Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Size: px
Start display at page:

Download "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation"

Transcription

1 Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto, Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur Uiversity, Aubur, AL 36849, USA weishi@aubur.edu Keywords: Wireless sesor etworks, etwork security, hierarchical topology, malicious ode detectio. Abstract Deployed i a hostile eviromet, idividual odes of a wireless sesor etwork (W) could be easily compromised by the adversary due to the costraits such as limited battery lifetime, memory space ad computig capability. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary through compromised odes. However, it is challegig to secure the flat topology etworks efficietly because of the poor scalability ad high commuicatio overhead. O top of a hierarchical W architecture, i this paper we proposed a ovel scheme based o weighted-trust evaluatio to detect malicious odes. The hierarchical etwork ca reduce the commuicatio overhead betwee sesor odes by utilizig clustered topology. Through itesive simulatio, we verified the correctess ad efficiecy of our detectio scheme. 1. INTRODUCTION Recet advacemets i micro-electro-mechaical systems (MEMS) ad low power ad highly itegrated electroic devices have led to the developmet ad wide applicatio of wireless sesor etworks [5], [14], [16]. Wireless sesor etworks cosist of very small devices, called sesor odes, that are battery powered ad are equipped with itegrated sesors, a data-processig uit, a small storage memory, ad short-rage radio commuicatio [17]. Typically, these sesors are radomly deployed i the field. They form a uatteded wireless etwork, collect data from the field, partially aggregate them, ad sed them to a sik that is resposible for data fusio. Sesor etworks have applicatios i emergecy-respose etworks, eergy Mauscript submitted o Ja. 11, 28 to The Symposium o Simulatio of Systems Security (SSSS 8), Ottawa, Caada, April 14 17, 28. Correspodig author: Yu Che, Dept. of Electrical & Computer Egieerig, SUNY Bighamto, Bighamto, NY yche@bighamto.edu, Tel.: (67) maagemet, medical moitorig, logistics ad ivetory maagemet, ad battlefield maagemet. I cotrast to traditioal wireless etworks, special security ad performace issues have to be carefully cosidered for sesor etworks [21]. For example, due to the uatteded ature of sesor etworks, a attacker could lauch various attacks ad eve compromise sesor devices without beig detected. Therefore, a sesor etwork should be robust agaist attacks, ad if a attack succeeds, its impact should be miimized. I other words, compromisig a sigle sesor ode or few sesor odes should ot crash the etire etwork. Aother cocer is about eergy efficiecy. I a W, each sesor ode may eed to support multiple commuicatio models icludig uicast, multicast, ad broadcast. Therefore, due to the limited battery lifetime, security mechaisms for sesor etworks must be eergy efficiet [19]. Especially, the umber of message trasmissios ad the amout of expesive computatio should be as few as possible. I fact, there are a umbers of attacks a attacker ca lauch agaist a wireless sesor etwork oce a certai umber of sesor odes have bee compromised. I literature, for istace, HELLO floodig attacks [9], sik hole attacks [9], Sybil attack [12], black hole attack [15], worm hole attacks [6], or DDoS attacks [4] are optios for a attacker. These attacks lead to aomalies i etwork behaviors that are detectable i geeral. There are some reported solutios to detect these attacks by moitorig the aomalies [9]. I this work, we addressed a eve trickier sceario. Whe a adversary has gaied cotrol over certai sesor ode(s), he/she does ot lauch direct attacks agaist the etwork. Sice oce the misbehavior is detected, the operator may forsake these compromised odes ad tur to other data sources. Istead, the attacker let those compromised odes behave ormally but report false data to the data collector. The purpose of the adversary is to mislead the operator with falsified data. This may lead to more serious cosequeces; for istace, i the battlefield a false report regardig the operatios of the eemy may lead to

