A Perceptron based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks

Size: px
Start display at page:

Download "A Perceptron based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks"

Transcription

1 A Perceptron based Classfer for Detectng Malcous Route Floods n Wreless Mesh Networks Lakshm Santhanam*, Anndo Mukheree*, Ra Bhatnagar Ψ, and Dharma P. Agrawal* Department of ECECS, CDMC Lab, Unversty of Cncnnat, Cncnnat, OH, USA Ψ Department of ECECS, Machne Intellgence Lab, Unversty of Cncnnat, Cncnnat, OH, USA Emal: {santhal, mukherao, dpa}@ececs.uc.edu, rbhatnag@ececs.uc.edu Abstract Wreless Mesh Networks WMN) are evolvng as a new paradgm for broadband Internet, n whch a group of statc mesh routers employ multhop forwardng to provde wreless Internet connectvty. All routng protocols n WMNs navely assume nodes to be nonmalcous. But, the plug-n-and play archtecture of WMNs paves way for malcous users who could explot some loopholes of the underlyng routng protocol. A malcous node can nundate the network by conductng frequent route dscovery whch severely reduces the network throughput. In ths paper, we nvestgate the detecton of route floods by ncorporatng a machne learnng technque. We use a perceptron tranng model as a tool for ntruson detecton. We tran the perceptron model by feedng varous network statstcs and then use t as a classfer. We llustrate usng an expermental wreless network ns-2) that the proposed scheme can accurately detect route msbehavors wth a very low false postve rate. open wreless communcaton channel and the multhop nature of communcaton can pave way to malcous ntruders. A malcous ntruder can explot the hdden loopholes n the routng protocol [2], to conduct varous knds of attack such as route dsrupton attacks e.g. blackhole attack, selfsh node attack, malcous route flood, route table posonng, route loopng, modfcaton of route requests) and packet forwardng attacks e.g. selfsh node attack, Denal of Servce DoS) attack). Bhargava et al. [3] demonstrated that a false dstance vector and a false sequence number attack can drastcally reduce the network throughput by 75%. Buldng a secure routng protocol SEAD [4], Aradne [5]) s not a complete soluton to thwart attacks on the routng protocol, as MRs are often deployed n publc locatons lke rooftops, streetlghts, poles etc.) that are easly accessble to potental adversares. Keywords - Anomaly Detecton, AODV, Intruson Detecton System, Normalzaton, Perceptron, and Wreless Mesh Networks.. Introducton Wreless Mesh Networks WMNs) [] are becomng ncreasngly popular as they provde cheap and ubqutous broadband Internet access. WMNs consst of a group of statc mesh routers MRs) that are connected by wreless lnks. It obvates the need for extensve wred backhaul network by connectng only a small subset of MRs known as Internet Gateways IGWs)) to the wred backbone. Other MRs forward ther traffc n a multhop fashon towards the IGW. Fg. shows a typcal mesh network scenaro. Securty n WMNs s very much n ts nfancy and there are several ssues that reman to be addressed. The Fgure. Sample Wreless Mesh Network Scenaro In ths paper, we study the problem of detectng malcous nodes that mtates a normal node n all respects, except n performng unnecessary route dscoveres. These malcous nodes frequently ntate route dscovery to unknown destnatons wth ntent to flood the network wth route request packets. As t s dffcult to dstngush between a route dscovery ntated wth a malcous ntent and a legtmate route dscovery for reparng broken/stale routes, ths type of attack s hard to detect. Though, several broadcast management technques exsts that try to allevate *Ths work s has been supported by the Oho Board of Regents, Doctoral Enhancement Funds Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $ /7 $25. 27

