Hardware-Based IPS for Embedded Systems

Size: px
Start display at page:

Download "Hardware-Based IPS for Embedded Systems"

Transcription

1 Hardware-Baed IPS for Embedded Sytem Tomoaki SATO, C&C Sytem Center, Hiroaki Univerity Hiroaki Japan Shuya IMARUOKA and Maa-aki FUKASE Graduate School of Science and Technology, Hiroaki Univerity Hiroaki Japan ABSTRACT Some embedded ytem are ued with the Internet. In that cae, protection from unauthorized computer acce or attack i required, and the olution by oftware i difficult. Additionally, the olution with hardware ha limitation of conumption of power and hardware reource. In thi paper, Hardware-Baed IPS (Intruion Prevention Sytem) for Embedded Sytem i propoed. The IPS i compoed of Firewall Unit and DoS Attack Detection Unit. Power conumption of the IPS i reduced by Firewall Unit and wave-pipelining. Proceing peed of Firewall Unit and DoS Attack Detection Unit i evaluated. The reult how that they are able to correpond to Gigabit Ethernet. Keyword: IPS, Embedded Sytem, Firewall Unit, Wave-Pipelining 1. INTRODUCTION Variou embedded ytem are ued with the Internet connection. Connecting an embedded ytem with computer network enable it control and obervation from a remote place. Example of uing it are a recording reervation of a televiion program from a detination and obervation of a houe for ecurity, etc. Connecting an embedded ytem to computer network need to olve problem on network ecurity and it i very difficult. The low-power operation and the miniaturization of the embedded ytem are demanded. Baically, it i compoed by a low-peed CPU and a mall amount of memory. Therefore, Security oftware which i like anti-viru oftware or HIPS (Hot-baed Intruion Prevention Sytem) oftware cannot be ued on the embedded ytem. A mobile phone i generated in thi problem. In thi paper, the author propoe a HIPS for embedded ytem. The HIPS operate by mall circuit and low-power conumption. It i compoed by Firewall Unit and DoS Attack Detection Unit. Firewall Unit i needed for protecting unauthorized acce, reduction of detection circuit, and power control of the HIPS. Becaue a low-peed CPU cannot operate normally while having received DoS Attack, DoS Attack Detection Unit i epecially needed in the embedded ytem. Becaue ome embedded ytem ue FPGA, the author ue FPGA for development of HIPS circuit. 2. HIPS FOR EMBEDDED SYSTEMS Operation of IPS or IDS (Intruion Detection Sytem) [1] without a problem i indipenable to prevent information leakage or illegal operation. Conventional IPS and IDS are claified into network-baed and hot-baed depend on place where the ytem i et up and have following problem. Hot-baed IPS (HIPS) and Hot-baed IDS (HIDS) They conume CPU power and electric power of buttery by detection proceing. Network-baed IPS (NIPS) and Network-baed IDS (NIDS) They are not able to detect unauthorized computer acce that occur between computer in LAN. They are hard to proce all the packet analye with the increae of the amount of packet. A high performance computer i needed for them and expenive. In addition, intallation of IPS or IDS on an embedded ytem uch a a mobile phone and a PDA i difficult. A CPU of the embedded ytem operate more low-peed than PC and ultra low-power