2 extra casualties. I this paper, we proposed a weighted-trust evaluatio (WTE) based scheme to detect the compromised odes by moitorig its reported data. It is a light-weighted algorithm that would icur little overhead. Cosiderig the scalability ad flexibility, hierarchical etwork architecture is adopted. Through itesive simulatio, we verified that our WTE scheme detects misbehaved odes accurately with very short delay. The rest of the paper is structured as follows. I sectio 2, we briefly review the related malicious W ode detectio approaches. Sectio 3 describes our hierarchical etwork structure ad the priciple of our WTE based malicious ode detectio algorithm. The experimet setup ad simulatio results are preseted i Sectio 4. Sectio 5 wraps up this paper with a discussio about efficiecy ad implemetatio issues of our solutio. 2. RELATED WORK Wireless sesor etworks are ofte deployed i a hostile eviromet ad work without huma supervisio, idividual ode could be easily compromised by the adversary due to the costraits such as battery lifetime, smaller memory space ad limited computig capability. Security i W has bee oe of the most importat topics i the W research commuity [1], [8], [22]. Here we oly briefly review the reported works closely related to malicious ode detectio due to the limited space. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary. Luo et al. [11] have poited out that ifrastructureless ad hoc etworks rarely have a real defese mechaism agaist most of the attacks, icludig both outsider ad isider attacks such as compromised ode attacks. They suggested a system desig like this if oe ode is amed trusted by certai umber of its eighborig odes, that particular ode is trusted both locally ad globally. However, sice the system uses a miimum umber of trusted odes it is ot so applicable to sesor etworks where the odes are radomly spread out. I other words, it is possible that uder certai coditios odes caot fid the miimum umber of eighborig odes i order to be amed trusted. Oe solutio for locatioized aomaly detectio i a group of odes is suggested i [4]. Every ode gets the localizatio iformatio from the eighborig odes ad also computes the localizatio iformatio itself ad compares these two values. If the differece is small eough, that ode decides there is o adversary aroud causig the localizatio problem i its locatio. Researchers also suggested detectig malicious ode usig sigal stregth [7]. The idea here is to deped o eighborhood moitorig of the odes. Every sesor ode moitors its surroudig ad wheever a trasmissio sigal is detected by a sesor ode, it would check if the sigal stregth of the trasmittig ode is compatible with the origiator ode's geographical positio. Eve though this approach is applicable, it is ot efficiet i may ways. The large overhead eeded for trasmittig data is a problem both for sedig ad processig. Also it is ot eergyefficiet sice all odes are moitorig ad processig data all the time. The work reported i [3] is the most close to our approach. They proposed to detect malicious ode by comparig its output with a aggregatio value. Ispired by the Byzatie problem, our approach is more straightforward ad icurs much less overhead sice there is o expesive calculatio ivolved. Karlof ad Wager [9] suggested to costruct efficiet radom samplig mechaisms ad iteractive proofs, the a user ca verify that the aswer give by the aggregator is a good approximatio of the true value eve whe a fractio of the sesor odes are compromised. Furthermore, i other fields Byzatie program is cosidered as a importat issue. For example, i cogitive radio etwork, Byzatie problem i spectrum sesig is also ivestigated [2]. 3. WEIGHTED TRUST EVALUATION TECHNOLOGY 3.1 Network Architecture Figure 1 demostrates the etwork architecture i which our weighted-trust evaluatio scheme is implemeted. It is a three-layer hierarchical etwork architecture, which cosists of three types of sesor odes similar to the architecture utilized i [2]: Low-power Sesor Nodes ()" with limited fuctioality; Higher-power Forwardig Nodes (FN)" that forward the data obtaied form sesor odes to upper layer; Access Poits (AP)", or called Base Statios (BS) that route data betwee wireless etworks ad the wired ifrastructure. I cotrast to sesor odes i flat ad hoc sesor etworks, sesor odes i the lowest layer of this hierarchical etwork do ot offer multi-hop routig capability to its eighbors. A umber of Sesor Nodes (s) are orgaized as a group ad cotrolled by a higher layer ode, the Forwardig Node (FN). Therefore, each sesor ode oly commuicates with its FN ad provides iformatio such as sesor readig to its FN. FNs are located o the secod layer atop the sesor ode layer ad offers multi-hop routig capability to s or other FNs. We assume the FNs are trustful ad wo t be compromised. We also assume the APs are trustful, otherwise the adversary

