SELF-ADAPTABLE SECURITY ARCHITECTURE FOR POWER-AWARE EMBEDDED SYSTEMS
|
|
- Hope Walker
- 5 years ago
- Views:
Transcription
1 BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LVI (LX), Fasc. 3, 2010 SecŃia AUTOMATICĂ şi CALCULATOARE SELF-ADAPTABLE SECURITY ARCHITECTURE FOR POWER-AWARE EMBEDDED SYSTEMS BY NICOLAE ALEXANDRU BOTEZATU, VASILE ION MANTA and ANDREI STAN Abstract. Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by optimizing the trade-off between minimizing energy consumption and maintaining a proper security level. This paper proposes a self-adaptable security architecture for embedded systems. The proposed method points out a conceptual blueprint needed for the implementation of such self-adaptable mechanisms. An example case study is described in order to better understand how an adaptable security mechanism can be implemented, also pointing out the effect on energy consumption. Key words: embedded systems, power constrains, energy consumption, security Mathematics Subject Classification: 68M01, 94C Introduction Many embedded systems interact with the real world. Form microwave ovens to MP3 players and photo cameras to cell phones, embedded computing has a huge impact on our everyday life. The research and technological advances that made all this possible, determined an increase in the system s complexity, also spurring a downside: the raise of security costs. The development of new, faster, more feature rich embedded systems has boosted the emergence and improvement of security methods in parallel to ranges of new and more power types of attacks. While security method s and protocol s designers address the security
2 58 Nicolae Alexandru Botezatu et al. problem from a functional perspective (the traditional way), all embedded systems are constrained, in a way or another, by the available internal resources and the external environment dynamics. Also, security is often perceived by the system designers as an additional or optional feature. In fact, security should be considered in the design process along costs, performance and power. The problems arising from the aforementioned, between necessities and capabilities, are described and classified as a set of gaps [1]. One of these gaps, the battery gap, emphasizes the overheads in energy consumption introduced by supporting security on battery powered devices. This is due to the slow pace of advancement in battery technology that has not kept up with the progress in processing capabilities (and consequently energy consumption). Therefore, the primary challenge in providing security in battery powered embedded devices is to minimize power consumption and maximize security. Due to the conflicting nature of the two elements, there is an intrinsic need to understand the relation between energy consumption and security parameters. One way to approach this problem is by adaptable security. By changing in some automated or semi-automated way, the security mechanisms respond to internal or external system events, consequently causing a variation in energy consumption. The link between this variation and the dynamics of adaptable security must be determined in order to assess and optimize the energy consumption level. As the paper name implies, we propose a conceptual design for the infrastructure needed for adapting security, also providing a fundamental operational structure. We also suggest a functional description of the architecture s requirements by presenting an implementation example. The paper is organized as follows. Section 2 briefly outlines the related work presented in the literature. Section 3 explains the architecture and describes its components, whereas in Section 4 we present an implementation example. Section 5 highlights some perspectives for further research. 2. Related Work We focus on giving an overview on papers that cover the aspects of adaptable security or energy consumption, due to the lack of papers covering the two topics at theoretical level. We also centered over the papers presenting these aspect at a more practical level. Reference [2] proposes some guidelines for designing a standardized Adaptive Security Infrastructure (ASI). The problems raised by this concept are presented in a structured way and include: the components of an ASI, the principles and issues of formalization and the term of security policy described as a system specification. Also, the author proposes some broad research directions, covering the discussed topics. In [3] the self-adaptable security is addressed at system level, centered on the concept of security policy. The authors propose a domain-independent
3 Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, methodology for system security adaptability. The security policy adaptability scheme allows the system to keep a constant security level even when certain stimuli influence it. Reference [4] presents an overview of the current trends in energyefficient computing. The strengths and weaknesses of present power management are discussed, considering the ACPI standard as a case study. Also, the author s vision on energy consumption reduction is presented as an optimization problem. Three stages are outlined for approaching a solution on energy-efficiency: constructing a power model; determining the performance requirements of tasks or the workload; implementing means of deciding an energy-efficient configuration of the hardware at all times while operating. In [5], the authors acknowledge the importance of constructing poweraware applications. The paper also briefly surveys some of the most recent directions in supporting power-efficiency for battery powered devices. Furthermore, a power efficiency framework is proposed which addresses both power consumption measurements and high level power efficiency metrics in a unified way, thus providing real-time feedback to applications. Next, in [6] the authors, using real-life experimentation based profiling, measure and model the power consumption of some cryptographic algorithms. Also, they propose a way for minimizing vulnerability subject to power constraints. The vulnerability metric is defined as a quantity dependent on the success probability of a cryptanalysis attack. This metric is used as the objective function to formulate two optimization problems. Moreover, the paper proposes algorithms that solve these problems, giving optimal power consumption and security vulnerability levels. The research presented in [7] deals with the implementation of security primitives on reconfigurable hardware. The reconfiguration thresholds are based on external events that point out any incoming attacks. The paper also presents a functional description for the monitoring blocks used to detect attacks and for the SSC (system security controller) and SPC (security primitive controller) that are used in the reconfiguration process. 3. Self-adaptable Architecture In this section we present our vision on the security self-adaptable method. As shown in Fig. 1 the architecture is based on three functional blocks: Sensing, Analysis and Enforcement. The data sets required as input for the blocks are represented by the System status, System descriptors and System goals. The workflow of the architecture is the following: when the Sensing block detects a change in the parameters defined in the data sets, it signals the Analysis block to determine what changes in security must be made in order to match some requirements defined in the System goals. Last, the Enforcement block applies changes to the system. The following subsections present the six new concepts.
