Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Size: px
Start display at page:

Download "Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network"

Transcription

1 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College, Changchun, China Absrac IP mulimedia subsysems bring huge securiy hreas o he IMS-based nex-generaion newors alhough hey bring IMS-based newor inegraion and business abiliy enhancemen. Therefore, he research on he vulnerabiliy of IP mulimedia subsysems aracs widespread aenion recenly. In his aricle, he securiy hreas of nex-generaion core newors are discussed firs. And hen we analyze he vulnerabiliy characerisics of IP mulimedia subsysems. In order o evaluae he vulnerabiliy of IP mulimedia subsysems effecively, his paper furher applies he complex newor heory o consruc he newor model of IP mulimedia subsysem and propose he vulnerabiliy assessmen indicaor by adoping enropy model. Finally, some simulaion experimens and resul analysis are provided o our evaluaion model. Boh heoreical analysis and numerical simulaions indicae ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of his ind of IP mulimedia subsysems. In addiion, he proposed mehod provides a new idea and scienific basis for he vulnerabiliy assessmen of IP mulimedia subsysems. Index Terms IP Mulimedia Subsysem, ewor Safey, Vulnerabiliy Assessmen, Complex ewor Theory, nropy Model I. ITRODUCTIO Many real-life newors such as he Inerne, power grids and oher self-organizing newors exhibi complex feaures [, 2, 3]. These newors are imporan componens of our daily lives. Their safeies can seriously impac he economic developmen and social sabiliy. Therefore, he relaed researches on he newor safey have araced increasing aenion in recen decades [4, 5, 6]. For compuer newors, heir securiy is more and more imporan. Therefore, i is urgen o develop a suie of measurable and quaniaive merics o evaluae heir vulnerabiliy and furher propose schemes o proec hem. specially, IP mulimedia subsysem is an imporan concep proposed by he mos auhoriaive indusry organizaions 3GPP in he field of 3G mobile communicaions in March 22 [7, 8]. As he core of he nex generaion newors, is funcion eniy is numerous, and he vulnerabiliy disribuion is complicaed [9,, ]. Only when he vulnerabiliy of IP mulimedia subsysems can be evaluaed effecively, we can find ou he ey facors which lead o he securiy performance hreas of IP mulimedia subsysems and conrol he source of securiy hreas wihin IP mulimedia subsysems effecively [2, 3]. Furhermore, we can obain he objecive evaluaion according o various vulnerabiliy impacs on IP mulimedia subsysems. And hen he resilience of IP mulimedia subsysems will be improved and enhanced. Recenly, 3GPP and 3GPP2 Organizaions have proposed he securiy sandards on IP mulimedia subsysems. However, he sudy on he safey of IP mulimedia subsysems is sill in is infancy, which is insufficien o mee he securiy needs. A he same ime, i is difficul o follow he newor safey sandard because he acual configuraion of IP mulimedia subsysems needs o consider he acual condiions and he specific newor needs. Furhermore, in he operaion and mainenance process of IP mulimedia subsysems, here exis oher facors, such as he human negligence and misaes and so on. All hese will lead o securiy hreas of IP mulimedia subsysems. In order o find ou he weanesses of IP mulimedia subsysems, he source of safey hreas and he possibiliy of leaed informaion, he vulnerabiliy assessmen of IP mulimedia subsysems are very imporan and demanding o solve. In his way, he proecion program of IP mulimedia subsysems can be obained. On his basis, we can furher selec and deermine he safey conrol measures o avoid ransfer or reduce he losses. The early IP mulimedia subsysems are he firs sep in he migraion pah. They olerae he differen nown limiaions of securiy which could be challenging o sele in real-life operaions. However, he early IP mulimedia subsysem is omi consciously bu no wihou emphasizing he imporance of considering he sharply decreased securiy [7]. Furhermore, he vulnerabiliy of IP mulimedia subsysem implemenaions and high level service provider securiy demands were examined. And hen an implemenaion mehod o provide he desired degree of safey for IP mulimedia subsysem deploymens was defined [4]. Considering ha communicaions service provider mus deermine how o handle he influences of securiy flaws, a new mehod was emphasized in reference [5], wih examples o deermine he influence of safey-relaed malfuncions and he ey design elemens which are relaed wih modeling service reliabiliy. However, he safey research resuls on IP mulimedia subsysem are relaively lacing in spie of he core posiion of IP 23 ACADMY PUBLISHR doi:.434/jmm

