Wormhole Detection and Prevention in MANETs

Size: px
Start display at page:

Download "Wormhole Detection and Prevention in MANETs"

Transcription

1 Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India Sheena Kuian K Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India Abstact Mobile nodes ae esponsible fo oute establishment in MANET using wieless link. MANET is an open entusted envionment so it encountes a numbe of secuity theats with little secuity aangement. Womhole is consideed to be a vey seious secuity theat among othes in MANET. In womhole, a tunnel is made between two selfish nodes which ae geogaphically vey fa away to each othe, in ode to hide thei actual location and ty to believe that they ae tue neighbous and makes convesation though the womhole tunnel. Reseaches ae going on to detect and pevent Womhole attack in efficient manne. Thee ae diffeent techniques to detect and pevent Womhole attack in MANETs, but some of them cause outing ovehead and delays. A model that encapsulate neighbo node and hop count method is consideed in this pape fo the Womhole detection and pevention. Keywods: AODV, MANET, Theshold, Womholes. INTRODUCTION MANET(Mobile Ad-hoc Netwoks) oiginates fom the need of mobile devices communication in wieless without fixed infastuctue pot. Mobile devices have to be the ole of outes to communicate each othe, which maintain outing infomation and fowad packets towad destination. Uneliable wieless media used fo communication between hosts, constantly changing netwok topologies and membeships, lifetime, limited bandwidth, computation powe of nodes etc. ae some special chaacteistic featues of MANETs. Fo the flexibility of MANETs these chaacteistics ae essential, and they intoduce specific secuity concens that ae absent o less sevee in wied netwoks. Wieless netwoks ae geneally implemented with some type of emote infomation tansmission system that uses electomagnetic waves, such as adio waves; fo the caie and this implementation usually takes place at the physical level o "laye" of the netwok. Mobile Adhoc netwok [2] [9] is a pat of wieless netwok which is a self-configuing netwok that is fomed automatically by a set of mobile nodes without the help of a fixed infastuctue o centalized management. To impove the secuity of an ad- hoc netwok Intusion pevention measues such as stong authentication and edundant tansmission can be used. The pevention techniques should be complemented by detection techniques, which monito secuity status of the netwok and identify malicious behavio; this is the equiement of the dynamic natue of ad-hoc netwoks. The secuity poblems ae not seiously consideed, even though thee exists many outing potocols. The attack behavio such as data stolen, modification, and dopping ae done by the malicious nodes when they become the immediate nodes of outing paths. These attack behavio intefee o deny communication between mobile nodes by wasting unnecessay bandwidth esouce. Netwoks may be boken and even cashed in wost cases. So it is vey impotant to potect MANET fom malicious attacks. One such dangeous malicious attack is the Womhole Attack. In a womhole attack, two attacke nodes join togethe. One attacke node eceives packets at one point and tunnels" them to anothe attacke node via a pivate netwok connection, and then eplays them into the netwok. The womhole puts the attacke nodes in a vey poweful position compaed to othe nodes in the netwok. In the eactive outing potocols such as AODV (Ad-hoc On Demanding Vecto) [4] [5], the attackes can tunnel each oute equest packets to anothe attacke that is nea to destination node. When the neighbous of the destination hea this RREQ (Route Request), they will eboadcast this RREQ and then discad all othe eceived RREQs in the same oute discovey pocess. As mention above womhole attack have a best impact on the netwok, it will attact a lage amount of netwok taffic which is done by giving a shotest oute to destination in the netwok. Theefoe, the outes going though the womhole must be shote than altenate outes though valid netwok nodes. Fig1: Womhole Woking Hee Fig 1 [3] shows an example of womhole attack ie, a netwok unde a womhole attack. Intudes A and B ae connected by an off-channel link (i.e. wied o satellite link), which they use to tunnel netwok data fom one end of the netwok to the othe. Without a womhole, nodes 7 and 3 ae 4

