Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Size: px
Start display at page:

Download "Vulnerability Analysis of Electric Power Communication Network. Yucong Wu"

Transcription

1 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering, chool of Electricl nd Electronic Engineering, North Chin Electric Power University, Being, , Chin Keywords: Electric Power Communiction Network; Vulnerbility; Mesure of the Frgility; Chrcteristics Index Evlution Method; Business Reltive Importnt Mtrix ABTRACT. As support network of the smrt grid, the relibility of electric power communiction network hs become the prerequisites of the smrt grid to become intelligent nd economic, nd operte sfely. This pper minly studies the vulnerbility of the electric power communiction network, so s to provide strong gurntee nd support for electric power production. Vulnerbility, s n effective mesure of network relibility, cn mesure the performnce of the network under ttck or equipment filure. Here we put forwrd n nlysis method bout the vulnerbility of the electric power communiction network business lyer, bsed on the importnce of electric power business: in view of the uncertinty produced during expert evlution link in importnce evlution of trditionl electric power business, we put forwrd n objective stndrds insted of experts subjective rting business importnce evlution method, nmely chrcteristic index evlution method. Introduction With the booming of electric power technology, electric system higher the requirements on communiction security. The vulnerbilities in electric power communiction system led to incidents. In the trditionl nlysis, we use relibility index to nlyze the electric power communiction system. The relibility index only relies on the mount of known incident type, which is unble to reflect the defect of the system nd it is not conducive to improve the system. However, the evlution bsed on the concept of vulnerbility synthesize the sfety index, reflect the system security level in generl. The network vulnerbility, s n effective mesure to the system relibility, reflects decline degree of network performnce on different network unit nd point out the wek link in the network, which supports network plnning nd risk mngement. In this pper, we first stte the concept of electric power telecommuniction network nd its min business. econd, we elborte the development sttus of electric power communiction network. Then we discuss the bsic concept of the vulnerbility nd its chrcteristics. After tht we confirm the mesurement index of the vulnerbility. At lst, we put forwrd n electric power communiction network business lyer model of its vulnerbility. In this model, n electric power business importnce evlution method is proposed, in which the expert subjective rting is replced by objective indictors. It elimintes the subjective uncertinty of evlution results. Then we use business importnce s prmeters. We build the electric power communiction network model on the business lyer nd nlyze the vulnerbility of electric power communiction network in vrious link filure model. At lst, we djust the wek link in the network ccording to the results to improve the network performnce The uthors - Published by Atlntis Press 185

2 The concept of electric power communiction network Power Line Communiction, whose full nme is Power Line Crrier Communiction, is specil communiction method using high voltge power lines, medium voltge power line nd low voltge power line s informtion trnsmission medium for voice or dt trnsmission. Network vulnerbility s n effective mesure of network relibility mesures the network performnce when network is ttcked or equipment nturlly fils. It reflects vrious decline degree when different network unit fils nd point out the wek link in the network to support the network progrmming nd risk mngement. Electric power communiction business is divided to production business nd mngement business. There re lrge mount of indexes to describe network vulnerbility, such s integrity, expnsivity nd so on. In the trditionl network vulnerbility nlysis, we consider rther less on ctegories nd chrcteristics of network trnsmission business, which hs its limittion. Development of electric power communiction network Public network is lck of communiction cpcity nd develops slowly. There re vrious types of business in the public communiction network. The business with huge spn mkes it difficult to refine the network performnce index to the business lyer. As the electric communiction network specil for electric system, the demnd of improving communiction cpbility nd stisfy to meet the specil request of the electric system rises. Becuse of the specificity of the electric system, power genertion, trnsmission, substtion, power distribution is conducted t the sme time nd distribution re is very extensive. In order to resonble economic power genertion, distribution of electricity nd timely find nd del with the fults of power system, we hve to set up n electric power system for unified mngement nd need sfegurd of electric power communiction system to supervise the whole process of electric power system nd detection. These dys, electric power communiction network in Chin hs mde gret progress with the development of the power system. After yers of development, communiction institutions nd tem should hve certin scle nd to crete good cdemic tmosphere. Even so, there re still some defects in our country contrst to the big trend in the development of the globl telecommunictions nd direction of the development of electric power communiction round the world electric power communiction network t present. The network structure is wek. The min electric power communiction network structure is complex, minly tree or str structure, difficult to form roundbout circuit. Hence, it is difficult to resonble shre through the detour once the fult hppens. Communiction system is reltively bckwrd nd min circuit over term service. Mny circuits operte for ges, over the term of scrp. It is difficult to complete the integrted digitl business. Network ccess nd network mngement is wek. The current user ccess is telephone lines in generl or the nlog signl interfce. Difficult s the network mngement informtion is collected, it is hrd to form comprehensive network mngement system. The bsic concept of vulnerbility In system sfety point of view, vulnerbility refers to exist in wekness or defect in the system, system for specific thret ttck or the sensitivity of risk events nd the possibility of the thret of ttck effect. The index of vulnerbility nd other indexes hve fundmentl difference. 186

