Security Analysis of IMA Primary Processing System Based on DFTA

Size: px
Start display at page:

Download "Security Analysis of IMA Primary Processing System Based on DFTA"

Transcription

1 Internatonal Conference on Mechatroncs, Electronc, Industral and Control Engneerng (MEIC 2014) Analyss of IMA Based on DFTA Ygang Sun Hao L haol0508@163.com Zhen Zhao zhenzhao0523@gmal.com Zhyong Fan Avoncs Engneerng Faculty, Cvl Avaton, Chna Abstract In order to realze the archtectural benefts (ncreased system scalablty, decreased workload, and etc.), the securty of the IMA archtecture should be put on the frst poston. IMA archtectures utlze shared, confgurable computng, communcaton, and I/O resources. These archtectures do lots of benefts to the avoncs system ntegrators. By learnng from GENIS (a new style of synthess computng platform that comprses IMA and other computng platform, and provdes computng, communcaton and I/O resources for the tme-embedded system known as Hosted ), ths paper focuses on the composton, functon, structure and prncple of the prmary processng system of IMA platform, and enumerates one model about ts characters n component number, communcaton ways, and placed locatons. From the perspectve of ntegrty and avalablty, the securty of IMA archtecture s analyzed usng the Dynamc Fault Tree Analyss n ths paper. The analyss results provde gudance for mplementaton of Hosted n IMA prmary Keywords-; Archtecture; DFTA; processng system; IMA I. INTRODUCTION Integrated Modular Avoncs (IMA) archtectures are based upon a set of modular systems that share computng, communcaton, I/O resources, and etc. In order to conserve computng resources, power resources, and module for the collectve set of avoncs onboard, IMA archtectures ncreased levels of avoncs ntegraton. Thus, the use of ntersystem resources can be a new way n the world of systems ntegraton. An open systems archtecture known as GENIS (Generc Networked Element for Synthess of Integrated ) was mplemented on the Boeng 787 as the Common Core (CCS) [1]. The 787 CCS s one of the frst examples of an open system IMA archtecture that was put nto practce, ths IMA platform can ntally host about 70 applcatons for ndependent supplers, but s capable of hostng over 100 applcatons [2]. Snce a lot of avoncs functons are ntegrated together usng the shared platform resources, the use of ntersystem resources would be a new paradgm n the world of systems ntegraton. Then the complexty of the ntegraton process s ncreased due to the sharng of ntersystem resources. So the securty of IMA platform appears partcularly mportant. Prevous work has addressed modular certfcaton arguments [3], mechansms for compostonal reasonng and modular systems [4], besdes, automated selecton, szng, and mappng of IMA modules had dscussed n [5]. Ths paper has a detal descrpton about the composton and ntegraton of IMA prmary By analyzng the ntegrty and avalablty of IMA prmary processng system, ths paper provdes gudance for mplementaton of Hosted n IMA prmary II. PRIMARY PROCSING SYSTEM OF IMA PLATFORM A. Prncples of IMA IMA archtectures are dfferent from tradtonal federated archtectures for whch each system contans ts own dedcated processor, communcaton channels, and I/O resources. IMA archtectures provde a more effcent soluton by sharng resources and mnmzng resource waste. Multple systems can be archtected and overlad on the parttoned platform resources to form a hghly ntegrated system wth the unque characterstcs of full solaton and ndependence of each ndvdual system. Hosted s s referred to that avoncs systems hosted on an IMA platform. The shared resources must be allocated among the Hosted s wthn the IMA archtecture. For Hosted s, they can own unque sensors,, devces and non-platform LRUs that become part of the functonal system archtecture. Multple Hosted s share the platform resources wthn a logcal system envronment enforced by parttonng mechansms that are mplemented as part of the platform desgn. The logcal system parttonng envronment guarantees that Hosted functons are solated from each other. Fg 1 depcts a type of IMA system archtecture [6]. To mtgate the error propagaton, hgh The authors - Publshed by Atlants Press 534

