Hardware-Based IPS for Embedded Systems
|
|
- Quentin Marshall
- 5 years ago
- Views:
Transcription
1 Hardware-Baed IPS for Embedded Sytem Tomoaki SATO, C&C Sytem Center, Hiroaki Univerity Hiroaki Japan Shuya IMARUOKA and Maa-aki FUKASE Graduate School of Science and Technology, Hiroaki Univerity Hiroaki Japan ABSTRACT Some embedded ytem are ued with the Internet. In that cae, protection from unauthorized computer acce or attack i required, and the olution by oftware i difficult. Additionally, the olution with hardware ha limitation of conumption of power and hardware reource. In thi paper, Hardware-Baed IPS (Intruion Prevention Sytem) for Embedded Sytem i propoed. The IPS i compoed of Firewall Unit and DoS Attack Detection Unit. Power conumption of the IPS i reduced by Firewall Unit and wave-pipelining. Proceing peed of Firewall Unit and DoS Attack Detection Unit i evaluated. The reult how that they are able to correpond to Gigabit Ethernet. Keyword: IPS, Embedded Sytem, Firewall Unit, Wave-Pipelining 1. INTRODUCTION Variou embedded ytem are ued with the Internet connection. Connecting an embedded ytem with computer network enable it control and obervation from a remote place. Example of uing it are a recording reervation of a televiion program from a detination and obervation of a houe for ecurity, etc. Connecting an embedded ytem to computer network need to olve problem on network ecurity and it i very difficult. The low-power operation and the miniaturization of the embedded ytem are demanded. Baically, it i compoed by a low-peed CPU and a mall amount of memory. Therefore, Security oftware which i like anti-viru oftware or HIPS (Hot-baed Intruion Prevention Sytem) oftware cannot be ued on the embedded ytem. A mobile phone i generated in thi problem. In thi paper, the author propoe a HIPS for embedded ytem. The HIPS operate by mall circuit and low-power conumption. It i compoed by Firewall Unit and DoS Attack Detection Unit. Firewall Unit i needed for protecting unauthorized acce, reduction of detection circuit, and power control of the HIPS. Becaue a low-peed CPU cannot operate normally while having received DoS Attack, DoS Attack Detection Unit i epecially needed in the embedded ytem. Becaue ome embedded ytem ue FPGA, the author ue FPGA for development of HIPS circuit. 2. HIPS FOR EMBEDDED SYSTEMS Operation of IPS or IDS (Intruion Detection Sytem) [1] without a problem i indipenable to prevent information leakage or illegal operation. Conventional IPS and IDS are claified into network-baed and hot-baed depend on place where the ytem i et up and have following problem. Hot-baed IPS (HIPS) and Hot-baed IDS (HIDS) They conume CPU power and electric power of buttery by detection proceing. Network-baed IPS (NIPS) and Network-baed IDS (NIDS) They are not able to detect unauthorized computer acce that occur between computer in LAN. They are hard to proce all the packet analye with the increae of the amount of packet. A high performance computer i needed for them and expenive. In addition, intallation of IPS or IDS on an embedded ytem uch a a mobile phone and a PDA i difficult. A CPU of the embedded ytem operate more low-peed than PC and ultra low-power
2 conumption. And an old or low-peed PC ha a imilar problem. To olve thee problem, we have developed and H-HIPS (Hardware-baed HIPS) and H-HIDS (Hardware-baed HIDS) [2]. H-HIPS furnihing the function of both NIPS and HIPS i logic-baed HIPS achieved by FPGA (Field programmable gate array). Thi i reconfigurable hardware. Baic algorithm of conventional HIPS have been made ue of to the Netlit of FPGA. In deigning H-HIPS, we aim to achieve more advantageou feature with le power than conventional HIPS. However, H-HIPS i not applicable in an embedded ytem. The reaon i a follow. Power conumption of an embedded ytem i limited more than that of a PC. The pace of a proceor i limited. H-HIPS for Embedded Sytem which i hown in Fig. 1 i H-HIPS to olve thee problem. The IPS i compoed of Firewall Unit and DoS Attack Detection Unit. Power conumption of the IPS i reduced by Firewall Unit and wave-pipelining. multifunctional