Asee peer logo
Displaying all 4 results
Collection
2010 Fall ASEE Middle Atlantic Section Conference
Authors
Richard Perry
changes each time the student accesses the exercise, so this exercise is only partiallystatic.The process of checking the student results in this case uses a conversational style, simulating whatan instructor might do when discussing student results in person. At the end, if all six parts arecorrect, the student is given positive feedback: Fall 2010 Mid-Atlantic ASEE Conference, October 15-16, 2010, Villanova University Figure 4: Two–user RSA Key ExampleUserID: frede is correct, let’s check p next:bitLength(p) == 128, good...p is prime, almost there for p...gcd(e,p-1) == 1, p is ok, let’s check q next:q != p, that’s a good start...bitLength(q) == 128, good...q is prime, almost there for q...gcd(e,q-1) == 1, q is ok, let’s
Collection
2010 Fall ASEE Middle Atlantic Section Conference
Authors
Dennis Silage
receiver forsymmetrical signals with perfect carrier and bit time synchronization (Figure 3). The theoreticalprobability of bit error (Pb) for a symmetrical BPSK signal in AWGN and with optimalreception, assuming that the apriori probabilities of the binary data and the energy per bit areequal (P0 = P1 = 0.5 and Eb0 = Eb1 = Eb), is presented in the course lecture5. 2 Eb Pb Q NoThe function Q is the complementary error function and No is the power spectral density of theAWGN. The optimal threshold for the correlation receiver is set as τopt = 0. MATLAB/Simulinkcan calculate the statistics of the binary data
Collection
2010 Fall ASEE Middle Atlantic Section Conference
Authors
Qinghai Gao
, pp.1-5 (London, 9-12 Nov.2009).[5] F. Monrose, M. Reiter, and S. Wetzel (1999). Password Hardening Based on Keystroke Dynamics. Proc. of theACM Conference in Computer and Communications Security, pp: 73– 82.[6] F. Monrose, M. Reiter, Q. Li, and S. Wetzel (2001). Cryptographic key generation from voice. Proc. of the IEEESymposium on Security and Privacy.[7] F. Hao, and C. Chan (2002). Private key generation from on-line handwritten signatures. InformationManagement & Computer Security, 10(2): 159–164.[8] B. Chen, and V. Chandran (2007). Biometric Based Cryptographic Key Generation from Faces. Proc. of the 9thBiennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques andApplication, pp: 394
Collection
2010 Fall ASEE Middle Atlantic Section Conference
Authors
Ani Ural; Joseph Yost
practice aftergraduation.References[1] Dinehart, D., Yost, J., Gross, S., Radlinska, A. The role of structural engineering in multi-disciplinary freshman projects. American Society for Engineering Education Annual Conference & Exposition, 2010.[2] Comolli, N., Kelly, W., Wu, Q. The artificial kidney: investigating current dialysis methods as a freshman design project. American Society for Engineering Education Annual Conference & Exposition, 2010.[3] Caverly, R., Fulmer, H., Santhanam, S., Singh, P., O’Brien, J., Jones, G., Char, E., Mercede, F., Weinstein, R., Yost, J. Project-Based Freshman Engineering Experience: The Core Course American Society for Engineering Education Annual Conference &