Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
|
|
- Naomi Gibson
- 6 years ago
- Views:
Transcription
1 Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur Uiversity, Aubur, AL 36849, USA weishi@aubur.edu Keywords: Wireless sesor etworks, etwork security, hierarchical topology, malicious ode detectio. Abstract Deployed i a hostile eviromet, idividual odes of a wireless sesor etwork (W) could be easily compromised by the adversary due to the costraits such as limited battery lifetime, memory space ad computig capability. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary through compromised odes. However, it is challegig to secure the flat topology etworks efficietly because of the poor scalability ad high commuicatio overhead. O top of a hierarchical W architecture, i this paper we proposed a ovel scheme based o weighted-trust evaluatio to detect malicious odes. The hierarchical etwork ca reduce the commuicatio overhead betwee sesor odes by utilizig clustered topology. Through itesive simulatio, we verified the correctess ad efficiecy of our detectio scheme. 1. INTRODUCTION Recet advacemets i micro-electro-mechaical systems (MEMS) ad low power ad highly itegrated electroic devices have led to the developmet ad wide applicatio of wireless sesor etworks [5], [14], [16]. Wireless sesor etworks cosist of very small devices, called sesor odes, that are battery powered ad are equipped with itegrated sesors, a data-processig uit, a small storage memory, ad short-rage radio commuicatio [17]. Typically, these sesors are radomly deployed i the field. They form a uatteded wireless etwork, collect data from the field, partially aggregate them, ad sed them to a sik that is resposible for data fusio. Sesor etworks have applicatios i emergecy-respose etworks, eergy Mauscript submitted o Ja. 11, 28 to The Symposium o Simulatio of Systems Security (SSSS 8), Ottawa, Caada, April 14 17, 28. Correspodig author: Yu Che, Dept. of Electrical & Computer Egieerig, SUNY Bighamto, Bighamto, NY yche@bighamto.edu, Tel.: (67) maagemet, medical moitorig, logistics ad ivetory maagemet, ad battlefield maagemet. I cotrast to traditioal wireless etworks, special security ad performace issues have to be carefully cosidered for sesor etworks [21]. For example, due to the uatteded ature of sesor etworks, a attacker could lauch various attacks ad eve compromise sesor devices without beig detected. Therefore, a sesor etwork should be robust agaist attacks, ad if a attack succeeds, its impact should be miimized. I other words, compromisig a sigle sesor ode or few sesor odes should ot crash the etire etwork. Aother cocer is about eergy efficiecy. I a W, each sesor ode may eed to support multiple commuicatio models icludig uicast, multicast, ad broadcast. Therefore, due to the limited battery lifetime, security mechaisms for sesor etworks must be eergy efficiet [19]. Especially, the umber of message trasmissios ad the amout of expesive computatio should be as few as possible. I fact, there are a umbers of attacks a attacker ca lauch agaist a wireless sesor etwork oce a certai umber of sesor odes have bee compromised. I literature, for istace, HELLO floodig attacks [9], sik hole attacks [9], Sybil attack [12], black hole attack [15], worm hole attacks [6], or DDoS attacks [4] are optios for a attacker. These attacks lead to aomalies i etwork behaviors that are detectable i geeral. There are some reported solutios to detect these attacks by moitorig the aomalies [9]. I this work, we addressed a eve trickier sceario. Whe a adversary has gaied cotrol over certai sesor ode(s), he/she does ot lauch direct attacks agaist the etwork. Sice oce the misbehavior is detected, the operator may forsake these compromised odes ad tur to other data sources. Istead, the attacker let those compromised odes behave ormally but report false data to the data collector. The purpose of the adversary is to mislead the operator with falsified data. This may lead to more serious cosequeces; for istace, i the battlefield a false report regardig the operatios of the eemy may lead to