3 ca iject ay data without bee detected. AP AP AP Layer FN FN FN FN Layer FN FN FN Layer Figure 1. Architecture of the hierarchical W. 3.2 Malicious Nodes Detectio As metioed earlier, sesor odes i sesor etworks are usually deployed i hostile eviromets such as battlefields. Cosequetly a sesor ode may be compromised or out of fuctio ad the provides wrog iformatio that may mislead the whole etwork. This problem is called as the Byzatie problem. For example, a compromised sesor ode (malicious ode) ca costatly report icorrect iformatio to higher layers. The aggregator (FN or AP) i higher layer may make a wrog aggregatio result due to the effect of the malicious ode. It is therefore a importat issue i sesor etworks to detect malicious odes i spite of such Byzatie problem. Each FN has two wireless iterfaces, oe commuicates with lower layer odes (s), which belog to its maagemet, ad the other coects to higher layer odes Access Poits (APs). APs are located o the highest layer i a wireless etwork, ad have both wireless ad wired iterfaces. APs provide multi-hop routig for packets from s ad FNs withi radio rage, i additio to routig data to wired etworks. APs also have the fuctioality of forwardig cotrol iformatio from wired etworks to FNs ad s. This hierarchical etwork ca also be cosidered as a distributed iformatio aggregatio system. s gather iformatio ad report to its FN. Based o the iformatio collected from s, FNs compute the aggregatio result ad commit the iformatio to APs. However, sice s may be compromised ad report fake iformatio, it is importat for FNs to verify the correctess of the iformatio collected from s. Similarly, it is also desired that APs possess the ability of verifyig the committed iformatio. Table 1 summarizes the symbolic otatio used throughout this paper. Figure 2. A weight based etwork for hierarchical sesor etwork. As the first step toward the solutio to the problem, we model it ito a weight-based etwork as show i Figure 2. The etwork is adapted i the architecture betwee a group of sesor odes ad their forwardig ode. As show i the figure, a weight W is assiged to each sesor ode. The FN collects all iformatio provided by s ad calculates a aggregatio result usig the weight assiged to each : E = N = W U 1 (1) Symbol FN AP BS W E U θ r Table 1. Symbolic otatios Meaig Sesor Node Forwardig ode Access poit Base statio Weight rage Aggregatio result A sesor ode s output Weight pealty ratio The ratio of sesor odes i a cluster sedig differet report to the FN Where E is the aggregatio result ad W is the weight ragig from to 1. A essetial cocer is about the defiitio of sesor ode s output U. I practice, the output iformatio U may be false or true iformatio or cotiues umbers such as temperature readig. Thus the defiitio of output U is usually depedig o the applicatio where the sesor etwork is used. The followig issue is to update the weight of each sesor ode based o the correctess of iformatio reported. Updatig the weight of each sesor ode has two purposes. First, if a sesor ode is compromised (becomes a malicious ode) ad frequetly seds its report icosistet with the fial decisio, its weight is likely to be decreased.

4 The if a sesor ode s weight is lower tha a specific threshold, we ca idetify it as a malicious ode. Secod, the weight also decides how much a report may cotribute to the fial decisio. This is reasoable sice if the report from a sesor ode teds to be icorrect, it should be couted less i the fial decisio. This logic is reflected i the followig equatio. W W = W θ r if ( U elsewise E) Where θ is a weighted pealty ratio. Whe the output of a sesor ode s is ot cosistet with the fial result, its weight is reduced by the weight pealty θ multiplyig r. The umber r is defied as: (2) r = m s (3) Where m is the umber of odes i the cluster sedig differet report to the FN, ad s is the total umber of odes i the cluster uder the same FN. A optimal θ value is essetial i our WTE mechaism sice it affects the detectio time ad the accuracy of the algorithm. I additio, due to various defiitios of output iformatio (U ) as metioed above, the cosistece determiatio, which decides whether a ode s output is cosistet with the fial result, is also applicatiodepedet. For example, it is easy to determie the cosistece for a false or true output. However, for a cotiuous umber of U like temperature readig, the probability distributio fuctio could be used to determie the cosistecy of the output iformatio from all sesor odes. Furthermore, a ormalizatio operatio as described i the followig equatio is used to guaratee the weight kept i the rage from to 1. W = W / max( W, LW 1 N Based o updated weights, the forwardig ode is able to detect a ode as a malicious ode if its weight is lower tha a specific threshold. This detectio algorithm ca be widely used i differet types of sesor etworks. For example, the umber of sesor odes ca vary i the algorithm, which makes it suitable for very large ad very small etworks. However, the descriptio of sesor ode output ad updatig scalig factor which are depedet o the applied applicatio eed to be determied carefully i order to achieve efficiet ad high accuracy detectio. 4. SIMULATION EXPERIMENTAL RESULTS 4.1 Simulatio Setups ) (4) Itesive simulatio experimets usig MatLab were coducted to evaluate the effectiveess of our WTE based malicious odes detectio algorithm. I the simulatio, the detectio algorithm is deployed at a forwardig ode to moitor all sesor odes uder the cotrol of the forwardig ode, ad the detectio is performed every cycle, which is a basic time uit of the simulatio. For coveiece, the output of sesor ode are either as 1 (alarm) or (o alarm). All simulatio results were recorded after the system model reached steady state. We assume that a sesor ode is compromised radomly by the attacker at a specific probability every cycle, referred to as the attack probability, ad the this malicious ode keeps reportig the opposite iformatio after compromised. For example, a malicious ode always seds alarm while the aggregatio result computed from other sesor odes is o alarm. Meawhile, a ormal sesor ode may also sed alarm whe real alarm occurs. This case also occurs radomly at a differet alarm probability : Normal Node : Malicious Node : Normal Node sedig : Detected Node : Misdetected Node Figure 3. A example of sesor odes deploymet i the simulatio. Uder the assumptio that sesor odes are desely deployed to moitor certai target. I cotrast to malicious odes, if a ormal ode started sedig alarm, its eighbor odes would also start to sed alarm after a short delay time. Furthermore, ormal alarmig odes will stop sedig alarms after a certai cycles. The ode, which is detected or misdetected as a malicious ode, is iactivated from the whole processig. The detectio is termiated after 2 cycles or more tha 25% of all odes are detected as malicious odes. Each result is calculated form a average over 1 idepedet simulatios. Figure 3 shows a example of sesor odes deploymet i the simulatio eviromet. Sesor odes are uiformly deployed i a square plae. A sesor ode may be a malicious ode, a ormal ode, or a ormal ode that geeratig alarms.

