- Collection
- 2010 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Richard Perry
changes each time the student accesses the exercise, so this exercise is only partiallystatic.The process of checking the student results in this case uses a conversational style, simulating whatan instructor might do when discussing student results in person. At the end, if all six parts arecorrect, the student is given positive feedback: Fall 2010 Mid-Atlantic ASEE Conference, October 15-16, 2010, Villanova University Figure 4: Two–user RSA Key ExampleUserID: frede is correct, let’s check p next:bitLength(p) == 128, good...p is prime, almost there for p...gcd(e,p-1) == 1, p is ok, let’s check q next:q != p, that’s a good start...bitLength(q) == 128, good...q is prime, almost there for q...gcd(e,q-1) == 1, q is ok, let’s
- Collection
- 2010 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Dennis Silage
receiver forsymmetrical signals with perfect carrier and bit time synchronization (Figure 3). The theoreticalprobability of bit error (Pb) for a symmetrical BPSK signal in AWGN and with optimalreception, assuming that the apriori probabilities of the binary data and the energy per bit areequal (P0 = P1 = 0.5 and Eb0 = Eb1 = Eb), is presented in the course lecture5. 2 Eb Pb Q NoThe function Q is the complementary error function and No is the power spectral density of theAWGN. The optimal threshold for the correlation receiver is set as τopt = 0. MATLAB/Simulinkcan calculate the statistics of the binary data
- Collection
- 2010 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Qinghai Gao
, pp.1-5 (London, 9-12 Nov.2009).[5] F. Monrose, M. Reiter, and S. Wetzel (1999). Password Hardening Based on Keystroke Dynamics. Proc. of theACM Conference in Computer and Communications Security, pp: 73– 82.[6] F. Monrose, M. Reiter, Q. Li, and S. Wetzel (2001). Cryptographic key generation from voice. Proc. of the IEEESymposium on Security and Privacy.[7] F. Hao, and C. Chan (2002). Private key generation from on-line handwritten signatures. InformationManagement & Computer Security, 10(2): 159–164.[8] B. Chen, and V. Chandran (2007). Biometric Based Cryptographic Key Generation from Faces. Proc. of the 9thBiennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques andApplication, pp: 394
- Collection
- 2010 Fall ASEE Middle Atlantic Section Conference
- Authors
-
Ani Ural; Joseph Yost
practice aftergraduation.References[1] Dinehart, D., Yost, J., Gross, S., Radlinska, A. The role of structural engineering in multi-disciplinary freshman projects. American Society for Engineering Education Annual Conference & Exposition, 2010.[2] Comolli, N., Kelly, W., Wu, Q. The artificial kidney: investigating current dialysis methods as a freshman design project. American Society for Engineering Education Annual Conference & Exposition, 2010.[3] Caverly, R., Fulmer, H., Santhanam, S., Singh, P., O’Brien, J., Jones, G., Char, E., Mercede, F., Weinstein, R., Yost, J. Project-Based Freshman Engineering Experience: The Core Course American Society for Engineering Education Annual Conference &