2 extra casualties. I this paper, we proposed a weighted-trust evaluatio (WTE) based scheme to detect the compromised odes by moitorig its reported data. It is a light-weighted algorithm that would icur little overhead. Cosiderig the scalability ad flexibility, hierarchical etwork architecture is adopted. Through itesive simulatio, we verified that our WTE scheme detects misbehaved odes accurately with very short delay. The rest of the paper is structured as follows. I sectio 2, we briefly review the related malicious W ode detectio approaches. Sectio 3 describes our hierarchical etwork structure ad the priciple of our WTE based malicious ode detectio algorithm. The experimet setup ad simulatio results are preseted i Sectio 4. Sectio 5 wraps up this paper with a discussio about efficiecy ad implemetatio issues of our solutio. 2. RELATED WORK Wireless sesor etworks are ofte deployed i a hostile eviromet ad work without huma supervisio, idividual ode could be easily compromised by the adversary due to the costraits such as battery lifetime, smaller memory space ad limited computig capability. Security i W has bee oe of the most importat topics i the W research commuity [1], [8], [22]. Here we oly briefly review the reported works closely related to malicious ode detectio due to the limited space. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary. Luo et al. [11] have poited out that ifrastructureless ad hoc etworks rarely have a real defese mechaism agaist most of the attacks, icludig both outsider ad isider attacks such as compromised ode attacks. They suggested a system desig like this if oe ode is amed trusted by certai umber of its eighborig odes, that particular ode is trusted both locally ad globally. However, sice the system uses a miimum umber of trusted odes it is ot so applicable to sesor etworks where the odes are radomly spread out. I other words, it is possible that uder certai coditios odes caot fid the miimum umber of eighborig odes i order to be amed trusted. Oe solutio for locatioized aomaly detectio i a group of odes is suggested i [4]. Every ode gets the localizatio iformatio from the eighborig odes ad also computes the localizatio iformatio itself ad compares these two values. If the differece is small eough, that ode decides there is o adversary aroud causig the localizatio problem i its locatio. Researchers also suggested detectig malicious ode usig sigal stregth [7]. The idea here is to deped o eighborhood moitorig of the odes. Every sesor ode moitors its surroudig ad wheever a trasmissio sigal is detected by a sesor ode, it would check if the sigal stregth of the trasmittig ode is compatible with the origiator ode's geographical positio. Eve though this approach is applicable, it is ot efficiet i may ways. The large overhead eeded for trasmittig data is a problem both for sedig ad processig. Also it is ot eergyefficiet sice all odes are moitorig ad processig data all the time. The work reported i [3] is the most close to our approach. They proposed to detect malicious ode by comparig its output with a aggregatio value. Ispired by the Byzatie problem, our approach is more straightforward ad icurs much less overhead sice there is o expesive calculatio ivolved. Karlof ad Wager [9] suggested to costruct efficiet radom samplig mechaisms ad iteractive proofs, the a user ca verify that the aswer give by the aggregator is a good approximatio of the true value eve whe a fractio of the sesor odes are compromised. Furthermore, i other fields Byzatie program is cosidered as a importat issue. For example, i cogitive radio etwork, Byzatie problem i spectrum sesig is also ivestigated [2]. 