3 Generlly, system security mesures hve effectiveness, relibility clcultion nd nti-destroying bility clcultion. The relibility refers to the system's bility to fully relize some function in certin time. Vlidity refers to the system is enbled t ny time in efficient working condition. Anti-destroying bility is in view of the network topology structure relibility ssessment. Anti-destroying bility of the network node communiction is minly pointing to the sfety degree of the system under destruction. Thus, the frgility of the description ngle nd the form re different to the bove two cses. It focus on vulnerble prt of the network fter ttck, brought bout by the decline in overll performnce. Mesure of the frgility Nowdys, there is no unified definition of Frgility. Frgility which we used in the pper is the performnce decline of some nodes in the network fter ttck. Currently, the bsic prmeters of mesuring the network in the complex network theory chrcteristics re the shortest pth, clustering coefficient, degree, degree distribution nd so on. These prmeters show the chrcteristics of the network performnce from different spects. Averge distnce L. In network, the distnce between ny two nodes is defined s the shortest distnce between the two notes. We get the verge distnce from the node distnce. It reflects the verge length of informtion trnsmission between nodes in the network, 1 L= nn ( 1 Clustering coefficient C. The clustering coefficient in the network is the importnt prmeters used to evlute network node cluster. The quntity of clustering coefficient shows the degree of collectiviztion in the network, j 1 n Ci n i = 1 C = d Node degree distribution. Degree distribution effects gretly on the network trnsmission performnce of the informtion. We use P(k to indicte the percentge of number of nodes with k degree nd the ccumulte probbility of notes degree is P ( (k' cum k = P Node betweenness distribution k' k. In the network, node betweenness is the frequency if pssing the note in the shortest distnce. We use P( to indicte the percentge of number of nodes with betweenness nd the ccumulte probbility of notes betweenness is Pcum ( = P(' Generlly we use these prmeters to indicte network structure chrcteristics. However it is unble to describe the network performnce comprehensively. Currently, the index we use to evlute the network performnce is efficiency function. The efficiency index of the network G is defined s ' 187

4 1 1 1 EG ( = ε = nn ( 1 nn ( 1 d i, j Gi, j i, j Gi, j We use to indicte the communiction efficiency between two notes nd it is, inversely with the shortest distnce between the two notes. When, tht is, when there re no pth between the two notes,. The function of the communiction system is different from the electric system. Hence the nlytic ngle is not the sme. In this pper, we consider the communiction network business impct from two spects: the business trnsmission bndwidth nd connectivity. The originl efficiency function only indictes the business trnsmission bndwidth nd it doesn t involve the connectivity. Hence we will modify the efficiency function. The result is s follows: The method of clculting the shortest pth doesn t chnge. Then we clculte the totl efficiency E of the system. We get the totl business volume from the business mtrix nd clculte the shortest distnce mtrix. Of those, is the shortest distnce between note i nd j. We wipe off one dots every time we do the simultion nd count the business which loses link. Then we represent the efficiency function by E' = j, 0 In the eqution, E is the efficiency function clculted by the originl method. j, 0 E j j is the percentge of the trnsporting business, which is regrded s business connected efficiency. The efficiency fter modified not only considers the business connectivity, but lso the effect of business distribution to network trnsmission chrcteristics. When the note with more business connection fils, the vlue of j, 0 j E E nd E is smll. Chrcteristics index evlution method Business reltive importnt mtrix. Expert evlution in the trditionl electric power business importnce evlution hs strong subjectivity. Different experts grding results vry, which my led to inconsistent evlution nd ffect ll sorts of network performnce nlysis bsed on the business importnt degree. In order to eliminte the effect, we need to find objective fctors replcement for the expert subjective fctors to describe the importnt degree of ech other between the business. Different electric power business hve different requirements on the sme technicl indictors. ome indictors cnnot directly reflect the importnce of business, such s communiction bndwidth. However, some index reflects the importnt degree of business chrcteristics, such s time dely. We define the index tht cn reflect the business importnt degree s chrcteristic index, nd use it s n objective evlution fctors insted of the expert subjective fctors. Then we evlute electric power business importnce through the nlysis of the different requirements of business on the chrcteristic indexes. We select the collection of chrcteristic indexes nd for business collection mp vrious requirements of the indexes to integer field forming importnt vlue sequence,. represents the importnce vlue of business under the chrcteristic vlue. For the business requires highest on chrcteristic 188