2 44 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 mulimedia subsysem in nex-generaion newors. So far, he vulnerabiliy evaluaion echnology of domesic and inernaional mainsream mainly consis of newor survivabiliy analysis echniques [6], aac ree echnology [7], graph-based newor vulnerabiliy analysis echniques [8, 9]. The above echnologies in solving he problem of vulnerabiliy have some defecs and shorcomings. Acually, he vulnerabiliy assessmen of IP mulimedia subsysem should be a complex nonlinear problem since he vulnerabiliy of IP mulimedia subsysems is uncerain. Considering ha IP mulimedia subsysems are in he core posiion in he nex generaion newors and he exising problems, in his aricle, he securiy hreas of nex-generaion core newors are discussed and he vulnerabiliy characerisics of IP mulimedia subsysems are analyzed firs. And hen we use complex newor heory o build a newor model of IP mulimedia subsysem. According o he characerisics of IP mulimedia subsysem newors, a new soluion for he vulnerabiliy evaluaion of IP mulimedia subsysem newors is pu forward on he basis of he enropy model. Finally, we provide some simulaion experimens and resul analysis o proof he effeciveness of our evaluaion model. Boh heoreical analysis and numerical simulaions indicae ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of his ind of IP mulimedia subsysems. In addiion, he proposed mehod presens a new soluion mehod for he vulnerabiliy measuremen of IP mulimedia subsysem newors and provides basis for he esablishmen of securiy policy of IP mulimedia subsysems. measures before he aac on he IP mulimedia subsysem newors are invesigaed. This mehod has a more pracical significance o service providers as well as he majoriy of users because i focuses on he difficuly and he impac ha an aacer explois he vulnerabiliy of IP mulimedia subsysem newors. An imporan consideraion is provided o maerial uilizaion cos and ime uilizaion cos which are no direcly associaed wih he vulnerabiliy of IP mulimedia subsysem newors, bu acually are closely relaed o he facors of heir vulnerabiliy uilizaion. On he basis of consideraion, we analyze he vulnerabiliy characerisics of IP mulimedia subsysems and furher presen he assessmen mehod. The proposed vulnerabiliy assessmen of IP mulimedia subsysems is considered saring wih he possibiliy of vulnerabiliy uilizaion firs. Secondly, he consequence of vulnerabiliy uilizaion is an imporan facor which is considered by aacers. Synheically considering above wo aspecs, we obain he following evaluaion facors of vulnerabiliy. The deailed represenaion is as follows. II. VULRABILITY OF IP MULTIMDIA SUBSYSTM AD IP MULTIMDIA SUBSYSTM TWORK Figure. Index sysem of vulnerabiliy assessmen model. A. Vulnerabiliy of IP Mulimedia Subsysem The vulnerabiliy research of compuer newors can be divided ino several problem areas which include vulnerabiliy definiion, vulnerabiliy idenificaion, and vulnerabiliy analysis and vulnerabiliy assessmen. In general, he main purpose of he vulnerabiliy assessmen is he righ vulnerabiliy scoring or raing, he qualiaive and quaniaive analysis of he sysem vulnerabiliy. The sysem can be a service, a compuer on he newor or he compuer newor. In he field of newor securiy, he vulnerabiliy assessmen and he inrusion deecion of sysems, firewalls, virus deecion are four elemens in newor securiy. The research for vulnerabiliy assessmen of IP mulimedia subsysems is sill in is infancy, here are no sysemaic research resuls up o now. Addiionally, i is difficul o obain he facors of vulnerabiliy assessmen. Therefore, according o he curren siuaion of vulnerabiliy assessmen of IP mulimedia subsysems, he analysis mehod of vulnerabiliy dimension srucure is inroduced in his paper firs. The proposed evaluaion mehod considers he securiy reasons of IP mulimedia subsysems mainly from malicious users or aacers perspecive. Defense IP mulimedia subsysems are vulnerable o aacs and malfuncions. The mos imporan reason is ha here are many weanesses in hemselves. Once an aacer explois hese vulnerabiliies, hey are easy o succeed. The vulnerabiliies of IP mulimedia subsysems include he sysem vulnerabiliy which exiss iniially and he poenial vulnerabiliy which is brough by he laer increased safey measures. In oher word, he vulnerabiliy of IP mulimedia subsysems refers o he number of loopholes in he sysem and he resuling damage degree o he poenial hreas. I is an imporan indicaor o measure safey performance of an IP mulimedia subsysem. In general, if he vulnerabiliy degree of an IP mulimedia subsysem is small, i is more secure. Here, he vulnerabiliy of IP mulimedia subsysems is divided ino four caegories: logic errors, sysem flaws, social engineering and sraegy negligence. ach caegory in he above four caegories can be subdivided ino several subcaegories. In order o be convenien o calculae hem, here he facor se of vulnerabiliy assessmen and is corresponding subse of facors are designed. According o he acual siuaion, he weigh is given according o various facors, as shown in Table. 23 ACADMY PUBLISHR