5 Three metrics are defied to evaluate the performace of the detectio algorithm. The respose time, which is the average detectio cycles of correctly detected malicious odes shows how fast malicious odes ca be detected. The Detectio rate, which is the ratio of the umber of detected malicious odes ad the umber of total malicious odes, idicates the effectiveess of our scheme. The third measure is misdetectio ratio, which is the ratio of misdetected odes to all detected odes icludig correctly detected ad misdetected odes. Actually these misdetected odes cosist of two parts: the umber of ormal odes beig treated as malicious oes ad the umber of malicious ode beig treated as ormal odes. For such a malicious ode detectio scheme, short respose time, high detectio rates are desired as well as a low misdetectio ratio. We studied the three metrics through simulatio usig differet parameters. odes sed alarms ad wait to stop alarms is 1 cycles. A threshold (.4) is also set for detectio determiatio as metioed earlier. Figure 4 illustrates the results with weight pealties varyig from.2 to 1. the umber of sesor odes are chage from 1 odes to 4 odes. The icreasig weight pealty reaches a shorter respose time, ad improves the detectio ratio. Ituitively the pealty value reveals the sesitivity of our detectio results agaist the variatio i reported data. However, the misdetectio ratio also icreases as weight pealty icreasig, especially after the pealty ratio becomes.8 ad greater. Cosiderig the tradeoffs amog respose time, detectio rate ad misdetectio rate comprehesively, it is reasoable to set the weight pealties values i the rage of (.4-.1). 4.3 Scalability 4.2 Weight Pealty Respose (1) Respose (4) Usig weight pealties.1 ad.5, we further evaluated the algorithm with various umbers of odes as show i Figure 5. The parameters for this experimet are the same as the first experimet Cycles Cycles Weight Pealty Respose (θ=.1) Respose (θ=.5) Ratio (a) Respose Time vs. Pealty Weights 1 Detect (1) Detect (4) Misdetect (1) Misdetect (4) Weight Pealty (b) Detectio Accuracy vs. Pealty Weights Figure 4. Impact of various Pealty Weights o system performace. The first simulatio is to fid a optimal weight pealty for the detectio algorithm. The attack probability ad alarm probability are both.4. The umber of cycles that ormal Ratio Number of Nodes (a) Respose Time vs. Number of Nodes 1 Detect (θ=.1) Detect (θ=.5) Misdetect (θ=.1) Misdet (θ=.5) Number of Nodes (b) Detectio Accuracy vs. Number of Nodes Figure 5. Illustratio of the system scalability.