2 hops apat, thei messages to each othe should go though nodes 2, 6, and 5. When intudes A and B activate a womhole, nodes 7 and 3 ae able to diectly ovehea each othe s messages, and ae lead to believe they ae immediate neighbos. Once this happens, all futhe communications between nodes 3 and 7 will be going though the womhole link intoduced by A and B. The entie wok of the pape is oganized as follows. The motivation fo this wok is descibed in next section. Afte that system envionment is discussed then in next section system evaluation is given and in final section, some concluding emaks ae explained. MOTIVATION Kushwaha et al [12] poposes a simple technique to effectively detect womhole attacks. Special hadwae and/o stict location o synchonization equiements ae not needed thee. The poposed technique makes use of vaiance in outing infomation between neighbous to detect womholes. Finding an altenative path fom souce to second hop and calculating the numbe of hops to detect the womhole is the base of dissetation. Discoveing altenative outes to a taget node T that is one-hop neighbo s nodes that do not go though the womhole is the basic idea of the poposed technique. The length of the altenative path will be geate than the path that have womhole, and othewise the womhole will not attact lage amounts of taffic in this method. The detection of womhole depends on the density of nodes in the netwok, so the theshold value is calculated by checking the aveage numbe of hops between the nodes in the netwok. The poposed appoach attempts to find the numbe of hops on the second shotest oute between two altenate nodes stating fom the souce. Womhole can pesent between the two nodes if numbe of hops in the second shotest path is geate than the pedefined theshold. The detection technique depends on the netwok density. Theshold also depends on the netwok density. Hop count is compaed with the theshold in the poposed technique. A highe value of false negative ate (means it give tue altenative oute as a false oute) will be povided if the theshold value is small than the hop count else it will give false positive ate (means it give highe altenative oute as a tue oute). When the value of theshold inceases the detection atio of womhole shows good esult. Actual esult is fully depended on theshold value. When the numbe of nodes inceases the value of contol packet also inceases. The obsevations shows that the detection technique woks efficiently but having some ovehead when contol packet inceases, but the benefit of this technique is that it detects the womhole, and will seve as an advantage when added to the existing AODV potocol. Mahajan et al [13] gives a paticula fom of the womhole attack called the self-contained in-band womhole attack. In an out-of-band womhole, the collude nodes establish a diect link between the two end-points of the womhole tunnel in the netwok. A wied link o a long-ange wieless tansmission is used to establish this link. The womhole attacke then eceives packets at one end and diects the packets to be fowaded to the othe end though the established link. The attacke can thus analyze and tampe a lage amount of taffic though this link. An in-band womhole does not use an extenal communication medium to develop the link between the colluding nodes. Instead it develops a covet ovelay tunnel ove the existing wieless medium. It can be a pefeed choice of attackes and can be potentially moe hamful as it does not equie any additional hadwae infastuctue and consumes existing communication medium capacity fo outing the tunneled taffic. An illusion of being neighbos is ceated by in-band womholes, by sending false outing advetisements of a 1-hop symmetic link between the two nodes without the actual exchange of HELLO messages. This false link infomation is popagated to othe nodes acoss the netwok via a boadcast of OLSR Topology Contol (TC) messages. This false link infomation thus undemines the shotest path outing calculations attacting many end-to end flows by advetising incoect shotest paths. With the help of a thid collude node the attacted taffic is then fowaded though a tunnel. This collude node acts as an applicationlaye elay fo womhole taffic between the womholes endpoints. Extended in-band womhole and self-contained inband womhole ae the two foms of in-band womholes. An extended womhole ceates a womhole that extends beyond the attackes foming the tunnel endpoints. A false link is advetised between two nodes that ae not the attacke nodes. On the othe hand a potentially stealthie self-contained womhole, advetises a false link between the attacke nodes themselves. The effectiveness of a womhole attack is based on the amount of taffic that can be attacted by a womhole. The lage the amount of attacted taffic, stonge can be the womhole attack on the netwok taffic. The stength of a womhole attack can be defined as the numbe of end-to-end paths attacted by the false link advetisement sent by the attackes. In othe wods, the stength of a womhole is the numbe of end-to-end paths passing though the womhole tunnel. The ability of the womhole to pesist without significant decease in the stength even in the pesence of mino topology changes in the netwok is efeed to as obustness of a womhole. The esilience of the womhole to small changes of topology is based on the amount of attaction offeed by the womhole. Small impovements in nomal paths can esult in nodes choosing altenative paths that do not pass though the womhole link when the attaction is small, thus deceasing the stength of the womhole. The decease in the path length offeed by the womhole is efeed to as attaction. To mitigate the womhole attack [8] [10] [11] in mobile Adhoc netwok, cluste based technique is poposed. Clustes ae fomed to detect the womhole attack. The whole netwok is divided into clustes ovelapped o disjoint. Membe nodes of cluste pass the infomation to the cluste head and cluste head is elected dynamically. This cluste heads maintains the 2

