Thomas R Kronhamn Ericsson Microwave Systems AB Mölndal, Sweden

Size: px
Start display at page:

Download "Thomas R Kronhamn Ericsson Microwave Systems AB Mölndal, Sweden"

Transcription

1 6HQVRU,QWHU1HW:RUNV Thomas R Kronhamn Ericsson Microwave Systems AB Mölndal, Sweden Thomas.Kronhamn@emw.ericsson.se $EVWUDFW It is shown how distributed sensors, networked by Internet techniques, can interact to create not only a common, wide area situation picture but also to support each other in the measurement and tracking process. The paper gives a framework for how the networked system can accommodate sensors of different sophistication and for the system to be developed in an evolutionary way. Specifically, a solution to the truly distributed sensor fusion problem is described. In this solution sensors cooperate directly sensor-to-sensor, in a totally flat architecture. By making the fusion support the primary data sources, the sensors, it is implicated that it also benefits the system as a hole..h\zrugv Sensor networks, Internet communication, sensor data fusion, distributed fusion.,qwurgxfwlrq Networks and data fusion are hot topics in many areas today. Primarily, this paper deals with sensor networks for air surveillance. Traditionally, sensors were connected to centers/hubs designed to create, from the specific sensors used, a common situation picture for the area covered by the sensors. This could be the case for sensors distributed over an area or for multi-sensor platforms, often ships or aircraft. However, new demands on coordinating assets in a flexible and robust way and the advent of Internet communication have made new solutions both wanted and possible. This paper will show how networks can be built from very diverse pieces of equipment, to build "a system of systems". Particularly, it is shown how different levels of sophistication can be accommodated and how the network fusion functionality can be developed in an evolutionary way. Fundamental to such a process is to formulate the fusion objectives and to have a clear strategy in relation to the classical data fusion problems. The paper defines three levels of ambitions for the sensor data fusion and gives corresponding solutions. A specific section is devoted to DISSY, the "ultimate" distributed sensor system solution. Architectures for multiple sensor tracking have been discussed in the literature, e.g. in [1,2,3]. DISSY, first presented in [4,5], shares ideas with the "distributed composite tracking" concept of [3]. The main differences to [3] are in the measures to ensure a truly common air picture. First, in DISSY, it is favored that all measurements in a vicinity of a track are communicated, leaving the association task to the receiving sensor. This prevents that association errors are spread to others. Second, communicating data is not enough to ensure a common picture, because of bandwidth constraints. A "hand shake" procedure is necessary between sensors to establish which one that should be responsible globally for each track. Otherwise, the result would be similar, but not truly identical, air pictures. 7KHQHWZRUNLGHD 2SHUDWLRQDOEHQHILWV The network idea, from an operational point of view, is to create a multi-source, multi-user system with key qualities such as flexibility and robustness. Indirectly this favors a flat, distributed architectural solution. Other operational objectives are to give, all units involved, both a common unified situation picture as well as an increase in the quality of information.

2 1HWZRUNFRPSRQHQWV From a sensor point of view some sensors may be dedicated to the network, others may be sensors belonging to taskoriented platforms or systems of different kinds. These could be units of fighter aircraft, ships, air-defense systems, AEW-systems, etc.. One of the network ideas is to exploit the different qualities of sensors such as radar, ESM, IR, etc. to the benefit of track continuity and target classification. Some sensors may be designed functionally to work together and to be supported by specific high performance data links. Many sensors today may, on the other side, be of local use only. The paper addresses the question of how to make them work together, to be a "system of systems", see Figure 1. Figure 1. A system of systems

3 Figure 2. The Internet world. 2.3 An Inter-Net-Work Logically we think of the sensor system as in Figure 2 that is as sensors connected by way of an Intranet. In this way the physical location or the physical communication links are not an issue from a functional point of view. Functionally, sensors may now cooperate because they observe the same targets and not because they have been connected to specific centers or fusion nodes. 6RPHIXVLRQDVSHFWV 'DWDIXVLRQDPELWLRQV Sensor data fusion may be done in numerous ways. From an engineering point of view, customer needs (expressed as system requirements) should be the leading star. This means that solutions should not be unnecessarily complicated. Here we define/distinguish three levels of ambition, in increasing order of complexity: A1: Creation of a unified situation picture. A2: Performance improvements by use of all data available. A3: Performance improvement by support of local sensor measurement and track. With "a unified situation picture" is here understood that all users shall have the same situation picture. With "use of all data" means that data, from different sensors, concerning the same target should be used to improve the result compared to the single sensor performance. With "by support of local sensor measurement and track" means that the basic measurement and track processes of the sensors themselves should benefit from the data of the other sensors. This may be achieved by feedback from a fusion node or, as advocated in this paper, by direct sensor-tosensor communication.