5 ,. For the business requires lowest on chrcteristic,. is determined by difference degree of business set under the feture index, of which the vlue hs different requirements to index. We get the business reltive importnt mtrix under the chrcteristic index through the clcultion of business importnt vlue sequence, In the eqution, is whether the business importnt under chrcteristic index reltive to the business.1 = importnt, 0 = unimportnt, 0.5 = of the sme importnce s. When i=j, hs no prcticl mening nd it should be vlue tht doesn t ffect the result. According to the lgorithm, we hve in this pper. When, si( k n 1, > 1 sj( kn s ( k = 0.5, = 1 ( si( kn 0, < 1 sj( kn ( kn i n sj kn We sum up ll business reltive importnt mtrix under ll indexes in the collection of chrcteristic index nd get syntheticlly reltive importnt mtrix A, in which, N = n= 1 The evlution of business importnce. In order to void the difference between business importnt degree evlution result is too lrge or too smll. In this pper we use the liner normliztion function nd intervl mpping function to del with syntheticlly reltive importnt mtrix nd get importnt business degrees. First of ll, we sum up the row vector elements of the syntheticlly reltive importnt mtrix nd get the sum of ll the other syntheticlly reltive importnt vlue of focusing business to business, sum i Then, we select the liner normliztion function ( kn I = mx j= 1 z z f( z = z z In the eqution, z is the vrite to be normlized nd, respectively represents the mximum nd the minimum vrible in z domin,. We substitute into eqution nd get normlized importnt vlue: min min ( sum sum sum i i min i' = f( i = sum sum ( i mx ( i min After normliztion, the minimum vlue of is 0, which represents the importnce degree of the business is 0, nmely it cn be discrded, which is not resonble. Therefore, we need to mp through formul 189

6 Q= Q ( ' = '(1 X + X i i i to intervl [X,1], in which 0<X<1 nd get the resonble importnce evlution of business. When the vlue of X is too lrge, the difference of importnce degree between business is too smll nd it is difficult to distinguish vrious business. Hence, in this pper, we hve X=0.1 to define the distnce between the mximum nd minimum of importnce degree s ten times. Reference [1] Zhoxi X,Mnimrn G,Vittl V.An informtion rchitecture for future power systems nd its relibility nlysis[j].ieee Trnsctions on Power ystems,2002,17(3: [2] Brefoot C A,Entringer R,wrt H.Vulnerbility in grphs- comprtive survey [J]. Journl of Combintoril Mthemtics nd Combintoril Computing 1987(1: [3] Dinh T N,Ying Xun,Thi M T,et l.on new pproches of ssessing network vulnerbility: hrdness nd pproximtion[j]. IEEE/ACM Trnsctions on Networking,2012,20(2: [4] Vrdi Y, Zhng Cun Hui. Mesures of network vulnerbility[j]. IEEE ignl Processing Letters, 2007, 14(5: [5] Peng Wei,Li Zimu,Liu Yujing,et l.assessing the vulnerbility of network topologies under lrge-scle regionl filures[j].ieee Journl of Communictions nd Networks,2012,14(4: [6] Wng Xioling,Jing Xiohong,Pttvin A.Assessing network vulnerbility under probbilistic region filure model[c]//ieee 12th Interntionl Conference on High Performnce witching nd Routing (HPR. Crtgen, pin:ieee,2011. [7] ZHAO L, PARK K,nd LAI Y C.Attck vulnerbility of scle-free networks due to cscding brekdown[j],phys.rev.e,2004(70:

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

A Fast Imaging Algorithm for Near Field SAR

A Fast Imaging Algorithm for Near Field SAR Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

Introduction to Integration

Introduction to Integration Introduction to Integrtion Definite integrls of piecewise constnt functions A constnt function is function of the form Integrtion is two things t the sme time: A form of summtion. The opposite of differentition.