wave-pipeline, a wave-pipelined ALU ha recently appeared [6]-[9]. Then, a microproceor developed by uing wave-pipeline in part appeared [10]. It i 14-egment ULTRASPARC-III whoe econd and third intruction fetch egment have been wave-pipelined. Another example i an aynchronou wave-pipeline, though it i not compatible with conventional proceor. Wave-pipelined LFSR (Linear Feedback Shift Regiter) that i a equential circuit had not been achieved [5]. Circuit for CRC proceing and peudorandom number generation of WEP i required and alway operate in H-HIPS. They are compoed of LFSR circuit. Becaue LFSR circuit have a lot of regiter, deign for low-power and high-peed i indipenable. Therefore, we have developed wave-pipelined LFSR circuit. A reult, we have clarified that wave-pipelined LFSR circuit archive coexiting of low-power and high-peed operation [11]. NIC FPGA Ethernet Cable RJ-45 Connector Ethernet Controller NIOS CPU Function Clock Wave- Control Pipelined Firewall Unit DoS Attack Detection Unit Clock (a) Stage 1 Stage 2 Stage 2 Fig. 1 H-HIPS for Embedded Sytem regiter Critical path regiter 3. WAVE PIPELINING (b) Not only high clock frequency but alo low power diipation can be obtained at the ame time by wave-pipelining [3]-[5]. It exploit high throughput combinational logic block in which a many a data are launched unle they conflict. Although wave-pipelining wa attempted to the entire region of a proceor, it wa viewed peimitically becaue it require removing general regiter a well a pipeline regiter from proceor. It eem hard to eliminate general regiter playing fundamental role in equential circuit. The inufficient power of CAD tool o far developed i another reaon why wave-pipeline have been applied out of proceor. Accordingly, deign and evaluation method for wave-pipeline have not yet etablihed well compared with thoe for conventional pipeline. Motly wave-pipeline have been o far applied to imple unifunctional circuit uch a adder, multi-plier, counter, and DRAM. Regarding Fig. 2 Synchronization of pipeline (a) Wave-pipeline. (b) Conventional pipeline. Logic depth D MAX -path D MIN -path Time TCK D MAX + T OV Fig. 3 Wave model of Fig. 2 (a).
3 The ignal path of combinational circuit i uneven of delay time. The mot high-peed ignal in one group in a clock ha the poibility to collide with the low ignal in jut before clock. The problem wa olved to wave-pipelined combinational circuit hown in Fig. 2 (a) by the delay time of all ignal path i brought cloe at the delay time of critical path. The relation between the clock cycle and delay i obtained a follow [5]. T CK > ( D MAX - D MIN ) + T OV (1) Here, T CK : Clock cycle time T OV : Overhead time From Eq. (1), D MAX - D MIN hould be cloe to 0 a much a poible in order to obtain minimum T ck. One of olution to atify thi requirement can be conceived from Fig. 3 that how relation between time and logical depth. 100 MHz operation are confirmed. TABLE I CONTROLLED PORTS Function Port Number Binary NOP SMTP DNS HTTP POP HTTPS TABLE II DEVELOPMENT ENVIRONMENT OF FIREWALL UNIT CPU Intel Core 2 Duo E6600 (2.4GHz) Memory 2G Byte OS Micorooft Window XP Pro. SP3 Logic ynthei Altera Quartu II V FIREWALL UNIT Simulator Mentor Graphic ModelSim Altera 6.1g FPGA Device Altera Cyclone EP1C20F400C7 Fig. 4 how the outline of the firewall for H-HIPS [12]. In thi work, the controlled port are for uing a mobile computing, and they are at leat needed. Table I i the controlled port. Becaue the firewall unit i developed by FPGA, the change of port i very eay. Fig. 5 how yntheized circuit by uing development environment of Table II. Maximum delay time of the circuit i 17.9 n. The circuit can operate at 50 MHz by conventional operation. And, Minimum delay time i 12.3 n. According to Eq. (1), they can operate at 100MHz by wave-pipelined operation. The gate-level imulation are executed for confirming wave-pipelined operation. Fig. 6 how conventional operation and Fig. 7 how wave-pipelined operation. According to the reult of Fig. 7, Fig. 5 Firewall Unit. 20 n Fig. 4 Firewall for H-HIPS. Fig. 6 Conventional Operation (50MHz).