4 Figure 3. A sensor block diagram showing points of potential benefits for a sensor from external data. In Figure 3, three potential areas of performance improvements from external data are shown for a sensor target track function. These are association, filtering and track load. In the figure, two alternative entry points are shown for external data into the target data processing chain. The preferred alternative is the plot data entry into the association block. For full advantage "high bandwidth" plot data is required. In case track data is received, this still can be beneficial, depending on the status and quality of the own sensor track data. For adaptive sensors, with data arriving at a rate comparable with its own adaptive loop bandwidth, track load savings can be made. Within each level of ambition described above there are still many alternative solutions. In this paper, an engineering design approach is taken that has its focus on the system requirements and tries to find simple ways to avoid or solve the problems encountered. Below, some data fusion issues are discussed. 'DWDIXVLRQLVVXHV &RUUHODWHGGDWD However, even if known, correlated data represents an additional communication and processing load. Three different situations with correlated data can be distinguished: - "common process noise", - shared measurement data, - data feedback. Common process noise is present in track data from different sensors. This means that dynamic track errors are correlated, while the measurement errors are not. Shared measurement data may be present if data can take different routes in a network. This may happen if sensor data, no matter if measurement data or track data, is sent to sensors or fusion nodes without control. Data feedback, here primarily thought of as data from a fusion node that is fed back to sensors, often leads to the sensor s own data coming back to an unknown extent. A general comment on these problems is that they should be avoided if possible. In high performance applications this can be done by direct communication of measurement data sensor-to-sensor. In low performance applications it can be avoided by selection (of track data) rather than fusion. Correlated data is often a problem in data fusion. This is especially the case if the degree of correlation is not known.

5 &RPPXQLFDWLRQEDQGZLGWK Sensor data fusion is always affected by the communication bandwidth. With narrow band, fixed protocol communication links the transmission of track data often is preferred over plot data. With high bandwidth links and flexible protocols the question is open and the answer may be both. In a network, of the kind here considered, the situation may be that bandwidth levels can not be guaranteed and that equipment may be of very different kinds in terms of fusion functionality. Often argued in the past was that track data was more communication efficient than plot data. This was certainly true in the early days, with poor false alarm control. This paper favors plot data for fusion performance reasons (see above). In this solution, however, only a selection of data is communicated and only from selected sensors (those actually observing the target). Another reason is that track data today, to give the full picture, often is of multiple model complexity, far outweighing measurement reports (plot data) in terms of data content. A conclusion must be that solutions must be adapted to the conditions at hand. When high performance solutions are required communication performance must be guaranteed or flexibly controlled. 'DWDIXVLRQVROXWLRQV Given the levels of ambitions (A1-A3) and the different problems presented above, some straightforward solutions (S1-S3) can be found. There are of course numerous possible variants, but solutions are given here with the purpose to match the level of performance ambition, without unnecessary involvement in the problems mentioned. Below the word "selected" is used when one out of two or more pieces of data is chosen, as opposed to "fused" when the data is filtered or otherwise weighted together. Included in the notion "selected" is the possibility to "combine" data from different sensors, which may complement each other in different ways. Such a typical situation is to combine radar or laser range data with IRST angular data when these sensors are co-located on platforms. The three solutions (S1-S3) are as follows: S1: Track data from the best sensor or node is selected. This solution means that no extra fusion is performed for the sake of the net. S2: Plot data should be fused at nodes, where possible. If done at several locations for a particular target, or where there are sensors not connected to these nodes, track data from the best location should then be selected. This solution should be used when sensors and communication links are known and dependable, such as in multisensor platforms and specifically designed local sensor nets. The solution results in that extra track functions are introduced at the nodes. Sensors may have (probably have) track functions of their own. Plot data, not all but selected, potentially belonging to the track in question, should be communicated. S3: Plot data should be shared among sensors or nodes and fused in a way that all data concerning each target is available at the fusion point (sensor). The best node or sensor should then be selected. In this solution fusion nodes should only exist where sensors do not have a tracking capability of their own. Common for all the solutions are the interface to the net and that there are no correlated data problems. 7KH',66<VROXWLRQ In a perfect world where all sensors are built, with the highest ambitions, for the network, a truly distributed Sensor Inter-Net-Works can be obtained in the way shown in this section. Here, a solution is shown that satisfies the highest standards in - performance; all data fused, direct sensor-tosensor support, - robustness; fusion at sensors, no extra fusion nodes introduced. This is done without suffering from the problems mentioned above. 7KH',66<SULQFLSOH The solution of DISSY, DIstributed Sensor SYstem, is depicted in figure 4. Each participating sensor is connected to the network by the three services shown in the figure. Full functional standard is not necessary for participation. The services are: 1. One service finds out, for each specific target, if any other sensor observe the same target. This is based on the location of the own target track. These sensors send data, from an area around the actual track, to each other. 2. Another service adapts the received data to the functionality of the host sensor. The received data can be plots or tracks with different amounts of delay. 3. The third service is negotiating with the other sensors for the global responsibility of the target data. This is based on rules and data quality. The DISSY principle results in a flat architecture, as opposed to a solution with local and global fusion nodes (of which there are many variants). Sensor cooperation is logically the same irrespective of local physical connections.