6 The respose time, detectio, ad misdetectio ratios are pretty stable while we icreased the umber of odes from 9 to 9, particularly whe the umber of odes is greater tha 64. This result implies that our WTE based detectio algorithm has very ice scalability as it works well uder variat etwork sizes without losig much performace. Especially if the size of etwork becomes large eough, for example, greater tha 64, the etwork size almost has o ifluece o the performace. Figure 5 also demostrates the impact of the selectio of pealty weight θ. Whe a larger value is chose (θ =.1), the system ca detect malicious ode faster ad more accurately comparig to usig smaller value (θ =.5) as show i Fig. 5(a) ad the upper two curves i Fig. 5(b). However, such a faster respose is achieved with the cost of higher misdetectio rate as show by the lower two curves i Fig. 5(b). This verifies the tradeoff amog detectio performace ad misdetectio ratio, ad shows that the system operator ca adjust the sesitivity of the pealty weight parameter θ accordig to the requiremets i differet applicatios. 4.4 Attack Probability Fially, the performace at various attack probabilities is evaluated with weight pealty.5 for 1 odes ad 4 odes cases. The attackig probability is defied as the ratio of malicious odes amog total umber of sesor odes i the etwork that is assumed could be compromised. It describes the itesity of false data that the adversary ijects ito the etwork. As idicated i the research of Byzatie Geeral Problem [1], whe the umber of malicious odes is larger tha the umber of legitimate odes, the loyalty geerals caot figure out who is the rebelled oe; Furthermore, whe there is ot ay autheticatio mechaism applied, the umber of rebel geerals has to be less tha 1/3 of the total umber of geerals if the loyal geerals wat to reach a agreemet o correct activity. I our problem, similarly, if the umber of compromised odes is larger tha 25% of the total odes, we may ot be able to detect the bad guys accurately. The upper bod of the amout of compromised odes i our simulatio is 3% of the total umber of odes. Therefore, the attack probability of 1 implies that there are 25% of the sesor odes have bee compromised. We evaluated the performace usig the respose time, detectio, ad misdetectio ratios as show i Figure 6. The icreasig attack probability meas that there are more odes beig compromised ad falsified data are iserted. As illustrated i Fig. 6(a), the respose time slightly icreases with attack probability icreasig. This makes sese that as more malicious odes appear, the aggregated data is affected more by the falsified data. While there are oly small chages observed i detectio ratios, the misdetectio ratio decreases largely as the growth of the attack probabilities, as show i Fig. 6(b). This is partially due to the icreasig umber of malicious odes that makes the false positive rate smaller. Based o the results reported above, the respose time, detectio, ad misdetectio ratios are stable i the cases large umber of odes ad high compromise probability. It demostrates that the proposed detectio algorithm is efficiet for both large etworks ad high attack probability coditios. The experimet results also show that the performace of the detectio algorithm is largely depedet o parameters studied above. Cycles Ratio Respose (1) Respose (4) Attack Probability (a) Respose Time vs. Compromise Probability Detect (1) Detect (4) Misdetect (1) Misdetect (4) Attack Probability (b) Detectio Accuracy vs. Compromise Probability Figure 6. System performace uder differet compromise probabilities. 5. CONCLUSIONS I this paper, we proposed a ovel weighted-trust evaluatio based scheme to detect compromised or misbehaved odes i wireless sesor etworks. The basic idea is that FNs give