4 60 Nicolae Alexandru Botezatu et al System Status The system status may be viewed uniquely defined by a set of specific parameters. These parameters can be grouped as internal or external, where the internal ones are specific to the systems hardware configuration (e.g. what functional blocks does the system have that can influence the status) and to the software applications that can run on the system (e.g. the application s requirements concerning different hardware properties of the system). As for the external parameters, they are represented by the systems external conditions as the user of the system (e.g. tasks that are defined or ran by the user) and the environment in which the system is operating (e.g. sunlight condition for systems with photovoltaic power cells). All this data is acquired through the use of monitoring devices and sensors. Fig. 1 Adaptive security architecture blocks and related relations. In general, for an application that needs to know the system status there must be defined a list of parameters that can influence the status of the system in the current context of operation. All the values of the parameters, the valid values transitions that are important for the applications, all the connections between the parameters and their values that are valid at system runtime must be analyzed. More, in order to have accurate information about the system, a comprehensive set of monitored parameters must be defined.
5 Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, Also, the rate at which the system status is sampled is important. Different parameters may be sampled at different rates based on the speed of their temporal variation. The sampling rate may vary for the same parameter for specific intervals of its values (e.g. the sampling rate for the voltage of a NiMH cell can be raised for a Depth of Discharge (DOD) over 80%, due to the increase in voltage decline rate). Specific to the current architecture are the following properties that outline the system status: a) Current security level for every running application; b) The available energy of the system, expressed conveniently as a combination of drawn current, battery capacity, discharge rate, nominal power etc. An example of selected parameters is presented in Section System Descriptors The system descriptors are represented by a collection of data that describe the hardware and software components of the system. The data is organized in a hierarchical manner, based on a class collection that describes and groups the systems elements with respect to their energy and security properties. The base model for this branching hierarchy is presented in Fig. 2. The first three levels of the class collection make a broad classification of the system components, as from level four onwards specific classes may be derived in order to describe the system components (e.g. from the energy suppliers class we can derive new classes to describe batteries, photovoltaic cells or other types of supplies). Fig. 2 System descriptor hierarchy.
6 62 Nicolae Alexandru Botezatu et al. The properties of the objects that describe the hardware components depend on the operating modes used during application execution. A complete profile for every system element is obtained by describing the energy properties for all the operating modes, based on usage patterns. For example, if we consider a LCD backlight, the energy consumption must be determined and described for every backlight intensity mode available. By defining these properties, a connection is established between energy consumption, workload and operating mode. For the software components, security properties must be considered. Also, the objects describing the software components are used to determine their energy, workload and security footprints. In order to achieve this, the properties for the software components also specify the hardware resources used and how they are used. Concerning the security primitives, their properties are described for all the usage options available (e.g. different key lengths, variable number of encryption rounds) as a usage cost (e.g. energy consumption, hardware needs). Also, for the security primitives the throughput must be considered as a property for every usage option System Goals The system goals are determined based on the correlations between the energy resources of the system and its security demands. Ravi et al. in [1] have identified several gaps regarding the capabilities and demands of current embedded systems. In the context of the current architecture, the system goals are to be determined taking into account two of the proposed gaps: the battery and the flexibility gaps. The first one highlights that the current energy consumption overheads of supporting security on battery powered embedded devices are very high, whereas the second one emphasizes an embedded system s need to run a large and diverse set of security primitives and methods. Also, the authors state the existence of a processing gap because the current embedded architectures cannot keep up with the rising computational demands of new and more complex security algorithms. To sum up, the system goals must be described as a maximization of operating time while maintaining the requested security levels for the system. In order to better understand this concept, the following example is considered: an embedded system has two running applications A1 and A2. A1 processes two types of data, the first one requiring a security level of S1 and the second one S2. A2 needs a security level of S3. The system, using the built in security primitives can provide a maximum security level of Smax, where Smax=S3>S1>S2. So, if the system would consider a constant security level for all the applications, the extra
7 Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, security delivered for application A1 would consume a part of the systems energy to no purpose. In order to decrease the used energy, the security level would have to be adapted to the application s needs, this process being transparent to the user. Moreover, if the security demands of an application varies at runtime, based on some environment variations (e.g. the transition from an unsecure wireless network to a secure one), this fact must also be considered when determining the system goals Sensing Block The sensing block monitors the state of the system. The states of the system are defined as the elements of a finite set S = {s 1, s 2,, s n }, those states being determined based on the combinations and correlations between the environment parameters (System status) and the system descriptors. When a state transition occurs this block decides if a request to reevaluate the security is sent to the Analysis block. Its purpose is to determine the state of the system and to filter out the transitions that are not relevant in the context of energy consumption optimization. On a time basis, the sensing block samples the environment parameters and system descriptors and evaluates an f function which has the aforementioned parameters, thus determining the system state. In order to filter out the transitions not relevant to the system a prediction module is used. Its role is to express a probability for any status transition. This means that following a state transition, the system must remain in the new state long enough to account for the extra energy used by the reevaluation of security and the related security setup cost (e.g. generation of new encryption keys). The mechanism of the prediction module is explained hereinafter. First, all the transitions have a default probability value. In order to evaluate the validity of a transition, its probability is compared to a threshold value. If the test is passed (initially all transitions are considered valid) and a reevaluation request is sent to the Analysis block, the energy level used by the analysis step is assessed. Also, the energy consumed by the system, for enforcing security, until the next state transition is determined. Based on these results the probability is modified by applying a correction factor accordingly Analysis Block This block receives security reevaluation requests from the Sensing block, based on system states transitions. Depending on the goals and the new state of the system, it decides what security elements should be modified consequently.