2 conumption. And an old or low-peed PC ha a imilar problem. To olve thee problem, we have developed and H-HIPS (Hardware-baed HIPS) and H-HIDS (Hardware-baed HIDS) [2]. H-HIPS furnihing the function of both NIPS and HIPS i logic-baed HIPS achieved by FPGA (Field programmable gate array). Thi i reconfigurable hardware. Baic algorithm of conventional HIPS have been made ue of to the Netlit of FPGA. In deigning H-HIPS, we aim to achieve more advantageou feature with le power than conventional HIPS. However, H-HIPS i not applicable in an embedded ytem. The reaon i a follow. Power conumption of an embedded ytem i limited more than that of a PC. The pace of a proceor i limited. H-HIPS for Embedded Sytem which i hown in Fig. 1 i H-HIPS to olve thee problem. The IPS i compoed of Firewall Unit and DoS Attack Detection Unit. Power conumption of the IPS i reduced by Firewall Unit and wave-pipelining. multifunctional wave-pipeline, a wave-pipelined ALU ha recently appeared [6]-[9]. Then, a microproceor developed by uing wave-pipeline in part appeared [10]. It i 14-egment ULTRASPARC-III whoe econd and third intruction fetch egment have been wave-pipelined. Another example i an aynchronou wave-pipeline, though it i not compatible with conventional proceor. Wave-pipelined LFSR (Linear Feedback Shift Regiter) that i a equential circuit had not been achieved [5]. Circuit for CRC proceing and peudorandom number generation of WEP i required and alway operate in H-HIPS. They are compoed of LFSR circuit. Becaue LFSR circuit have a lot of regiter, deign for low-power and high-peed i indipenable. Therefore, we have developed wave-pipelined LFSR circuit. A reult, we have clarified that wave-pipelined LFSR circuit archive coexiting of low-power and high-peed operation [11]. NIC FPGA Ethernet Cable RJ-45 Connector Ethernet Controller NIOS CPU Function Clock Wave- Control Pipelined Firewall Unit DoS Attack Detection Unit Clock (a) Stage 1 Stage 2 Stage 2 Fig. 1 H-HIPS for Embedded Sytem regiter Critical path regiter 3. WAVE PIPELINING (b) Not only high clock frequency but alo low power diipation can be obtained at the ame time by wave-pipelining [3]-[5]. It exploit high throughput combinational logic block in which a many a data are launched unle they conflict. Although wave-pipelining wa attempted to the entire region of a proceor, it wa viewed peimitically becaue it require removing general regiter a well a pipeline regiter from proceor. It eem hard to eliminate general regiter playing fundamental role in equential circuit. The inufficient power of CAD tool o far developed i another reaon why wave-pipeline have been applied out of proceor. Accordingly, deign and evaluation method for wave-pipeline have not yet etablihed well compared with thoe for conventional pipeline. Motly wave-pipeline have been o far applied to imple unifunctional circuit uch a adder, multi-plier, counter, and DRAM. Regarding Fig. 2 Synchronization of pipeline (a) Wave-pipeline. (b) Conventional pipeline. Logic depth D MAX -path D MIN -path Time TCK D MAX + T OV Fig. 3 Wave model of Fig. 2 (a).

3 The ignal path of combinational circuit i uneven of delay time. The mot high-peed ignal in one group in a clock ha the poibility to collide with the low ignal in jut before clock. The problem wa olved to wave-pipelined combinational circuit hown in Fig. 2 (a) by the delay time of all ignal path i brought cloe at the delay time of critical path. The relation between the clock cycle and delay i obtained a follow [5]. T CK > ( D MAX - D MIN ) + T OV (1) Here, T CK : Clock cycle time T OV : Overhead time From Eq. (1), D MAX - D MIN hould be cloe to 0 a much a poible in order to obtain minimum T ck. One of olution to atify thi requirement can be conceived from Fig. 3 that how relation between time and logical depth. 100 MHz operation are confirmed. TABLE I CONTROLLED PORTS Function Port Number Binary NOP SMTP DNS HTTP POP HTTPS TABLE II DEVELOPMENT ENVIRONMENT OF FIREWALL UNIT CPU Intel Core 2 Duo E6600 (2.4GHz) Memory 2G Byte OS Micorooft Window XP Pro. SP3 Logic ynthei Altera Quartu II V FIREWALL UNIT Simulator Mentor Graphic ModelSim Altera 6.1g FPGA Device Altera Cyclone EP1C20F400C7 Fig. 4 how the outline of the firewall for H-HIPS [12]. In thi work, the controlled port are for uing a mobile computing, and they are at leat needed. Table I i the controlled port. Becaue the firewall unit i developed by FPGA, the change of port i very eay. Fig. 5 how yntheized circuit by uing development environment of Table II. Maximum delay time of the circuit i 17.9 n. The circuit can operate at 50 MHz by conventional operation. And, Minimum delay time i 12.3 n. According to Eq. (1), they can operate at 100MHz by wave-pipelined operation. The gate-level imulation are executed for confirming wave-pipelined operation. Fig. 6 how conventional operation and Fig. 7 how wave-pipelined operation. According to the reult of Fig. 7, Fig. 5 Firewall Unit. 20 n Fig. 4 Firewall for H-HIPS. Fig. 6 Conventional Operation (50MHz).