4 10 n 20 n START Initialization Timer=0; Data Sum=0; Timer tart Data Sum=Data Sum + Data length Fig. 7 Wave-Pipelined Operation (100MHz). 5. DOS ATTACK ANALYSIS UNIT no Set value < Timer ye Packet to client computer Timer=0; Data Sum=0; Set value < Data Sum no Detection of DoS Attack Notification of Max_IP,Max_DL Prevention of Do Attack END ye DoS attack end a large amount of packet to a computer, and it give the computer an over load. A a reult, the computer loe function. The ue of anti-viru oftware i one of the olution for protecting DoS attack. However, the protection of uing oftware conume CPU and memory reource. To olve thi problem, we propoe to build H-HIPS into Do Attack Analyi Unit [13]. The unit i compoed of FPGA a well a other analye and protecting unit. We develop the unit by uing the development environment hown in Table III. TABLE III DEVELOPMENT ENVIRONMENT OF DOS ATTACK ANALYSIS UNIT Platform Microoft Window 2000 CPU Intel Pentium III (1GHz) Main Memory 512 MByte CAD Altera Quartu II FPGA Altera Cyclone EP1C20F400C7 To protect Do attack, the unit need a ender IP addre and the number of packet. Becaue Do attack give a load to a computer by a great deal of packet of hort time, Do attack i judged by the number of packet each unit time. The flow chart of Do Attack Analyi Unit i hown in Fig, 8 and the hardware tructure i hown in Fig. 9. We imulate circuit of Fig. 9 at the gate level. Reult of Stored Unit i hown in Fig.10 and Reult of Detecting Unit i hown Fig. 11. According to reult, 56.8 MHz operation i confirmed. Becaue word ize of Circuit of Do Attack Analyi Unit i 48 bit, the unit can correpond to 2.6Gbp. RESET 1 CLK1 IP Addre Data Length 16 From NioII Fig. 8 Flow chart of Do Attack Analyi Unite. Stored unit IP Addre Max Data Length R_RAM2 48 Detecting unit Data Control Detection ignal 1 IP Addre Max Data Length 16 Data SUM 16 To Protection unit Fig. 9 Hardware tructure of Do Attack Analyi Unit.
5 RESET CLK Write Enable IP Addre Data length R_A_1 IP Addre Data Length RAM1_OUT R_A_2 RAM2_OUT W_A_2 W_D_2 W_E_2 N_P Fig. 10 Simulation reult of Stored Unit. Non-DoS ThreholdData Sum= 700Byte RESET CLK W_E DataLeng thw_e_2 W_D_2 Data_Sum Div_5 Div_10 T_Time Detect Clear Max_DL Max_IP 200Byte 200Byte 200Byte ThrehouldTime = Threhold Time DoS RESET CLK W_E DataLength W_E_2 W_D_2 Data_Sum Div_5 Div_10 T_Time Detect Clear Max_DL Max_IP ThreholdData Sum= 500Byte 200Byte 200Byte 200Byte ThrehouldTime = Byte 500Byte 600Byte 400Byte 700Byte Max IP : Max DL: 400Byte Fig. 11 Simulation reult of Detecting Unit. 6. CONCLUDING REMARKS Thi paper ha decribed the propoal of H-HIPS for Embedded Sytem. The ytem i compoed of Firewall Unit and DoS Attack Detection Unit. Firewall Unit operate by wave-pipelining and it i ued for the clock control. Becaue the unit doe not have a regiter, it hardly conume electric power. And the clock peed of the unit correpond to Giga-bit Ethernet. DoS Attack Detection Unit i deigned by uing FPGA which i low-peed operation. However, according to the gate-level imulation, throughput of the unit i 2.6 GHz. Our future work are evaluation of power and performance at ytem-level.
