Detection and Elimination of Fake Access Points in WLAN using Multi Agents Sourcing Methodology
|
|
- Shawn Harrell
- 6 years ago
- Views:
Transcription
1 Detectio ad Elimiatio of Fake Access Poits i WLAN usig Multi Agets Sourcig Methodology Priyaka G. Sasae Dept. of Computer Egi. SKNCOE, Vadgao Uiversity of Pue, Idia pdpatil.sae@sihgad.edu Prof. S. K. Patha Dept. of Computer Egi. SKNCOE, Vadgao Uiversity of Pue, Idia Abstract The major security issue i the Wireless LAN is, the presece of access poits which are ot approved by the admiistrator. If this issue is ot detected o time, them it may lead to serious etwork damage ad may result ito major data loss or data impact. May researchers have already proposed various solutios to overcome the above metioed situatio, but either most of them are limited i techiques or they are ot automated to absorb the frequecy alteratios i WLAN. This is the proposed research paper i which the ew approach is preseted which is based o Master ad Slave Topology. This is specially desiged approach which is ot oly workig o Fast Detectio of Rough Access Poits (FDRAP) but also icludes the solutios of mitigatig these Rough Access Poits. I the overview, this ew framework will be hadlig the Detectio as well Elimiatio of Rough Access Poits i the etwork. This Master ad Slave agets will automatically sca the etwork ad detect the uauthorized access poits usig various skew itervals. We have attempted to focus o followig methodologies for makig it successful 1) this specially desiged approach does ot require ay special hardware 2) Algorithm is desiged to work o both Detectio as well as Elimiatio 3) As o special hardware is ivolved, it becomes a very cost effective solutio 4) Due to multiple Master agets i actio, possibility of etwork cogestio or delay i packet sigalig is also reduced. This algorithm is proposed to block the RAPs ad also to remove them from the etwork with coverig both aspects like uauthorized APs or Rough Cliets actig as Ap s. Keywords- Itrusio Detectio System; Maet; Master; Rogue/Fake Access Poit; Slave; WLAN ***** I. INTRODUCTION Wireless LAN System (WLANs) is oe of the fastest growig techologies i the Commuicatio world. With the fastest growig & commuicatig world, the demad of devices which ca work or commuicate without cables are icreasig day by day. Primarily Wireless etworks are predomiatly used by mobile or omadic computig devices to provide them the etwork access without cables. It serves its ow attractive purposes likes mobility, greater flexibility i device hadlig ad operatig, portability, ad more importatly freedom of access with sigificat security. There is possibility that soopig of the wireless commuicatio, because the sigals from wireless etworks are usually uidirectioal ad due to its variety i rage projectios it may get reach beyod the iteded coverage area. Here this situatio it becomes primary alert to secure the etwork physically because eve ayoe with wireless receiver ca attempt to soop the etwork ad may times this type of itrusio is virtually udetectable. To overcome this type of security threat, may researchers have proposed various papers, discussig about most commo security protocols; also it has bee observed that Wired Equivalet Privacy (WEP) also faces breakdows if it is cofigured improperly. Oe of the most impressive security challeges for the etwork admiistrator amog rest all is the, desigig prevetive majors to block the Rough Access Poits (RAPs) [10-12]. This attack of RAP is cosidered as Serious Threat to the etwork because, may other threats are either based o very high-level of techical kowledge represetatios or to breakdow the security very sophisticated & costly istrumets are required, but this type of RAPs could be easily accomplished eve by people with limited kowledge related with etwork security. I the literature the Rough Access Poits are referred as Uauthorized AP. I descriptio, it ca be described as, a wireless poit which is either istalled o secure etwork without takig ito cosideratio the explicit authorizatio from local admiistrator [15], or maybe it has bee falsely cofigured which may allow cracker to coduct a ma-imiddle attack, or i worst situatio, it ca be used by adversaries for committig soopig ad executig various attacks. The Rough APs ca be classified broadly ito various categories based o levels like Uauthorized Rough APs, Improperly Cofigured Rough APs, ad Compromised Rough APs ad used for Phishig Rough APs. To get more iformatio