3 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST TABL I. OUR PROPOSD VULRABILITY VALUATIO FACTORS OF IP MULTIMDIA SUBSYSTM Level indicaors Weighs Logic errors.25 Sysem flaws Social engineering Sraegy negligence Secondary indicaors Sysem bug; Hardware bug Firewall filering rules; Securiy conrol measures Adminisraor service qualiy; personnel securiy awareness of IP mulimedia subsysem Securiy policy defecs; Implemenaion effeciveness of securiy policy The corresponding level of he weigh of he higher level.65;.35.35;.65.4;.6.5;.5 Figure 2. Informaion exchange lin graph wihin IP mulimedia subsysem newor B. IP Mulimedia Subsysem ewor based on Complex ewor Theory Wih he rapid developmen of IP mulimedia subsysem, newor consisency rule becomes a very acive opic in newor dynamics. Since small world newors and scale-free newors are proposed, complex newors have become he popular research opic in various disciplines. Some basic conceps and characerisic quaniies such as he shores pah, degree disribuion, clusering coefficien, beweenness and so on are pu forward gradually o describe he opology characerisics and dynamic properies of complex newors. I is found ha here are wo basic characerisics which are large average clusering coefficien and shores pah. Similar wih social relaion feaure in social newor, he acual newors also include a communiy srucure. Tha is, he inner connecion beween nodes of each communiy is very close. These characerisics have paved he way for he sudy of IP mulimedia subsysems. Based on he characerisic analysis of he vulnerabiliy of IP mulimedia subsysems, he archiecure-based vulnerabiliy approach is adoped o invesigae IP mulimedia subsysem newors by combining complex newor heory. The archiecure of is given by is probabilisic conrol flow graph. In his aricle, a graph G is defined by a non-empy se of nodes H and a nonempy se of edges L : G ( H, L), where H v v2 v L { e, e2,, e M } {,,, } is he se of nodes and is he se of edges. The oal number of nodes in he se H is, and he oal number of edges in he se L is M. In an IP mulimedia subsysem, informaion exchange behavior always occurs a he poin. The main funcion of he subsysems is o connec wo relaively independen componens ogeher. We will also regard any pair of poins allow access as a lin, as is shown in Figure 2. Figure 3. Virual represenaion of IP mulimedia subsysem newor In he following, we mae ensure he componens of IP mulimedia subsysem newor. Then he exchange relaions of informaion and energy among componens are invesigaed he beween componens. When here is he exchange of maer or energy beween he wo componen nodes exising wihin he IP mulimedia subsysem, an edge beween hem is deermined. The odes represen he componens of he applicaion. The edges represen he flow of conrol among he componens. ewors can be direced or undireced. Undireced newors are composed by edges connec a pair of nodes in a ransiive fashion. everheless, direced newors are composed only by direced edges connecing a pair of nodes hrough a given direcion. In general, direced edges are showed by an arrow represening he direcion of he connecion beween a pair of nodes. Here, we will exrac IP mulimedia subsysem ino a direced newor. In order o obain he corresponding adjacency marices of IP mulimedia subsysem, we collec daa and invesigae he relaions among componen nodes and hen obain he adjacency marix. Figure 3 represens he probabilisic conrol flow graph of an IP mulimedia subsysem newor by using UCIT 6., which consiss of 6 nodes. III. PROPOSD SCHM For IP mulimedia subsysem newor, he wo main indicaor of he informaion flow is he imeliness and accuracy of he informaion ransmission, as well as 23 ACADMY PUBLISHR

4 442 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 informaion securiy, namely he newor vulnerabiliy. Considering hese hree aspecs, we use he enropy o consruc he vulnerabiliy assessmen model of IP mulimedia subsysem newor. Based on he above analysis of he vulnerabiliy of IP mulimedia subsysem newors, he uncerainy of microscopic sae of IP mulimedia subsysem newors is described by he enropy in he following. I is relaed wih he number of he possible microscopic saes under macroscopic saes and also wih he occurrence probabiliy of he differen microscopic saes. The enropy reflecs he realiy connecion beween he nodes wihin he newor. The maximum enropy m represens he maximum value of he newor enropy, which represens he mos chaoic sae of he IP mulimedia subsysem newor. The raio of he presen newor enropy and he maximum newor enropy reflecs he unorganized exen of he IP mulimedia subsysem newor. Therefore, we define he ordered degree of an IP mulimedia subsysem newor as follows. R () The value of R characerizes he degree of organizaion of he newor. I is larger, which means ha he ordered degree of newor is higher and heir organizaion is more efficien. In he following, we define he ordered degree of a newor based on he accuracy and newor survivabiliy during informaion ransmission of IP mulimedia subsysem newor respecively in his aricle. And hen we synheically consider he wo aspecs. In his way, newor evaluaion model is proposed on he basis of he consideraion for he accuracy of he response and he newor ani-desroying abiliy. ewor qualiy reflecs he accuracy of he informaion flow beween he nodes in he newor. The qualiy enropy characerizes he size of he uncerainies of informaion qualiy. The oal qualiy enropy is defined as follows. m ( ) (2) p ( )log p ( ) (3) where p ( ) is node o achieve he qualiy of he micro-sae probabiliy? The expression of p ( ) is as follows. p ( ) d d where d is he number of nodes which is direcly lined o node. I is also he above-menioned node degree in IP mulimedia subsysem newor. (4) The maximum qualiy enropy of IP mulimedia subsysem newor is defined as follows. m log d (5) Thus, he qualiy ordered degree is as following. R (6) m Cluser coefficien C represens he cluser level among nodes in he newor. I describes he aggregaion sae of nodes wihin newor. For he cluser coefficien of any node, he following definiion is adoped: C 2 d ( d ) where is he number of acual exising edges among d( d ) neighboring nodes of node. is he maximum 2 connecion number among all neighboring nodes of node. Thus, he average cluser coefficien of he enire IP mulimedia subsysem newor is as follows. C (7) C (8) Obviously, C. Ani-desroying abiliy reflecs he sabiliy size of he newor srucure under differen aac sraegy. Anidesroying enropy describes he uncerainy size of he newor srucure ani-desroying abiliy. Ani-desroying enropy of node characerizes he uncerainy size of he ani-desroying abiliy of node, which is defined as following. ( ) p ( )log p ( ),,2,..., (7) where p ( ) 2 is he microsaes ani-desroying probabiliy of node and he following expression of p ( ) 2 is adoped: p ( ) 2 C According o q. (7) and q. (8), we define ha he ani-desroying enropy of IP mulimedia subsysem newor is as following. ( ) 2 2 C p ( )log p ( ) 2 2 The maximum ani-desroying enropy of IP mulimedia subsysem newor is defined as follows. (8) (9) 23 ACADMY PUBLISHR