2 redundant broadcasts [6]; they fal to address the problem of bogus broadcast packets. Deslva et al. [7] propose a statstcal method to mtgate malcous route floods; n whch when the generaton rate of a node exceeds a certan threshold, all the route requests of that node are dropped by ts neghbors. We however, detect the same based on the examnaton of the network. In order to detect malcous route floods n a WMN; we propose to deploy an Intruson Detecton System IDS) on every MR n the network. As WMNs don t suffer from power constrants, each MR can be made as a montorng agent. We propose an IDS based on a machne learnng technque called perceptron tranng. The IDS collects a set of statstcs on few route and data parameters such as RREQ Route Request), RREP Route reply), and RERR Route error), data packets orgnated, and data packets forwarded. The above lsted parameters are then fed to the perceptron model n order to learn the normal routng behavor and establsh a normal routng profle. Typcally, t s dffcult to udge a safe threshold value for the number of RREQs packets that can be generated by a MR n a WMN as t depends on several other network condtons lke lnk falure, stale route, network congeston, etc. Thus, we propose a threshold ndependent scheme called perceptron based IDS to detect malcous route flood attack. It adaptvely modfes the detecton model based on the tranng data and detects attack n the face of new data. The remander of the paper s organzed as follows: Secton 2 descrbes the related work. Secton 3 presents the varous loop holes n the route dscovery phase of Ad hoc On-Demand Vector AODV) routng protocol. We study the mpact of a malcous route flood attack through smple smulatons. Secton 4 delneates the archtecture of our perceptron based IDS. Secton 5 llustrates the effectveness of our proposed scheme through extensve smulatons. We fnally conclude the paper and present the future work n Secton Related Work Most of the tradtonal IDS, detect attack by processng audt trals for devatons from normal actvty anomaly detecton [8]) or by matchng typcal ntruson nstances msuse detecton [9]). The man drawback of msuse detecton s that, t cannot detect new attacks. On the other hand, an anomaly detector successfully detects unknown ntrusons also. But, f an attacker changes ts profle slowly, even well-known attacks reman undetected. Intellgent machne learnng technques lke perceptron, artfcal neural networks ANN), and decson trees can be used to tran the IDS accurately. ANN has nnumerable advantages n the detecton of ntrusons []. Zhang et al. [] propose to detect DoS attacks usng a hybrd ANN classfer based on perceptron and backpropagaton. It derves a statstcal smlarty decson vector between the observed profle and the establshed normal profle. As n the presence of a DoS attack the smlarty vector s very small, an alert s rased by the IDS. But, the detecton metrcs for a route floodng attack and DoS attack are dfferent. Hence, such a scheme s not sutable for detectng msbehavor n the routng protocol. Ghost et al. [2] employ a neural network to detect anomalous ntrusons on a software system Buffer overflow attack). Saterls et al. [3] employ a Mult-Layer Perceptron MLP) to detect Dstrbuted DoS attacks by montorng several passve flow statstcs. Thus, most of the works n the lterature focus on developng a IDS for detectng DoS attacks only and are unsutable for detectng route floods. We however, focus on the problem of detectng malcous route floods by usng the ntellgence provded by our perceptron model. Huang et al. [4] propose a cooperatve detecton system by electng Custer Heads CHs). The CHs apply smple rules to dentfy varous route attacks. As the CHs are elected randomly, there s a possblty that a malcous attacker can be elected as a CH whch would be detrmental to the network. We however, employ a dstrbuted approach to detect route attacks that also decreases the detecton tme when compared to [4]. 3. Malcous Route Flood & ts Impact In ths paper, we use an AODV routng protocol for our analyss. In ths secton, we explan the route dscovery phase n the AODV protocol and hghlght the vulnerabltes n t that can be exploted by an attacker. We then nvestgate the mpact of a malcous route flood attack on the network. 3. Vulnerabltes of AODV AODV s a reactve ad hoc routng protocol. A source node n AODV ntates a route dscovery to a destnaton only f ts route entry s unknown or old. It broadcasts a route request packet RREQ) requestng for a route to the requred destnaton. Ths s repeatedly re-broadcasted by other nodes untl t reaches the destnaton tself or an ntermedate node wth a fresh enough route. However, a malcous node can perodcally generate large number of false RREQ packets to non-exstent destnaton nodes so that t s repeatedly re-broadcasted tll the lfetme of the packet. Ths attack s known as a malcous route flood attack. Ths creates a deluge of packets whch drastcally affects the achevable throughput at the applcaton layer. If the network s saturated, a malcous floodng further aggravates the network performance [7]. An Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $2. 27