3. WEIGHTED TRUST EVALUATION TECHNOLOGY 3.1 Network Architecture Figure 1 demostrates the etwork architecture i which our weighted-trust evaluatio scheme is implemeted. It is a three-layer hierarchical etwork architecture, which cosists of three types of sesor odes similar to the architecture utilized i [2]: Low-power Sesor Nodes ()" with limited fuctioality; Higher-power Forwardig Nodes (FN)" that forward the data obtaied form sesor odes to upper layer; Access Poits (AP)", or called Base Statios (BS) that route data betwee wireless etworks ad the wired ifrastructure. I cotrast to sesor odes i flat ad hoc sesor etworks, sesor odes i the lowest layer of this hierarchical etwork do ot offer multi-hop routig capability to its eighbors. A umber of Sesor Nodes (s) are orgaized as a group ad cotrolled by a higher layer ode, the Forwardig Node (FN). Therefore, each sesor ode oly commuicates with its FN ad provides iformatio such as sesor readig to its FN. FNs are located o the secod layer atop the sesor ode layer ad offers multi-hop routig capability to s or other FNs. We assume the FNs are trustful ad wo t be compromised. We also assume the APs are trustful, otherwise the adversary
3 ca iject ay data without bee detected. AP AP AP Layer FN FN FN FN Layer FN FN FN Layer Figure 1. Architecture of the hierarchical W. 3.2 Malicious Nodes Detectio As metioed earlier, sesor odes i sesor etworks are usually deployed i hostile eviromets such as battlefields. Cosequetly a sesor ode may be compromised or out of fuctio ad the provides wrog iformatio that may mislead the whole etwork. This problem is called as the Byzatie problem. For example, a compromised sesor ode (malicious ode) ca costatly report icorrect iformatio to higher layers. The aggregator (FN or AP) i higher layer may make a wrog aggregatio result due to the effect of the malicious ode. It is therefore a importat issue i sesor etworks to detect malicious odes i spite of such Byzatie problem. Each FN has two wireless iterfaces, oe commuicates with lower layer odes (s), which belog to its maagemet, ad the other coects to higher layer odes Access Poits (APs). APs are located o the highest layer i a wireless etwork, ad have both wireless ad wired iterfaces. APs provide multi-hop routig for packets from s ad FNs withi radio rage, i additio to routig data to wired etworks. APs also have the fuctioality of forwardig cotrol iformatio from wired etworks to FNs ad s. This hierarchical etwork ca also be cosidered as a distributed iformatio aggregatio system. s gather iformatio ad report to its FN. Based o the iformatio collected from s, FNs compute the aggregatio result ad commit the iformatio to APs. However, sice s may be compromised ad report fake iformatio, it is importat for FNs to verify the correctess of the iformatio collected from s. Similarly, it is also desired that APs possess the ability of verifyig the committed iformatio. Table 1 summarizes the symbolic otatio used throughout this paper. Figure 2. A weight based etwork for hierarchical sesor etwork. As the first step toward the solutio to the problem, we model it ito a weight-based etwork as show i Figure 2. The etwork is adapted i the architecture betwee a group of sesor odes ad their forwardig ode. As show i the figure, a weight W is assiged to each sesor ode. The FN collects all iformatio provided by s ad calculates a aggregatio result usig the weight assiged to each : E = N = W U 1 (1) Symbol FN AP BS W E U θ r Table 1. Symbolic otatios Meaig Sesor Node Forwardig ode Access poit Base statio Weight rage Aggregatio result A sesor ode s output Weight pealty ratio The ratio of sesor odes i a cluster sedig differet report to the FN Where E is the aggregatio result ad W is the weight ragig from to 1. A essetial cocer is about the defiitio of sesor ode s output U. I practice, the output iformatio U may be false or true iformatio or cotiues umbers such as temperature readig. Thus the defiitio of output U is usually depedig o the applicatio where the sesor etwork is used. The followig issue is to update the weight of each sesor ode based o the correctess of iformatio reported. Updatig the weight of each sesor ode has two purposes. First, if a sesor ode is compromised (becomes a malicious ode) ad frequetly seds its report icosistet with the fial decisio, its weight is likely to be decreased.