7 trust values to each of the odes i the cluster, if a ode seds meaigless/wrog iformatio which implies that a ode has bee compromised or out is of fuctio, the FN directly lowers that ode s trust level. It is much easier ad less complex to keep track of the odes ad it is harder to compromise most of the ode uless a attacker compromises the base statios. With a very good scalability, our approach is applicable to both small size Ws ad Ws with larger umber of odes. The oly differece to apply it to larger size Ws is to icrease the umber of FNs. Essetially, it could be treated as a ode-clusterig problem. Our approach is based o the assumptio that base statios are trusted. I fact, if the adversary ca gai cotrol over the base statios, he/she ca do ay possible attack agaist the W. This is a iterestig ope problem, however it is beyod the scope of this paper. Aother critical assumptio is that the majority of the sesor odes are workig properly. If the umber of compromised odes is more tha the umber of ormal odes, the legal odes will be reported as malicious oe ad beig isolated. Actually, i this paper we have reported merely some prelimiary results, which verified the correctess ad effectiveess of our solutio. More detailed aalysis regardig the performace of our scheme will be studied i the ogoig research ad more questios to be aswered. For istace, how is the impact of distributio of the 25% malicious odes agaist the performace of weighted-trust evaluatio? What is the behavior of our detectio scheme if the ratio of malicious odes beyod 1/3 of the sesor odes? I our progressive efforts, we are studyig the deploymet of FNs ad the ifluece of differet desities of FNs o the performace. I additio, we are settig up a testbed cosistig of more tha 64 sesor odes. That may allow us to ivestigate the differeces betwee the simulatio experimets ad what happes i real world whe real physical odes are i use. ACKNOWLEDGEMENT We d like to thak the aoymous reviewers for their valuable commets ad suggestios. REFERENCES [1] E. Ayday, F. Delgosha, ad F. Fekri, Locatio-Aware Security Services for Wireless Sesor Networks usig Network Codig, Ifocom, May 27. [2] R. Che, J. M. Park, ad K. Bia, Robust Distributed Spectrum Sesig i Cogitive Radio Networks, Techical Report TR-ECE-6-7, Dept. of Electrical ad Computer Egieerig, Virgiia Tech., July 26. [3] D.-I. Curiac, O. Baias, F. Draga, C. Volosecu, ad O. Draga, Malicious Node Detectio i Wireless Sesor Networks Usig a Autoregressio Techique, the 3 rd Iteratioal Coferece o Networkig ad Services (ICNS 7), Jue 19 25, 27, Athes, Greece. [4] W. Du, L. Fag, ad P. Nig, LAD: Localizatio Aomaly Detectio for Wireless Sesor Networks, the 19 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 5), April 3 8, 25, Dever, Colorado, USA. [5] D. Estri, R. Govida, J. Heidema, ad S. Kumar, Next Cetury Challeges: Scalable Coordiatio i Sesor Networks, MOBICOM, August 1999 [6] Y. Hu, A. Perrig, ad D. Johso, Packet Leashes: A Defese agaist Wormhole Attacks i Wireless Ad Hoc Networks, IEEE INFOCOM, 23 [7] W. Juior, T. Figueriredo, H.-C. Wog, ad A. Loureiro, Malicious Node Detectio i Wireless Sesor Networks, the 18 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 4), April 26 3, 24, Sata Fe, Nex Mexico, USA. [8] C. Karlof, N. Sastry, ad D. Wager, TiySec: A Lik Layer Security Architecture for Wireless Sesor Networks, ACM Sesys, November 24. [9] C. Karlof ad D. Wager, Secure Routig i Wireless Sesor Networks: Attacks ad Coutermeasures, Joural of Ad Hoc Networks, Elsevier, 23 [1] L. Lamport, R. Shostak, ad M. Pease, The Byzatie Geerals Problem, ACM Trasactios o Programmig Laguages ad Systems, Vol. 4, No. 3, July [11] Haiyu Luo, Petros Zerfos, Jieju Kog, Sogwu Lu, Lixia Zhag, Self-securig Ad Hoc Wireless Networks, IEEE ISCC (IEEE Symposium o Computers ad Commuicatios) 22, Italy. [12] J. Newsome, E. Shi, D. Sog, ad A. Perrig, The Sybil Attack i Sesor Networks: Aalysis ad Defese, Iteratioal Symposium o Iformatio Processig i Sesor Networks, Vol. 1(24). [13] B. Przydatek, D. Sog, ad A. Perrig, SIA: Secure Iformatio Aggregatio i Sesor Networks, Proceedigs of the 1st iteratioal coferece o Embedded etworked sesor systems, November 5-7, 23, Los Ageles, Califoria, USA. [14] S. D. Servetto, From small Sesor Networks to Sesor Networks, EmNets 26, May 26. [15] B. Su, K. Wu, ad U. Pooch, Secure Routig agaist Black-hole Attack i Mobile Ad Hoc Networks, i