3 outing infomation and sends aggegated infomation to all membes within cluste. Thee is a node at the intesection of two clustes named as guad node. The guad node has equipped with powe to monito the activity of any node and guad the cluste fom possible attack. The netwok is also divided into oute laye and inne laye. Oute laye cluste head is having the esponsibility of infoming all nodes of the inne laye about the pesence of the malicious node. SYSTEM ENVIRONMENT The system envionment includes, Basic MANET AODV Envionment Ceation using simulation in Java [14]. Womhole Attack Model Ceation Detection of Womhole using Womhole detection Algoithm and Theshold Calculation Algoithm. Pefomance Analysis and Detection of Womhole using time synchonization fo educing Routing Ovehead. Basic MANET AODV Envionment Ceation in Java Simulato includes Nodes ceation, Movement of nodes, Routing of nodes using AODV. Adhoc on demanding vecto (AODV) [7] is one of popula outing potocol. It can be applied in high mobility devices, in which the netwok topology changes fequently. Routing path fo communication may get disupted due to mobility of nodes. When data communication is needed, fistly the mobile nodes have to discove and setup a outing path. In such case, malicious nodes have diffeent oppotunities to join the pocess of setting up a outing path. So that, moe attention should be paid to secuity poblems. Womhole attack ecods packets at one end-point in the netwok and tunnels them to othe endpoint. These attacks ae sevee theats to MANET outing potocols. Fo example, when a womhole attack is used against an on-demand outing potocol such as AODV/ DSR, the attack could pevent the discovey of any outes othe than though the womhole. Womhole attacks put sevee theats to MANETs. This attack is vey much dangeous because it can also still be pefomed even if the netwok communication povides authentication and confidentiality. Womhole attack can also affect the netwok even if the attacke has no cyptogaphic keys. The womhole attack is especially hamful against many ad-hoc outing potocols [6] [7] fo example, Adhoc on-demand distance vecto (AODV), dynamic souce outing (DSR), the hop count of a path effects the choice of outes, cluste head gateway switch outing potocol (CGSR), hieachical state outing potocol (HSR) and adaptive outing using clustes (ARC). The womhole attack is able to confuse the clusteing pocedue and lead to a wong topology and it can patition the netwok though contol links between two cluste heads of the outing hieachy. The womhole attack is dangeous against the secuity in MANETs in which the nodes that hea a packet tansmission diectly fom some node conside themselves to be in ange of that node. It is one of the most the poweful attacks that ae faced by many Adhoc netwok outing potocols. The womhole attack does not equie exploiting the featue of nodes in the netwok and it can intefee while executing the outing pocess. Attacke uses these attacks to gain unauthoized access to compomise systems o pefom denial-of-sevice (DoS) attacks. Womhole attacks ae vey difficult to detect, because pass infomation path it used is often not a pat of the actual netwok, and it is paticulaly dangeous, because they can damage without knowing the netwok potocols and sevices povided unde cetain situation. Womhole could be a useful netwoking sevice as this simply pesents a long netwok link to the link laye and up, the attacke may use this link to its advantage. Afte the attacke attacts a lot of data taffic though the womhole, it can disupt the data flow by selectively dopping o modifying data packets, geneating unnecessay outing activities by tuning off the womhole link peiodically. The attacke can also simply ecod the taffic fo late analysis. Using womholes an attacke can also beak any potocol that diectly o indiectly elies on geogaphic poximity. Fo example, taget tacking applications in senso netwoks can be easily confused in the pesence of womholes. In this methodology evey node is esponsible to find out whethe thee is any wom hole between those nodes to it s next to successo node. Fo detection evey node find altenate oute fo it s next to successo node as suggested by AODV, if numbe of hop count in any of altenate oute is geate than theshold then that node eply womhole detection signal between itself and it s next to successo node. Algoithm fo womhole detection is descibed below in algoithm 1. Exisitng Algoithm fo Womhole Detection Algoithm 1 (S i,t i+2 ) Step 1 if (S i = D-1) Then no womhole in whole path P SD Else go to step 2 Step 2 S i boadcast HELLO message to all neighbo Node(NS) except P i+1 S,D. Step 3 All NS eply to S i egading to HELLO message. Step 4 Evey NS find a oute to T i+2 (NS, T) = l NS,T step5 and eply in tem of hops to souce s i. NS (NS,T) Whee (P i NS,T) = S whee i = 1,2,3, Then discad l NS,T Step6 souce (S) select minimum l NS,T among all l NS,T Step7 If(minimum l NS,T <= T) Then i=i+1 Goto step 1 Else Exit womhole 3