4 The if a sesor ode s weight is lower tha a specific threshold, we ca idetify it as a malicious ode. Secod, the weight also decides how much a report may cotribute to the fial decisio. This is reasoable sice if the report from a sesor ode teds to be icorrect, it should be couted less i the fial decisio. This logic is reflected i the followig equatio. W W = W θ r if ( U elsewise E) Where θ is a weighted pealty ratio. Whe the output of a sesor ode s is ot cosistet with the fial result, its weight is reduced by the weight pealty θ multiplyig r. The umber r is defied as: (2) r = m s (3) Where m is the umber of odes i the cluster sedig differet report to the FN, ad s is the total umber of odes i the cluster uder the same FN. A optimal θ value is essetial i our WTE mechaism sice it affects the detectio time ad the accuracy of the algorithm. I additio, due to various defiitios of output iformatio (U ) as metioed above, the cosistece determiatio, which decides whether a ode s output is cosistet with the fial result, is also applicatiodepedet. For example, it is easy to determie the cosistece for a false or true output. However, for a cotiuous umber of U like temperature readig, the probability distributio fuctio could be used to determie the cosistecy of the output iformatio from all sesor odes. Furthermore, a ormalizatio operatio as described i the followig equatio is used to guaratee the weight kept i the rage from to 1. W = W / max( W, LW 1 N Based o updated weights, the forwardig ode is able to detect a ode as a malicious ode if its weight is lower tha a specific threshold. This detectio algorithm ca be widely used i differet types of sesor etworks. For example, the umber of sesor odes ca vary i the algorithm, which makes it suitable for very large ad very small etworks. However, the descriptio of sesor ode output ad updatig scalig factor which are depedet o the applied applicatio eed to be determied carefully i order to achieve efficiet ad high accuracy detectio. 4. SIMULATION EXPERIMENTAL RESULTS 4.1 Simulatio Setups ) (4) Itesive simulatio experimets usig MatLab were coducted to evaluate the effectiveess of our WTE based malicious odes detectio algorithm. I the simulatio, the detectio algorithm is deployed at a forwardig ode to moitor all sesor odes uder the cotrol of the forwardig ode, ad the detectio is performed every cycle, which is a basic time uit of the simulatio. For coveiece, the output of sesor ode are either as 1 (alarm) or (o alarm). All simulatio results were recorded after the system model reached steady state. We assume that a sesor ode is compromised radomly by the attacker at a specific probability every cycle, referred to as the attack probability, ad the this malicious ode keeps reportig the opposite iformatio after compromised. For example, a malicious ode always seds alarm while the aggregatio result computed from other sesor odes is o alarm. Meawhile, a ormal sesor ode may also sed alarm whe real alarm occurs. This case also occurs radomly at a differet alarm probability : Normal Node : Malicious Node : Normal Node sedig : Detected Node : Misdetected Node Figure 3. A example of sesor odes deploymet i the simulatio. Uder the assumptio that sesor odes are desely deployed to moitor certai target. I cotrast to malicious odes, if a ormal ode started sedig alarm, its eighbor odes would also start to sed alarm after a short delay time. Furthermore, ormal alarmig odes will stop sedig alarms after a certai cycles. The ode, which is detected or misdetected as a malicious ode, is iactivated from the whole processig. The detectio is termiated after 2 cycles or more tha 25% of all odes are detected as malicious odes. Each result is calculated form a average over 1 idepedet simulatios. Figure 3 shows a example of sesor odes deploymet i the simulatio eviromet. Sesor odes are uiformly deployed i a square plae. A sesor ode may be a malicious ode, a ormal ode, or a ormal ode that geeratig alarms.
