An IPv6-Oriented IDS Framework and Solutions of Two Problems
|
|
- Clare Quinn
- 5 years ago
- Views:
Transcription
1 An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of Chnese Academy of Scence Shenyang Insttute of Computng Technology, Shenyang, Chna muscalfe@lve.com, fangzy@jlu.edu.cn ABSTRACT In order to lower false postves rate and false negatves rate, a payload-adapt IDS framework n IPv6/4 envronments s proposed n ths paper. By usng the decson-tree-based classfcaton method, a rule matchng tree adapt to load characterstc s created dynamcally, whch mproves the detecton effcency. Makng use of Petr net to buld a mode to the complcated attack behavor, and then form the complcated attack rule lbrary, mprove the detecton accuracy rate. In the end, the experment proves our solutons are feasble and effectve to resolve the problems that current IDS faced. 2. FRAMEWORK OF SYSTEM Wth the development of large-scale hgh-speed nternet network attacks and the ncreasng of the ntruson detecton complexty, IDS (Intruson Detecton System) [5-0] s up aganst a new challenge. To solve the problem whch the hgh-speed envronment brngs, we proposed a payload-adapt IDS framework n IPv6/4 envronments. The whole framework s smply descrbed by fgure. Collaboratve Analyss and Control Centre Keyword: IDS, IPv6, false postves rate, false negatves rate, Payload-adapt and Petr net.. INTRODUCTION In IPv4, Intruson Detecton technology has been studed by many people. But n IPv6, the relevant research s stll smaller. More manufacturers smply transform exstng products n IPv4 nto supportng IPv6. Some new characters n IPv6 as well as the ssue of network securty have not fully taken nto account. Therefore, the ntruson detecton research on IPv6 wll be the future drecton of development. Ths paper s IDS research on the IPv6 []. To enhance the detecton speed, Qan Tang [2] and Xaofeng Ren [3] proposed ther own ntruson detecton method respectvely, but those methods have some dsadvantage. In ths paper, we propose a payload-adapt ntruson detecton method. By usng the decson-tree-based classfcaton method, a rule matchng tree adapt to load characterstc s created dynamcally, whch mproves the detecton effcency. It s carred out by the Rule Matchng Tree Generaton n the Payload-adapt Analyss, whch s a very mportant part of our system. Collaboratve analyss and control center s the hgh level of the overall framework, t use Petr nets [4] to model complex attacks to generate rules to mprove the accuracy of alert and lower false postves rate and false negatves rate. Payload-adapt Analyss Data Collector Data Source (gh-speed IPv6/4 Network) Fg.. Payload-adapt IDS Framework under IPv6/4 Envronment From fgure we can fnd, the entre framework s composed of three parts, whch ncludes Data Collecton, Payload-adapt Analyss, and Collaboratve Analyss and Control Centre. Each part s one knd of loose couplng relaton and all parts are mutually ndependent wth each other. The framework can be realzed by dstrbuted archtecture and used to solve mass data detecton problems under the large-scale hgh-speed network envronments. The man functon of the data collecton module s to collect data from the entre network and send t to the other modules. For the collector n dstrbuted archtecture, ts man task s to obtan more comprehensve and accurate crtcal nformaton.