5 G R JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST m log C () Thus, he qualiy ordered degree is as following. R 2 2 () 2m The vulnerabiliy measuremen is denoed by R. In order o consider he wo main facors of he accuracy of he informaion ransmission and informaion securiy synheically, he following vulnerabiliy measuremen of IP mulimedia subsysem newor is adoped based on q. (6) and q. (). R R R (2) 2 where and are he weigh coefficiens respecively. In m is he same case, if R is larger, he ordered degree of IP mulimedia subsysem newor is higher. In oher words, IP mulimedia subsysem newor is more efficien. Therefore, he value of R could characerize he vulnerabiliy of IP mulimedia subsysem newor well. To mae a meaningful comparison, we inroduce anoher definiion o discuss he vulnerabiliy of he IP mulimedia subsysem newors. We invesigae heir global conneciviy. A parameer G is proposed o measure he global conneciviy, which is defined as follows. G (3) where is he number of he nodes which can mainain he normal operaions before cascading breadowns, and is he number of he nodes of he whole newor which can mainain he normal operaions a presen. We define ha he load of node is as following. L C ( ) B ( ) ij i jh ij ( ) (4) where ij is he number of all he shores pahs beween node i and node j, ( ) is he number of he shores ij pahs hrough node beween node i and node j. The capaciy of a node represens he maximum load ha he node can olerae. In IP mulimedia subsysem newors, he capaciy of a node is limied by he corresponding cos. Here, we assume ha he capaciy C of node o be proporional o is iniial load, i.e., C ( ) L () ij ( ) (5) i j H ij ( ) ( ) where he parameer is he olerance parameer which reflecs he resisance o he aacs and malfuncions, According o he acual siuaion, L () is calculaed by q.(4) and he capaciy C of node is calculaed by q.(5) in our simulaions. IV. UMRICAL RSULTS In he simulaions, we choose.5 and.5. We use Malab2 as a programming language. In order o implemen our model, he Floyd Warshall algorihm is uilized in his leer. This algorihm follows a dynamic programming mehod o calculae he shores pahs beween all verices of an IP mulimedia subsysem newor. Based on he proposed vulnerabiliy assessmen mehod of IP mulimedia subsysem newor, he IP mulimedia subsysem newor model including 6 nodes will be applied o illusrae he vulnerabiliy of he IP mulimedia subsysem newors which is subjeced o malicious aacs. The beweenness for a node is he number of shores pahs passing hrough he node. We adop he highes beweenness node-based aac o explore he vulnerabiliy phenomenon of he IP mulimedia subsysem newor. If here are some nodes have equivalen beweenness, we choose he node wih he highes degree as he aaced node Figure 4. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of Figure 5. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of.. 23 ACADMY PUBLISHR