5 Three metrics are defied to evaluate the performace of the detectio algorithm. The respose time, which is the average detectio cycles of correctly detected malicious odes shows how fast malicious odes ca be detected. The Detectio rate, which is the ratio of the umber of detected malicious odes ad the umber of total malicious odes, idicates the effectiveess of our scheme. The third measure is misdetectio ratio, which is the ratio of misdetected odes to all detected odes icludig correctly detected ad misdetected odes. Actually these misdetected odes cosist of two parts: the umber of ormal odes beig treated as malicious oes ad the umber of malicious ode beig treated as ormal odes. For such a malicious ode detectio scheme, short respose time, high detectio rates are desired as well as a low misdetectio ratio. We studied the three metrics through simulatio usig differet parameters. odes sed alarms ad wait to stop alarms is 1 cycles. A threshold (.4) is also set for detectio determiatio as metioed earlier. Figure 4 illustrates the results with weight pealties varyig from.2 to 1. the umber of sesor odes are chage from 1 odes to 4 odes. The icreasig weight pealty reaches a shorter respose time, ad improves the detectio ratio. Ituitively the pealty value reveals the sesitivity of our detectio results agaist the variatio i reported data. However, the misdetectio ratio also icreases as weight pealty icreasig, especially after the pealty ratio becomes.8 ad greater. Cosiderig the tradeoffs amog respose time, detectio rate ad misdetectio rate comprehesively, it is reasoable to set the weight pealties values i the rage of (.4-.1). 4.3 Scalability 4.2 Weight Pealty Respose (1) Respose (4) Usig weight pealties.1 ad.5, we further evaluated the algorithm with various umbers of odes as show i Figure 5. The parameters for this experimet are the same as the first experimet Cycles Cycles Weight Pealty Respose (θ=.1) Respose (θ=.5) Ratio (a) Respose Time vs. Pealty Weights 1 Detect (1) Detect (4) Misdetect (1) Misdetect (4) Weight Pealty (b) Detectio Accuracy vs. Pealty Weights Figure 4. Impact of various Pealty Weights o system performace. The first simulatio is to fid a optimal weight pealty for the detectio algorithm. The attack probability ad alarm probability are both.4. The umber of cycles that ormal Ratio Number of Nodes (a) Respose Time vs. Number of Nodes 1 Detect (θ=.1) Detect (θ=.5) Misdetect (θ=.1) Misdet (θ=.5) Number of Nodes (b) Detectio Accuracy vs. Number of Nodes Figure 5. Illustratio of the system scalability.
6 The respose time, detectio, ad misdetectio ratios are pretty stable while we icreased the umber of odes from 9 to 9, particularly whe the umber of odes is greater tha 64. This result implies that our WTE based detectio algorithm has very ice scalability as it works well uder variat etwork sizes without losig much performace. Especially if the size of etwork becomes large eough, for example, greater tha 64, the etwork size almost has o ifluece o the performace. Figure 5 also demostrates the impact of the selectio of pealty weight θ. Whe a larger value is chose (θ =.1), the system ca detect malicious ode faster ad more accurately comparig to usig smaller value (θ =.5) as show i Fig. 5(a) ad the upper two curves i Fig. 5(b). However, such a faster respose is achieved with the cost of higher misdetectio rate as show by the lower two curves i Fig. 5(b). This verifies the tradeoff amog detectio performace ad misdetectio ratio, ad shows that the system operator ca adjust the sesitivity of the pealty weight parameter θ accordig to the requiremets i differet applicatios. 4.4 Attack Probability Fially, the performace at various attack probabilities is evaluated with weight pealty.5 for 1 odes ad 4 odes cases. The attackig probability is defied as the ratio of malicious odes amog total umber of sesor odes i the etwork that is assumed could be compromised. It describes the itesity of false data that the adversary ijects ito the etwork. As idicated i the research of Byzatie Geeral Problem [1], whe the umber of malicious odes is larger tha the umber of legitimate odes, the loyalty geerals caot figure out who is the rebelled oe; Furthermore, whe there is ot ay autheticatio mechaism applied, the umber of rebel geerals has to be less tha 1/3 of the total umber of geerals if the loyal geerals wat to reach a agreemet o correct activity. I our problem, similarly, if the umber of compromised odes is larger tha 25% of the total odes, we may ot be able to detect the bad guys accurately. The upper bod of the amout of compromised odes i our simulatio is 3% of the total umber of odes. Therefore, the attack probability of 1 implies that there are 25% of the sesor odes have bee compromised. We evaluated the performace usig the respose time, detectio, ad misdetectio ratios as show i Figure 6. The icreasig attack probability meas that there are more odes beig compromised ad falsified