2 Payload-adapt analyss module s used to analyze the raw data from data collector and gve the smple analyss of attack and send the results to other modules. Payload-adapt analyss module s made up of the module that generates the rule-matchng tree, payload-adapt rule-matchng tree structure, payload-adapt detecton module, secure communcaton module, response mechansms, data formattng and confguraton management module. The framework s smply showed by fgure 2. Collaboratve Analyss and Control Centre Secure Communcaton Data Formattng Response Mechansm Rule Matchng Tree Generaton Management Confguraton Center Payload-adapt Detecton Analyss Payload-adapt Rule-matchng Tree Fg.2. Payload-adapt Analyss Complcated Intruson Rule Lbrary Complcated Intruson Analyzer Storage Center Secure Communcaton Payload-adapt Analyss Alarm Response Control Center Management Confguraton Center Fg.3. Framework of Collaboratve Analyss and Control Centre Collaboratve analyss and control centre, showed as fgure 3, s the hgh level of the overall framework. It uses Petr nets[5] to model complex attacks and generate rules from complex attacks whch are used to detect nformaton from low-level alarm. Because we use the technology such as alarm correlaton, nformaton fuson to enhance credblty of alert, t may mprove the accuracy of alert and has lower false postves rate and lower false negatves rate to resolve the problem that current IDS faced. 3. PAYLOAD-ADAPT INTRUSION DETECTION METOD AND TE RELATED MODULES Important s Related to the Method Rule Matchng Tree Generaton : Accordng to the sample traffcs and rule sets of real acquston, on the bass of protocol analyss, ths module generates a rule matchng tree by the mproved decson tree method. For each event or the package whch need to be detected, make the number of rule sets detected to be fewest, and acheve the goal of mprovng the detecton speed as soon as possble. Payload-adapt Rule-matchng Tree: Ths s a data structure for savng the new rules set. It s generated by Rule Matchng Tree Generaton and also s the analyss base of the Payload-adapt Detecton Analyss. Payload-adapt Detecton Analyss : The module s the core of Payload-adapt Analyss, whch s responsble for the analyss of the data collected from data acquston module. Accordng to the rule matchng trees adapt to load characterstc generated by rule matchng trees, t determne the rule for sets each event or the package whch can be detected, and then match rapdly to each event or the package. By usng the msuse detecton technology to detect data packets quckly, fnd the attack packets of known attack types. Send the detected attack nformaton to the response mechansm module, after the data formatted treatment, and then send to the collaboratve analyss and control center for the further processng. Thus t reduces the mstake and falure rate as soon as possble, and mproves the accuracy of detecton. Payload-adapt Intruson Detecton Method By analyzng current detecton method, we can draw the concluson that network envronment change and rule classfcaton asymmetry would serously affect the IDS detecton speed, even we adopt the current popular protocol analyss technology. For hgher performance, we argue IDS should adapt the traffc characterstcs and rule characterstcs. Lke the protocol analyss method, we pre-treat the data receved through the value of protocol felds. On the bass
3 of whether the values of protocol felds match to the packets or not, the sets of the applcable rules are determned. The dfference s that our approach s to use the characterstcs of traffcs and rules to classfy rules. Because of the lmt of the memory, we can t choose all protocol characterstcs, and can t mantan all values for every protocol feld. Therefore, we buld a mathematcal model to solve ths problem. Defnton : Rk refers to a specfc rule n rules set R. r r2 r That s R ( n k = F = V F2 = V2 L Fn = Vn ), n whch n refers to the number of feld wth avalable rules; F refers to the th feld of the rule, j [ K n] ; V refers to the j th value of the th feld of the rule; K refers to the rules number of the rules set, k K. Defnton 2: P s the set of the subset of the rules set. That s P = { P, P2, L P }, n whch P s a subset of the rules set R, and P = P = n whch [ K ]. ere we say P s a category of the rules set. Defnton 3: Num( P ) refers to the number of the packets who satsfy the th rules subset P n the example traffc S, n whch S s a set of some data packets, and refers to a sample of the actual network traffc. Defnton 4: Bk s the tme used to detect that whether the specfc data packets satsfy the rule Rk n the rules set. Defnton 5: T ( P ) refers to the tme used to detect all data packets satsfed by the th rules subset P of the category P n the rules set R n traffc S. Formula : T ( P) = Num( P ) B, n k k K Rk P whch Num( P ) reflects the affecton of the load to detectng effcency and Bk reflects the k K Rk P affecton of the rules to the detectng effcency. Defnton 6: M ( P ) refers to the memory used to save the rules of the th rules subset P of the category P. So for an actual traffc S we may present the relatonshp of categores, detecton effcency and the memory by usng the formula as follows. Suppose that refers to the number of categores of all rules and th category of the rules, [ K ]. P refers to the Formula 2: SupposeT refers to the tme used to detect the example traffc S n the condton of category P. Then T = T( P). = Formula 3: M refers to the memory used to save all detecton rules set R n the condton of category P. Then M = M ( P). = Theoretcally, f the memory s unlmted, the best project s that makngt mnmum. But actually t s mpossble. * We have to fnd out the category P satsfed T s mnmum by comparng the category set P composed by dfferent rule felds. That s the project we need. Formula 2 and 3 gve us a judgment method of comparng the advantages and the dsadvantages of dfferent projects. Inducton of the traffc gves us a new llumnaton. The problem proposed before can be solved theoretcally. The followng s the generaton algorthms of payload-adapt rule matchng tree: we proposed. We suppose as follows: the memory savng the data s fxed; the tme s fxed, whch s used to detect whether a data packet matches the rule R n the rules set; N refers to the number of the rules n rules set R, and R NT refers to the number of the data packets n example traffc S, and then we defnte that E p refers to the present of the rule number detected by each packet averagely n the whole rules number after takng P category, that s E = N /( N + N ). p p R T Generate_Rule_tree produces a rule tree through the assgned rule sets and traffc sets. Input: rule sets, rules; traffc sets, traffcs; respectvely presented by the correspondng dscrete attrbute values; the attrbute lst composed of the canddate rule feld, attrbute lst. Output: a rule tree. Algorthms as follows: Buld node N; IF attrbute_lst s empty TEN Back to N as the leaf node; Mark rules for the general category; // recursve end Calculate the Gan(P) of each attrbute n attrbute_lst; IF the attrbute whch s meet to the condton exsts test_attrbute TEN Mark node N for test_attrbute; ELSE k
4 Back to N as the leaf node, mark rules for the general category; // recursve end FOR the value v n each test_attrbute //demarcate rules Buld a branch node for the test_attrbute = v as a condton over the node N; Rnum = the meet condton rule number, and conduct the rules; Tnum = the meet condton packet number, and conduct the traffcs; IF Tnum == 0 TEN Back to node N as the leaf node, nto the next cycle; Assume R to be the rule sets of test_attrbute = v n rules; // a dvson Assume D to be the traffc sets of test_attrbute = v n datas; // traffc dvson Generate_Rule_tree (R, D, attrbute_lsttest_ attrbute); Next; Cancel the mark of node N; 4. USING PETRI NET TO LOWER FALSE POSITIVES RATE AND FALSE NEGATIVES RATE FURTER Accordng to the ntermedate detecton results from each sub detecton center reports, the complex ntruson analyzer based on Petr nets takes full use of the complex attack model represented by Petr nets model to carry on alarm nformaton fuson, comprehensve analyss and reduce the mstake and falure further. Fgure 4 descrbes the detecton process. Suspcous Behavor Lbrary Complex Intruson Rule Lbrary Pattern Matchng Devce Suspcous Behavor Judgment Devce Bottom Suspcous Informaton Alarm Response Fg.4. Analyss process of Complex Intruson Analyzer based on Petr net In fgure 4, the suspcous behavor lbrary s a tree structure. The root node ponts to the rules whch come from the complex ntruson rule lbrary watng for analyzng (added dynamcally by the pattern matchng devce based on Petr nets). It presents the referrng rules tracked by suspcous behavors. The lower nodes record the nstances satsfyng ths rule. They represent the beng tracked and specfc suspcous behavors currently, contanng multple sub nodes of suspcous behavors. Those who are suspcous behavors needed to be further proved, have done the partal correct match to the Petr nets rules corresponded by each attack behavor. The suspcous behavor judgment devce carres on the further match to every rule nstance whch s n process n the suspcous behavor lbrary by usng the bottom suspcous nformaton as the nput. If the match s satsfed, t refers to the relablty of attack behavors s ncreasng. If t's judged to be the ntruson, alarm to the manager through the alarm response module. Otherwse, send to the s to carry on processng. Accordng to the suspcous nformaton needed to be judged whch s sent by the suspcous behavor judgment devce, the pattern matchng devce based on Petr net extracts satsfed rules from the complex ntruson rule lbrary based on Petr nets to carry on the comparson wth the rules (2nd level nodes) of suspcous behavor lbrary. If they are matched, create the specfc nstance to the correspondng node. Otherwse create the rules and ts frst new nstance under the nodes for the later matchng operaton. 5. EXPERIMENTAL RESULTS AND ANALYSIS To prove our solutons are feasble and effectve, we developed two components on the bass of Snort to realze the payload-adapt ntruson detecton method. The frst component s the rule matchng tree generaton module carred on by usng decson tree classfcaton method, whch generates the payload-adapt rule matchng tree accordng to the actual network traffc S and the avalable rules sets R. The second component locates the avalable examnaton rule sets of each event or packet to take the rapd rule match to them by usng payload-adapt rule matchng tree and the search process of the decson tree. We collect datum of the three perods and respectvely use Snort [] and our mproved Snort (PASnort for short) to carry on experments. The data obtaned from experments are recorded n fgure 5. In fgure 5, the long strps refer to the detecton effcency P, whch presents wth the amount of dsposng packets per second. The start workng tme of detectng s represented wth Tstart. The end tme of detectng s represented wth Tend. Num refers to the tmes of the detecton module beng called, that s the amount of packets. Then, P = Num / (Tend-Start).