6 ACKNOWLEDGMENT Thi work ha been upported in part by Grant-in-Aid for Young Scientit (B) ( ) from Minitry of Education, Culture, Sport, Science and Technology, Japan. of ISPACS 2008, pp , [13] Tomoaki Sato, Kazuhira Kikuchi, Syuya Imaruoka, and Maa-aki Fukae, "DoS Attack Analyi for H-HIPS," Proc. of IMETI, Vol. II, pp , REFERENCES [1] Keiji TAKEDA and Hirohi Iozaki, Network Intruion Detection, Soft Bank Pub., [2] T. Sato, R. Sakuma, D. Miyamori, and M. Fukae, Hardware Security-Embedded Wirele LAN Proceor, Proc. of ECTI-CON 2006, Vol. II, pp , [3] L. Cotton, Maximum rate pipelining ytem, Proc. AFIPS Spring Joint Computer Conference, pp , [4] F. Kla and M. J. Flynn, COMPARATIVE STUDIES OF PIPELINED CIRCUITS, Stanford Univerity Technical Report, No. CSL-TR , July [5] W. P. Burleon, M. Cieielki, F. Kla, and W. Liu, Wave-Pipelining: A Tutorial and Reearch Survey, IEEE Tran. on Very Large Scale Integration (VLSI) Sytem, Vol. 6, No. 3, pp , Sept [6] T. Sato, M. Fukae, and T. Nakamura, Performance analyi of a wave-pipelined ALU, Technical Report of IEICE, CPSY 2000, Vol. 100, No. 20, pp. 1-6, [7] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Scaling up of Wave Pipeline, THE FOURTEENTH INTERNATIONAL CONFERENCE ON VLSI DESIGN, Jun [8] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Breakthrough of Supercalar Proceor by Multifunctional Wave-Pipeline, Proc. of 9th NASA Sympoium on VLSI Deign, pp , Nov [9] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Deigning a Wave-Pipelined Vector Proceor, Proc. of the Tenth Workhop on Synthei and Sytem Integration of Mixed Technologie, pp , Oct [10] Tim Horel and Gary Lauterbach, UltraSPARC-III: Deigning Third-Generation 64-Bit Performance, IEEE Micro, Vol. 19, No. 3, pp , [11] T. Sato, R. Sakuma, D. Miyamori, and M. Fukae, Waved-LFSR Circuit for Hardware-baed Intruion Detection Sytem, Proc. of ECTI-CON2006, pp , [12] Tomoaki Sato, Syuya Imaruoka, and Maa-aki Fukae, Reconfigurable Firewall Unit by Wave-Pipelined Operation, proc.
Delay Time Analysis of Reconfigurable. Firewall Unit
Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationIntegration of Digital Test Tools to the Internet-Based Environment MOSCITO
Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationFall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:
Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:
More informationFall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:
Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationSpring 2012 EE457 Instructor: Gandhi Puvvada
Spring 2012 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 2/17/2012, Friday in SLH200 Calculator and Cadence Verilog Guide are allowed; Time: 10:00AM-12:45PM Cloed-book/Cloed-note Exam Total point:
More informationLecture 8: More Pipelining
Overview Lecture 8: More Pipelining David Black-Schaffer davidbb@tanford.edu EE8 Spring 00 Getting Started with Lab Jut get a ingle pixel calculating at one time Then look into filling your pipeline Multiplier
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationBuilding a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique
202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique
More informationDigifort Standard. Architecture
Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion
More information13/ 12/ Am ade us IT Gro up and its affil iate s and sub sidi arie s. Development Last update: 04/27/2017 Page 1 of 12. amadeus-hospitality.