8 64 Nicolae Alexandru Botezatu et al. When designing this module, its response time should be taken into account because it has the potential to be the most expensive of the entire architecture. Moreover, the extra delay introduced by adapting the security primitives used may have a negative impact on security (e.g. unsafe operation from the state change until the enforcement of the new security parameters) as well as on the energy consumption (e.g. the overhead introduced by the analysis), resulting in a performance decline. After the analysis process, if there are available a number of possible security adaptations sets, equivalent for the system goals, the timing factor must be considered. For a better understanding, let us account the following example: two primitives could be used for securing an application. The first one has a high setup cost (and a subsequent higher enforcement delay) and a low usage cost (e.g. in a mj/bit metric), whereas the second one has a smaller setup cost and a higher usage one. In this case, the analysis block should select to enforce the second set of security methods as first option Enforcement Block This block receives security reconfiguration requests from the analysis module. It tries to apply the changes to the system, the result (success or fail) being feed-backed to the analysis module. If the reconfiguration request cannot be satisfied, the analysis module must propose other security alternatives. It also offers an interface to the OS (if any) and the underlying system applications, acting as a bridge between the system s security primitives and methods and the running applications. Dictating security changes can also indirectly influence the system s status and goals. For example, one of the status parameters is the battery voltage or one of the goals is based on the same parameter. Knowing that a change in the system s load (sink/source current), based on security adjustment, determines a voltage value variation, a threshold cross could determine a false response. Therefore, care must be taken in order to minimize the negative impact of these influences. 4. Implementation Example We propose a simple implementation example in order to show how the functions of the fore mentioned blocks can be described, without presenting any implementation details. First, the software and hardware parts of the system will be described grouped after the base classes illustrated in the previous section.
9 Running Application Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, Table 1 System States and Security Requirements Battery Dod State Security Requirements A1m1 S1 A1 DES16 A1m2 S2 A1 DES A1m1 < 50% S3 & A2 50% S4 A1m2 < 50% S5 & A2 50% S6 A1 DES16 A2 DES8 A1 DES16 A2 FEAL A1 DES A2 DES8 A1 DES A2 FEAL Algorithm Table 2 Encryption Algorithms Characteristics Encryption Time for 64 Bit Data, [µsec] MCU Workload, [%] Power [mw] DES DES FEAL The system we built runs two applications: the first one resides permanently and has two operating modes; the two modes alternate on a time basis, the application spending 5 min in the first mode (referred to as A1m1), after that spending 10 min in the second mode (referred to as A1m2). The second application runs for 30 min, only after an external event arises (e.g. in our hardware setup the event was the push of a button). As for the security primitives, there are two symmetric key ciphers implemented on the system: Data Encryption Standard (DES) and Fast Data Encipherment Algorithm (FEAL) [8]. The DES algorithm can be used with 16 encryption round and with 8 encryption rounds (referred as DES16 and DES8), while the FEAL cipher is used in the default form. Now, the security requirements for the applications can be defined. The first application when operating in mode 1 needs to be secured using DES16 and when operating in mode 2 it has a more general requirement, needing DES. This means that either DES16 or DES8 can be used. The second application
10 66 Nicolae Alexandru Botezatu et al. considers FEAL to maintain a sufficient security level and DES8 to provide good security. We will see later how this requirement is translated into measurable properties. From the hardware perspective, we only consider the MCU as energy consumer, due to the variation of energy consumption in run and sleep modes. The systems battery is considered as an energy supplier class object, its sole property being the initial energy level. The chosen metric for estimating the systems energy status is the battery s depth of discharge (DOD), expressed in percents. The DOD is approximated based on the battery capacity, the system power consumption and the system s components operating time vs. modes. The hardware platform used is based on an ARM Cortex-M3 MCU and on rechargeable NiMH batteries (we used batteries with a capacity of 2000 mah) [9]. We have chosen two parameters with dynamic variation at runtime (system status) that influence the system s state: the DOD and a parameter that shows what applications are running and in what mode (if applicable). Based on this information, Table 1 shows the system states that can be identified by the sensing block. For the parameter showing the DOD level we considered a threshold at 50% value. This threshold is used to influence the selection of security primitive used for application 2: below 50% DES8 is used and FEAL above this value. The system goals are the following: a) to provide the security level required by the applications security goal; b) to use the security methods with the lowest energy consumption level energy goal. The Analysis block functions are constant, because the system goals do not change over time. This means that the same security primitives are constantly chosen for every state based on a look-up table, also shown in Table 1. The security goal is satisfied by providing the desired security for every application as illustrated in the System descriptors. The energy goal is met for states S2, S5 and S6, when application 1 is operating in mode 2 and its security requirements are satisfied by DES. The system chooses to use DES8 due to its lower energy consumption. The Enforcement block matches the security algorithms, indicated by the Analysis block, with the applications data in order to encrypt them. Concerning the operation of the system, when the conditions of state transition are met (the variation of DOD over the 50% threshold or a change in the application s operating mode) the algorithms for securing the system are selected. Based on the system specifications, which were randomly selected, the process of securing the running applications consists of the encryption of 80 bytes of data, for every application, in a time window of 29 milliseconds. The