6 Figure 4. DISSY, DIstributed Sensor SYstem. Each participating sensor, or sensor sub-system, is functionally a part of the distributed sensor system by use of the three services shown in the figure. 0RWLYDWLRQDFDVHVWXG\ Consider a target crossing the area of interest. There is always (almost) one sensor to be the first to detect and start tracking. This sensor learns (service no 1) that no other sensors are tracking this particular target and sets up a global track. When another sensor gets its first detection from this target, it finds out (service no 1) that there is already a global track at this location. These two sensors now start to exchange data. This same thing takes place for each new sensor observing the target. The data exchanged by the sensors may be of many different kinds and not known in advance. One basic idea behind the distributed network is that sensor cooperation FDQ QRW EH SUHSODQQHG in terms of which sensors that observe a particular target at a particular time and that sensor cooperation VKRXOG QRW EH SUHSODQQHG because of requirements on flexibility and mobility of sensors. This means that data may come in many different forms, such as plot or track data and of one, two or three space dimensions. Not only data come in different kinds but so does also the receiving sensor functionality. The purpose of "service no 2" is to flexibly adapt the data to the sensor. This range from doing nothing to taking care of everything. At the low end, this can be a sensor that cannot benefit from external data and only delivers local track data. At the high end, a sensor has the ability to accept and to use, to the advantage possible, data from all kinds of sensors. A requirement for an Intranet of sensors is to accept the plurality of sensor sophistication, as the first goal is to make the net work and then gradually hone its abilities. At each instant of time there is always one sensor that is the "best", in terms of target measurements. By the sensorto-sensor communication, this sensor has the possibility to improve further by means of the received data. It is hard to imagine that, from a performance point of view, anything could be gained from sending data to a third party (such as a fusion node) instead of sensor-to-sensor. A third party would always be worse off than the best sensor in terms of data and can not generally be better positioned in relation to users, in a flexible, distributed multi-user network. The remaining thing, sending data to each other, is to decide bilaterally between the sensors which will produce

7 the best result, "service 3". The best sensor will be responsible to the users for the particular target data. For a target, passing through the area of interest, this responsibility is handed over from sensor to sensor all along the path. Criteria may be based on track quality measures and predetermined relations among sensors. Mostly the criteria are not critical, as data is shared among the sensors. $QHWZRUNHYROXWLRQSURFHVV Building a network is not necessarily only high-tech in terms of fusion. First thing is often to make things work together with existing equipment. Successively equipment may then be modified, or new material added that is adapted from the start. There will certainly always be equipment of different standards in terms of functionality. The challenge will be to manage the network development in an evolutionary way. The process advocated here is that sensors etc delivers track data to the net. A net service correlates and selects the best data; i.e. produces the unified picture for all users. This allows a unified situation picture to be created regardless of the fusion sophistication at various members. A net service, rather than a built-in function at the sensors and nodes, has the advantage of minimizing modifications in existing equipment. To raise the quality of the result, sensors and nodes may share data among themselves, when this is beneficial. This can be done without affecting the previously described process of creating the unified situation picture as shown with solutions 2 and 3 above. To raise the robustness of the net, the number of fusion nodes may be increased, but rather, the fusion functionality, both the data fusion itself and the responsibility negotiation, should be distributed directly at the sensors. The higher performance levels described will certainly come to use in the new generation of microwave sensors based on DGA-techniques (DGA: Digital Group Antennas), where time critical sensor-to-sensor co-operation will be exploited. Another application that will benefit from this solution is networks of passive sensors, where no natural fusion points can be found. 5HIHUHQFHV [1] Chong, C. Y., S. Mori and K. C. Chang, Distributed Multitarget Multisensor Tracking, in Multitarget- Multisensor Tracking: Advanced Applications, Vol. I (Y. Bar-Shalom, ed.), Artech House, 1990, pp [2] Blackman, S. S., and R. Popoli, Design and Analysis of Modern Tracking Systems, Artech House, [3] Moore, J. R. and W. D. Blair, Practical Aspects of Multisensor Tracking, in Multitarget-Multisensor Tracking: Applications and Advances, Vol. III (Y. Bar-Shalom and W. D. Blair, ed.), Artech House 2000, pp [4] Kronhamn, T. R., Sensorsamverkan i Omvandling, Milinf 2000, Enköping, sept (in Swedish). [5] Kronhamn, T. R., Sensor Fusion Revisited, Militärteknisk Tidskrift - Swedish Journal of Military Technology, No. 4, &RQFOXVLRQV The paper has shown a way to build wide area networks of sensors by Internet techniques. A framework has been given that allows system components of different sophistication to be included. This also makes it possible to develop the network in an evolutionary way. The DISSY solution results in a totally flat architecture without many of the problems in hierarchical solutions. This technique is considered especially important for high performance requirements when adaptive and passive sensors are involved.