u it ub idi Lat date: 04/27/7 Page 1 of 12 amu-hopitality.com u it ub idi Index I-Server 2.0 AP4 I-Server 2.0 AP4 Sytem Requirement...3 Additional Server Requirement...4 Sytem Requirement Worktation Requirement...5
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationAn Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System
Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationThe Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationDynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array
Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science
More informationA Basic Prototype for Enterprise Level Project Management
A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationFor use in May 2012, November 2012, May 2013 and November 2013
M&N12&13/5/COMSC/BP2/ENG/TZ0/XX/CS COMPUTER SCIENCE CASE STUDY: SMARTPHONES For ue in May 2012, November 2012, May 2013 and November 2013 INSTRUCTIONS TO CANDIDATES Cae tudy booklet required for higher
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationKinematics Programming for Cooperating Robotic Systems
Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationDomain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures
Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationFinite State Machine Based Reconfigurable Architecture For Image Processor
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Reearch in Science, Engineering and Technology Volume 3, Special Iue 3, March 2014 2014 International Conference on
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationSIMIT 7. Profinet IO Gateway. User Manual
SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationAn FPGA Architecture for ASIC-FPGA Co-Design to Streamline Processing of IDSs
2016 International onference on ollaboration Technologies and Systems An FPGA Architecture for ASI-FPGA o-design to Streamline Processing of IDSs Tomoaki Sato Sorawat hivapreecha, Phichet Moungnoul Kohji
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationAll in-focus View Synthesis from Under-Sampled Light Fields
ICAT 2003 December 3-5, Tokyo, Japan All in-focu View Synthei from Under-Sampled Light Field Keita Takahahi,AkiraKubota and Takehi Naemura TheUniverityofTokyo Carnegie Mellon Univerity 7-3-1, Hongo, Bunkyo-ku,
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More information(12) United States Patent
U009250939B2 (12) United tate Patent Odaira (54) INFORMATION PROCEING DEVICE, PROFILE TARGET DETERMINING PROGRAM, AND METHOD (71) Applicant: International Buine Machine Corporation, Armonk, NY (U) (72)
More informationArchitecture and grid application of cluster computing system
Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,
More informationAdvanced Datapath Synthesis using Graph Isomorphism
Advanced Datapath Synthei uing Graph Iomorphim Cunxi Yu, Mihir Choudhury 2, Andrew Sullivan 2, Maciej Cieielki ECE Department, Univerity o Maachuett, Amhert *IBM T.J Waton Reearch Center 2 ycunxi@uma.edu,
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationSynthesis of Signal Processing Structured Datapaths for FPGAs Supporting RAMs and Busses
Synthei of Signal Proceing Structured Datapath for FPGA Supporting AM and Bue Baher Haroun and Behzad Sajjadi Department of lectrical and Computer ngineering, Concordia Univerity 455 de Maionneuve Blvd.
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationVLSI Design 9. Datapath Design
VLSI Deign 9. Datapath Deign 9. Datapath Deign Lat module: Adder circuit Simple adder Fat addition Thi module omparator Shifter Multi-input Adder Multiplier omparator detector: A = 1 detector: A = 11 111
More information999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States
(19) United State US 2006O1296.60A1 (12) Patent Application Publication (10) Pub. No.: Mueller et al. (43) Pub. Date: Jun. 15, 2006 (54) METHOD AND COMPUTER SYSTEM FOR QUEUE PROCESSING (76) Inventor: Wolfgang
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationarxiv: v1 [cs.ar] 31 Aug 2017
Advanced Datapath Synthei uing Graph Iomorphim Cunxi Yu, Mihir Choudhury 2, Andrew Sullivan 2, Maciej Cieielki ECE Department, Univerity o Maachuett, Amhert IBM T.J Waton Reearch Center 2 ycunxi@uma.edu,
More informationPERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM
PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication
More informationWhat is "Computer Architecture" ECE 4680 Computer Architecture and Organization. Lecture 1: A Short Journey to the World of Computer Architecture
ece4680 Lect Intro. February 6, 2002 What i "Computer Architecture" ECE 4680 Computer Architecture and Organization Lecture : A Short Journey to the World of Computer Architecture Baic Idea and Definition
More informationAudio-Visual Voice Command Recognition in Noisy Conditions
Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationOptimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit
Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationParallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges
American Journal of Applied Science 4 (5): 300-306, 2007 ISSN 1546-9239 2007 Science Publication Correponding Author: Parallel Approache for Interval Analyi of Variable Statitic in Large and Spare Linear
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationA Novel Grey-RSS Navigation System Design for Mobile Robots
A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More information3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts
3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More information