11 Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, remaining idle time, after all the data bytes are encrypted, is spent by the MCU in a low-power consumption sleep mode. The time, workload and power consumption characteristics for the security primitives, relative to the system s specifications, are presented in Table 2 [9], [10]. a Fig. 3 Power level (a); energy consumption variation at runtime (b). b
12 68 Nicolae Alexandru Botezatu et al. Fig. 3 a presents the variation of the power consumed by the system over a period of 60 min. The system passes through all possible states, the operating period of application 2 being asynchronous with the mode change of application 1. In the first 16 min and 15 sec only application 1 is running on the system, alternating it s mode of operation two times. After that application 2 also start, thus implying the state change from S1 to S3. After another 15 and a half min, the value of the battery s DOD passes the 50% threshold causing a transition from S3 to S4. The change in the security requirement for application 2, from DES8 to FEAL, brings a significant variation to the consumed power level. When application 2 terminates execution, due to the small/low consumption level of the FEAL primitive, the variation of the power level has lower amplitude. The energy consumed for the operating period is shown in Fig. 3 b. If both applications are secured with the safest available primitive, meaning DES16 [6], and the variations in the battery s DOD level or application operating modes are not considered, an increase of 550 mj in the consumed energy level can be observed. In the current context, this method for providing uniform security at system level may be considered to be the simplest available, even the safest available, but is certainly not the cheapest available. Therefore, by using this adaptive security method, a decrease of roughly 31% in energy consumption is obtained at runtime. This example shows that even when the security is adapted to the system s need in a simple manner, important energy savings can be achieved. 5. Conclusions We have presented our vision on how to address security selfadaptability in order to minimize energy consumption. The proposed methodology points out the main functionality needed for the implementation of such self-adaptable mechanisms, along the interactions within the system and with the environment. An example case study is described, in order to better understand how an adaptable security mechanism can be implemented, also pointing out the effect on energy consumption. Further work implies the implementation of the self-adaptable security method on different embedded architectures. This involves enhancements for the system s status, descriptors and goals entities in order to define them in a more consistent and homogeneous way. Also, different implementations for the functional blocks will be investigated. The evaluation of the blocks under real life scenarios is important in order to appreciate the relation between the required system performance and the used resources.
13 Bul. Inst. Polit. Iaşi, t. LVI (LX), f. 3, A c k n o w l e d g e m e n t s. This work was supported by the research project SIMPA, Contract no /2007. Received: June 4, 2010 Gheorghe Asachi Technical University of Iaşi, Department of Computer Engineering s: nbotezatu@cs.tuiasi.ro vmanta@cs.tuiasi.ro andreis@cs.tuiasi.ro R E F E R E N C E S 1. Ravi S., Kocher P., Hattangady S., Security in Embedded Systems: Design Challenges. ACM Trans. on Embedded Comp. Syst., Vol. 2, 3, , Aug Marcus L., Introduction to Logical Foundations of an Adaptive Security Infrastructure. Presented at the Workshop on Logical Foundations of an Adaptive Security Infrastructure, Turku, Finland, July 12 13, Ferrante A., Taddeo V., Sami M., Mantovani F., Fridkins J., Self-adaptive Security at Application Level: a Proposal. Proc. of the 4th Workshop on Embedded Syst. Security, Grenoble, France, 2009, Paper Brown D., Reams C., Toward Energy-Efficient Computing. In Communications of the ACM, 53, 3, 50 58, March Tudor D., Marcu M., Designing a Power Efficiency Framework for Battery Powered Systems. Proc. of SYSTOR 2009: The Israeli Experimental Syst. Conf., Haifa, Israel, 2009, Chandramouli R., Bapatla S., Subbalakshmi K.P., Battery Power-Aware Encryption. In ACM Trans. on Inform. a. Syst. Security, 9, 2, , May Gogniat G., Wolf T., Burleson W., Reconfigurable Security Architecture for Embedded Systems. Proc. of the 39th Hawaii Internat. Conf. on Syst. Sci., Kauai, Hawaii, USA, Menezes A., Van Oorschot P., Vanstone S., Handbook of Applied Cryptography. CRC Press, Botezatu N.A., Stan A., Panduru L., Power-aware Framework for Encrypted Communications. Proc. of the 20th DAAAM World Symp. Intelligent Manufacturing & Automation: Theory, Practice & Education, Vienna, Austria, (2009). 10. Stan A., Botezatu N.A., Data Encryption Methods for Power-Aware Embedded Systems used in Patient Monitoring. Proc. of the 10th Internat. Carpathian Control Conf., Zakopane, Poland, (2009).