about them alog with possible scearios, readers are advised to refer [5] for i-depth taxoomy of all metioed categories. Cosiderig the fact that may commercial products are available readily i the market for detectig the RAPs [10-12], ad also studies proved that extesive research work has ot bee carried out, here i this area ad moreover may are performig oly RAP detectio ad very few amog them are focusig o elimiatig / blockig of these RAPs. So to fill this gap, this paper we are proposig a completely ew & ovel approach with Multi Aget Sourcig Methodology for detectio ad elimiatio of RAPs. The project flow of this paper will be like Sectio (II) will discuss the related work ad Curret Approaches. Ad 1673
2 i ext Sectio (III) we are discussig about the System Architecture. Mathematical model at sectio (IV) followed by result at (V). At the coclusio portio the Sectio (VI) is dedicated followed by Refereces i Sectio (VII). II. RELATED WORK Mobile Ad-hoc Networks abbreviated as MANETs are ifamous for their ifrastructural support ad trasiet or short-lived ature. These characteristics of MANETs are really providig challegig platform for IDS executios. The major fact of MANETs is, eve frequet chages i topology ad commuicatio patters requires the use of specialized protocols ad specially desiged strategies for successful routig, trasportig ad securities. The researches i MANET are majorly focused o Private Public Key Maagemet, Routig Protocols ad Itrusio Detectio Systems, but past experimets ad researches have proved that the desiged itrusio prevetio algorithms ad ecryptio techiques are ot sufficiet, ad if we attempt to complex it, it will lead to more complex security problems. O the cotrary, the itrusio techiques used i wired etworks are caot be directly applied as it is to Mobile Ad Hoc Networks, based o special characteristics possessed by this type of etworks. To take research oe step ahead, most curret MANET IDS are still i pre-mature stage, which directly implies huge scope ad aggressive developmet i the program of makig Ad Hoc Network more secure which ca be achieved by desigig more advaced ad itelliget itrusio detectio systems. Whe we make compariso with wired etworks ad wireless ad hoc etworks, we eed to cosider the importat differeces while desigig a itelliget itrusio detectio system. To summarize, we are suggestig few major differeces betwee wired ad wireless etworks wired etworks are usig variety of devices like gateways, routers, ad switches for traffic moitorig purposes, but wireless ad hoc etworks are purely lackig traffic maagemet aspect. I result the IDS i wireless etworks are based o local security audit data. We ca suggest to take followig aspect ito cosideratio i usig IDS i wireless etworks because of limited resources, oe should emphasis o securig it with keepig i mid the resource cosumptio characteristics, which meas it is most preferred to use periodic itrusio detectio system istead of a Always ON prevetive cofiguratios. A. Itroductio to Mobile Agets Mobile Agets (MA) is basically software etities which ca physically travel across the etwork ad perform various assiged tasks o targeted machies which provide the hostig capacity for this aget. This allows processes to migrate from oe computer to other, or sometimes base o requiremets processes gets spilt ito multiple istaces that will get executed o differet machies ad will retur to their poit of origis. Here term migratios of mobile agets essetially implies that, some code with required set of data i trasferred to aother ode for remote executio of that code. B. Rogue Access Poit The Rogue Access Poit ca be defied as: Fig 1. System Architecture [6] Rough Access Poits are usually istalled over the etwork without autheticatig itself ad also it will violate the security policies. Basically these Rough Access Poits are istalled to the etwork with the major itetio to attack o the cofidetial iformatio. Based o above two defiitios we ca easily idetify the Rough Access Poits. I above figure we have attempted to show the approaches we have take for this paper. While desigig this proposed approach, we have take ito cosideratio followig elemets which will be the limitatio for this work - Due to use of Multi-Aget System, the performace of this proposed system alog with overall etwork may get impacted like overall throughput or wireless etwork, packet drop ratio, ed to ed delay etc. - While autheticatig the ew the access poit for its validity, Heavy load