Fusion of Radar and EO-sensors for Surveillance

Fusion of Radar and EO-sensors for Surveillance of Radar and EO-sensors for Surveillance L.J.H.M. Kester, A. Theil TNO Physics and Electronics Laboratory P.O. Box 96864, 2509 JG The Hague, The Netherlands kester@fel.tno.nl, theil@fel.tno.nl Abstract

More information

A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS

A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS I&S A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS Kiril ALEXIEV 1. Introduction Digital computer simulation is a valuable tool, used for the design,

More information

Outline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking

Outline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking REGLERTEKNIK Outline AUTOMATIC CONTROL Target Tracking: Lecture 1 Course Info + Introduction to TT Emre Özkan emre@isy.liu.se Course info Introduction to Target Tracking Division of Automatic Control Department

More information

Probability Evaluation in MHT with a Product Set Representation of Hypotheses

Probability Evaluation in MHT with a Product Set Representation of Hypotheses Probability Evaluation in MHT with a Product Set Representation of Hypotheses Johannes Wintenby Ericsson Microwave Systems 431 84 Mölndal, Sweden johannes.wintenby@ericsson.com Abstract - Multiple Hypothesis

More information

Multisensor Data Fusion Using Two-Stage Analysis on Pairs of Plots Graphs

Multisensor Data Fusion Using Two-Stage Analysis on Pairs of Plots Graphs Multisensor Data Fusion Using Two-Stage Analysis on Pairs of Plots Graphs Rogério Perroti Barbosa 1,2, Frederic Livernet 3, Beatriz S. L. P. de Lima 1, José Gomes de Carvalho Jr 2 1 - COPPE/ Federal University

More information

US and Swedish Industrial Support to Network Centric Warfare for US and Swedish Forces

US and Swedish Industrial Support to Network Centric Warfare for US and Swedish Forces US and Swedish Industrial Support to Network Centric Warfare for US and Swedish Forces October 9, 2003 Erik Löwenadler, President Ericsson Microwave Systems AB 10 th US-Sweden Defense Industry Conference

More information

Sensor Networks: Evolution, Opportunities, and Challenges C. Y. Chong and S. P. Kumar Proceedings of the IEEE, 91, 8, 2003

Sensor Networks: Evolution, Opportunities, and Challenges C. Y. Chong and S. P. Kumar Proceedings of the IEEE, 91, 8, 2003 Sensor Networks: Evolution, Opportunities, and Challenges C. Y. Chong and S. P. Kumar Proceedings of the IEEE, 91, 8, 2003 Allison Lee CS295-1 Sensor data management October 12, 2005 Outline Why is sensor

More information

Outline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System

Outline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System Outline EE793 Target Tracking: Lecture 2 Introduction to Target Tracking Umut Orguner umut@metu.edu.tr room: EZ-12 tel: 4425 Department of Electrical & Electronics Engineering Middle East Technical University

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

Network-Centric MFA Tracking Architectures

Network-Centric MFA Tracking Architectures Network-Centric FA Tracking Architectures Suihua Lu Department of athematics Colorado State University Fort Collins, CO 80523 lu@mathcolostateedu Aubrey B Poore Numerica, Inc PO Box 271246 Fort Collins,

More information

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY

WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY Since its early days in the 1990s, the Internet has truly transformed the world. It would be difficult, if not impossible, to find an industry that

More information

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS

SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS When discussing business networking and communications solutions, the conversation seems invariably to revolve around cloud services, and more

More information

Radar Detection Improvement by Integration of Multi- Object Tracking

Radar Detection Improvement by Integration of Multi- Object Tracking Radar Detection Improvement by Integration of Multi- Object Tracing Lingmin Meng Research and Technology Center Robert Bosch Corp. Pittsburgh, PA, U.S.A. lingmin.meng@rtc.bosch.com Wolfgang Grimm Research

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

Examining the Authority and Ranking Effects as the result list depth used in data fusion is varied

Examining the Authority and Ranking Effects as the result list depth used in data fusion is varied Information Processing and Management 43 (2007) 1044 1058 www.elsevier.com/locate/infoproman Examining the Authority and Ranking Effects as the result list depth used in data fusion is varied Anselm Spoerri

More information

Taxonomies and controlled vocabularies best practices for metadata

Taxonomies and controlled vocabularies best practices for metadata Original Article Taxonomies and controlled vocabularies best practices for metadata Heather Hedden is the taxonomy manager at First Wind Energy LLC. Previously, she was a taxonomy consultant with Earley

More information

Chapter 1 - Introduction

Chapter 1 - Introduction Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding

More information

A new parameterless credal method to track-to-track assignment problem

A new parameterless credal method to track-to-track assignment problem A new parameterless credal method to track-to-track assignment problem Samir Hachour, François Delmotte, and David Mercier Univ. Lille Nord de France, UArtois, EA 3926 LGI2A, Béthune, France Abstract.