14 70 Nicolae Alexandru Botezatu et al. ARHITECTURĂ DE SECURITATE AUTO-ADAPTIVĂ PENTRU SISTEME ÎNCORPORATE POWER-AWARE (Rezumat) Securizarea sistemelelor încorporate reprezintă o direcńie de cercetare provocatoare şi importantă datorită resurselor de calcul şi de memorie limitate. Mai mult, sistemele încorporate alimentate de la baterie introduc constrângeri ale consumului de putere ce cresc dificultatea procesului de implementare a securităńii. Acestă problemă poate fi adresată prin determinarea unui raport optim între un consum scăzut de energie şi un nivel de securitate adecvat. Această lucrare propune o arhitectură de securitate auto-adaptivă pentru sistemele încorporate, descriind o schemă conceptuală necesară pentru implementarea unui astfel de mecanism. Pe lângă modul de interacńiune al blocurilor componente, lucrarea prezintă şi problemele ridicate de implementarea acestora. De asemenea, este prezentat şi un exemplu de implementare pentru mai buna înńelegere a mecanismelor auto-adaptive ale arhitecturii propuse. Efectul asupra consumului de energie este evaluat, obńinându-se o reducere a consumului de până la 30%.
Self-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off
Self-adaptability in Secure Embedded Systems: an Energy-Performance Trade-off N. Botezatu V. Manta and A. Stan Abstract Securing embedded systems is a challenging and important research topic due to limited
More informationAUTONOMOUS ROBOT NAVIGATION BASED ON FUZZY LOGIC AND REINFORCEMENT LEARNING
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi, Tomul LVI (LX), Fasc. 4, 2010 Secţia CONSTRUCŢII DE MAŞINI AUTONOMOUS ROBOT NAVIGATION BASED ON FUZZY
More informationDISTRIBUTED DIFFERENTIAL CRIPTANALYSIS OF FEAL - 8
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LV (LIX), Fasc. 1, 2009 SecŃia AUTOMATICĂ şi CALCULATOARE DISTRIBUTED DIFFERENTIAL CRIPTANALYSIS
More informationMODELING THE FORCE-ELONGATION CURVE OF SINGLE YARNS
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LVI (LX), Fasc. 1, 2010 SecŃia TEXTILE. PIELĂRIE MODELING THE FORCE-ELONGATION CURVE OF SINGLE
More informationABOUT MANUFACTURING PROCESSES CAPABILITY ANALYSIS
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIX (LXIII), Fasc. 4, 013 Secţia CONSTRUCŢII DE MAŞINI ABOUT MANUFACTURING PROCESSES CAPABILITY
More informationA NOVEL SYSTOLIC ALGORITHM FOR 2-D DISCRETE SINE TRANSFORM
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIX (LXIII), Fasc. 3, 2013 Secţia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ A NOVEL SYSTOLIC ALGORITHM
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationVARIATION OF INTERNAL FORCES USING ARTIFICIAL NEURONAL NETWORK
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Volumul 63 (67), Numărul 1, 2017 Secţia CONSTRUCŢII. ARHITECTURĂ VARIATION OF INTERNAL FORCES USING
More informationSecret Key Algorithms (DES)
Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used
More informationAN EVALUATION SYSTEM FOR CONTESTS AND CLASSROOMS
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Volumul 64 (68), Numărul 1, 2018 Secţia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ AN EVALUATION SYSTEM
More informationMark Sandstrom ThroughPuter, Inc.
Hardware Implemented Scheduler, Placer, Inter-Task Communications and IO System Functions for Many Processors Dynamically Shared among Multiple Applications Mark Sandstrom ThroughPuter, Inc mark@throughputercom
More informationBOOLEAN FUNCTION DECOMPOSITION BASED ON FPGA BASIC CELL STRUCTURE
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LXI (LXV), Fasc. 1, 2015 SecŃia AUTOMATICĂ şi CALCULATOARE BOOLEAN FUNCTION DECOMPOSITION BASED
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS
COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationA Firewall Architecture to Enhance Performance of Enterprise Network
A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationTrust4All: a Trustworthy Middleware Platform for Component Software
Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software
More informationMAC LEVEL BASED QUALITY OF SERVICE MANAGEMENT IN IEEE NETWORKS
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LVII (LXI), Fasc. 4, 2011 SecŃia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ MAC LEVEL BASED QUALITY
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationCE4031 and CZ4031 Database System Principles
CE431 and CZ431 Database System Principles Course CE/CZ431 Course Database System Principles CE/CZ21 Algorithms; CZ27 Introduction to Databases CZ433 Advanced Data Management (not offered currently) Lectures
More informationEvent-based sampling for wireless network control systems with QoS
21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin
More informationA STUDY ON CLASSIFIERS ACCURACY FOR HAND POSE RECOGNITION
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIX (LXIII), Fasc. 2, 2013 SecŃia AUTOMATICĂ şi CALCULATOARE A STUDY ON CLASSIFIERS ACCURACY
More informationA Countermeasure Circuit for Secure AES Engine against Differential Power Analysis
A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationMicrosoft RemoteFX for Remote Desktop Virtualization Host Capacity Planning Guide for Windows Server 2008 R2 Service Pack 1
Microsoft RemoteFX for Remote Desktop Virtualization Host Capacity Planning Guide for Windows Server 2008 R2 Service Pack 1 Microsoft Corporation Published: March 2011 Abstract Microsoft RemoteFX delivers
More informationSecret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34
Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.