4 Pocess fo evaluating the value of theshold is based on a model that encompasses both hop count and neighbou node algoithm. In this appoach value of theshold is calculated on the basis of hop count methodology with the help of neighbou node infomation. Fo calculating theshold each and evey node of netwok find the path having the lagest numbe of node ove the entie possible path between it and it s next to successo node and conside aveage value highest hop count of the entie node as theshold ove the netwok as descibe in algoithm 2 [1]. Algoithm 2 (Theshold of Netwok) { Assumption 1. N total numbe of node in netwok 2. HP numbe of Hop count in any oute initialed with HP=0 3. SHP sum of maximum hop count fo all pai of node in netwok Fo (I=1; J<=N ; I++) { Fo (J=1; J<=X ; J++) { Step 1. Si send an oute equest message to all its neighbo node fo its next to successo node NNjSi Step 2. All the neighbo node eply the Route though oute Reply packet to Si in tem of numbe of hop count Y Step 3. if (Y>HP) HP=Y } SHP= SHP+ HP } Theshold = SHP/N } In ode to identify the womhole link the existing algoithm needs outing in each step of data tansmission. That is at fist a oute is identified using nomal method and data sending is initialized though that oute. Then befoe each hop the algoithm equie a outing to the next to next hop. This involves all the steps of outing such as equest boadcast and eply eception. Afte a numbe of eplies, outes ae obtained, the node matches the longest eply oute length to theshold and if found geate it identifies as womhole link. ISSN In poposed wok the pime concen is to avoid this additional In this algoithm all decision will take on the basis of value of outing equiement and in tun educe the time taken fo each theshold ie,minimum numbe of node in altenate oute message to tansmit and avoid the huge ovehead caused by between evey pai of node to next to successo node with the the outings in each step of tansmission. An effective and path discove by AODV is geate than o not. If it s geate entiely new algoithm is implemented which is based on the than theshold, then it s declaed thee is womhole between fact that the womhole link is consideably lengthie than its next node and next to successo node, elsewhee not. nomal links and womhole data pocessing is diffeent fom nomal nodes with espect to the time it consumes. Time synchonization is done to all the nodes in the system which can be easily done in MANET envionment by the available times. With time sync all nodes now has the ability to tack the tavelling time of each packets which contains the time which it has been oiginally tansmitted. When a oute eply eaches the souce, the souce will calculate the time taken fo the packet to aive by simply subtacting the tansmitted time fom cuent time. Fom this pe-hop delay is calculated fom the equation total tavelling time by no: of hops. (If the packet is taveled though 5 nodes in 5secs each link took 5/5=1s ie, Pe-hop delay). This pe-hop delay will be appoximately same fo all genuine links. When the oute includes a womhole link the pe-hop delay vaies significantly. That is how the womhole link is identified. Theshold is the nomal maximum pe-hop delay calculated fom the oute. Delay is diectly popotional to the tavelling distance. When distance inceases delay also inceases. Maximum delay can thus calculated using the effective ange of nodes. A successful genuine link will have a maximum distance equal to the ange of paticipating nodes. But fo a womhole this will be significantly lage. The algoithm fo both theshold calculation and womhole detection used in poposed method is given below. Poposed Algoithm fo Theshold Calculation Step 1: Identify send time fom eceived RREP (Route Reply). Step 2: Identify cuent time fom system clock. Step 3: Fo each oute calculate the delay using the fomula Route Delay = Received Time - Send Time Step 4: Identify hop count fo each oute. Step 5: Find Individual pe hop theshold using the fomula Theshold = delay/hop count Step 6: Calculate the oveall theshold using the fomula : Oveall Theshold = Poposed Algoithm fo Womhole Detection Step 1: Select Route to send data as pe Routing Algoithm. Step 2: Fo each hop in the Route. Identify pe hop delay. Step 3: If (pe hop delay >theshold) Then beak as womhole detected Else Successful Message sending. 4