2 ntegrty fault contanment mechansms should be mplemented and ensure that when a fault n one Hosted or platform component wll not ntate falures n all Hosted s. Redundancy mechansms are also requred to deal wth the error propagaton across multple Hosted s. Logcal Boundares Physcal Boundares Module 1 Infrastructure O/S Processor Communcatons Network I/O Module Fgure 1 parttons A B C A type of IMA system archtecture B. The prmary processng system Module 2 Infrastructure O/S Processor I/O Module As descrbed above, the prmary processng system of IMA platform can be obtaned. It s proposed to dealng wth relevant avoncs tasks and provdng servces for hosted functons. The system s comprsed of sngle or multple IMA cabnets, data transmsson networks and nterfaces. To ensurng that each system applcaton can share computng, network, I/O resources, the allocaton of these resources s predetermned. The prmary processng system of IMA platform can hold the functons of data processng, data transmsson, and data converson based on these shared resources. It s a real-tme dstrbuted computer system whch can manage a synthess processng on data, sgnal and mage. For the expectaton of beng generally used n any avoncs system, at the hardware aspect, IMA prmary processng systems should be desgned as standard modules and combned wth external non-commonly sensors frontend, and applcaton software va nterfaces, fnally mprove nteroperablty and lower the total costs of equpment lfespan[7]. In vew of the mentoned functons, the man components of the IMA prmary processng system can be concluded as GPM, AFDX and RDIU [8]. III. SYSTEM FUNCTION AND CORRPONDING COMPONENTS A. The functon of data processng and General Module (GPM) The data processng functon covers hardware as well as software requrements. It provdes resources for Hosted for the mplementaton of arcraft s Data processng functon can be realzed by resources (enough processng tme, memory and etc.) suppled for Hosted. GPM s system processng resource, whose man task s realzng the data processng It also provdes robust classfcaton for envronment and nfrastructure servces (e.g. I/O, health montorng, the storage and retreval of non-volatle fles based on the ARINC653 standard). Besdes, core software s hosted on t. The realtme operatng system based on ARINC653 s hosted on every GPM whch supples operatng control and resources management n tme-spatal dvson (workng tme dvson, space dvson) for GPM. s lke data processng, health management, data loadng, confguraton management and system recovery are hosted on GPM. The hardware used for GPM can realze fault passve protecton, there s no sngle falure can lead to an ncorrect acton, meanwhle, there s no stuaton that not detected fault leads to an ncorrect acton. GPM owes ts ndependent ntegrty and redundancy whch can meet the avalablty of Hosted. B. The functon of data transmsson and Avoncs Full Duplex Swtched Ethernet (AFDX) The system provdes resources for the data transmsson network whch makes a connecton between data processng resources and other arcraft subsystems based on the ARINC664-P7 standard. The data transmsson network s conssted of End (), Swtch () and AFDX. Each of the n the AFDX s connected wth two redundancy channels and each channel s desgned matched wth the, thus, t can mprove the avalablty of data transmsson. can manage the work status based on the transmsson and recevng of data stream n every logcal channel. Structure of the AFDX network s shown n Fg 2. AFDX network s the communcaton channel of IMA prmary Its structure s dsposed n dual star topology. As for each termnal node n topology structure there wll be a backup node, the two nodes wll connected n a pont-to-pont way wth two ndependent communcaton path (channel A and channel B). Controller Sensor Actuator Controller Sensor Actuator Subsystem Subsystem Arborne Computer Avoncs Internet AFDX Swtch Gateway Fgure 2 Structure of the AFDX network Research on optmal desgn of vrtual lnks n AFDX network was proposed n [9]. So long as the End s meet the requrement of avalablty, they could be separately connected to AFDX network va sngle swtch. Every network channel s desgned to contan all the falures probably taken placed between transmttng and recevng ports. The fault sealng property s realzed by usng complete algorthm that runnng n the End. These wll lead to hgher avalablty n redundancy channels and ensure ntegrty not affected by the network. C. The functon of data converson and Remote DataInterface Unte (RDIU) RDIU s used to complete data converson functon n IMA prmary Its man task s 535