5 Data Data2 Data PASnort Snort Fg.5. Detecton Effcency The experment ndcates (Fgure 5): When the features of smple packets are smlar to the characterstcs of traffcs detected, the detecton rate of our approach ncreased by nearly 20% compared to the orgnal method. When the features of smple packets and the characterstcs of traffcs detected have few dfferences, the detecton rate also ncreased but only a lttle. owever, t sn t lower than the detecton rate of Snort, whch fully proves our soluton s effectve. Meanwhle, we appled our framework to the Web-Based Teachng System developed by ourselves. For at the hgh level we use Petr net to establsh rule lbrary, we can reduce the false postves rate and the false negatves rate of the alarm nformaton at lower level, ncrease the relablty of detecton at hgh level and the ntruson detecton accurate by detectng complcated attacks and correlated attacks through the nformaton ntegraton and alarm correlaton technology. On the other hand, ths can also reduce the burden of network admnstrators. 6. CONCLUSIONS In ths paper, a payload-adapt IDS framework n IPv6/4 envronments s establshed. By usng Payload-adapt Intruson Detecton Method proposed n the paper, the Payload-adapt Analyss of the framework s realzed. It can be utlzed to solve the hgh packet-loss problem. In addton, the Collaboratve analyss and control center uses Petr nets to model complex attacks to generate rules to mprove the accuracy of alert. The experment proves that our solutons are feasble and effectve to resolve the problems of hgh false postves rate and hgh false negatves rate that current IDS faced. [3] Ren Xaofeng, Dong Zhanqu, Research and Implementaton on Increasng Speed of Rule-matchng n Snort, Computer Applcatons, 2003, 23(4): [4] Wolfgang Resg, Petr nets, Berln; Sprnger-Verlag, 985. [5] D.E.Dennng, An ntruson-detecton model, IEEE Transactons on Software Engneerng, Vol. 3, No. 2, 987, pp [6] J.Frank, Artfcal Intellgence and Intruson Detecton: Current and Future Drectons, Proceedng of the 7th Natonal Computer Securty Conference, 994. [7] Rchard P. Lppmann, Davd J. Fred, Isaac Graf, Joshua W. anes, Krstopher R. Kendall, Davd McClung, Dan Weber, Seth E. Webster, Dan Wyschogrod, Robert K. Cunnngham, and Marc A. Zssman, Evaluatng Intruson Detecton Systems: the 998 DARPAOff-Lne Intruson Detecton Evaluaton, Proceedngs of the 2000 DARPA Informaton Survvablty Conference and Exposton(DISCEX), Vol.. [8] J.P.Anderson, Computer Securty Threat Montorng and Survellance, Techncal report, James P Anderson Co. Fort Washngton, Pennsylvana, 980. [9] eberlen, L. et al., A Network Securty Montor, Proceedngs of the IEEE Computer Socety Symposum, Research n Securty and Prvacy, 990, pp [0] Roy A.Maxon, Kyme M.C.Tan, Benchmarkng Anomaly-Based Detecton Systems, Internatonal Conference on Dependable Systems and Networks (DSN 2000), [] Q Jandong, Tao Lan, Sun Zongcan, Dssectng Snort, tool for ntruson detecton, Computer Engneerng and Desgn, 2004., pp REFERENCES [] Marcus Goncalves, Ktty Nles, IPv6 networks, New York: McGraw-ll, 998. [2] Tang Qan, Zhang Dafang, uang Kun, Usng Gan-rato Based Decson Trees to Improve Intruson Detecton, Computer Engneerng, 2006, 32(7):
Cluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationQuerying by sketch geographical databases. Yu Han 1, a *
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationSoftware Trustworthiness Static Measurement Model and the Tool
Avalable onlne at www.jpe-onlne.com vol. 13, no. 7, November 2017, pp. 1101-1110 DOI: 10.23940/jpe.17.07.p13.11011110 Software Trustworthness Statc Measurement Model and the Tool Yan L, Zhqang Wu, Yxang
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationStudy of Data Stream Clustering Based on Bio-inspired Model
, pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationDAQ-Middleware: Data Acquisition Middleware based on Internet of Things
DAQ-Mddleware: Data Acquston Mddleware based on Internet of Thngs Zhjn Qu, Zhongwen Guo, Shua Guo, Yngjan Lu and Yu Wang Ocean Unversty of Chna, Qngdao, Shandong, Chna Unversty of North Carolna at Charlotte,
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationA Distributed Dynamic Bandwidth Allocation Algorithm in EPON
www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationAssociation Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop
Assocaton Rule Mnng wth Parallel Frequent Pattern Growth Algorthm on Hadoop Zhgang Wang 1,2, Guqong Luo 3,*,Yong Hu 1,2, ZhenZhen Wang 1 1 School of Software Engneerng Jnlng Insttute of Technology Nanng,