3 Instantaneous Throughput Kbps) Flow- Flow Tme Secs) Flow-2 45 Number of MAC Transmssons No attack 5 Under attack AODV UDP DATA Throughput Kbps) RREQ/sec RREQ/sec 2 RREQ/sec 5 RREQ/sec RREQ/sec Offered load Kbps) Fgure 2. Instantaneous throughput of flows durng attack Fgure 3. Average Number of Packets Transmtted by each MR Fgure 4. Throughput obtaned vs. offered load condtons attacker can ntensfy the effect of a malcous route flood by further manpulatng the protocol. Typcally, each RREQ packet s assocated wth an dentfcaton number ID) to prevent redundant broadcast. A malcous node can modfy the ID of a RREQ packet so that t always appears to be a fresh request to other nodes and s repeatedly re-broadcasted by them. A malcous route flood attack results n route nvason, packet droppng, and network congeston. 3.2 Impact of Malcous Route Flood In ths sub-secton, we study and llustrate the mpact of a malcous route flood attack n WMNs through smulatons n ns-2 [5]. We consder a smple IEEE 82.s based mesh network wth 49 MRs 7 x 7) deployed n a grd lke fashon n an area of 5 x 5 meters. We randomly attach 2-3 mesh clents to each of the MRs. One MR s elected as the IGW. The MRs communcate wth each other usng legacy IEEE 82. based nterfaces. We start flows from few mesh clents attached to MRs). We ntate 3 UDP flows, sendng traffc at a constant rate of 2 Kbps. We use a constant packet sze of 52 bytes. We use IEEE 82. as the channel arbtraton protocol. The transmsson range and the channel capacty are set to 25 meters and Mbps respectvely. AODV s used as the routng protocol. The total smulaton tme s set to 5 seconds. Each smulaton s repeated wth dfferent traffc profles contanng randomly chosen traffc sources. We randomly choose one MR as malcous, whch perodcally generates every second) large number of RREQ packets to arbtrarly chosen unknown destnatons. We consder the case when all MRs are backlogged wth traffc. Fg. 2 shows the effect of a malcous route flood RREQ/ sec) on the nstantaneous throughput of flows at the IGW all flows not shown for clarty), under a randomly chosen traffc profle. We see that whle the throughput of flow-3 s affected by a small percentage 45%) only, the throughput of flow- and flow-2 are drastcally reduced by 99% n the presence of a malcous route flood attack. Fg. 3 llustrates the average number of packets transmtted at each MR n the presence and the absence of a malcous route flood attack. It can be seen from Fg. 3 that durng an attack, the average number of RREQs packets receved at each MR s abnormally hgh 22), whle the average number of data packets transmtted by each MR s cut down from 8 to 529. Ths s because; control packets are gven hgher prorty over data packets to prevent lnk breakages. We next study the effect of a malcous MR generatng RREQs at dfferent rates - RREQs /sec), for dfferent offered load. We clearly see from Fg. 4 that as the generaton rate of malcous requests ncreases, the aggregate throughput of flows drastcally decreases. Thus, a malcous route flood attack s a serous threat. 4. Perceptron based IDS In ths secton, we present the applcaton of a machne learnng technque called perceptron n IDS. We frst present the hgh level archtecture and then dscuss the confguraton of our perceptron based classfer. 4. System Archtecture An IDS s deployed at every MR n the WMN. The archtecture of the proposed IDS s shown n Fg. 5. Fgure 5. Archtecture of perceptron based IDS Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $2. 27