4 10 n 20 n START Initialization Timer=0; Data Sum=0; Timer tart Data Sum=Data Sum + Data length Fig. 7 Wave-Pipelined Operation (100MHz). 5. DOS ATTACK ANALYSIS UNIT no Set value < Timer ye Packet to client computer Timer=0; Data Sum=0; Set value < Data Sum no Detection of DoS Attack Notification of Max_IP,Max_DL Prevention of Do Attack END ye DoS attack end a large amount of packet to a computer, and it give the computer an over load. A a reult, the computer loe function. The ue of anti-viru oftware i one of the olution for protecting DoS attack. However, the protection of uing oftware conume CPU and memory reource. To olve thi problem, we propoe to build H-HIPS into Do Attack Analyi Unit [13]. The unit i compoed of FPGA a well a other analye and protecting unit. We develop the unit by uing the development environment hown in Table III. TABLE III DEVELOPMENT ENVIRONMENT OF DOS ATTACK ANALYSIS UNIT Platform Microoft Window 2000 CPU Intel Pentium III (1GHz) Main Memory 512 MByte CAD Altera Quartu II FPGA Altera Cyclone EP1C20F400C7 To protect Do attack, the unit need a ender IP addre and the number of packet. Becaue Do attack give a load to a computer by a great deal of packet of hort time, Do attack i judged by the number of packet each unit time. The flow chart of Do Attack Analyi Unit i hown in Fig, 8 and the hardware tructure i hown in Fig. 9. We imulate circuit of Fig. 9 at the gate level. Reult of Stored Unit i hown in Fig.10 and Reult of Detecting Unit i hown Fig. 11. According to reult, 56.8 MHz operation i confirmed. Becaue word ize of Circuit of Do Attack Analyi Unit i 48 bit, the unit can correpond to 2.6Gbp. RESET 1 CLK1 IP Addre Data Length 16 From NioII Fig. 8 Flow chart of Do Attack Analyi Unite. Stored unit IP Addre Max Data Length R_RAM2 48 Detecting unit Data Control Detection ignal 1 IP Addre Max Data Length 16 Data SUM 16 To Protection unit Fig. 9 Hardware tructure of Do Attack Analyi Unit.

5 RESET CLK Write Enable IP Addre Data length R_A_1 IP Addre Data Length RAM1_OUT R_A_2 RAM2_OUT W_A_2 W_D_2 W_E_2 N_P Fig. 10 Simulation reult of Stored Unit. Non-DoS ThreholdData Sum= 700Byte RESET CLK W_E DataLeng thw_e_2 W_D_2 Data_Sum Div_5 Div_10 T_Time Detect Clear Max_DL Max_IP 200Byte 200Byte 200Byte ThrehouldTime = Threhold Time DoS RESET CLK W_E DataLength W_E_2 W_D_2 Data_Sum Div_5 Div_10 T_Time Detect Clear Max_DL Max_IP ThreholdData Sum= 500Byte 200Byte 200Byte 200Byte ThrehouldTime = Byte 500Byte 600Byte 400Byte 700Byte Max IP : Max DL: 400Byte Fig. 11 Simulation reult of Detecting Unit. 6. CONCLUDING REMARKS Thi paper ha decribed the propoal of H-HIPS for Embedded Sytem. The ytem i compoed of Firewall Unit and DoS Attack Detection Unit. Firewall Unit operate by wave-pipelining and it i ued for the clock control. Becaue the unit doe not have a regiter, it hardly conume electric power. And the clock peed of the unit correpond to Giga-bit Ethernet. DoS Attack Detection Unit i deigned by uing FPGA which i low-peed operation. However, according to the gate-level imulation, throughput of the unit i 2.6 GHz. Our future work are evaluation of power and performance at ytem-level.

6 ACKNOWLEDGMENT Thi work ha been upported in part by Grant-in-Aid for Young Scientit (B) ( ) from Minitry of Education, Culture, Sport, Science and Technology, Japan. of ISPACS 2008, pp , [13] Tomoaki Sato, Kazuhira Kikuchi, Syuya Imaruoka, and Maa-aki Fukae, "DoS Attack Analyi for H-HIPS," Proc. of IMETI, Vol. II, pp , REFERENCES [1] Keiji TAKEDA and Hirohi Iozaki, Network Intruion Detection, Soft Bank Pub., [2] T. Sato, R. Sakuma, D. Miyamori, and M. Fukae, Hardware Security-Embedded Wirele LAN Proceor, Proc. of ECTI-CON 2006, Vol. II, pp , [3] L. Cotton, Maximum rate pipelining ytem, Proc. AFIPS Spring Joint Computer Conference, pp , [4] F. Kla and M. J. Flynn, COMPARATIVE STUDIES OF PIPELINED CIRCUITS, Stanford Univerity Technical Report, No. CSL-TR , July [5] W. P. Burleon, M. Cieielki, F. Kla, and W. Liu, Wave-Pipelining: A Tutorial and Reearch Survey, IEEE Tran. on Very Large Scale Integration (VLSI) Sytem, Vol. 6, No. 3, pp , Sept [6] T. Sato, M. Fukae, and T. Nakamura, Performance analyi of a wave-pipelined ALU, Technical Report of IEICE, CPSY 2000, Vol. 100, No. 20, pp. 1-6, [7] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Scaling up of Wave Pipeline, THE FOURTEENTH INTERNATIONAL CONFERENCE ON VLSI DESIGN, Jun [8] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Breakthrough of Supercalar Proceor by Multifunctional Wave-Pipeline, Proc. of 9th NASA Sympoium on VLSI Deign, pp , Nov [9] M. Fukae, T. Sato, R. Egawa, and T. Nakamura, Deigning a Wave-Pipelined Vector Proceor, Proc. of the Tenth Workhop on Synthei and Sytem Integration of Mixed Technologie, pp , Oct [10] Tim Horel and Gary Lauterbach, UltraSPARC-III: Deigning Third-Generation 64-Bit Performance, IEEE Micro, Vol. 19, No. 3, pp , [11] T. Sato, R. Sakuma, D. Miyamori, and M. Fukae, Waved-LFSR Circuit for Hardware-baed Intruion Detection Sytem, Proc. of ECTI-CON2006, pp , [12] Tomoaki Sato, Syuya Imaruoka, and Maa-aki Fukae, Reconfigurable Firewall Unit by Wave-Pipelined Operation, proc.

