e
m
e
n
t
sy
ste
m
(DMS
),
d
e
m
a
n
d
sid
e
m
a
n
a
g
e
m
e
n
t
(DSM
)
c
o
n
c
e
p
ts
a
n
d
a
p
p
l
ica
ti
o
n
s,
m
icro
g
r
id
d
e
si
g
n
a
n
d
o
p
e
ra
ti
o
n
stu
d
ies
,
d
e
sig
n
o
f
e
n
e
rg
y
m
a
n
a
g
e
m
e
n
t
s
y
ste
m
(EM
S
),
a
p
p
l
ica
ti
o
n
o
f
F
A
CTS
c
o
n
tr
o
ll
e
rs
in
p
o
we
r
sy
ste
m
s
,
a
p
p
li
c
a
ti
o
n
o
f
in
tell
ig
e
n
t
c
o
n
tr
o
ll
e
rs
in
p
o
we
r
sy
ste
m
s.
He
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
s.g
o
lsh
a
n
n
a
v
a
z
@u
rm
ia.ac
.
ir
.
Evaluation Warning : The document was created with Spire.PDF for Python.