data are iserted. As illustrated i Fig. 6(a), the respose time slightly icreases with attack probability icreasig. This makes sese that as more malicious odes appear, the aggregated data is affected more by the falsified data. While there are oly small chages observed i detectio ratios, the misdetectio ratio decreases largely as the growth of the attack probabilities, as show i Fig. 6(b). This is partially due to the icreasig umber of malicious odes that makes the false positive rate smaller. Based o the results reported above, the respose time, detectio, ad misdetectio ratios are stable i the cases large umber of odes ad high compromise probability. It demostrates that the proposed detectio algorithm is efficiet for both large etworks ad high attack probability coditios. The experimet results also show that the performace of the detectio algorithm is largely depedet o parameters studied above. Cycles Ratio Respose (1) Respose (4) Attack Probability (a) Respose Time vs. Compromise Probability Detect (1) Detect (4) Misdetect (1) Misdetect (4) Attack Probability (b) Detectio Accuracy vs. Compromise Probability Figure 6. System performace uder differet compromise probabilities. 5. CONCLUSIONS I this paper, we proposed a ovel weighted-trust evaluatio based scheme to detect compromised or misbehaved odes i wireless sesor etworks. The basic idea is that FNs give
7 trust values to each of the odes i the cluster, if a ode seds meaigless/wrog iformatio which implies that a ode has bee compromised or out is of fuctio, the FN directly lowers that ode s trust level. It is much easier ad less complex to keep track of the odes ad it is harder to compromise most of the ode uless a attacker compromises the base statios. With a very good scalability, our approach is applicable to both small size Ws ad Ws with larger umber of odes. The oly differece to apply it to larger size Ws is to icrease the umber of FNs. Essetially, it could be treated as a ode-clusterig problem. Our approach is based o the assumptio that base statios are trusted. I fact, if the adversary ca gai cotrol over the base statios, he/she ca do ay possible attack agaist the W. This is a iterestig ope problem, however it is beyod the scope of this paper. Aother critical assumptio is that the majority of the sesor odes are workig properly. If the umber of compromised odes is more tha the umber of ormal odes, the legal odes will be reported as malicious oe ad beig isolated. Actually, i this paper we have reported merely some prelimiary results, which verified the correctess ad effectiveess of our solutio. More detailed aalysis regardig the performace of our scheme will be studied i the ogoig research ad more questios to be aswered. For istace, how is the impact of distributio of the 25% malicious odes agaist the performace of weighted-trust evaluatio? What is the behavior of our detectio scheme if the ratio of malicious odes beyod 1/3 of the sesor odes? I our progressive efforts, we are studyig the deploymet of FNs ad the ifluece of differet desities of FNs o the performace. I additio, we are settig up a testbed cosistig of more tha 64 sesor odes. That may allow us to ivestigate the differeces betwee the simulatio experimets ad what happes i real world whe real physical odes are i use. ACKNOWLEDGEMENT We d like to thak the aoymous reviewers for their valuable commets ad suggestios. REFERENCES [1] E. Ayday, F. Delgosha, ad F. Fekri, Locatio-Aware Security Services for Wireless Sesor Networks usig Network Codig, Ifocom, May 27. [2] R. Che, J. M. Park, ad K. Bia, Robust Distributed Spectrum Sesig i Cogitive Radio Networks, Techical Report TR-ECE-6-7, Dept. of Electrical ad Computer Egieerig, Virgiia Tech., July 26. [3] D.-I. Curiac, O. Baias, F. Draga, C. Volosecu, ad O. Draga, Malicious Node Detectio i Wireless Sesor Networks Usig a Autoregressio Techique, the 3 rd Iteratioal Coferece o Networkig ad Services (ICNS 7), Jue 19 25, 27, Athes, Greece. [4] W. Du, L. Fag, ad P. Nig, LAD: Localizatio Aomaly Detectio for Wireless Sesor Networks, the 19 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 5), April 3 8, 25, Dever, Colorado, USA. [5] D. Estri, R. Govida, J. Heidema, ad S. Kumar, Next Cetury Challeges: Scalable Coordiatio i Sesor Networks, MOBICOM, August 1999 [6] Y. Hu, A. Perrig, ad D. Johso, Packet Leashes: A Defese agaist Wormhole Attacks i Wireless Ad Hoc Networks, IEEE INFOCOM, 23 [7] W. Juior, T. Figueriredo, H.