4 It conssts of the followng components: Packet Montor & Feature Extractor Packet montor at every MR ntercepts the ncomng traffc and passes t to the feature extractor. Feature selecton plays an mportant role n determnng the accuracy of any classfer. The feature extractor gathers a set of statstcs for each of ts neghbors N where N represents the set of neghbors of a node N ). A sample snapshot of the features collected s shown n Table.. For broadcast packets lke RREQ, we mantan only the number of packets sent by a node s neghbor. But, for uncast packets lke RREP, we gather two statstcs.e., the number of packets sent by node s neghbor wth destnaton as the node tself and wth destnaton as some other node; the latter beng collected by lstenng n promscuous mode. Table. Sample snapshot of nodal table # RREQ sent N to # RERR sent N to # RREP sent N to # Packets orgnated N to N ) # Packets forwarded N to N ) N ) N ) N ) number of route request packets Number of route error packets number of route reply packets number of data packets orgnated wth source address as self number of data packets forwarded wth source address as self Anomaly Detector It conssts of the traned perceptron model. The montored network statstcs s fed as nput to the perceptron classfer, whch gves a bnary output t). A postve output s ndcatve of a normal condton and a negatve output s ndcatve of an attack. When an attack s detected, an alert s ssued by the alert module to block the ntrusve actvty and a report s lodged n the ntrusve log. Known Attack Profle The tranng data for the perceptron model s generated by conductng expermental smulatons usng ns-2 [5]. The known attack s grafted nto the smulaton and the accumulated network statstcs gathered durng ths perod are labeled as attack nstances. 4.2 Perceptron Tranng Algorthm We model the detecton of malcous flood attack as a typcal classfcaton problem. Perceptron s used as a classfer to assess the network status based on the montored network actvty. Perceptron s the smplest form of a lnear classfer [6]. The confguraton of a lnear perceptron s shown n Fg. 6. As seen n Fg. 6, a perceptron accepts a lnear combnaton of real-valued nputs; and outputs, f the result s greater than a certan threshold and outputs -, otherwse. For a gven set of n nputs x, x 2,, x n, the output s, o x, x,..., x )={ f w w x + w x w x n 2 n n > - otherwse}, ) where each w denotes the contrbuton of each nput x to the perceptron output. Here, w denotes the threshold that the lnear combnaton of nputs must surpass for an output of. For smplfcaton, we augment an addtonal unty constant x = to the orgnal nput vector so that the above equaton can be rewrtten n a smpler form as, n o x, x,..., x ) = { f w > ; else - 2) 2 n = Fgure 6. Lnear Perceptron Model The perceptron tranng algorthm nvolves the evoluton of the weght vector w, whch would correctly classfy all the nstances presented to t n the tranng stage. We nput a feature vector of route and data parameters to the perceptron along wth the label ω orω 2 ), whch represents the class of the nstance where ω represents a normal nstance and ω2 represents an attack nstance). We begn the tranng wth some random assgnment of weghts. When the perceptron msclassfes an example, the weghts are actvely adapted accordng to the followng perceptron tranng rule, w x = w + η x f w x and x ω, and w = w η x f w x and x ω2, 3) where η s the learnng rate of the algorthm whch moderates the extent to whch weghts are changed. We set η to a small value of.2. Thus, N tranng examples consstng of normal and attack nstances are presented to the algorthm teratvely. The algorthm s repeated untl all the examples are correctly classfed. Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $2. 27

5 Cluster 2 Slhouette Value True Postve R ate Tranng Sample Sze True Postve Rate False Postve Rate Fgure 7. Lnearly separable tranng data Fgure 8. Effect of tranng sample sze on true postve rate Fgure 9. ROC Curve It s mportant to note that a perceptron can be appled for lnearly separable data ponts only. To hghlght the fact that the attack nstances and the normal nstances are lnearly separable n the space of detecton metrcs, we tested the data by performng k-means clusterng test [6]. We see from the slhouette plot MATLAB) n Fg. 7, that our tranng sample s perfectly classfed nto two clusters attack and non-attack nstances). 5. Performance analyss In ths secton, we study the performance of our proposed perceptron based IDS usng smulatons performed n ns-2 [5]. We use the same scenaro and attack confguraton as descrbed n Secton 3. Each smulaton s run for 6 seconds. We generate a sample sze of 33,5 feature ponts, comprsng of 5 % of attack nstances and 5 % of normal nstances. The tranng perod s set for 5 epochs so that the weghts of the perceptron model converge for sure. We use about 5 % of the generated data for our tranng model and the other half s used later for testng and valdaton purposes. We evaluate the network performance based on the followng detecton metrcs: True postves TP): Number of tmes an alert s rased, when an attack s present. False negatves FN): Number of tmes when no alert s rased, but attack s present. False postves FP): Number of tmes when alert s rased, but attack s not present. True negatves TN): Number of tmes when no alert s rased, when no attack s present. The performance of our classfcaton algorthm s thus based on TPR True postve rate) and FPR False postve rate). TPR = TP, whch s the rato of TP + FN number of alerts when there s an attack to total number of attacks. Smlarly, FPR = FP. TN + FP We llustrate the detecton accuracy TPR) of the traned perceptron model for varous szes of tranng sample n Fg. 8. We fnd that the accuracy of the model s less for a small sample sze. The model acheves best results for a tranng sze of 4-8 nstances. We next study the Recever Operatng Characterstcs ROC) curve TPR vs. FPR) whch reflects the tradeoffs n the senstvty of the detecton algorthm. Fg. 9 shows the ROC curve for our detecton scheme. We observe that n our scheme very less number of normal nstances are msclassfed as anomales as seen by FPR value) and all attack nstances are correctly dentfed as ntrusons as seen by the hgh TPR value close to ). Table. 2 summerzes the msclassfcaton rate of our traned algorthm for dfferent generaton rate of RREQs by a sngle malcous MR. Msclassfcaton rate s defned as the percentage of nputs msclassfed durng one tranng epoch nclude FP and FN). Table 2. Msclassfcaton rates of perceptron Bogus RREQ generaton rate Msclassfcaton rate RREQ/sec.98 % 5 RREQ/sec.988 % RREQ/sec.9995 % Fg. demonstrates the detecton ablty of our system when the number of malcous MRs generatng malcous requests s ncreased. Even f only a small percentage of the MRs are malcous, we see that our perceptron based IDS accurately detects them wth a hgh TPR of 98% and has close to % detecton rate for largely compromsed network. Ths s because for a hgh attack rate, the data s easly separable n the space of detecton metrcs and s thus easly classfable by the perceptron model. Smlarly, Fg. shows the FPR for varyng number of good MRs. A large number of good MRs mply very few MRs are compromsed. It can be seen that the maxmum value of FPR s wthn 23%, for a largely compromsed WMN. We also see that as the attack rate ncreases, the FPR ncreases ndcatng that a Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $2. 27