8 Proceedigs of Commuicatios ad Computer Networks, 22. [16] M. Tubaishat ad S. Madria., Sesor Networks: a Overview, IEEE Potetials, 22, 2, 2-23, April 23. [17] M.A.M. Vieira, D.C. da Silva Jr., C.N. Coelho Jr., ad J.M. da Mata., Survey o Wireless Sesor Network Devices, Emergig Techologies ad Factory Automatio (ETFA3), September 23. [18] W. Ye, F. Silva, ad J. Heidema, Ultra-Low Duty Cycle MAC with Scheduled Chael Pollig, i Proceedigs of the 4th ACM Coferece o Embedded Networked Sesor Systems (SeSys), Boulder, Colorado, USA, November, 26. [19] Y. Yu, B. Krishamachari, ad V.K. Prasaa, Eergy-Latecy Tradeoffs for Data Gatherig i Wireless Sesor Networks, IEEE Ifocom'4 [2] S. Zhao, K. Tepe, I. Seskar ad D. Raychaudhuri, Routig Protocols for Self-Orgaizig Hierarchical Ad-Hoc Wireless Networks, Proceedigs of the IEEE Saroff Symposium, Treto, NJ, March 23. [21] L. Zhou ad Z. Haas, Securig Ad Hoc Networks, IEEE Network Special Issue o Network Security, 13, 6, 24-3, November [22] S. Zhu, S. Setia, ad S. Jajodia, LEAP: Efficiet Security Mechaisms for Large-Scale Distributed Sesor Networks, CCS'3, October 23. Yu Che received the MS ad PhD degree i Electrical Egieerig from the Uiversity of Souther Califoria (USC) i 22 ad 26, respectively. He is a assistat professor of electrical ad computer egieerig at SUNY - Bighamto. His research iterest icludes etwork security, Security ad privacy i distributed systems ad pervasive computig eviromets, Iteret ifrastructure security, ad recofigurable hardware based security solutios. He is a member of the ACM, the IEEE ad the SPIE. Dr. Che could be reached at yche@bighamto.edu. Wei-Shi Ku received the Ph.D. degree i computer sciece from the Uiversity of Souther Califoria (USC) i 27. He also obtaied both the M.S. degree i computer sciece ad the M.S. degree i Electrical Egieerig from USC i 23 ad 26 respectively. He is a assistat professor with the Departmet of computer sciece ad software egieerig at Aubur Uiversity. His research iterests iclude spatial ad temporal data maagemet, mobile data maagemet, geographic iformatio systems, ad security & privacy. He has published more tha 3 research papers i refereed iteratioal jourals ad coferece proceedigs. He is a member of the ACM ad the IEEE. Dr. Ku could be reached at weishi@aubur.edu. BIOGRAPHY Idris M. Atakli received his M.S. degree i Electrical Egieerig from the State Uiversity of New York (SUNY), Bighamto i 27. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at SUNY - Bighamto. His research iterests iclude iformatio security, digital watermark applicatios, ad computer etwork systems. Mr. Atakli could be reached at iatakli1@bighamto.edu. Hogbig Hu received his B.E. i computer sciece from Jili Uiversity, Chagchu, Chia, ad B.E. i iformatio ad etwork sciece from Chiba Istitute of Techology, Narashio, Japa both i 21. He received his M.S. degree i iformatio sciece from Tohoku Uiversity, Sedai, Japa i 23. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at the SUNY - Bighamto. His research iterests iclude speech aalysis, patter recogitio, speech codig, ad etwork systems. Mr. Hu could be reached at hhu1@bighamto.edu.

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Weighted trust evaluation-based malicious node detection for wireless sensor networks

Weighted trust evaluation-based malicious node detection for wireless sensor networks 132 Int. J. Information and Computer Security, Vol. 3, No. 2, 2009 Weighted trust evaluation-based malicious node detection for wireless sensor networks Hongbing Hu and Yu Chen* State University of New

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Relay Placement Based on Divide-and-Conquer

Relay Placement Based on Divide-and-Conquer Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N.

Cost Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ISSN 2348 2370 Vol.08,Issue.12, September-2016, Pages:2397-2401 www.ijatir.org Cost Aware Secure Routig (CASER) Protocol Desig for Wireless Sesor Networks G. SNEHA PRANEETHA 1, DEEPTHI JANAGAMA 2, N. ANJANEYULU

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding

Calculation and Simulation of Transmission Reliability in Wireless Sensor Network Based on Network Coding Calculatio ad Simulatio of Trasmissio Reliability i Wireless Sesor Network Based o Network Codig https://doi.org/0.399/ijoe.v3i2.7883 Zhifu Lua Weifag Uiversity of Sciece ad Techology, Weifag, Chia 92268476@qq.com

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Range Free Localization Schemes For Wireless Sensor Networks