5 SYSTEM EVALUATION Table 2: Delay Compaison A system evaluation pocess based on both existing and No: of No: of Existing Poposed poposed algoithm is descibed hee. The envionment Nodes Womholes Avg. Delay Avg. Delay paametes used in Java Simulato is shown in Table 1. (ms) (ms) Table 1: System Paamete s used. Routing Potocol AODV Expeiment Aea (x-axis, y-axis) Mobile Nodes Deployment 650m*650m Random Numbe of Nodes 5 ~ 60 Numbe of Womholes 2 ~ 5 Node Speed(m/s) 10 ~ 50 Type of Data Communication Constant Bit Rate (CBR) Mbps MAC Laye Potocol b The paametes used fo the evaluation is Delay, Routing Ovehead and Enegy. A delay gaph compaison[15] fo both existing and poposed wok is made against the numbe of nodes pesent in the netwok. When numbe of nodes and numbe of malicious node incease in the netwok, coesponding changes also will happen in delay, outing ovehead and enegy. But the delay, outing ovehead and enegy used will be consideably less fo the poposed wok. Routing ovehead efes to the no. of exta packets equied to successfully tansmit the data apat fom the outing netwok packets. The existing needs exta outing packets send in each step of the data tansmission. This eflects in a high Routing ovehead. Meanwhile poposed system needs mino modification in the existing packets and exta time synchonizing. This esult in vey little exta bits so ovehead is consideably lowe in poposed wok. This esult eflects in the gaph obtained. Each packet equies some enegy to tansmit. So total enegy used by the system is diectly popotional to the no. of packets send including both netwok packets and secuity packets. Existing system shoots a consideable amount of secuity packets and use up a lot of enegy. In poposed it is shown that it uses fewe packets to delive the data. So enegy is educed. Oveall enegy use also depends on no of nodes in system No: of Nodes Table 3: Routing Ovehead Compaison No: of Womholes Existing Avg. Routing Ovehead (pkts) Poposed Avg. Routing Ovehead (pkts) No: of Nodes Table 4: Enegy Compaison No: of Existing Womholes Avg. Enegy (ma) Poposed Avg. Enegy (ma) Fig 2, Fig 3, Fig 4 shows a Compaison gaph in which the aveage delay, aveage outing ovehead and aveage enegy is compaed with the numbe of nodes espectively in both existing and poposed wok and it is based on the paamete value compaison in Table II, Table III and Table IV. Fig 2: Delay Compaison Gaph