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

Tilt-Sensing with Kionix MEMS Accelerometers

Tilt-Sensing with Kionix MEMS Accelerometers Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2016)

International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2016) \ Interntionl Conference on Mechnics, Mterils nd tructurl Engineering (ICMME 2016) Reserch on the Method to Clibrte tructure Prmeters of Line tructured Light Vision ensor Mingng Niu1,, Kngnin Zho1, b,

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Technical data. General specifications. Transducer frequency Indicators/operating means

Technical data. General specifications. Transducer frequency Indicators/operating means Model Number Fetures Ultrsonic system for relible detection of no, one, or two overlpping sheet mterils, preferbly ppers Short version No TEACH-IN required Function indictors visible from ll directions

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

A HYDRAULIC SIMULATOR FOR AN EXCAVATOR

A HYDRAULIC SIMULATOR FOR AN EXCAVATOR P-06 Proceedings of the 7th JFPS Interntionl Symposium on Fluid Power TOYAMA 008 September 5-8 008 A HYDRAULIC SIMULATOR FOR AN EXCAVATOR Soon-Kwng Kwon* Je-Jun Kim* Young-Mn Jung* Chn-Se Jung* Chng-Don

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Essential Question What are some of the characteristics of the graph of a rational function?

Essential Question What are some of the characteristics of the graph of a rational function? 8. TEXAS ESSENTIAL KNOWLEDGE AND SKILLS A..A A..G A..H A..K Grphing Rtionl Functions Essentil Question Wht re some of the chrcteristics of the grph of rtionl function? The prent function for rtionl functions

More information

)

) Chpter Five /SOLUTIONS Since the speed ws between nd mph during this five minute period, the fuel efficienc during this period is between 5 mpg nd 8 mpg. So the fuel used during this period is between

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

- 2 U NIX FILES 1. Explin different file types vilble in UNIX or P OSIX s ystem. ( 08 mrks) ( My-08/Dec-08/My-10/My- 12) 2. Wht is n API? How is it di

- 2 U NIX FILES 1. Explin different file types vilble in UNIX or P OSIX s ystem. ( 08 mrks) ( My-08/Dec-08/My-10/My- 12) 2. Wht is n API? How is it di -1 I NTRODUCTION 1. Wht is posix stndrd? Explin different subset of posix stndrd. Write structure of progrm to filter out non- p osix complint codes from user progrm. ( 06 mrks) ( Dec- 2010). 2. W rite

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

PROBABILISTIC SEISMIC DEMAND ANALYSIS CONSIDERING RANDOM SYSTEM PROPERTIES BY AN IMPROVED CLOUD METHOD

PROBABILISTIC SEISMIC DEMAND ANALYSIS CONSIDERING RANDOM SYSTEM PROPERTIES BY AN IMPROVED CLOUD METHOD The 4 th World Conference on Erthquke Engineering October -7, 8, Beijing, Chin PROBABILISTIC SEISMIC DEMAND ANALYSIS CONSIDERING RANDOM SYSTEM PROPERTIES BY AN IMPROVED CLOUD METHOD D-Gng Lu, Xio-Hui Yu,

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions

The Reciprocal Function Family. Objectives To graph reciprocal functions To graph translations of reciprocal functions - The Reciprocl Function Fmil Objectives To grph reciprocl functions To grph trnsltions of reciprocl functions Content Stndrds F.BF.3 Identif the effect on the grph of replcing f () b f() k, kf(), f(k),

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Digital Design. Chapter 1: Introduction. Digital Design. Copyright 2006 Frank Vahid

Digital Design. Chapter 1: Introduction. Digital Design. Copyright 2006 Frank Vahid Chpter : Introduction Copyright 6 Why Study?. Look under the hood of computers Solid understnding --> confidence, insight, even better progrmmer when wre of hrdwre resource issues Electronic devices becoming

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Noisy Voltage Sag Signal Analysis Based on Wavelet Transformation

Noisy Voltage Sag Signal Analysis Based on Wavelet Transformation 3rd Interntionl Conerence on Mechtronics nd Industril Inormtics (ICMII 05) Noisy Voltge Sg Signl Anlysis Bsed on Wvelet Trnsormtion Min Co,,, Shilin Li, b, Qingchn Liu, c Chong Lin, d, Zhiqing M3, e* Yunnn

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

Optimization of Air Bearing Slider Design

Optimization of Air Bearing Slider Design Proceedings of TC2005 orld Tribology Congress III Proceedings of TC2005 September 2-6, orld 2005, Tribology shington, Congress D.C., III SA September 2-6, 2005, shington, D.C., SA Optimiztion of Air Bering

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

A New Approach for Ranking of Fuzzy Numbers using the Incentre of Centroids

A New Approach for Ranking of Fuzzy Numbers using the Incentre of Centroids Intern. J. Fuzzy Mthemticl rchive Vol. 4 No. 04 5-0 ISSN: 0 4 (P 0 50 (online Published on pril 04.reserchmthsci.org Interntionl Journl of Ne pproch for nking of Fuzzy Numbers using the Incentre of Centroids