More information

Going With the (Data) Flow

Going With the (Data) Flow 1 of 6 1/6/2015 1:00 PM Going With the (Data) Flow Publish Date: May 20, 2013 Table of Contents 1. Natural Data Dependency and Artificial Data Dependency 2. Parallelism in LabVIEW 3. Overuse of Flat Sequence

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore

High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore Module No # 09 Lecture No # 40 This is lecture forty of the course on

More information

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016 edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract

More information

No Time for Zero-Day Solutions John Muir, Managing Partner

No Time for Zero-Day Solutions John Muir, Managing Partner No Time for Zero-Day Solutions John Muir, Managing Partner Executive Summary Innovations in virus construction and propagation have created a zero-day threat from email attachments that can wreak significant

More information

(Refer Slide Time: 00:02:04)

(Refer Slide Time: 00:02:04) Computer Architecture Prof. Anshul Kumar Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture - 27 Pipelined Processor Design: Handling Control Hazards We have been

More information

CSE200 Lecture 6: RECURSION

CSE200 Lecture 6: RECURSION Table of Contents Review of functions (using factorial example)... 1 Recursion... 1 Step by step run through of recursive factorial... 2 Recursion vs. iteration (for and while loops)... 3 Helper functions:...

More information

(Refer Slide Time 6:48)

(Refer Slide Time 6:48) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 8 Karnaugh Map Minimization using Maxterms We have been taking about

More information

Future Technologies and Developments In Sonar Systems For Conventional Submarines

Future Technologies and Developments In Sonar Systems For Conventional Submarines Future Technologies and Developments In Sonar Systems For Conventional Submarines Cmde A Jai Singh (Retd), ATLAS ELEKTRONIK India 19 April 2016, FCCI - New Delhi a sound decision The ATLAS ELEKTRONIK Group/

More information

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems

Fuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems 13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using

More information

SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK.

SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK. SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on

More information

Use of n-vector for Radar Applications

Use of n-vector for Radar Applications Use of n-vector for Radar Applications Nina Ødegaard, Kenneth Gade Norwegian Defence Research Establishment Kjeller, NORWAY email: Nina.Odegaard@ffi.no Kenneth.Gade@ffi.no Abstract: This paper aims to

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS

DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50

More information

An Approach to Task Attribute Assignment for Uniprocessor Systems

An Approach to Task Attribute Assignment for Uniprocessor Systems An Approach to ttribute Assignment for Uniprocessor Systems I. Bate and A. Burns Real-Time Systems Research Group Department of Computer Science University of York York, United Kingdom e-mail: fijb,burnsg@cs.york.ac.uk

More information

What is a multi-model database and why use it?

What is a multi-model database and why use it? What is a multi-model database and why use it? An When it comes to choosing the right technology for a new project, ongoing development or a full system upgrade, it can often be challenging to define the

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

THE INFORMATION SYSTEM AS A SUPPORT OF THE EDUCATION PROCESS ON SCHOOL OF BUSINESS ADMINISTRATION OF SILESIAN UNIVERSITY IN KARVINA

THE INFORMATION SYSTEM AS A SUPPORT OF THE EDUCATION PROCESS ON SCHOOL OF BUSINESS ADMINISTRATION OF SILESIAN UNIVERSITY IN KARVINA THE INFORMATION SYSTEM AS A SUPPORT OF THE EDUCATION PROCESS ON SCHOOL OF BUSINESS ADMINISTRATION OF SILESIAN UNIVERSITY IN KARVINA VÁCLAV KRÓL Silesian University in Opava School of Business Administration

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

Telematics I. Chapter 1 A Quick Tour. Goals of this chapter Examples Direct connection between two devices Multiple devices Errors

Telematics I. Chapter 1 A Quick Tour. Goals of this chapter Examples Direct connection between two devices Multiple devices Errors Telematics I Chapter 1 A Quick Tour Goals of this chapter Examples Direct connection between two devices Multiple devices Errors (Acknowledgement: these slides have been edited from Prof. Karl s set of

More information

WYSIWON T The XML Authoring Myths

WYSIWON T The XML Authoring Myths WYSIWON T The XML Authoring Myths Tony Stevens Turn-Key Systems Abstract The advantages of XML for increasing the value of content and lowering production costs are well understood. However, many projects