3 provdng data nterfaces va AFDX data bus for seres of tradtonal sensors, and man processng resources. It works as a data-to-data gateway among AFDX network, analog devce, tradtonal ARINC 429 and lnear CAN subnet. RDIU accumulates data from data bus n every buffer area and mappng these data to specally apponted ARINC 664-P7 ports whch located n AFDX End. In order to ensure the separaton between functon sgnals of I/O and avod error propagaton between nterfaces, the parttonng method of I/O n RDIU s physcal separaton method. The structure of RDIU s conssted of two dfferent ntegrty areas, one s shared by all resources users and another s provded ndependently for dedcated users. The mportance of ths structure s to ensure that when falures exst n publc resources, the falures wll not lead to falures n dedcated resources or the functon that s usng the resources smultaneously. Output from each RDIU wll be forced n a safe state when falures or not vald commands exst n output nterface. A fault wll be marked when t s detected and data n transmttng packets n a network wll be regarded as nvald. D. composte structure For the sake of formng a specfed IMA prmary processng system and achevng mplementaton n physcal, the components can nstalled n vares of ways. These components can be assembled n the style of LRU, LRM or PCB, besdes, the LRM and PCB can be combned n the cabnet of IMA to share publc resources lke power and refrgeraton. As n Boeng 787 arcraft, ts CCS s a specfc physcal mplementaton of IMA system. Many GPM and AFDX network swtches are assembled n one cabnet. RDIU s made as RDC n CCS and other AFDX network swtches are made n the style of LRM [10]. The scale of the IMA prmary processng system s changed over the dfferent securty level of Hosted. Fg 3 descrbes one model structure of IMA prmary processng system [11]. Each resource n module can be ncreased or decreased based on the requrement of Hosted n a gven group. When the scale of these modules changed over tme, the system operaton and functon structure wll not be affected, as the resources allocaton whch lnked to functons reman unchanged and have no effect on exstng Hosted. Fgure 3 The left cabnet of IMA ACS-LA GPM-L1 ARS-1A ACS-LB Sgnal Resources (sensors) Hot Backup The rght cabnet of IMA ACS-RA ARS-1B GPM-R1 Sgnal Resources (sensors) Hot Backup ACS-RB One model structure of IMA prmary processng system In Fg 3, GPM and part of network swtches are placed separately n rght/left cabnets and components can be mutual backup f they are n same types. Network swtches are classfed nto two types: AFDX Cabnet Swtch (ACS) and AFDX Remote Swtch (ARS). AFDX s a full meshed network, every swtch connected to another. The data transmtted n channel A s the same as channel B, ntegrty testng and the elmnaton of nvald frames can operated n the then redundant frames can be elmnated by redundancy management. The resource module of IMA prmary processng system can be confgured. To make sure there wll be enough processng tme, memory capacty, I/O port and nterface resource, each Hosted acqures requred resources based on the safety level n the system. The dstrbuton of these resources modules are realzed by the specfc confguraton tables whch loaded to every system component. IV. ANALYSIS AND RULTS In order to ensure the securty of IMA prmary processng system, falure state should be put n the frst place. By usng the Hazard Assessment (FHA), falure state that caused by the potental hazard when system n falure or workng state can be dentfed whlst classfcaton on system falure state should be executed to match wth the level that system expected to be. The FHA results are separately showed n Table I and Table II Table I s about the system avalablty and Table II the system ntegrty. TABLE I THE FHA RULTS ABOUT AVAILABILITY Provdng General Resources for Arcraft RELATED TO IMA SYSTEM State ablty for a crtcal crtcal crtcal Lost the ablty to restart a crtcal Hosted. functon to a hgh necessty hgh necessty hgh necessty Lost the confguraton management functon of system. ablty for a low necessty low necessty low necessty Level s lsted n Table I and Table II are matched wth the functon realzed by IMA prmary processng system, nclude data processng, data transmsson, data converson, and etc. Generally, undetected error data or acton belongs to the doman of system ntegrty whle lost ablty or resource belongs to the doman of system 536