6 True Postve Rates RREQ 2 RREQ 5 RREQ RREQ Number of Msbehavng MRs False Postve Rate RREQ 2 RREQ 5 RREQ RREQ Number of Well Behavng MRs True Postve Rat Learnng Rate Fgure. TPR under varyng number of msbehavng MRs Fgure. FPR under varyng number of well behavng MRs Fgure 2. Effect of learnng threshold on the detecton rate small percentage of false alarms would be rased from tme-to-tme. Both graphs prove that the proposed perceptron based IDS has a very hgh TPR %) and a low FPR 23%). The proposed IDS, thus detects malcous route dscoveres accurately and effcently. It also llustrates the fact that the features detecton metrcs) selected as nputs for tranng the perceptron model, are accurate predctors of the attack. We next study the effect of learnng rate η ) on the detecton rate of our proposed IDS. It s mportant to choose a small value for the perceptron to correctly classfy the data wth a low FPR and a hgh TPR. We see from Fg. 2, that a lower learnng rate has a hgher detecton rate over hgher learnng rate. Hence, we choose an deal learnng rate of.2 for our model. 6. Concluson and future work In ths paper, we propose to use an ntellgent machne learnng technque based on lnear perceptron classfer to detect malcous route dscoveres. We model the detecton of malcous route flood as a classfcaton problem. As malcous route flood attack has a global effect at every MR n the WMN, the IDS rases a tmely alert on the occurrence of the attack. We prove through extensve smulatons, that our perceptron based IDS model has a hgh detecton rate and a low false postve rate. As a part of our future work, we plan to use other machne learnng technques lke mult-layer perceptron model to detect attacks lke selfsh node and blackhole attack, whch fal to get classfed by a lnear perceptron model. 7. References [] N. Nandrau, D. Nandrau, L. Santhanam, B. He, J. Wang, and D. P. Agrawal, Wreless mesh networks: current challenges and future drectons of web-n-thesky, To appear n IEEE Communcaton Magazne. [2] P. Nng and K. Sun, How to msuse AODV: a case study of nsder attacks aganst moble ad-hoc routng protocols, Ad Hoc Networks, 36), pp , 25. [3] B. Bhargava, W. Wang, and Y. Lu, On vulnerablty and protecton of ad hoc on-demand dstance vector prototol, In the Proc. of Internatonal Conference on Telecommuncaton, 23. [4] Y. Hu, D. B. Johnson, and A. Perrg, SEAD: secure effcent dstance vector routng for moble wreless ad hoc networks, Ad Hoc Networks, pp , 23. [5] Y. Hu, A. Perrg, and D. B. Johnson, Aradne: a secure on-demand routng protocol for ad hoc networks, In the Proc. of ACM Mobcom, pp. 2-23, 22. [6] S.-Y. N, Y. C. Tseng, Y. Shyan, and J.-P. Sheu, The broadccast storm problem n a moble ad hoc networks, In the Proc. of IEEE MCN, pp , 999. [7] S. Deslva and R. V. Boppana, Mtgatng malcous control packets floods n ad hoc networks, In the Proc. of IEEE WCNC, Vol.4, pp , 25. [8] A. Valdes and D. Anderson, Statstcal methods for computer usage anomaly detecton usng NIDES, Techncal report, SRI Internatonal, January 995. [9] W. Lee, S. J. Stolfo, and K. W. Mok, A data mnng framework for buldng ntruson detecton models, In the Proc. of IEEE Symposum of Securty and Prvacy, pp. 2-32,999. [] J. Cannady, Artfcal neural networks for msuse detecton, In the Proc. NISSC, pp , 998. [] Z. Zhang, J. L, C. N. Mankopoulos, J. Jorgenson, and J. Ucles, HIDE: A herarchal network ntruson detecton system usng statstcal preprocessng and neural network classfcaton, In the Proc. of Workshop on Informaton Assurance and Securty, pp. 85-9, 2. [2] A. K. Ghosh, J. Wanken, and F. Charron, Detectng anomalous and unknown ntrusons aganst programs, In the Proc. of Computer Securty Applcatons Conference, pp , 998. [3] C. Saterls and V. Maglars, Detectng ncomng and outgong DDoS attacks at the edge usng a sngle set of network characterstcs, In the Proc. of th IEEE Intl. Symposum on Computers and Communcaton Systems, pp , 25. [4] Y.-A. Huang and W. Lee, A cooperatve ntruson detecton system for ad hoc networks, In the Proc. of st ACM Workshop on Ad hoc and Sensor Networks, pp , 23. [5] Network Smulator NS-2), [6] S. Theodords and K. Koutroumbas, Pattern Recognton, 3 rd Edton, Academc Press, 997 Proceedngs of the Internatonal Mult-Conference on Computng n the Global Informaton Technology ICCGI'7) /7 $2. 27