6 R G G R 444 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST Figure 6. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of Figure 7. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of Figure 8. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of.3. In Figs. 4-9, he dynamical behaviors of our proposed vulnerabiliy measuremen based on enropy and he damage size during failure propagaion are repored for an IP mulimedia subsysem newor of 6 nodes a he cases of differen values of he parameer. To mae a meaningful comparison, From Figs. 4, 6 and 8, we can see ha he value of R for a larger cascade increases much more sharply han ha for a smaller one even a he very early sage of malfuncion propagaion when he node wih he larges beweenness is aaced. Therefore, he proposed vulnerabiliy measuremen of IP mulimedia subsysem newor can help us o idenify he larger damage a he very early sage of malfuncion propagaion. I is of grea significance in he prevenion of major accidens in IP mulimedia subsysems. I is because ha he major accidens are no disinc from he smaller malfuncions on he enire scales a he early period of acciden propagaion. In addiion, as shown in Figs. 4, 6 and 8, we also find ha he value of R increases o a pea value and hen decreases o a saionary value during he process of malfuncion propagaion. In oher words, i increases o a maximal value and hen mainains almos unchanged. This resul shows ha our mehod can mae us find he malfuncions and dissolve locally in ime. Thus, he malfuncions from propagaing hroughou he IP mulimedia subsysem newor are prevened effecively Figure 9. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of.3. Figs. 5, 7 and 9 depic he dynamical evolving behaviors of damage size during he malfuncion propagaion in he IP mulimedia subsysem newor of 6 nodes, a he cases of differen values of he parameer. In many IP mulimedia subsysem newors, he parameer is severely limied by he sysem cos. Therefore, our simulaions adop differen values of parameer o invesigae he IP mulimedia subsysem newor. We examine he impac of differen node capaciy of α on he IP mulimedia subsysem newors, as is shown in Figs The comparison resuls of he dynamics of he value of R and damage scale R during malfuncion propagaion are shown in Figs. 4-. We can see ha he value of parameer has significan influence on he malfuncion propagaion in IP mulimedia subsysem newor. Since he value of parameer is limied by he cos of an IP mulimedia subsysem, we should consruc he load disribuion of he IP mulimedia subsysem newors as homogenous as possible o decrease he vulnerabiliy agains he major incidens. By simulaions, we see ha our resuls are in agreemen wih easily he real-life IP mulimedia 23 ACADMY PUBLISHR

7 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST subsysem. For example, in an IP mulimedia subsysem, he more equal he exchange informaion capaciy is, he more sable he IP mulimedia subsysem becomes. Consequenly, our proposed vulnerabiliy evaluaion based on enropy can be used as an indicaor o measure and conrol he vulnerabiliy of IP mulimedia subsysem newors. V. COCLUSIO IP mulimedia subsysem newors provide a powerful IP session-based core for advanced services in nexgeneraion newors. They mus be suiable o mee cusomer needs and service provider. IP mulimedia subsysems are designed o be a generic service enabler plaform which includes he availabiliy requiremens of he presen elecommunicaion operaors newors. In order for faciliae he operaions of his complex and cosly archiecure, we will a pleny of aracive services obaining high user accepance. The vulnerabiliy of he IP mulimedia subsysem user equipmen is also a serious safey hrea. A presen, he vulnerabiliy sudy of IP mulimedia subsysems in is infancy, no more influence resuls are pu forward by auhoriaive expers or insiuions. Therefore, i is no easy for us o quanify each evaluaion aribues of he vulnerabiliy for IP mulimedia subsysem newors. There is oo lile safey and oo many resricions imposed upon he users and cusomers ha mae operaing adequae securiy of IP mulimedia subsysems such a grand challenge. The enropy is iniially inroduced as a hermodynamic concep. I is a measure for he sysem disorder. The enropy is widely used due o is unique conen and peneraion. Recenly, as a physical descripion of complex sysem srucure, he enropy is more and more aenion and becomes an imporan research ool for complex sysems in he heory of complex sysems [2, 2]. The macro significance of enropy is a measuremen for he uniformiy of he sysem energy disribuion. The change direcion of he complex sysem sae can be expressed by he enropy. The energy disribuion is more uniform, he greaer he enropy is. Based on his, in order o avoid subjecive weighing mehod of uncerainy caused by he vague and conroversial and deermine he scienific and reasonable vulnerabiliy evaluaion mehod, we inroduce he concep of enropy o explore he vulnerabiliy of IP mulimedia subsysem newors. In his paper, on he basis of he emergence complex newor heory in recen years, we analyze complex feaures of IP mulimedia subsysem newors and explore he facors of he vulnerabiliy uilizaion for IP mulimedia subsysem newors. Based on he vulnerabiliy analysis, we inroduce he complex newor o build a newor model according he feaures of IP mulimedia subsysems. The concep of he newor enropy is proposed o quanify he vulnerabiliy of IP mulimedia subsysem newors. Finally, we provide some simulaion experimens and resul analysis o confirm he effeciveness and he pracicaliy of our evaluaion model. Boh numerical simulaion resuls show ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of IP mulimedia subsysems. The proposed mehod provides a new soluion mehod for he vulnerabiliy measuremen of IP mulimedia subsysem newors and also provides basis for he esablishmen of securiy policy of IP mulimedia subsysems. RFRCS [] S. V. Buldyrev, R. Parshani, G. Paul, H.. Sanley, and S. Havlin, Caasrophic cascade of failures in inerdependen newors, aure, vol. 464, pp. 25, 2. [2] P. S. Kousourelais, Assessing srucural vulnerabiliy agains earhquaes using muli-dimensional fragiliy surfaces: a Bayesian framewor, Probab. ng. Mech, vol. 25, pp. 49-6, 2. [3] M.. J. ewman, The srucure and funcion of complex newors, Siam Review, vol. 45, pp , 23. [4] A. A. Moreira, J. S. Andrade, H. J. Herrmann, and J. O. Indeeu, How o mae a fragile newor robus and vice versa, Physical Review Leers, vol. 2, pp. 87, 29. [5] Y. Q. Jiao, J. Weir and W. Q. Yan, Flame deecion in surveillance, Journal of Mulimedia, vol. 6(), pp , 2. [6] J. L. Wan and Y. H. Liu, Muli-regions exure subsiuion for image and video, Journal of Mulimedia, vol. 7(6), pp , 22. [7] Third Generaion Parnership Projec (3GPP). Securiy aspecs of early IP Mulimedia Subsysem (IMS) (Release 8).TR V.., 28. [8] J. L. Wan and Y. H. Liu, Signalling cases and QoS managemen wihin TISPA G residenial environmens, Journal of Mulimedia, vol. 2(2), pp , 27. [9] A. Barnawi, A. H Alalhi, M. R. J. Qureshi and A. I. Khan, valuaion of IP mulimedia subsysem based mobile mass examinaion sysem, I. J. Compuer ewor and Informaion Securiy, vol. 4, pp. -2, 22. [] J. H. Lee, Y. B. Huh, S. W. Woo and J. S. Sohn, Rouing mechanism for VoIP emergency calls in IP Mulimedia Sysem Advanced Communicaion Technology (ICACT), 2 The 2h Inernaional Conference on. Vol., pp , I, 2. [] C. Y. Chen, K. D. Chang, J. L. Chen and H. C. Chao, xending emergency services coverage in cooperaive IMS newors, Inernaional Journal of Auonomous and Adapive Communicaions Sysems, vol. 5(4), pp , 22. [2] P. Bellavisa, G. Cardone, A. Corradi and L. Foschini, The Fuure Inerne convergence of IMS and ubiquious smar environmens: An IMS-based soluion for energy efficiency, Journal of ewor and Compuer Applicaions, vol. 35(4), pp , 22. [3] A. Berger, I. Gojmerac and O. Jung, Inerne securiy mees he IP mulimedia subsysem: an overview, Securiy and Communicaion ewors, vol. 3(2-3), pp , 2. [4].. Anderlind, D. W. Faucher,. H. Grosse, e al., IMS securiy, Bell Labs Technical Journal, vol. (), pp , 26. [5] H. Pan, A. R. McGee, U. Chandrashehar and S. H. Richman, Opimal availabiliy and securiy for IMS-based VoIP newors, Bell Labs Technical Journal, vol. (3), pp , ACADMY PUBLISHR