-C. Wog, ad A. Loureiro, Malicious Node Detectio i Wireless Sesor Networks, the 18 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 4), April 26 3, 24, Sata Fe, Nex Mexico, USA. [8] C. Karlof, N. Sastry, ad D. Wager, TiySec: A Lik Layer Security Architecture for Wireless Sesor Networks, ACM Sesys, November 24. [9] C. Karlof ad D. Wager, Secure Routig i Wireless Sesor Networks: Attacks ad Coutermeasures, Joural of Ad Hoc Networks, Elsevier, 23 [1] L. Lamport, R. Shostak, ad M. Pease, The Byzatie Geerals Problem, ACM Trasactios o Programmig Laguages ad Systems, Vol. 4, No. 3, July [11] Haiyu Luo, Petros Zerfos, Jieju Kog, Sogwu Lu, Lixia Zhag, Self-securig Ad Hoc Wireless Networks, IEEE ISCC (IEEE Symposium o Computers ad Commuicatios) 22, Italy. [12] J. Newsome, E. Shi, D. Sog, ad A. Perrig, The Sybil Attack i Sesor Networks: Aalysis ad Defese, Iteratioal Symposium o Iformatio Processig i Sesor Networks, Vol. 1(24). [13] B. Przydatek, D. Sog, ad A. Perrig, SIA: Secure Iformatio Aggregatio i Sesor Networks, Proceedigs of the 1st iteratioal coferece o Embedded etworked sesor systems, November 5-7, 23, Los Ageles, Califoria, USA. [14] S. D. Servetto, From small Sesor Networks to Sesor Networks, EmNets 26, May 26. [15] B. Su, K. Wu, ad U. Pooch, Secure Routig agaist Black-hole Attack i Mobile Ad Hoc Networks, i
8 Proceedigs of Commuicatios ad Computer Networks, 22. [16] M. Tubaishat ad S. Madria., Sesor Networks: a Overview, IEEE Potetials, 22, 2, 2-23, April 23. [17] M.A.M. Vieira, D.C. da Silva Jr., C.N. Coelho Jr., ad J.M. da Mata., Survey o Wireless Sesor Network Devices, Emergig Techologies ad Factory Automatio (ETFA3), September 23. [18] W. Ye, F. Silva, ad J. Heidema, Ultra-Low Duty Cycle MAC with Scheduled Chael Pollig, i Proceedigs of the 4th ACM Coferece o Embedded Networked Sesor Systems (SeSys), Boulder, Colorado, USA, November, 26. [19] Y. Yu, B. Krishamachari, ad V.K. Prasaa, Eergy-Latecy Tradeoffs for Data Gatherig i Wireless Sesor Networks, IEEE Ifocom'4 [2] S. Zhao, K. Tepe, I. Seskar ad D. Raychaudhuri, Routig Protocols for Self-Orgaizig Hierarchical Ad-Hoc Wireless Networks, Proceedigs of the IEEE Saroff Symposium, Treto, NJ, March 23. [21] L. Zhou ad Z. Haas, Securig Ad Hoc Networks, IEEE Network Special Issue o Network Security, 13, 6, 24-3, November [22] S. Zhu, S. Setia, ad S. Jajodia, LEAP: Efficiet Security Mechaisms for Large-Scale Distributed Sesor Networks, CCS'3, October 23. Yu Che received the MS ad PhD degree i Electrical Egieerig from the Uiversity of Souther Califoria (USC) i 22 ad 26, respectively. He is a assistat professor of electrical ad computer egieerig at SUNY - Bighamto. His research iterest icludes etwork security, Security ad privacy i distributed systems ad pervasive computig eviromets, Iteret ifrastructure security, ad recofigurable hardware based security solutios. He is a member of the ACM, the IEEE ad the SPIE. Dr. Che could be reached at yche@bighamto.edu. Wei-Shi Ku received the Ph.D. degree i computer sciece from the Uiversity of Souther Califoria (USC) i 27. He also obtaied both the M.S. degree i computer sciece ad the M.S. degree i Electrical Egieerig from USC i 23 ad 26 respectively. He is a assistat professor with the Departmet of computer sciece ad software egieerig at Aubur Uiversity. His research iterests iclude spatial ad temporal data maagemet, mobile data maagemet, geographic iformatio systems, ad security & privacy. He has published more tha 3 research papers i refereed iteratioal jourals ad coferece proceedigs. He is a member of the ACM ad the IEEE. Dr. Ku could be reached at weishi@aubur.edu. BIOGRAPHY Idris M. Atakli received his M.S. degree i Electrical Egieerig from the State Uiversity of New York (SUNY), Bighamto i 27. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at SUNY - Bighamto. His research iterests iclude iformatio security, digital watermark applicatios, ad computer etwork systems. Mr. Atakli could be reached at iatakli1@bighamto.edu. Hogbig Hu received his B.E. i computer sciece from Jili Uiversity, Chagchu, Chia, ad B.E. i iformatio ad etwork sciece from Chiba Istitute of Techology, Narashio, Japa both i 21. He received his M.S. degree i iformatio sciece from Tohoku Uiversity, Sedai, Japa i 23. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at the SUNY - Bighamto. His research iterests iclude speech aalysis, patter recogitio, speech codig, ad etwork systems. Mr. Hu could be reached at hhu1@bighamto.edu.