Neural Networks in Statistical Anomaly Intrusion Detection

Neural Networks in Statistical Anomaly Intrusion Detection Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition

Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition Detectng Compounded Anomalous SNMP Stuatons Usng Cooperatve Unsupervsed Pattern Recognton Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Machine Learning 9. week

Machine Learning 9. week Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks

Bayesian Model for Mobility Prediction to Support Routing in Mobile Ad-Hoc Networks Bayesan Model for Moblty Predcton to Support Routng n Moble Ad-Hoc Networks Tran The Son, Hoa Le Mnh, Graham Sexton, Nauman Aslam, Zabh Ghassemlooy Northumbra Communcatons Research Laboratory (NCRLab Faculty

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

A Self-Learning Network Anomaly Detection System using Majority Voting

A Self-Learning Network Anomaly Detection System using Majority Voting A Self-Learnng Network Anomaly Detecton System usng Majorty Votng D.Hock and M.Kappes Department of Computer Scence and Engneerng, Unversty of Appled Scences, Frankfurt am Man, Germany e-mal: {dehock kappes}@fb2.fh-frankfurt.de

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks *

Re-routing Instability in IEEE Multi-hop Ad-hoc Networks * Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN Rsk-Based Packet Routng for Prvacy and Complance-Preservng SDN Karan K. Budhraja Abhshek Malvankar Mehd Bahram Chnmay Kundu Ashsh Kundu Mukesh Snghal, Unversty of Maryland, Baltmore County, MD, USA Emal:

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK

NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK NETWORK LIFETIME AND ENERGY EFFICIENT MAXIMIZATION FOR HYBRID WIRELESS NETWORK Prasana kumar. S 1, Deepak.N 2, Tajudeen. H 3, Sakthsundaram. G 4 1,2,3,4Student, Department of Electroncs and Communcaton,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks

A Hybrid Data Mining based Intrusion Detection System for Wireless Local Area Networks Internatonal Journal of Computer Applcatons (0975 8887) A Hybrd Data Mnng based Intruson Detecton System for Wreless Local Area Networks M.Moorthy Professor, Department of MCA Muthayammal Engneerng College,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Face Recognition Based on SVM and 2DPCA

Face Recognition Based on SVM and 2DPCA Vol. 4, o. 3, September, 2011 Face Recognton Based on SVM and 2DPCA Tha Hoang Le, Len Bu Faculty of Informaton Technology, HCMC Unversty of Scence Faculty of Informaton Scences and Engneerng, Unversty

More information

A Misbehavior Detection System for Vehicular Delay Tolerant Networks

A Misbehavior Detection System for Vehicular Delay Tolerant Networks A Msbehavor Detecton System for Vehcular Delay Tolerant Networks Ynghu Guo, Sebastan Schldt, Johannes Morgenroth, Lars Wolf IBR, Technsche Unverstät Braunschweg Mühlenpfordstraße 23, 38106, Braunschweg,

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Real-time Network Attack Intention Recognition Algorithm

Real-time Network Attack Intention Recognition Algorithm Internatonal Journal of Securty and Its Applcatons, pp.51-62 http://dx.do.org/10.14257/sa.2016.10.4.06 Real-tme Network Attack Intenton Recognton Algorthm Qu Hu and Wang Kun Zhengzhou Insttute of Informaton

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks

Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks Channel-Aware Detecton of Gray Hole Attacks n Wreless Mesh Networks Devu Mankantan Shla, Yu Cheng and Trcha Anjal Dept. of Electrcal and Computer Engneerng, Illnos Insttute of Technology, Chcago, USA Abstract

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Long Lifetime Routing in Unreliable Wireless Sensor Networks

Long Lifetime Routing in Unreliable Wireless Sensor Networks 211 Internatonal Conference on Networkng, Sensng and Control Delft, the Netherlands, 11-13 Aprl 211 Long Lfetme Routng n Unrelable Wreless Sensor Networks Hamed Yousef, Mohammad Hossen Yeganeh, Al Movaghar

More information

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network*

A Secure Hybrid Wireless Mesh Protocol for s Mesh Network* A Secure Hybrd Wreless Mesh Protocol for 802.11s Mesh Network* Md. Sharful Islam, Young Jg Yoon, Md. Abdul Hamd, and Choong Seon Hong** Department of Computer Engneerng, Kyung Hee Unversty, Republc of

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

EFT: a high throughput routing metric for IEEE s wireless mesh networks

EFT: a high throughput routing metric for IEEE s wireless mesh networks Ann. Telecommun. (2010) 65:247 262 DOI 10.1007/s12243-009-0130-1 EFT: a hgh throughput routng metrc for IEEE 802.11s wreless mesh networks Md. Sharful Islam Muhammad Mahbub Alam Md. Abdul Hamd Choong Seon

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network

A Novel Fuzzy Stochastic Routing Protocol For Mobile AdHoc Network Avalable Onlne at www.jcsmc.com Internatonal Journal of Computer Scence and Moble Computng A Monthly Journal of Computer Scence and Informaton Technology IJCSMC, Vol. 2, Issue. 0, October 203, pg.98 06

More information

Ant Colony Based Node Disjoint Hybrid Multi-path Routing for Mobile Ad Hoc Network

Ant Colony Based Node Disjoint Hybrid Multi-path Routing for Mobile Ad Hoc Network Journal of Computer Scence 4 (2): 80-86, 2008 ISSN 1549-3636 2008 Scence Publcatons Ant Colony Based Node Dsjont Hybrd Mult-path Routng for Moble Ad Hoc Network 1 B. Kalaavath, 2 K. Duraswamy 1 Department

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain

Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Machine Learning. Topic 6: Clustering

Machine Learning. Topic 6: Clustering Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess

More information

A novel intelligent approach for detecting DoS flooding attacks in software-defined networks

A novel intelligent approach for detecting DoS flooding attacks in software-defined networks Internatonal Journal of Advances n Intellgent Informatcs ISSN 2442-6571 Vol. 4, No 1, March 2018, pp. 11-20 11 A novel ntellgent approach for detectng DoS floodng attacks n software-defned networks Majd

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults 1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Neural Network Control for TCP Network Congestion