8 446 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 [6] D. Farmer and W. Venema, Vulnerabiliy assessmen franwor, ewyor: CIAO Publicaion, pp , 26. [7] C. R. Ramarishnan and R. Sear, Survivabiliy analysis of newor specificaions, ew Yor: CIAO Publicaion, pp , 25. [8] L. Wang, S. oel and S. Jajodia, Minimum-cos newor hardening using aac graphs, Compuer Communicaions, vol. 29(8), pp , 26. [9] S. Jajodia and S. oel, Topological vulnerabiliy analysis, In Cyber Siuaional Awareness, Springer US, pp , 2. [2] M. Casera and M. C. odar, A cross enropy based algorihm for reliabiliy problems, Journal of Heurisics, vol. 5(5), pp , 29. [2] F. Aliparma and B. Dengiz, A cross enropy approach o design of reliable newors, uropean Journal of Operaional Research, vol. 99(2), pp , ACADMY PUBLISHR

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves AML7 CAD LECTURE Space Curves Inrinsic properies Synheic curves A curve which may pass hrough any region of hreedimensional space, as conrased o a plane curve which mus lie on a single plane. Space curves

More information

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng 3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

The Effects of Multi-Layer Traffic on the Survivability of IP-over-WDM Networks

The Effects of Multi-Layer Traffic on the Survivability of IP-over-WDM Networks The Effecs of Muli-Layer Traffic on he Survivabiliy of IP-over-WDM Neworks Peera Pacharinanakul and David Tipper Graduae Telecommunicaions and Neworking Program, Universiy of Pisburgh, Pisburgh, PA 15260,

More information

ECO-friendly Distributed Routing Protocol for Reducing Network Energy Consumption

ECO-friendly Distributed Routing Protocol for Reducing Network Energy Consumption ECO-friendly Disribued Rouing Proocol for Reducing Nework Energy Consumpion Daisuke Arai and Kiyohio Yoshihara KDDI R&D Laboraories Inc. 2-1-15 Ohara Fujimino-shi Saiama, Japan Email: {di-arai, yosshy}@kddilabs.jp

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available

More information

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded

More information

Web System for the Remote Control and Execution of an IEC Application

Web System for the Remote Control and Execution of an IEC Application Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD 21 s Inernaional Conference on Composie Maerials Xi an, 20-25 h Augus 2017 LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD Hyunseok Kwon 1, Yurim Park

More information

Modelling of Conflict Controlled Networks

Modelling of Conflict Controlled Networks Oleksii Ignaenko 4, Glushkov Avenue, CSP 368, Kyiv 187, Ukraine oigna@isofs.kiev.ua ABSTRACT Game heoreical echniques have recenly become prevalen in many engineering applicaions, noably in communicaions.