o oe Master Aget may ivolve uecessarily extra time, which will result ito icremet i extra etwork overhead ad may decrease the overall etwork throughput. III. ADVANCEMENT IN THE PROJECT There are few researches that have already performed i the field of detectig ad blockig these Rough Access Poits, but oe of them is able to provide the really fruitful solutio o this. Most of the developmets are doe o the base of eed of dedicated piece of software ad hardware, or eve some special qualified employees for performig differet types of etwork scas also sometimes it is like usig curret employees for regular scaig of their viciity for cross checkig ay uauthorized access poits active aroud them. To overcome this type of depedecies o specially customized hardware or depedecies o maual efforts which are most of the time subjected to be error proe, here we are proposig the fully automated cocept of detectig the elimiatig RAPs by applyig the Mobile Multi-Agets effectively o to the etwork. Here we are usig ew approach with usig two differet levels of Mobile Agets uder ew classificatios Master & Slave Mobile Agets. To achieve this we exteded the system architecture with additio of skew itervals to periodically sca the etworks 1674
3 istead of scaig i a Always ON mode. The executios 6. If ew Access Poit is detected, the cloed aget will build process will be like the INFO Packet automatically cotaiig importat - Iitially a master aget is geerated o the DHCP-M Server, iformatio about ewly detected Access Poit. which will be resposible for all regulatig all the 7. This INFO packet is haded over to the related Slave Aget authorizatio procedures for the wireless etwork. 8. Now, Slave Aget will had over this INFO packet to the - I later stages, the Master Aget will geerate the Slave Master Aget ad the Master Aget will trasfer this etire Aget based o umber of Active Access Poit coected packet to the DHCP Server for testig Autheticity of the to the server at that momet of time. Iformatio cotaied i the INFO Packet - Based o the supplied data, these Slave Agets are 9. If the DHCP server does NOT foud ay match of ew dispatched to the respective APs coected. iformatio i the firstly created Geuie Database, the it - Now, all these Slave Agets will be cloed o every Access will declare it as Rough Access Poit. Poit ad beig dispatched to the every coected cliets 10. Now to block or deactivate this Rough Access Poit, over that Access Poit. followig steps are performed, esurig o mistakes - Now this ewly Cloed Slave Agets will costatly a. First to get highest accuracy, the INFO packet is moitor the cliet systems ad detects ew Access Poits if extracted properly to get the correct MAC address ay b. Based o this MAC address, the exact Network - If these ewly Cloe Slave Agets detect ew Access Poit, Switch Address is idetified. it will automatically build iformatio packets INFO c. After successfully idetifyig the Network Switch, cotaiig followig iformatio about detected the ext target is to locate the exact port umber. Uauthorized APs SSID of Uauthorized APs, MAC- d. Oce the accurate port umber is calculated, the the Address of Uauthorized APs, Vedors Name used for fial task will be blockig it from ay other wireless Uauthorized APs, Chael Used by Uauthorized APs, etc etwork traffic. - This INFO packets are the trasferred to mai Slave Aget ad this Slave Aget will deliver this packet safely to the B. Clock Skew Master Aget o the sever. The Clock Skew ca be defied as the variaces betwee - At server, this ewly arrived iformatio is compared with the times publicized by the clocks at various odes at the same the stored repositories of all valid Access Poits. time iterval. As this Clock Skew idicatig the time - If foud that AP is authorized, the ew Slave Aget will be differeces betwee odes, so we ca use it to idetify ad geerated ad set over the respective AP to moitor it categories various etwork devices fallig ito similar or agai for ext attempt of itrusios. differet time itervals.studies have show that we ca implemet the usability of these clock skews to isolate more - But if AP is foud uauthorized, the Disassociatio Frame tha 512 uique access poits. is set to all APs iformig them ot to coect with this uauthorized AP a. Liear Programmig Method (LPM) - Else if details does t match with the repository, the the I this LP Method, first we eed to miimize or reduce MAC- Address of the AP will be fetched from the INFO, followig fuctio carefully by eterig appropriate