6 efficiency by educing oute delay, outing ovehead and enegy fo sending packets. REFERENCES CONCLUSION Fig 3: Routing Ovehead Gaph Fig 4: Enegy Gaph Womhole attack is one of the most seious attacks in MANETs. These attacks can be easily set up in mobile ad-hoc netwoks and it vey poweful to make seious consequences. Many solutions have been poposed to detect and emove the attack but ae not pefect in tems of efficiency o any special hadwae. The poposed appoach simulates the womhole nodes and povides a solution fo the detection of womhole attacks. The poposed technique povides a bette solution fo detecting womhole attack in the netwok. The detection method is mainly based on the pehop delay values between nomal paths and the paths unde womhole attack. A simulation is done hee with the paametes delay, outing ovehead and enegy with espect to the numbe of nodes in the netwok and the esults shows that the poposed appoach is successful in detecting womhole attack, poviding bette [1] Ankit Mehto, Pof.Hitesh Gupta A Dynamic Hybid Appoach fo Womhole Detection and Pevention 4th ICCCNT July 4-6, [2] Yudhvi Singh, AvniKhatka, Pabha Rani, Deepika, DheeDhwaj Baak Womhole Attack Avoidance Technique in Mobile Adhoc Netwoks Thid Intenational Confeence on Advanced Computing & Communication Technologies, [3] Xiangyang Li Wieless Adhoc and Senso Netwoks: Theoy and Applications Cambidge Univesity Pess, July [4] C. Pekins, E. Belding-Roye, Adhoc On-Demand Distance Vecto (AODV) Routing, The Intenet Society [5] Sang-min Lee, Keecheon Kim An Effective Path Recovey Mechanism fo AODV Using Candidate Node spinge link, vol. 4331/2006, [6] Rutvij H. Jhavei, Ashish D. Patel, Jatin D. Pama, Bhavin I. Shah MANET Routing Potocols and Womhole Attack against AODV, IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.10 No.4, Apil [7] Kanika Lakhani, Himani bathla, Rajesh Yadav A Simulation Model to Secue the Routing Potocol AODV against Black- Hole Attack in MANET IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, vol. 10 No.5, May [8] Kee, S. ;Suyavanshi, A., "To pevent womhole attacks using wieless potocol in MANET" IEEE 2010, Page [9] O. Kachiski and R. Guha, Effective Intusion Detection using Multiple Sensos in Wieless Adhoc Netwoks, in Poc. 36th Annual Hawaii Int l. Conf. on System Sciences (HICSS 03), pp.57.1, [10] L. Hu and D. Evans, Using Diectional Antennas to Pevent Womhole Attacks, in poceedings of the 11th Netwok and Distibuted System Secuity Symposium, pp , [11] Debdutta Baman Roy, Ritupana Chaki and Nabendu Chaki, New Cluste based womhole intusion detection algoithm fo mobile adhoc netwok, Intenational Jounal of Netwok Secuity & Its Applications (IJNSA), vol. 1, no. 1, pp , [12] Vien Mahajan, MaiteyaNatu, And AdashpalSethi Analysis Of Womhole Intusion Attacks In MANETs IEEE 2008, Page1-7. [13] N. Satheesh, D. K. Pasadh Analysis and Paameteized Evaluation of Impact of Womhole Attack Using AODV Potocol in MANET, Intenational Jounal of Advanced Reseach in Compute Science and Softwae Engineeing, Volume 3, Issue 9, Septembe [14] Lija Joy, Sheena Kuian K, Black Holes Detection in MANETs In the Poceedings of the C Sponsoed National Confeence on Infomation and Communication Technologies (NCICT 2014), 4 th and 5 th Mach, [15] Thasneem Abdul Jaleel, DA.Neela Madheswai, RCD based detection of Distibuted Reflection Denial of Sevice attacks with a compaative analysis of DDoS ove DRDoS In the Poceedings of the UGC Sponsoed National Confeence on Infomation and Communication Technologies (NCICT 2014), 4 th and 5 th Mach, 2014.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS

EFFICIENT ENERGY BASED CONGESTION CONTROL SCHEME FOR MOBILE AD HOC NETWORKS FFICINT NRGY BASD CONGSTION CONTROL SCHM FOR MOBIL AD HOC NTWORKS 1 S.SHJA, 2 DR.RAMACHANDRA V PUJRI 1 Reseach Schola, Bhaathia Univesity, Coimbatoe. 2 Vice-Pincipal, KGiSL Institute of Technology, Saavanampatti,

More information

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks

Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

CRESTBOT: A New Family of Resilient Botnets

CRESTBOT: A New Family of Resilient Botnets CRESTBOT: A New Family of Resilient Botnets Duc T. Ha, Hung Q. Ngo, Madhusudhanan Chandasekaan Depatment of Compute Science and Engineeing State Univesity of New Yok at Buffalo Amhest, NY 1426, USA Email:

More information

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks

A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Totally Disjoint Multipath Routing in Multihop Wireless Networks

Totally Disjoint Multipath Routing in Multihop Wireless Networks Totally isjoint Multipath Routing in Multihop Wieless Netwoks Sonia Wahate and Raouf outaba Univesity of Wateloo School of ompute Science Wateloo, anada {spwahate,boutaba}@uwateloo.ca bstact Speading taffic

More information

New Algorithms for Daylight Harvesting in a Private Office

New Algorithms for Daylight Harvesting in a Private Office 18th Intenational Confeence on Infomation Fusion Washington, DC - July 6-9, 2015 New Algoithms fo Daylight Havesting in a Pivate Office Rohit Kuma Lighting Solutions and Sevices Philips Reseach Noth Ameica

More information

How to outperform IEEE802.11: Interference Aware (IA) MAC

How to outperform IEEE802.11: Interference Aware (IA) MAC How to outpefom IEEE802.11: Intefeence Awae (IA) MAC Daniela Maniezzo, Piepaolo egamo, Matteo Cesana, Maio Gela CS Dept. - Univesity of Califonia Los Angeles - UCLA, Califonia, USA Engineeing Dept., Feaa

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information