More information

FUZZY HUMAN/MACHINE RELIABILITY USING VHDL

FUZZY HUMAN/MACHINE RELIABILITY USING VHDL FUZZY HUMN/MCHINE RELIBILITY USING VHDL Carlos. Graciós M. 1, lejandro Díaz S. 2, Efrén Gorroiea H. 3 (1) Insiuo Tecnológico de Puebla v. Tecnológico 420. Col. Maravillas, C. P. 72220, Puebla, Pue. México

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

Let s get physical - EDA Tools for Mobility

Let s get physical - EDA Tools for Mobility Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened

More information

A Numerical Study on Impact Damage Assessment of PC Box Girder Bridge by Pounding Effect

A Numerical Study on Impact Damage Assessment of PC Box Girder Bridge by Pounding Effect A Numerical Sudy on Impac Damage Assessmen of PC Box Girder Bridge by Pounding Effec H. Tamai, Y. Sonoda, K. Goou and Y.Kajia Kyushu Universiy, Japan Absrac When a large earhquake occurs, displacemen response

More information

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY QIN Zhong-yuan 1,3, CHEN Qi 2, LV You 2, QIANG Yong 2, GUO Ai-wen 2, SHEN Ri-sheng 1,3, Zhang Qunfang 4 1 Informaion Science and Engineering School,

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

A Face Detection Method Based on Skin Color Model

A Face Detection Method Based on Skin Color Model A Face Deecion Mehod Based on Skin Color Model Dazhi Zhang Boying Wu Jiebao Sun Qinglei Liao Deparmen of Mahemaics Harbin Insiue of Technology Harbin China 150000 Zhang_dz@163.com mahwby@hi.edu.cn sunjiebao@om.com

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

Computer representations of piecewise

Computer representations of piecewise Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom

More information

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,

More information

Reliability Analysis for Cryptographic Key Management

Reliability Analysis for Cryptographic Key Management Reliabiliy Analysis for Crypographic Key Managemen 1 Sheng Xiao, 2 Weibo Gong, 3 Don Towsley, 4, 5 Qingquan Zhang, 5 Ting Zhu 1 College of Informaion Science and Engineering, Hunan Universiy, China 2 Dep.

More information

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab CMOS INEGRAED CIRCUI DESIGN ECHNIQUES Universiy of Ioannina Clocking Schemes Dep. of Compuer Science and Engineering Y. siaouhas CMOS Inegraed Circui Design echniques Overview 1. Jier Skew hroughpu Laency

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

Motion Level-of-Detail: A Simplification Method on Crowd Scene

Motion Level-of-Detail: A Simplification Method on Crowd Scene Moion Level-of-Deail: A Simplificaion Mehod on Crowd Scene Absrac Junghyun Ahn VR lab, EECS, KAIST ChocChoggi@vr.kais.ac.kr hp://vr.kais.ac.kr/~zhaoyue Recen echnological improvemen in characer animaion

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

A New Semantic Cache Management Method in Mobile Databases

A New Semantic Cache Management Method in Mobile Databases Journal o Compuer Science 1 (3): 351-354, 25 ISSN 1549-3636 Science Publicaions, 25 A New Semanic Cache Managemen Mehod in Mobile Daabases Shengei Shi, Jianzhong Li and Chaokun Wang School o Compuer Science

More information

A Formalization of Ray Casting Optimization Techniques

A Formalization of Ray Casting Optimization Techniques A Formalizaion of Ray Casing Opimizaion Techniques J. Revelles, C. Ureña Dp. Lenguajes y Sisemas Informáicos, E.T.S.I. Informáica, Universiy of Granada, Spain e-mail: [jrevelle,almagro]@ugr.es URL: hp://giig.ugr.es

More information

Time Expression Recognition Using a Constituent-based Tagging Scheme

Time Expression Recognition Using a Constituent-based Tagging Scheme Track: Web Conen Analysis, Semanics and Knowledge Time Expression Recogniion Using a Consiuen-based Tagging Scheme Xiaoshi Zhong and Erik Cambria School of Compuer Science and Engineering Nanyang Technological

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.

More information

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate 20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

An Experimental QoS Manager Implementation

An Experimental QoS Manager Implementation An Experimenal QoS Manager Implemenaion Drago Žagar, Goran Marinović, Slavko Rupčić Faculy of Elecrical Engineering Universiy of Osijek Kneza Trpimira 2B, Osijek Croaia drago.zagar@efos.hr Absrac-- Qualiy

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Improving Ranking of Search Engines Results Based on Power Links

Improving Ranking of Search Engines Results Based on Power Links IPASJ Inernaional Journal of Informaion Technology (IIJIT) Web Sie: hp://www.ipasj.org/iijit/iijit.hm A Publisher for Research Moivaion... Email: edioriiji@ipasj.org Volume 2, Issue 9, Sepember 2014 ISSN

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

Trust-based Service Management of Mobile Devices in Ad Hoc Networks

Trust-based Service Management of Mobile Devices in Ad Hoc Networks Trus-based Service Managemen of Mobile Devices in Ad Hoc Neworks Yaing Wang, Ing-Ray Chen Virginia Tech Deparmen of Compuer Science Falls Church, VA, USA Email: {yaingw, irchen}@v.edu Jin-Hee Cho U.S.