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationMODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST
INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED 07 28-31 AUGUST 2007, CITE DES SCIENCES ET DE L'INDUSTRIE, PARIS, FRANCE MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAIMIZE PRODUCT VARIETY AND
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationDetecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
Detectng Compounded Anomalous SNMP Stuatons Usng Cooperatve Unsupervsed Pattern Recognton Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationRemote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information
Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationTHE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT
Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND
More informationA XML-Based Composition Event Approach as an Integration and Cooperation Middleware
A XML-Based Composton Event Approach as an Integraton and Cooperaton Mddleware Gang Xu, JanGang Ma, and Tao Huang Technology Center of Software Engneerng, Insttute of Software, Chnese Academy of Scences,
More informationMULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION
MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationReal-time Network Attack Intention Recognition Algorithm
Internatonal Journal of Securty and Its Applcatons, pp.51-62 http://dx.do.org/10.14257/sa.2016.10.4.06 Real-tme Network Attack Intenton Recognton Algorthm Qu Hu and Wang Kun Zhengzhou Insttute of Informaton
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationAudio Content Classification Method Research Based on Two-step Strategy
(IJACSA) Internatonal Journal of Advanced Computer Scence and Applcatons, Audo Content Classfcaton Method Research Based on Two-step Strategy Sume Lang Department of Computer Scence and Technology Chongqng
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationApplication of Clustering Algorithm in Big Data Sample Set Optimization
Applcaton of Clusterng Algorthm n Bg Data Sample Set Optmzaton Yutang Lu 1, Qn Zhang 2 1 Department of Basc Subjects, Henan Insttute of Technology, Xnxang 453002, Chna 2 School of Mathematcs and Informaton
More informationPerformance Assessment and Fault Diagnosis for Hydraulic Pump Based on WPT and SOM
Performance Assessment and Fault Dagnoss for Hydraulc Pump Based on WPT and SOM Be Jkun, Lu Chen and Wang Zl PERFORMANCE ASSESSMENT AND FAULT DIAGNOSIS FOR HYDRAULIC PUMP BASED ON WPT AND SOM. Be Jkun,
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationThe Comparison of Calibration Method of Binocular Stereo Vision System Ke Zhang a *, Zhao Gao b
3rd Internatonal Conference on Materal, Mechancal and Manufacturng Engneerng (IC3ME 2015) The Comparson of Calbraton Method of Bnocular Stereo Vson System Ke Zhang a *, Zhao Gao b College of Engneerng,
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league
More informationA NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING
A NEW APPROACH FOR SUBWAY TUNNEL DEFORMATION MONITORING: HIGH-RESOLUTION TERRESTRIAL LASER SCANNING L Jan a, Wan Youchuan a,, Gao Xanjun a a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty,129
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationReliability and Performance Models for Grid Computing
Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationDistributed Middlebox Placement Based on Potential Game
Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationLocal Quaternary Patterns and Feature Local Quaternary Patterns
Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationA Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures
A Novel Adaptve Descrptor Algorthm for Ternary Pattern Textures Fahuan Hu 1,2, Guopng Lu 1 *, Zengwen Dong 1 1.School of Mechancal & Electrcal Engneerng, Nanchang Unversty, Nanchang, 330031, Chna; 2. School
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationParallel Artificial Bee Colony Algorithm for the Traveling Salesman Problem
Parallel Artfcal Bee Colony Algorthm for the Travelng Salesman Problem Kun Xu, Mngyan Jang, Dongfeng Yuan The School of Informaton Scence and Engneerng Shandong Unversty, Jnan, 250100, Chna E-mal: xukun_sdu@163.com,
More informationFast Feature Value Searching for Face Detection
Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationBehavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine
Behavoral Model Extracton of Search Engnes Used n an Intellgent Meta Search Engne AVEH AVOUSI Computer Department, Azad Unversty, Garmsar Branch BEHZAD MOSHIRI Electrcal and Computer department, Faculty
More information