4 avalablty. Only when the requrement of ntegrty and avalablty are fully met can system acheve the requred securty level. TABLE II THE FHA RULTS ABOUT INTEGRITY Provdng General Resources for Arcraft RELATED TO IMA SYSTEM State Undetected error transmsson n network data. nterface resource to a crtcal Undetected error data processng n a processng component. Undetected error behavor n IMA health management Undetected error behavor n data loadng Undetected fault n system confguraton management nterface resource to a hgh necessty nterface resource to a low necessty Level l The classfcaton of securty level n falure state has a drect connecton to the mportance of Hosted, for example, the securty level of falure state s catastrophc so as to the corresponded Hosted. TABLE III RELATIONSHIP BETWEEN SECURITY LEVEL AND THE MAXIMUM PROBABILITY Hazard The Maxmum allowable Class probablty( per Flght Hour) Level Ⅰ 9 Hazard Ⅱ 7 Ⅲ 5 Secondary Ⅳ 3 The correspondng relatonshp between securty level and the maxmum probablty s showed n Table III. A. Fault tree modelng Because of the dynamc characterstcs of IMA prmary processng system, dynamc logcal gates are adopted to establsh the dynamc fault tree wth the help of conventonal method. Combned wth possble falure states, the fault tree model of the ntegrty and the avalablty can be establshed. The dynamc fault tree analyss model s shown as Fg 4 and Fg 5. Fg 4 s ntegrty DFTA model, Fg 5 s avalablty DFTA model. s stand for Undetected Erroneous Data. Loss of ntegrty E1:ARS 1A G1:ARS Falure E2:ARS 1B E3:ACS LA G4:ACS L Fgure 5 E4:ACS LB E5:CCR L G3:CCR L G2:CCR E6:GPM L1 B. Analyss based on DFTA R:Loss of avalablty E7:ACS RA G5:CCR R G6:ACS R E8:ACS RB E9:CCR R avalablty DFTA model E11:RDIU- 1 E10:GPM R1 G7:RDIU Falure E12: Modularzaton s an effectve way to deal wth DFTA. By decomposng the Dynamc Fault Tree nto many ndependent modules, then, numercal combnaton or BDD can be used to analyze statc module and Markov Model used to analyze dynamc module. There the DFTA model n Fg 5 s used to show the process of analyss. Modular decomposton: accordng to the characters of DFTA, a search method based on lnear DFLM s used to modular decomposton. Conductng DFLM search n fault tree module, the result s as TABLE IV. TABLE IV DFLM RULT Event R1 G1 G2 G3 G4 G5 G6 G7 #1 #2 Last Mn Max Mod Yes Yes Yes Yes Yes Yes Yes Yes Statc/Dynamc Dynamc Dynamc Dynamc Statc Statc Statc Statc Dynamc Results can be got form TABLE IV that the statc modules nclude G3, G4, G5 and G6; dynamc modules nclude R, G1, G2 and G7. Statc modules analyss: BDD analyss method s used to analyze statc modules: G3, G4 converted G3, G4 nto BDD chart as Fg 6. E3 E4 G3 BBD E6 E5 E3 G4 BBD E4 GPM GPM OR The probablty of GPM usng one of the GPM s 0.5 GPM L1 GPM L1 GPM L2 GPM L2 Fgure 4 ntegrty DFTA model 0 1 Fgure 6 BDD chart From the BDD chart, the cut-sets of G3 can be descrbed as {E3}, {E4}, {E5} and {E6}. The probablty of top event n G3 can be calculated as: P(G 3) 1 P( E 3) P( E 4) P( E 5) P( E 6) (1)