More informationptop: A Process-level Power Profiling Tool
ptop: A Process-level Power Profiling Tool Thanh Do, Suhib Rawshdeh, and Weisong Shi Wayne State University {thanh, suhib, weisong}@wayne.edu ABSTRACT We solve the problem of estimating the amount of energy
More informationParallel Implementation of the NIST Statistical Test Suite
Parallel Implementation of the NIST Statistical Test Suite Alin Suciu, Iszabela Nagy, Kinga Marton, Ioana Pinca Computer Science Department Technical University of Cluj-Napoca Cluj-Napoca, Romania Alin.Suciu@cs.utcluj.ro,
More informationA FAULT PRIMITIVE BASED MODEL OF ALL STATIC FOUR- CELL COUPLING FAULTS IN RANDOM-ACCESS MEMORIES
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIV (LVIII), Fasc. 1, 2008 Secţia AUTOMATICĂ şi CALCULATOARE A FAULT PRIMITIVE BASED MODEL OF
More informationAPPLICATIONS OF MICROSOFT EXCEL - SOLVER FOR HORIZONTAL AND LEVELLING NETWORKS ADJUSTMENT
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Volumul 63 (67), Numărul 1-2, 2017 Secţia HIDROTEHNICĂ APPLICATIONS OF MICROSOFT EXCEL - SOLVER FOR
More informationAdapting Mixed Workloads to Meet SLOs in Autonomic DBMSs
Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca
More informationWEB APPLICATIONS: OUR IDEA FOR A DEVELOPMENT FRAMEWORK
WEB APPLICATIONS: OUR IDEA FOR A DEVELOPMENT FRAMEWORK Luca Contursi luca.contursi@unile.it Roberto Paiano roberto.paiano@unile.it Andrea Pandurino andrea.pandurino@unile.it ABSTRACT The increased complexity
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationINTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET)
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976-6480 (Print) ISSN 0976-6499 (Online) Volume 4, Issue 1, January- February (2013), pp. 50-58 IAEME: www.iaeme.com/ijaret.asp
More informationDiffie-Hellman Protocol as a Symmetric Cryptosystem
IJCSNS International Journal of Computer Science and Network Security, VOL.18 No.7, July 2018 33 Diffie-Hellman Protocol as a Symmetric Cryptosystem Karel Burda, Brno University of Technology, Brno, Czech
More informationThe Affinity Effects of Parallelized Libraries in Concurrent Environments. Abstract
The Affinity Effects of Parallelized Libraries in Concurrent Environments FABIO LICHT, BRUNO SCHULZE, LUIS E. BONA, AND ANTONIO R. MURY 1 Federal University of Parana (UFPR) licht@lncc.br Abstract The
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationANALYSIS OF DATA TRANSMITTED BETWEEN THE SERVER AND THE CLIENT THROUGH DIFFERENT TYPES OF COMMUNICATION
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIX (LXIII), Fasc. 1, 2013 Secţia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ ANALYSIS OF DATA TRANSMITTED
More informationFrequency Oriented Scheduling on Parallel Processors
School of Mathematics and Systems Engineering Reports from MSI - Rapporter från MSI Frequency Oriented Scheduling on Parallel Processors Siqi Zhong June 2009 MSI Report 09036 Växjö University ISSN 1650-2647
More informationMeasuring the Capability of Smartphones for Executing Context Algorithms
Maximilian Eibl, Martin Gaedke. (Hrsg.): INFORMATIK 2017, Lecture Lecture Notes in Notes Informatics in Informatics (LNI), Gesellschaft (LNI), Gesellschaft für Informatik, für Informatik, Bonn 2017 Bonn
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationNovel Cluster Based Routing Protocol in Wireless Sensor Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer
More informationThe Comparative Study of Machine Learning Algorithms in Text Data Classification*
The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification
More informationCHECKING THE HOMOGENEITY OF CONCRETE USING ARTIFICIAL NEURAL NETWORK
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LXI (LXV), Fasc., 05 Secţia CONSTRUCŢII. ARHITECTURĂ CHECKING THE HOMOGENEITY OF CONCRETE USING
More informationCategory Theory in Ontology Research: Concrete Gain from an Abstract Approach
Category Theory in Ontology Research: Concrete Gain from an Abstract Approach Markus Krötzsch Pascal Hitzler Marc Ehrig York Sure Institute AIFB, University of Karlsruhe, Germany; {mak,hitzler,ehrig,sure}@aifb.uni-karlsruhe.de
More informationDiversity Coded 5G Fronthaul Wireless Networks
IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationINTRUSION RESPONSE SYSTEM TO AVOID ANOMALOUS REQUEST IN RDBMS
Vol.2, Issue.1, Jan-Feb 2012 pp-412-416 ISSN: 2249-6645 INTRUSION RESPONSE SYSTEM TO AVOID ANOMALOUS REQUEST IN RDBMS Akila.L 1, Mrs.DeviSelvam 2 1 II M.E CSE,Sri shakthi Institute Of Engineering and Technology,Anna
More informationCE4031 and CZ4031 Database System Principles
CE4031 and CZ4031 Database System Principles Academic AY1819 Semester 1 CE/CZ4031 Database System Principles s CE/CZ2001 Algorithms; CZ2007 Introduction to Databases CZ4033 Advanced Data Management (not
More informationNowadays data-intensive applications play a
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted
More informationInvestigating the Effect of Different Kernel Functions on the Performance of SVM for Recognizing Arabic Characters