Delay Time Analysis of Reconfigurable. Firewall Unit

Delay Time Analysis of Reconfigurable. Firewall Unit Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name:

Fall 2010 EE457 Instructor: Gandhi Puvvada Date: 10/1/2010, Friday in SGM123 Name: Fall 2010 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 10/1/2010, Friday in SGM123 Name: Calculator and Cadence Verilog guide are allowed; Cloed-book, Cloed-note, Time: 12:00-2:15PM Total point:

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Spring 2012 EE457 Instructor: Gandhi Puvvada

Spring 2012 EE457 Instructor: Gandhi Puvvada Spring 2012 EE457 Intructor: Gandhi Puvvada Quiz (~ 10%) Date: 2/17/2012, Friday in SLH200 Calculator and Cadence Verilog Guide are allowed; Time: 10:00AM-12:45PM Cloed-book/Cloed-note Exam Total point:

More information

Lecture 8: More Pipelining

Lecture 8: More Pipelining Overview Lecture 8: More Pipelining David Black-Schaffer davidbb@tanford.edu EE8 Spring 00 Getting Started with Lab Jut get a ingle pixel calculating at one time Then look into filling your pipeline Multiplier

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Digifort Standard. Architecture

Digifort Standard. Architecture Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion

More information

13/ 12/ Am ade us IT Gro up and its affil iate s and sub sidi arie s. Development Last update: 04/27/2017 Page 1 of 12. amadeus-hospitality.

13/ 12/ Am ade us IT Gro up and its affil iate s and sub sidi arie s. Development Last update: 04/27/2017 Page 1 of 12. amadeus-hospitality. u it ub idi Lat date: 04/27/7 Page 1 of 12 amu-hopitality.com u it ub idi Index I-Server 2.0 AP4 I-Server 2.0 AP4 Sytem Requirement...3 Additional Server Requirement...4 Sytem Requirement Worktation Requirement...5

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System

An Active Stereo Vision System Based on Neural Pathways of Human Binocular Motor System Journal of Bionic Engineering 4 (2007) 185 192 An Active Stereo Viion Sytem Baed on Neural Pathway of Human Binocular Motor Sytem Yu-zhang Gu 1, Makoto Sato 2, Xiao-lin Zhang 2 1. Department of Advanced

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission

The Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission 2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

A Basic Prototype for Enterprise Level Project Management

A Basic Prototype for Enterprise Level Project Management A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

For use in May 2012, November 2012, May 2013 and November 2013

For use in May 2012, November 2012, May 2013 and November 2013 M&N12&13/5/COMSC/BP2/ENG/TZ0/XX/CS COMPUTER SCIENCE CASE STUDY: SMARTPHONES For ue in May 2012, November 2012, May 2013 and November 2013 INSTRUCTIONS TO CANDIDATES Cae tudy booklet required for higher

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Finite State Machine Based Reconfigurable Architecture For Image Processor

Finite State Machine Based Reconfigurable Architecture For Image Processor ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Reearch in Science, Engineering and Technology Volume 3, Special Iue 3, March 2014 2014 International Conference on

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

An FPGA Architecture for ASIC-FPGA Co-Design to Streamline Processing of IDSs

An FPGA Architecture for ASIC-FPGA Co-Design to Streamline Processing of IDSs 2016 International onference on ollaboration Technologies and Systems An FPGA Architecture for ASI-FPGA o-design to Streamline Processing of IDSs Tomoaki Sato Sorawat hivapreecha, Phichet Moungnoul Kohji