More information

Chapter 2 Basic Principles of the Object-Oriented Paradigm 2.1 Abstraction

Chapter 2 Basic Principles of the Object-Oriented Paradigm 2.1 Abstraction Chapter 2 Basic Principles of the Object-Oriented Paradigm 2.1 Abstraction One of the most appreciated advantages of object-oriented versus other modern programming paradigms is the direct support for

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

Metrics for Feature-Aided Track Association

Metrics for Feature-Aided Track Association Metrics for eature-aided rack Association Chee-Yee Chong BAE Systems Los Altos, CA, U.S.A. chee.chong@baesystems.com Shozo Mori BAE Systems Los Altos, CA, U.S.A. shozo.mori@baesystems.com Abstract: rack

More information

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application.

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application. sg-midp20.book Page 1 Wednesday, May 14, 2003 1:27 PM CHAPTER1 Introduction MOBILE Information Device Profile (MIDP) defines the Java application environment for mobile information devices (MIDs), such

More information

A Sequential ESM Track Association Algorithm Based on the Use of Information Theoretic Criteria

A Sequential ESM Track Association Algorithm Based on the Use of Information Theoretic Criteria A Sequential ESM Track Association Algorithm Based on the Use of Information Theoretic Criteria Yifeng Zhou and Jim Mickeal Radar Electronic Warfare Section Defence R&D Canada - Ottawa 371 Carling Avenue,

More information

A New Parameterless Credal Method to Track-to-Track Assignment Problem

A New Parameterless Credal Method to Track-to-Track Assignment Problem A New Parameterless Credal Method to Track-to-Track Assignment Problem Samir Hachour, François Delmotte, and David Mercier Univ. Lille Nord de France, UArtois, EA 3926 LGI2A, Béthune, France Abstract.

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

Oceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd

Oceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd Oceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd He knows the course of the stars and can always orient himself. He knows the value of signs, both regular, accidental and abnormal,

More information

Data-driven Programming

Data-driven Programming Data-driven Programming By Johan Nel A series of articles explaining the principles Article 1: Concepts and theory November 2014 Table of contents 1. FRUIT FOR THOUGHT...1 2. DATA-DRIVEN PROGRAMMING...2

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

A Multi Agent System for MS Windows using Matlab-enabled Agents

A Multi Agent System for MS Windows using Matlab-enabled Agents A Multi Agent System for MS Windows using Matlab-enabled Agents Th.M. Hupkens a R.Thaens b a Royal Netherlands Naval College, Combat Systems Department, P.O. Box 10000, 1780 CA Den Helder, The Netherlands

More information

Passive Multi Target Tracking with GM-PHD Filter

Passive Multi Target Tracking with GM-PHD Filter Passive Multi Target Tracking with GM-PHD Filter Dann Laneuville DCNS SNS Division Toulon, France dann.laneuville@dcnsgroup.com Jérémie Houssineau DCNS SNS Division Toulon, France jeremie.houssineau@dcnsgroup.com

More information

Headline. Improving Development Time of Complex Microwave Test Adapters by Incorporating COTS Components OVERVIEW RELIABLE DATA FIRST TIME EVERY TIME

Headline. Improving Development Time of Complex Microwave Test Adapters by Incorporating COTS Components OVERVIEW RELIABLE DATA FIRST TIME EVERY TIME Improving Development Time of Complex Microwave Test Adapters by Incorporating COTS Components OVERVIEW Creating a unique test system design dedicated to a specific target test article can often be costly,

More information

COPYRIGHTED MATERIAL. An Introduction to Computers That Will Actually Help You in Life. Chapter 1. Memory: Not Exactly 0s and 1s. Memory Organization

COPYRIGHTED MATERIAL. An Introduction to Computers That Will Actually Help You in Life. Chapter 1. Memory: Not Exactly 0s and 1s. Memory Organization Chapter 1 An Introduction to Computers That Will Actually Help You in Life Memory: Not Exactly 0s and 1s Memory Organization A Very Simple Computer COPYRIGHTED MATERIAL 2 Chapter 1 An Introduction to Computers

More information

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India

Udaipur, Rajasthan, India. University, Udaipur, Rajasthan, India ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education

More information

Information Retrieval CSCI

Information Retrieval CSCI Information Retrieval CSCI 4141-6403 My name is Anwar Alhenshiri My email is: anwar@cs.dal.ca I prefer: aalhenshiri@gmail.com The course website is: http://web.cs.dal.ca/~anwar/ir/main.html 5/6/2012 1

More information

Model Evaluation. ACT-R, IMPRINT, and Matlab Comparisons, Parameter Optimizations, and Opportunities. Bengt Fornberg