3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationWeighted trust evaluation-based malicious node detection for wireless sensor networks
132 Int. J. Information and Computer Security, Vol. 3, No. 2, 2009 Weighted trust evaluation-based malicious node detection for wireless sensor networks Hongbing Hu and Yu Chen* State University of New
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationAn Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network
A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationRelay Placement Based on Divide-and-Conquer
Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationS. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea
S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More informationHarris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c
Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More informationOntology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection
2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,
More informationCost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.
ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationCalculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding
Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationMobile terminal 3D image reconstruction program development based on Android Lin Qinhua
Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationISSN (Print) Research Article. *Corresponding author Nengfa Hu
Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationInterference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks
Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh
More informationRange Free Localization Schemes For Wireless Sensor Networks
Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA
More informationLook-ahead Geographic Routing for Sensor Networks
1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationContour Map Matching for Event Detection in Sensor Networks
Cotour Map Matchig for Evet Detectio i Sesor Networks Wewei Xue, Qiog Luo, Lei Che, Yuhao Liu Departmet of Computer Sciece Hog Kog Uiversity of Sciece ad Techology Clear Water Bay, Kowloo, Hog Kog {wwxue,
More informationConsider the following population data for the state of California. Year Population
Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationA Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System
A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality
More informationPartition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration
Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationUsing a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations
Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag
More informationEnergy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationInformation Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation
Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat 785006, Assam moowar.tezu@gmail.com D.
More informationWeb Text Feature Extraction with Particle Swarm Optimization
32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationQuorum Based Data Replication in Grid Environment
Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More informationEffect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions
Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationSectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work
200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationCache-Optimal Methods for Bit-Reversals
Proceedigs of the ACM/IEEE Supercomputig Coferece, November 1999, Portlad, Orego, U.S.A. Cache-Optimal Methods for Bit-Reversals Zhao Zhag ad Xiaodog Zhag Departmet of Computer Sciece College of William
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationQoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
QoS Aware Geographic Opportuistic Routig i Wireless Sesor Networks Log Cheg, Member, IEEE, Jiawei Niu, Member, IEEE, Jiaog Cao, Seior Member, IEEE, Sajal K. Das, Seior Member, IEEE, ad Yu Gu, Member, IEEE
More informationProperties and Embeddings of Interconnection Networks Based on the Hexcube
JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationDETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION
Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme
More informationn Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers
EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationx x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the
COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,
More informationFAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS
SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationAccurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method
This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Accurate ad Efficiet Traffic Moitorig Usig Adaptive
More informationPosition and Velocity Estimation by Ultrasonic Sensor
Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationWhat are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs
What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure
More informationFCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks
FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationCMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,
More informationTitle: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity.
7 IEEE. Persoal use of this material is permitted. Permissio from IEEE must be obtaied for all other uses, i ay curret or future media, icludig repritig/republishig this material for advertisig or promotioal
More informationAPPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview
APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More information