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

All in-focus View Synthesis from Under-Sampled Light Fields

All in-focus View Synthesis from Under-Sampled Light Fields ICAT 2003 December 3-5, Tokyo, Japan All in-focu View Synthei from Under-Sampled Light Field Keita Takahahi,AkiraKubota and Takehi Naemura TheUniverityofTokyo Carnegie Mellon Univerity 7-3-1, Hongo, Bunkyo-ku,

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

(12) United States Patent

(12) United States Patent U009250939B2 (12) United tate Patent Odaira (54) INFORMATION PROCEING DEVICE, PROFILE TARGET DETERMINING PROGRAM, AND METHOD (71) Applicant: International Buine Machine Corporation, Armonk, NY (U) (72)

More information

Architecture and grid application of cluster computing system

Architecture and grid application of cluster computing system Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,

More information

Advanced Datapath Synthesis using Graph Isomorphism

Advanced Datapath Synthesis using Graph Isomorphism Advanced Datapath Synthei uing Graph Iomorphim Cunxi Yu, Mihir Choudhury 2, Andrew Sullivan 2, Maciej Cieielki ECE Department, Univerity o Maachuett, Amhert *IBM T.J Waton Reearch Center 2 ycunxi@uma.edu,

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Synthesis of Signal Processing Structured Datapaths for FPGAs Supporting RAMs and Busses

Synthesis of Signal Processing Structured Datapaths for FPGAs Supporting RAMs and Busses Synthei of Signal Proceing Structured Datapath for FPGA Supporting AM and Bue Baher Haroun and Behzad Sajjadi Department of lectrical and Computer ngineering, Concordia Univerity 455 de Maionneuve Blvd.

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

VLSI Design 9. Datapath Design

VLSI Design 9. Datapath Design VLSI Deign 9. Datapath Deign 9. Datapath Deign Lat module: Adder circuit Simple adder Fat addition Thi module omparator Shifter Multi-input Adder Multiplier omparator detector: A = 1 detector: A = 11 111

More information

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States (19) United State US 2006O1296.60A1 (12) Patent Application Publication (10) Pub. No.: Mueller et al. (43) Pub. Date: Jun. 15, 2006 (54) METHOD AND COMPUTER SYSTEM FOR QUEUE PROCESSING (76) Inventor: Wolfgang

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

arxiv: v1 [cs.ar] 31 Aug 2017

arxiv: v1 [cs.ar] 31 Aug 2017 Advanced Datapath Synthei uing Graph Iomorphim Cunxi Yu, Mihir Choudhury 2, Andrew Sullivan 2, Maciej Cieielki ECE Department, Univerity o Maachuett, Amhert IBM T.J Waton Reearch Center 2 ycunxi@uma.edu,

More information

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication

More information

What is "Computer Architecture" ECE 4680 Computer Architecture and Organization. Lecture 1: A Short Journey to the World of Computer Architecture

What is Computer Architecture ECE 4680 Computer Architecture and Organization. Lecture 1: A Short Journey to the World of Computer Architecture ece4680 Lect Intro. February 6, 2002 What i "Computer Architecture" ECE 4680 Computer Architecture and Organization Lecture : A Short Journey to the World of Computer Architecture Baic Idea and Definition

More information

Audio-Visual Voice Command Recognition in Noisy Conditions

Audio-Visual Voice Command Recognition in Noisy Conditions Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

A Sparse Shared-Memory Multifrontal Solver in SCAD Software

A Sparse Shared-Memory Multifrontal Solver in SCAD Software Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges

Parallel Approaches for Intervals Analysis of Variable Statistics in Large and Sparse Linear Equations with RHS Ranges American Journal of Applied Science 4 (5): 300-306, 2007 ISSN 1546-9239 2007 Science Publication Correponding Author: Parallel Approache for Interval Analyi of Variable Statitic in Large and Spare Linear

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

A Novel Grey-RSS Navigation System Design for Mobile Robots

A Novel Grey-RSS Navigation System Design for Mobile Robots A vel Grey-RSS Navigation Sytem Deign for Mobile Robot Albert Wen-Long Yao*,, Hin-Te Liao, and Shiou-De Chen Department of Mechanical and Automation Engineering, National Kaohiung Firt Univerity of Science

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts

3-D Visualization of a Gene Regulatory Network: Stochastic Search for Layouts 3-D Viualization of a Gene Regulatory Network: Stochatic Search for Layout Naoki Hooyama Department of Electronic Engineering, Univerity of Tokyo, Japan hooyama@iba.k.u-tokyo.ac.jp Abtract- In recent year,

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information