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012 Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

An Integrated Simulation System for Human Factors Study

An Integrated Simulation System for Human Factors Study An Integrted Simultion System for Humn Fctors Study Ying Wng, Wei Zhng Deprtment of Industril Engineering, Tsinghu University, Beijing 100084, Chin Foud Bennis, Dmien Chblt IRCCyN, Ecole Centrle de Nntes,

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

Efficient Techniques for Tree Similarity Queries 1

Efficient Techniques for Tree Similarity Queries 1 Efficient Techniques for Tree Similrity Queries 1 Nikolus Augsten Dtbse Reserch Group Deprtment of Computer Sciences University of Slzburg, Austri July 6, 2017 Austrin Computer Science Dy 2017 / IMAGINE

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

Truss Topology Optimization Using Genetic Algorithm with Individual Identification Technique

Truss Topology Optimization Using Genetic Algorithm with Individual Identification Technique WCE 2009, July - 3, 2009, London, U.K. Truss Topology Optimiztion Using Genetic Algorithm with Individul Identifiction Technique Su Ruiyi, Gui Lingjin, Fn Zijie Abstrct Since the evlution of ech individul

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

Abstract. 1. Introduction. Kaveh Bevrani 1 Mamun Muntasir Rahman 2 Edward Chung 3

Abstract. 1. Introduction. Kaveh Bevrani 1 Mamun Muntasir Rahman 2 Edward Chung 3 Austrlsin Trnsport Reserch Forum 011 Proceedings 8-30 September 011, Adelide, Austrli Publiction website: http://www.ptrec.org/trf.spx Queue protection prmeters fine-tuning for vrible speed limits Kveh

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Probabilistic Fuzzy Approach to Assess RDS Vulnerability and Plan Corrective Action Using Feeder Reconfiguration

Probabilistic Fuzzy Approach to Assess RDS Vulnerability and Plan Corrective Action Using Feeder Reconfiguration Energy nd Power Engineering, 2012, 4, 330-338 http://dx.doi.org/10.4236/epe.2012.45043 Published Online September 2012 (http://www.scirp.org/ournl/epe) Probbilistic Fuzzy Approch to Assess RDS Vulnerbility

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

A Novel Approach for Finding a Shortest Path in a Mixed Fuzzy Network

A Novel Approach for Finding a Shortest Path in a Mixed Fuzzy Network Wireless Sensor Network 00 48-60 doi:0.436/wsn.00.00 Published Online Februry 00 (http://www.scirp.org/journl/wsn/). A Novel Approch for Finding Shortest Pth in Mixed Fuzzy Network Abstrct Ali Tjdin Irj

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

CVM-A1500. Power analyzer for panel with power quality measurement parameters

CVM-A1500. Power analyzer for panel with power quality measurement parameters nlizdores de redes CVM-1500 Power nlyzer for pnel with power qulity mesurement prmeters Description CVM-1500 is pnel mounted power qulity nlyzer with EMS (Energy Mngement Softwre) integrted. Its internl

More information

Ray surface intersections

Ray surface intersections Ry surfce intersections Some primitives Finite primitives: polygons spheres, cylinders, cones prts of generl qudrics Infinite primitives: plnes infinite cylinders nd cones generl qudrics A finite primitive

More information

Solutions to Math 41 Final Exam December 12, 2011

Solutions to Math 41 Final Exam December 12, 2011 Solutions to Mth Finl Em December,. ( points) Find ech of the following its, with justifiction. If there is n infinite it, then eplin whether it is or. ( ) / ln() () (5 points) First we compute the it:

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Lecture 5: Spatial Analysis Algorithms

Lecture 5: Spatial Analysis Algorithms Lecture 5: Sptil Algorithms GEOG 49: Advnced GIS Sptil Anlsis Algorithms Bsis of much of GIS nlsis tod Mnipultion of mp coordintes Bsed on Eucliden coordinte geometr http://stronom.swin.edu.u/~pbourke/geometr/

More information

Spring 2018 Midterm Exam 1 March 1, You may not use any books, notes, or electronic devices during this exam.

Spring 2018 Midterm Exam 1 March 1, You may not use any books, notes, or electronic devices during this exam. 15-112 Spring 2018 Midterm Exm 1 Mrch 1, 2018 Nme: Andrew ID: Recittion Section: You my not use ny books, notes, or electronic devices during this exm. You my not sk questions bout the exm except for lnguge

More information