5 P( G 4) 1 P( E 3) P( E 4) (2) Dynamc Modules Analyss: Markov state-transton method s used to analyze dynamc modules. G1, G2 and G7 contan logc gate n ther structures and the number of backup s one, the corresponded Markov statetranston fgure s as Fg t 1 t 1 t t t Fgure 7 Markov state-transton dagram The prmary component n logc gate has the same falure rate as backup n and the probablty of dynamc module s: PG e e 2 t t (t) 1 2 (3) : the falure rate of the module under the logc gate. Comprehensve Analyss: R can be regarded as an ndependent sub-tree whch takes ndependent sub-tree G1, G2 and G7 as bottom events. Then R can be treated as statc module and converted used BDD method. Then the probablty of R s: P(R) P(G 1) P(G 2) P(G 7) (4) Calculaton: wth the probablty of bottom events provde as TABLE V. TABLE V PROBABILITY OF BOTTOM EVENTS Bottom event Probablty(per hour) Undetected error data n GPM 10 Undetected error data n the of GPM 10 Undetected error data n RDIU 6 Undetected error data n the of RDIU 6 ACS falure Cabnet falure 7 GPM falure ARS falure RDIU falure 5 The probablty of losng ntegrty and avalablty can be ganed as TABLE VI shows. TABLE VI CALCULATION RULTS Loss ntegrty Loss avalablty Level Sut to the degree of Hosted Low necessty Compared the results n TABLE VI wth the securty levels n TABLE III, t s clear that whch structure s sut to the securty level of Hosted and ths wll do benefts to the mplementaton of Hosted n IMA prmary For example, the structure showed n ths paper reaches the prmary securty level and t s appled to low necessty Hosted. V. CONCLUSION Ths paper has a deep study n IMA archtecture especally the prmary processng system of t. A clear structure and composton s showed. From the perspectve of ntegrty and avalablty analyzed by DFTA, ths paper analyses the securty of IMA prmary processng system, the results can be beneft to the mplementaton of Hosted n IMA prmary However, there are stll lots of work should be done to expand the deeper study n the securty of IMA archtecture. One typcal model of IMA prmary processng system was enumerated n ths paper, but t s not necessarly sutable for all avoncs systems. The model should be changed wth the system structure and the revsed system should be re-analyzed. In addton, because of the restorablty of system components and the software securty level were dscounted, the securty analyss s lmted n IMA prmary ACKNOWLEDGMENT Ths work was supported by the project 973 (Grant No. 2014CB744904), the Natonal Scence Foundaton of Chna (Grant No ), the Cvl Avaton Unversty of Chna (CAUC) Research Enablng Foundaton (Grant No. 2012QD22X). REFERENC [1] Chrstopher B Watkns, Smths Aerospace LLC, Grand Rapds. Integrated modular avoncs: Managng the allocaton of shared ntersystem resources [J]. 25 th Dgtal Avoncs Conference, October 15, [2] Jensen, Davd, 1 November 2005, B787 Cockpt: Boeng s Bold Move, Avaton Today. [3] Rushby, John, December 2002, Modular Certfcaton, NASA Contractor Report, CR , NASA Langley Research Center. [4] Namjosh, Kedar S., Rchard J. Trefler, July2000, On the Completeness of Compostonal Reasonng, Computer-Aded Verfcaton, CAV 2000 Vol of Lecture Notes n Computer Scence, Chcago, IL, Sprnger-Verlag, pp [5] Björn Annghöfer, Ernst Kleemann, Frank Thelecke. Automated Selecton,Szng,and Mappng of Integrated Modular Avoncs Modules [J]. 32nd Dgtal Avoncs s Conference October 6-10, 2013, pages 2E2-1 2E2-14. [6] Chrstopher B Watkns, Smths Aerospace LLC, Grand Rapds. Modular Verfcaton: Testng a Subset of Integrated Modular Avoncs n Isolaton [J]. 25 th Dgtal Avoncs Conference, October 15, [7] Zhengqu Xe, Mngwang Wu. Analyss of Arborne Equpment and Its Key Technologes on Large Arcraft [J]. Aeronautcal Manufacturng Technology, 2009(2): [8] Cary R.Sptzer. Dgtal Avoncs Handbook: Avoncs Development and Implementaton [M].Bejng: Avaton Industry Press, [9] Al Shekh, Ahmad, Olver Brun, Maxme Chéramy, and Perre- Emmanuel Hladk, Optmal Desgn of Vrtual Lnks n AFDX networks. Real-Tme s, pages [10] Xaozhe Sun, Song Han, Zongj Chen. Research on avoncs system of and vrtual prototype technology of cvl arcraft [C]. Shangha: Chnese Socety of Aeronautcs and Astronautcs, [11] Hongyan Zheng. Dynamc Fault Tree Analyss for the IMA Core of Cvl Arcraft [D].Nanjng: Nanjng Unversty of Aeronautcs and Astronautcs, 2013:

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

Design and Realization of Open CNC System Based on Software Motion Controller

Design and Realization of Open CNC System Based on Software Motion Controller Internatonal Forum on Management, Educaton and Informaton Technology Applcaton (IFMEITA 2016) Desgn and Realzaton of Open CNC System Based on Software Moton Controller Xu Ran1, a, Janqun Lu2, b, Weqang

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Application of Clustering Algorithm in Big Data Sample Set Optimization

Application of Clustering Algorithm in Big Data Sample Set Optimization Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton

More information

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG*

TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS. W. HU*, A. G. STARR* and A. Y. T. LEUNG* TWO DIAGNOSTIC MODELS FOR PLC CONTROLLED FLEXIBLE MANUFACTURING SYSTEMS W. HU*, A. G. STARR* and A. Y. T. LEUNG* * Manchester School of Engneerng, The Unversty of Manchester, Manchester M13 9PL, UK To

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Session 5.3. Switching/Routing and Transmission planning

Session 5.3. Switching/Routing and Transmission planning ITU Regonal Semnar Belgrade Serba and Montenegro 20-24 24 June 2005 Sesson 5.3 Swtchng/Routng and Transmsson plannng volvng nfrastructures to NGN and related Plannng Strateges and Tools I.S. Sesson 5.3-1

More information

A new segmentation algorithm for medical volume image based on K-means clustering

A new segmentation algorithm for medical volume image based on K-means clustering Avalable onlne www.jocpr.com Journal of Chemcal and harmaceutcal Research, 2013, 5(12):113-117 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCRC5 A new segmentaton algorthm for medcal volume mage based

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

DAQ-Middleware: Data Acquisition Middleware based on Internet of Things

DAQ-Middleware: Data Acquisition Middleware based on Internet of Things DAQ-Mddleware: Data Acquston Mddleware based on Internet of Thngs Zhjn Qu, Zhongwen Guo, Shua Guo, Yngjan Lu and Yu Wang Ocean Unversty of Chna, Qngdao, Shandong, Chna Unversty of North Carolna at Charlotte,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management.

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management. //7 Prnceton Unversty Computer Scence 7: Introducton to Programmng Systems Goals of ths Lecture Storage Management Help you learn about: Localty and cachng Typcal storage herarchy Vrtual memory How the

More information

Advances in Engineering Research, volume 104 7th International Conference on Mechatronics, Control and Materials (ICMCM 2016)

Advances in Engineering Research, volume 104 7th International Conference on Mechatronics, Control and Materials (ICMCM 2016) 7th Internatonal Conference on Mechatroncs, Control and Materals (ICMCM 6) ynamcs Modelng and valuaton of etermnstc ynamcs n Advanced Avoncs Networks Guoquan Zhang,Qfeng Ren,b,Qmng Yang,Jandong Zhang,a,Yan

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark Parallelzaton of a Seres of Extreme Machne Algorthms Based on Spark Tantan Lu, Zhy Fang, Chen Zhao, Yngmn Zhou College of Computer Scence and Technology Jln Unversty, JLU Changchun, Chna e-mal: lutt1992x@sna.com

More information

FPGA-based implementation of circular interpolation

FPGA-based implementation of circular interpolation Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 04, 6(7):585-593 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 FPGA-based mplementaton of crcular nterpolaton Mngyu Gao,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Multigranular Simulation of Heterogeneous Embedded Systems

Multigranular Simulation of Heterogeneous Embedded Systems Multgranular Smulaton of Heterogeneous Embedded Systems Adtya Agrawal Insttute for Software Integrated Systems Vanderblt Unversty Nashvlle, TN - 37235 1 615 343 7567 adtya.agrawal@vanderblt.edu Akos Ledecz

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

General Description. Description

General Description. Description June 0 Sheet 0 Metal-Enclosed Swtchgear MVS Medum Voltage Load Interrupter Fusble Swtch General Descrpton.0- Motor Operated MVS Swtches Applcaton Eaton s Cutler-Hammer MVS Pow-R- Drve motor operator makes

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

If you miss a key. Chapter 6: Demand Paging Source:

If you miss a key. Chapter 6: Demand Paging Source: ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Design of intelligent sensor based on BP neural network and ZigBee wireless sensor network

Design of intelligent sensor based on BP neural network and ZigBee wireless sensor network Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 204, 6(6):820-826 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Desgn of ntellgent sensor based on BP neural network and

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Energy-Efficient Workload Placement in Enterprise Datacenters

Energy-Efficient Workload Placement in Enterprise Datacenters COVER FEATURE CLOUD COMPUTING Energy-Effcent Workload Placement n Enterprse Datacenters Quan Zhang and Wesong Sh, Wayne State Unversty Power loss from an unnterruptble power supply can account for 15 percent

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information