Neural Network Control for TCP Network Congestion 5 Amercan Control Conference June 8-, 5. Portland, OR, USA FrA3. Neural Network Control for TCP Network Congeston Hyun C. Cho, M. Sam Fadal, Hyunjeong Lee Electrcal Engneerng/6, Unversty of Nevada, Reno,

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Abstract. 1. Introduction

Abstract. 1. Introduction One-Class Tranng for Masquerade Detecton Ke Wang Salvatore J. Stolfo Computer Scence Department, Columba Unversty 500 West 20 th Street, New York, NY, 0027 {kewang, sal}@cs.columba.edu Abstract We extend

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Resource Discovery in P2P Networks Using Evolutionary Neural Networks

Resource Discovery in P2P Networks Using Evolutionary Neural Networks > PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article Jestr Journal of Engneerng cence and Technology Revew 7 (3) (2014) 151 157 Research Artcle JOURAL OF Engneerng cence and Technology Revew www.estr.org Traffc Classfcaton Method by Combnaton of Host Behavour

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

SRBIR: Semantic Region Based Image Retrieval by Extracting the Dominant Region and Semantic Learning

SRBIR: Semantic Region Based Image Retrieval by Extracting the Dominant Region and Semantic Learning Journal of Computer Scence 7 (3): 400-408, 2011 ISSN 1549-3636 2011 Scence Publcatons SRBIR: Semantc Regon Based Image Retreval by Extractng the Domnant Regon and Semantc Learnng 1 I. Felc Raam and 2 S.

More information

Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense

Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense Base Staton Locaton Protecton n Wreless Sensor Networks: Attacks and Defense Juan Chen, Hongl Zhang, Xaojang Du 2, Bnxng Fang, Yan Lu 3, Hanng Yu Research Center of Computer Network and Informaton Securty

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET

CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET CLUSTER BASED COST EFFICIENT INTRUSION DETECTION SYSTEM FOR MANET Saravanan Kumarasamy 1, Hemalatha B 2 and Hashn P 3 1 Asst. Professor/CSE Erode Sengunthar Engneerng College, Erode, Inda 2, 3 B.E. C.S.E.

More information

An Approach for Building Intrusion Detection System by Using Data Mining Techniques

An Approach for Building Intrusion Detection System by Using Data Mining Techniques Internatonal Journal of Emergng Engneerng Research and Technology Volume, Issue, May 04, PP -8 An Approach for Buldng Intruson Detecton System by Usng Data Mnng Technques Praveen P Nak PG Student, Department

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Detection of masquerade attacks on Wireless Sensor Networks

Detection of masquerade attacks on Wireless Sensor Networks Detecton of masquerade attacks on Wreless Sensor Networks Vjay Bhuse,, Ajay Gupta and Ala Al-Fuqaha Department of Computer Scence, Western Mchgan Unversty, alamazoo, MI 49008 Insttute of Securty Technology

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Method of Wireless Sensor Network Data Fusion

Method of Wireless Sensor Network Data Fusion Method of Wreless Sensor Network Data Fuson https://do.org/10.3991/joe.v1309.7589 L-l Ma!! ", Jang-png Lu Inner Mongola Agrcultural Unversty, Hohhot, Inner Mongola, Chna lujangpng@mau.edu.cn J-dong Luo

More information

Learning Non-Linearly Separable Boolean Functions With Linear Threshold Unit Trees and Madaline-Style Networks

Learning Non-Linearly Separable Boolean Functions With Linear Threshold Unit Trees and Madaline-Style Networks In AAAI-93: Proceedngs of the 11th Natonal Conference on Artfcal Intellgence, 33-1. Menlo Park, CA: AAAI Press. Learnng Non-Lnearly Separable Boolean Functons Wth Lnear Threshold Unt Trees and Madalne-Style

More information

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks

The Impact of Delayed Acknowledgement on E-TCP Performance In Wireless networks The mpact of Delayed Acknoledgement on E-TCP Performance n Wreless netorks Deddy Chandra and Rchard J. Harrs School of Electrcal and Computer System Engneerng Royal Melbourne nsttute of Technology Melbourne,

More information

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY

ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K SANKAR: ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS A SURVEY K. Sankar Department of Computer Scence and Engneerng,

More information