More information

Future Generation Computer Systems. Self-healing network for scalable fault-tolerant runtime environments

Future Generation Computer Systems. Self-healing network for scalable fault-tolerant runtime environments Fuure Generaion Compuer Sysems 26 (2010) 479 485 Conens liss available a ScienceDirec Fuure Generaion Compuer Sysems journal homepage: www.elsevier.com/locae/fgcs Self-healing nework for scalable faul-oleran

More information

A Fast Stereo-Based Multi-Person Tracking using an Approximated Likelihood Map for Overlapping Silhouette Templates

A Fast Stereo-Based Multi-Person Tracking using an Approximated Likelihood Map for Overlapping Silhouette Templates A Fas Sereo-Based Muli-Person Tracking using an Approximaed Likelihood Map for Overlapping Silhouee Templaes Junji Saake Jun Miura Deparmen of Compuer Science and Engineering Toyohashi Universiy of Technology

More information

A Hierarchical Object Recognition System Based on Multi-scale Principal Curvature Regions

A Hierarchical Object Recognition System Based on Multi-scale Principal Curvature Regions A Hierarchical Objec Recogniion Sysem Based on Muli-scale Principal Curvaure Regions Wei Zhang, Hongli Deng, Thomas G Dieerich and Eric N Morensen School of Elecrical Engineering and Compuer Science Oregon

More information

Delay in Packet Switched Networks

Delay in Packet Switched Networks 1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link

More information

Reinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi

Reinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi Reinforcemen Learning by Policy Improvemen Making Use of Experiences of The Oher Tasks Hajime Kimura and Shigenobu Kobayashi Tokyo Insiue of Technology, JAPAN genfe.dis.iech.ac.jp, kobayasidis.iech.ac.jp

More information

Utility-Based Hybrid Memory Management

Utility-Based Hybrid Memory Management Uiliy-Based Hybrid Memory Managemen Yang Li Saugaa Ghose Jongmoo Choi Jin Sun Hui Wang Onur Mulu Carnegie Mellon Universiy Dankook Universiy Beihang Universiy ETH Zürich While he memory fooprins of cloud

More information

Hierarchical Recurrent Filtering for Fully Convolutional DenseNets

Hierarchical Recurrent Filtering for Fully Convolutional DenseNets Hierarchical Recurren Filering for Fully Convoluional DenseNes Jo rg Wagner1,2, Volker Fischer1, Michael Herman1 and Sven Behnke2 1- Bosch Cener for Arificial Inelligence - 71272 Renningen - Germany 2-

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

Who Thinks Who Knows Who? Socio-cognitive Analysis of Networks. Technical Report

Who Thinks Who Knows Who? Socio-cognitive Analysis of  Networks. Technical Report Who Thinks Who Knows Who? Socio-cogniive Analysis of Email Neworks Technical Repor Deparmen of Compuer Science and Engineering Universiy of Minnesoa 4-192 EECS Building 200 Union Sree SE Minneapolis, MN

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder, Jun Wang and Jie Shan Geomaics Engineering, School of Civil Engineering, Purdue Universiy 550 Sadium Mall Drive, Wes

More information

RECENT advancements in vehicular communication and

RECENT advancements in vehicular communication and Reliabiliy-oriened Opimizaion of Compuaion Offloading for Cooperaive Vehicle-Infrasrucure Sysems Jianshan Zhou, Daxin Tian, Senior Member, IEEE, Yunpeng Wang, Zhengguo Sheng, Xuing Duan, and Vicor C.M.

More information

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach The Universiy of Sheffield Deparmen of Compuer Science Indexing XML Daabases: Classificaions, Problems Idenificaion and a New Approach Research Memorandum CS-7-5 Mohammed Al-Badawi Compuer Science Dep

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

Joint Feature Learning With Robust Local Ternary Pattern for Face Recognition

Joint Feature Learning With Robust Local Ternary Pattern for Face Recognition Join Feaure Learning Wih Robus Local Ternary Paern for Face Recogniion Yuvaraju.M 1, Shalini.S 1 Assisan Professor, Deparmen of Elecrical and Elecronics Engineering, Anna Universiy Regional Campus, Coimbaore,

More information

A Survey on mobility Models & Its Applications

A Survey on mobility Models & Its Applications A Survey on mobiliy Models & Is Applicaions Prof. Vikas Kumar Jain 1, Prof. Raju Sharma 2, Prof. Bhavana Gupa 3 1,2,3 Compuer Science & Engineering, CIST Absrac In his paper, we survey he curren scenario

More information