Model Evaluation. ACT-R, IMPRINT, and Matlab Comparisons, Parameter Optimizations, and Opportunities. Bengt Fornberg Model Evaluation Slide 1 of 12 ACT-R, IMPRINT, and Matlab Comparisons, Parameter Optimizations, and Opportunities - 'Unified test problems' Keystroke entry task, and RADAR - RADAR Some modeling results

More information

User Assessment for Negotiating the Quality of Service for Streaming Media Applications

User Assessment for Negotiating the Quality of Service for Streaming Media Applications User Assessment for Negotiating the Quality of Service for Streaming Media Applications Adina Manoli Human Oriented Technology Lab, Department of Psychology, Carleton University, Ottawa, ON, K1S 5B6, Canada

More information

SIEM FOR BEGINNERS Everything You Wanted to Know About

SIEM FOR BEGINNERS Everything You Wanted to Know About SIEM FOR BEGINNERS Everything You Wanted to Know About Log Management But were Afraid to Ask www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on

More information

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of

More information

Section 3 - Backplane Architecture Backplane Designer s Guide

Section 3 - Backplane Architecture Backplane Designer s Guide Section 3 - Backplane Architecture Backplane Designer s Guide March 2002 Revised March 2002 The primary criteria for backplane design are low cost, high speed, and high reliability. To attain these often-conflicting

More information

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm K.Parimala, Assistant Professor, MCA Department, NMS.S.Vellaichamy Nadar College, Madurai, Dr.V.Palanisamy,

More information

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles. Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,

More information

Dynamic Service Definition in the future mixed Surveillance environment

Dynamic Service Definition in the future mixed Surveillance environment Dynamic Service Definition in the future mixed Surveillance environment Dr. Christos M. Rekkas Jean-Marc Duflot Pieter van der Kraan Surveillance Unit EUROCONTROL Rue de la Fusée 96, Brussels 1130, Belgium

More information

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection

Advanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,

More information

The Industrial Intranet: a Cause For Change

The Industrial Intranet: a Cause For Change The Industrial Intranet: a Cause For Change by S Graham, Schneider Automation Electricity + Control March 2000 Most plant data collection applications today use a batch approach, where data is transmitted

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Storage Area Networks SAN. Shane Healy

Storage Area Networks SAN. Shane Healy Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver

More information

Action TU1208 Civil Engineering Applications of Ground Penetrating Radar. SPOT-GPR: a freeware tool for target detection and localization in GPR data

Action TU1208 Civil Engineering Applications of Ground Penetrating Radar. SPOT-GPR: a freeware tool for target detection and localization in GPR data Action TU1208 Civil Engineering Applications of Ground Penetrating Radar Final Conference Warsaw, Poland 25-27 September 2017 SPOT-GPR: a freeware tool for target detection and localization in GPR data

More information

The Need for Speed: Understanding design factors that make multicore parallel simulations efficient

The Need for Speed: Understanding design factors that make multicore parallel simulations efficient The Need for Speed: Understanding design factors that make multicore parallel simulations efficient Shobana Sudhakar Design & Verification Technology Mentor Graphics Wilsonville, OR shobana_sudhakar@mentor.com

More information

Input/Output Management

Input/Output Management Chapter 11 Input/Output Management This could be the messiest aspect of an operating system. There are just too much stuff involved, it is difficult to develop a uniform and consistent theory to cover

More information

Lecture 30 Key Enables of Industrial IoT: Connectivity Part 3

Lecture 30 Key Enables of Industrial IoT: Connectivity Part 3 Introduction to Industry 40 and Industrial Internet of Things Prof Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 30 Key Enables of Industrial

More information

White Paper: VANTIQ Digital Twin Architecture

White Paper: VANTIQ Digital Twin Architecture Vantiq White Paper www.vantiq.com White Paper: VANTIQ Digital Twin Architecture By Paul Butterworth November 2017 TABLE OF CONTENTS Introduction... 3 Digital Twins... 3 Definition... 3 Examples... 5 Logical

More information

Designing the Right Ethernet Interconnect to Increase High-Speed Data Transmission in Military Aircraft. White Paper

Designing the Right Ethernet Interconnect to Increase High-Speed Data Transmission in Military Aircraft. White Paper Designing the Right Ethernet Interconnect to Increase High-Speed Data Transmission in Military Aircraft White Paper May 216 Abstract: Designing the right high-speed Interconnect that enables systems to

More information

DATA CENTRE & COLOCATION

DATA CENTRE & COLOCATION DATA CENTRE & COLOCATION RISING DEMAND FOR HOSTED SERVICES When it comes to hosted IT infrastructure, organisations are looking for highly resilient, highly available and highly scalable facilities at

More information

1: Introduction to Object (1)

1: Introduction to Object (1) 1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface

More information

Context Based Shared Understanding for Situation Awareness

Context Based Shared Understanding for Situation Awareness Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology

More information

(Refer Slide Time 3:31)

(Refer Slide Time 3:31) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions

More information

Three-Dimensional Multiple Layer Extended Target Modeling for Inverse Synthetic Aperture Radar Studies in Target Identification

Three-Dimensional Multiple Layer Extended Target Modeling for Inverse Synthetic Aperture Radar Studies in Target Identification Three-Dimensional Multiple Layer Extended Target Modeling for Inverse Synthetic Aperture Radar Studies in Target Identification Theodoros G. Kostis & Sokratis K. Katsikas Department of Information & Communication

More information

Use of Fibe-Channel Full Fabric and Storage Area Network Technology. Are you ready for the Challenge?

Use of Fibe-Channel Full Fabric and Storage Area Network Technology. Are you ready for the Challenge? Use of Fibe-Channel Full Fabric and Storage Area Network Technology. Are you ready for the Challenge? Ian D Norman, GRADINE Technical Director UK Ministry of Defence, Washington DC Rod Roderique, Principal

More information

TELEMETRY SYSTEMS OF THE FUTURE

TELEMETRY SYSTEMS OF THE FUTURE TELEMETRY SYSTEMS OF THE FUTURE Item Type text; Proceedings Authors Rauch, William D. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings Rights

More information

MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION ALGORITHM USING SIMULINK

MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION ALGORITHM USING SIMULINK MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION ALGORITHM USING SIMULINK Mahamuni P. D 1, R. P. Patil 2, H.S. Thakar 3 1 PG Student, E & TC Department, SKNCOE, Vadgaon Bk, Pune, India 2 Asst. Professor,

More information

The Parallel Software Design Process. Parallel Software Design

The Parallel Software Design Process. Parallel Software Design Parallel Software Design The Parallel Software Design Process Deborah Stacey, Chair Dept. of Comp. & Info Sci., University of Guelph dastacey@uoguelph.ca Why Parallel? Why NOT Parallel? Why Talk about

More information

ENERGY SCHEMING 1.0. G.Z. Brown, Tomoko Sekiguchi. Department of Architecture, University of Oregon Eugene, Oregon USA

ENERGY SCHEMING 1.0. G.Z. Brown, Tomoko Sekiguchi. Department of Architecture, University of Oregon Eugene, Oregon USA ENERGY SCHEMING 1.0 G.Z. Brown, Tomoko Sekiguchi Department of Architecture, University of Oregon Eugene, Oregon 97403 USA ABSTRACT This paper describes software for the Apple Macintosh microcomputer that

More information

5G radio access. ericsson White paper Uen June research and vision

5G radio access. ericsson White paper Uen June research and vision ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and

More information

Object Classification Using Tripod Operators

Object Classification Using Tripod Operators Object Classification Using Tripod Operators David Bonanno, Frank Pipitone, G. Charmaine Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley US Naval Research Laboratory, 4555 Overlook Ave.

More information

Instructor: Craig Duckett. Lecture 04: Thursday, April 5, Relationships

Instructor: Craig Duckett. Lecture 04: Thursday, April 5, Relationships Instructor: Craig Duckett Lecture 04: Thursday, April 5, 2018 Relationships 1 Assignment 1 is due NEXT LECTURE 5, Tuesday, April 10 th in StudentTracker by MIDNIGHT MID-TERM EXAM is LECTURE 10, Tuesday,

More information

High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 23 Hierarchical Memory Organization (Contd.) Hello

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.

More information

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM

More information

Implementation of Storing Data Algorithm for Tracking Targets using LABVIEW

Implementation of Storing Data Algorithm for Tracking Targets using LABVIEW Implementation of Storing Data Algorithm for Tracking Targets using LABVIEW Hazem Kamel Radar Department, Military Technical College Cairo, Egypt Abstract Human operators of any radar or aviation system

More information

CA Host-Based Intrusion Prevention System r8

CA Host-Based Intrusion Prevention System r8 PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION

More information

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING 1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous

More information

Unified Application Delivery

Unified Application Delivery The vision of a unified application delivery network gets more clear with F5 BIG-IP v10. White Paper by Lori MacVittie The Vision For every problem that arises out of the dust left behind as new technologies

More information

Concept as a Generalization of Class and Principles of the Concept-Oriented Programming

Concept as a Generalization of Class and Principles of the Concept-Oriented Programming Computer Science Journal of Moldova, vol.13, no.3(39), 2005 Concept as a Generalization of Class and Principles of the Concept-Oriented Programming Alexandr Savinov Abstract In the paper we describe a

More information

Design Principles : Fundamentals of Computer Networks Bill Nace

Design Principles : Fundamentals of Computer Networks Bill Nace Design Principles 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia No Paper Review for today

More information