Investigating the Effect of Different Functions on the Performance of SVM for Recognizing Arabic Characters Sayed Fadel 1,2, Said Ghoniemy 1,2, Mohamed Abdallah 1,3, Hussein Abu Sorra 1, Amira Ashour 1,4,
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,
More informationDistributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia
Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements
More informationLet s look at each and begin with a view into the software
Power Consumption Overview In this lesson we will Identify the different sources of power consumption in embedded systems. Look at ways to measure power consumption. Study several different methods for
More informationBARCODE READER MANAGEMENT WITH THE ATMEL MICROCONTROLLER (I)
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Volumul 63 (67), Numărul 1, 2017 Secţia ELECTROTEHNICĂ. ENERGETICĂ. ELECTRONICĂ BARCODE READER MANAGEMENT
More informationImproved Attack on Full-round Grain-128
Improved Attack on Full-round Grain-128 Ximing Fu 1, and Xiaoyun Wang 1,2,3,4, and Jiazhe Chen 5, and Marc Stevens 6, and Xiaoyang Dong 2 1 Department of Computer Science and Technology, Tsinghua University,
More informationNEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS. Arash Eghdamian 1*, Azman Samsudin 1
International Journal of Technology (2017) 3: 519-527 ISSN 2086-9614 IJTech 2017 NEW MODIFIED LEFT-TO-RIGHT RADIX-R REPRESENTATION FOR INTEGERS Arash Eghdamian 1*, Azman Samsudin 1 1 School of Computer
More informationStar: Sla-Aware Autonomic Management of Cloud Resources
Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,
More informationStatistical Testing of Software Based on a Usage Model
SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer
More informationTiger Scheme QST/CTM Standard
Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)
More informationOn-line Estimation of Power System Security Limits
Bulk Power System Dynamics and Control V, August 26-31, 2001, Onomichi, Japan On-line Estimation of Power System Security Limits K. Tomsovic A. Sittithumwat J. Tong School of Electrical Engineering and
More informationA NEW SYSTOLIC ALGORITHM OF 2-D DCT TRANSFORM BASED ON PSEUDO-CORRELATION STRUCTURES FOR A UNIFIED VLSI ARCHITECTURE
BULETIUL ISTITUTULUI POLITEHIC DI IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LXI (LXV), Fasc. 2, 25 Secţia ELECTROTEHICĂ. EERGETICĂ. ELECTROICĂ A EW SYSTOLIC ALGORITHM OF 2-D
More informationA Study of Connectivity Metrics for Wireless Ad Hoc Networks. Samuel C. Nelson. A Proposal Submitted to the Honors Council
A Study of Connectivity Metrics for Wireless Ad Hoc Networks by Samuel C. Nelson A Proposal Submitted to the Honors Council For Honors in Computer Science 15 October 2005 1 Introduction Imagine the following
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science
More informationApplying Synthetic Images to Learning Grasping Orientation from Single Monocular Images
Applying Synthetic Images to Learning Grasping Orientation from Single Monocular Images 1 Introduction - Steve Chuang and Eric Shan - Determining object orientation in images is a well-established topic
More informationIMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK
IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE 802.15.4 FOR WIRELESS SENSOR NETWORK Kamaljit Singh 1, Dr. Sukhvinder Singh Bamber 2, Aman Kaushik 3 1 M.Tech,CSE Department, Baddi University of Emerging
More informationA COMPETENT ALGORITHM TO FIND THE INITIAL BASIC FEASIBLE SOLUTION OF COST MINIMIZATION TRANSPORTATION PROBLEM
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LXI (LXV), Fasc., 05 SecŃia AUTOMATICĂ şi CALCULATOARE A COMPETENT ALGORITHM TO FIND THE INITIAL
More informationHOW TO PROVE AND ASSESS CONFORMITY OF GUM-SUPPORTING SOFTWARE PRODUCTS
XX IMEKO World Congress Metrology for Green Growth September 9-14, 2012, Busan, Republic of Korea HOW TO PROVE AND ASSESS CONFORMITY OF GUM-SUPPORTING SOFTWARE PRODUCTS N. Greif, H. Schrepf Physikalisch-Technische
More informationEfficient, Scalable, and Provenance-Aware Management of Linked Data
Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management
More informationPerformance Evaluation of Bluetooth Low Energy Communication
SCITECH Volume 7, Issue 2 RESEARCH ORGANISATION April 28, 2018 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Performance Evaluation of Bluetooth Low Energy
More informationFace Tracking in Video
Face Tracking in Video Hamidreza Khazaei and Pegah Tootoonchi Afshar Stanford University 350 Serra Mall Stanford, CA 94305, USA I. INTRODUCTION Object tracking is a hot area of research, and has many practical
More informationEnergy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2
Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,
More informationPOST-RENDERING ENHANCEMENT OF VOLUMES
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LV (LIX), Fasc. 3, 2009 SecŃia AUTOMATICĂ şi CALCULATOARE POST-RENDERING ENHANCEMENT OF VOLUMES
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationDETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Abstract... 2 Determination of the Malware Detection Rate...
More informationPERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION
20th European Signal Processing Conference EUSIPCO 2012) Bucharest, Romania, August 27-31, 2012 PERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION Mauricio Lara 1 and Bernard Mulgrew
More informationOutline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.
Paper presentation Ultra-Portable Devices Paper: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks Andrea J. Goldsmith, Stephen B. Wicker IEEE Wireless Communication August 2002, pages
More informationEXPERIMENTAL RESULTS ON THE PERFORMANCE OF A NEW CONTENT MANAGEMENT MODEL
U.P.B. Sci. Bull., Series C, Vol. 72, Iss. 4, 2010 ISSN 1454-234x EXPERIMENTAL RESULTS ON THE PERFORMANCE OF A NEW CONTENT MANAGEMENT MODEL Rareş VASILESCU 1 Sistemele de gestiune a conţinutului folosesc
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationarxiv: v1 [cs.dc] 2 Apr 2016
Scalability Model Based on the Concept of Granularity Jan Kwiatkowski 1 and Lukasz P. Olech 2 arxiv:164.554v1 [cs.dc] 2 Apr 216 1 Department of Informatics, Faculty of Computer Science and Management,
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More informationSAMBA-BUS: A HIGH PERFORMANCE BUS ARCHITECTURE FOR SYSTEM-ON-CHIPS Λ. Ruibing Lu and Cheng-Kok Koh
BUS: A HIGH PERFORMANCE BUS ARCHITECTURE FOR SYSTEM-ON-CHIPS Λ Ruibing Lu and Cheng-Kok Koh School of Electrical and Computer Engineering Purdue University, West Lafayette, IN 797- flur,chengkokg@ecn.purdue.edu
More informationA RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE
A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE Chris Mattmann University of Southern California University Park Campus, Los Angeles, CA 90007 mattmann@usc.edu
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationHierarchical Matching Techiques for Automatic Image Mosaicing
Hierarchical Matching Techiques for Automatic Image Mosaicing C.L Begg, R Mukundan Department of Computer Science, University of Canterbury, Christchurch, New Zealand clb56@student.canterbury.ac.nz, mukund@cosc.canterbury.ac.nz
More informationA Known-Plaintext Attack on Two-Key Triple Encryption
A Known-Plaintext Attack on Two-Key Triple Encryption Paul C. van Oorschot and Michael J. Wiener BNR P.O. Box 3511 tation C Ottawa, Ontario, Canada, K1Y 4H7 1990 June 29 Abstract. A chosen-plaintext attack
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationAbstract. Testing Parameters. Introduction. Hardware Platform. Native System
Abstract In this paper, we address the latency issue in RT- XEN virtual machines that are available in Xen 4.5. Despite the advantages of applying virtualization to systems, the default credit scheduler
More informationThis chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest
1 2 3 This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest PKCS, Diffie- Hellman key exchange. This first published
More informationC-NBC: Neighborhood-Based Clustering with Constraints
C-NBC: Neighborhood-Based Clustering with Constraints Piotr Lasek Chair of Computer Science, University of Rzeszów ul. Prof. St. Pigonia 1, 35-310 Rzeszów, Poland lasek@ur.edu.pl Abstract. Clustering is
More informationA COMPETENT ALGORITHM TO FIND THE INITIAL BASIC FEASIBLE SOLUTION OF COST MINIMIZATION TRANSPORTATION PROBLEM
BULETINUL INSTITUTULUI POLITEHNIC DIN IAŞI Publicat de Universitatea Tehnică Gheorghe Asachi din Iaşi Tomul LIX (LXIII), Fasc. 1, 016 Secţia AUTOMATICĂ şi CALCULATOARE A COMPETENT ALGORITHM TO FIND THE
More informationRequirements Engineering for Enterprise Systems
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Requirements Engineering for Enterprise Systems
More informationRGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata
RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch
More informationContent Addressable Memory with Efficient Power Consumption and Throughput
International journal of Emerging Trends in Science and Technology Content Addressable Memory with Efficient Power Consumption and Throughput Authors Karthik.M 1, R.R.Jegan 2, Dr.G.K.D.Prasanna Venkatesan
More informationDynamic Clustering of Data with Modified K-Means Algorithm
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq
More information