Range Free Localization Schemes For Wireless Sensor Networks Rage Free Localizatio Schemes For Wireless Sesor Networks ASHOK KUMAR, VINAY KUMAR AND VINOD KAPOOR Departmet of Electroics ad Commuicatio Egieerig Natioal Istitute of Techology Hamirpur (HP) 177 005 INDIA

More information

Look-ahead Geographic Routing for Sensor Networks

Look-ahead Geographic Routing for Sensor Networks 1 Look-ahead Geographic Routig for Sesor Networks Jiaxi You 1, Domiik Lieckfeldt 1, Qi Ha, Jakob Salzma 1, ad Dirk Timmerma 1 1 Uiversity of Rostock, Germay 1 {jiaxi.you, domiik.lieckfeldt, jakob.salzma,

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Contour Map Matching for Event Detection in Sensor Networks

Contour Map Matching for Event Detection in Sensor Networks Cotour Map Matchig for Evet Detectio i Sesor Networks Wewei Xue, Qiog Luo, Lei Che, Yuhao Liu Departmet of Computer Sciece Hog Kog Uiversity of Sciece ad Techology Clear Water Bay, Kowloo, Hog Kog {wwxue,

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks

Energy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat 785006, Assam moowar.tezu@gmail.com D.

More information

Web Text Feature Extraction with Particle Swarm Optimization

Web Text Feature Extraction with Particle Swarm Optimization 32 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.7 No.6, Jue 2007 Web Text Feature Extractio with Particle Swarm Optimizatio Sog Liagtu,, Zhag Xiaomig Istitute of Itelliget Machies,

More information

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach

Random Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Quorum Based Data Replication in Grid Environment

Quorum Based Data Replication in Grid Environment Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions

Effect of control points distribution on the orthorectification accuracy of an Ikonos II image through rational polynomial functions Effect of cotrol poits distributio o the orthorectificatio accuracy of a Ikoos II image through ratioal polyomial fuctios Marcela do Valle Machado 1, Mauro Homem Atues 1 ad Paula Debiasi 1 1 Federal Rural

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Cache-Optimal Methods for Bit-Reversals

Cache-Optimal Methods for Bit-Reversals Proceedigs of the ACM/IEEE Supercomputig Coferece, November 1999, Portlad, Orego, U.S.A. Cache-Optimal Methods for Bit-Reversals Zhao Zhag ad Xiaodog Zhag Departmet of Computer Sciece College of William

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks

QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks QoS Aware Geographic Opportuistic Routig i Wireless Sesor Networks Log Cheg, Member, IEEE, Jiawei Niu, Member, IEEE, Jiaog Cao, Seior Member, IEEE, Sajal K. Das, Seior Member, IEEE, ad Yu Gu, Member, IEEE

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION

DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Proceedigs, 11 th FIG Symposium o Deformatio Measuremets, Satorii, Greece, 2003. DETECTION OF LANDSLIDE BLOCK BOUNDARIES BY MEANS OF AN AFFINE COORDINATE TRANSFORMATION Michaela Haberler, Heribert Kahme

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the

x x 2 x Iput layer = quatity of classificatio mode X T = traspositio matrix The core of such coditioal probability estimatig method is calculatig the COMPARATIVE RESEARCHES ON PROBABILISTIC NEURAL NETWORKS AND MULTI-LAYER PERCEPTRON NETWORKS FOR REMOTE SENSING IMAGE SEGMENTATION Liu Gag a, b, * a School of Electroic Iformatio, Wuha Uiversity, 430079,

More information

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Accurate ad Efficiet Traffic Moitorig Usig Adaptive

More information

Position and Velocity Estimation by Ultrasonic Sensor

Position and Velocity Estimation by Ultrasonic Sensor Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks

FCM-SEP (Fuzzy C-Means Based Stable Election Protocol) for Energy Efficiency in Wireless Sensor Networks FCM-SEP (Fuzzy C-Meas Based Stable Electio Protocol) for Eergy Efficiecy i Wireless Sesor Networks Sadeep Kaur Computer Sciece ad Egieerig, Giai Zail Sigh Campus College of Egieerig ad Techology, Bathida,

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

Title: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity.

Title: Robust Registration of Multimodal Remote Sensing Images Based on Structural Similarity. 7 IEEE. Persoal use of this material is permitted. Permissio from IEEE must be obtaied for all other uses, i ay curret or future media, icludig repritig/republishig this material for advertisig or promotioal

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information