values i ad the port at which the MAC-Address is coected will be the fuctio. get searched ad the it will be blocked for ay sort of LAN Traffic. - This will automatically deactivate the RAP ad also 1 prevets cliets (if ay) from droppig the active coectio (δ xi φ oi) ad allows cliets to get associate with the earest AP i=1 which is authorized. - This is a very simple ad most effective techique for The major drawback of this method is it idicates High completely routig out the RAP from the etwork [1]. tolerace icliig towards the outliers. Please fid the ext steps from algorithm desiged for the Skew Itervals A. Steps to implemet 1. First create Master Aget o the DHCP server 2 From Master Aget Geerate the Slave Aget based o umber of access poits 3. Oce Slave Agets are geerated, trasfer them to all access poits 4. Whe Slave Agets are arrived at all the Access Poits, cloe all the Slave Agets agai. 5. Now, by geeratig Clock Skews at each Slave Aget, sca all the Access Poits. Ad it will create first Geuie Database. b. Least Square Fit (LSF) I this method, we have to focus o miimizig the followig equatio, by submittig the exact figures from the calculated iputs. [oi (δxi + φ)] 2 i=1 The master advatage of this methodology is, it allows low tolerace towards outliers which is really importat elemet i this proposed architecture. As a outcome, we ca distiguish betwee two Access Poits, eve if their Clock Skew values are very closely located alogside each other s. Idicatig, we ca use this methodology to idetify the Fake Access Poits, by takig 1675
4 accurate judgmet o the Access Poits which are egieered IV. UML DIAGRAMS very close to the Clock Skew of the Authorized Access Poits. 1. USE case diagram c. Implemetatio of LSF: We have already defied a fuctio f = [yi δxi + φ ] 2 i=1 Applyig stadard procedure to fid miima, we differetiate it partially with respect to δ ad equate it to zero. A. f/ δ = 0 ad f / = 0 Solvig them simultaeously, we get estimated value of δ as δ = xy x y x 2 x 2 C. Major Compoets of System: DHCP-M: This is cetral repository resposible for moitorig autheticatio process of active wireless etworks. Master Aget: Geerated at DHCP Server. Slave Aget: Geerated at every access poit i etwork Cloe Aget: Resided at cliet side. Access Poit: Coected with DHCP sever Cliet: Coected with AP. Fig 3. USE case Diagram 2. Sequece diagram Fig 2. RAP Detectio ad Elimiatio System architecture Fig 4. Sequece Diagram 1676
5 3. Flowchart Rogue Access Poits. (The port umber is calculated from the MAC Address) To evaluate the performace we ca produce the graphs like Time Graph ad Chael Graph ad also we ca provide filterig mechaisms for filterig the Access Poits based o APs Age, Chael Number etc. Please see followig represetatio for the results acquired Fig 5 RAP Detectio Algorithm V. RESULT As described, the practical evaluatios ca be expressed by cosiderig followig while developig this applicatio, we have developed a small desktop applicatio usig C#.et ad makig this code act like a Rogue Access Poit. Also similarly we will develop aother applicatio which will check the data provided by the Access Poits. The mai achievable from all this is to detect the Rogue Access Poits preset i the etwork. I the simulatio we will activate both above metioed modules ad o executio we will check for Origial ad Rogue Access Poits, ad if we locate the Rogue Access Poits, the block that port from trasferrig data usig our applicatio. The major modules of this applicatio ca be summarized as 1. Detectio of access poits. 2. Checkig of access poit. Rogue (Fake)/origial 3. Blockig the access poit from trasferrig data. The first module will eed Wi-Fi coectio ad some access poits which we will be detectig. (Laptop devices have the Wi-Fi hardware ibuilt, so we ca use laptop here). Now oce the secod module gets iitiated, it will collect the valuable data about access poits like MAC Address, SSID, RSI etc. ad this data will be reported to the server. Now at server level, this data is processed o the skew itervals alog with estimatig secod skew itervals for some equatio ad will be checked for equality if both the results are idicatig idetical iformatio, if they are same, the we ca declare that the metioed Access Poit is Origial, otherwise if results are ot similar we ca declare that Access Poit as Fake. Oce this Access Poit judgmet is doe, the fial module will get ivolved ad it will block the data commuicatio from the Fake Access Poits, by blockig the port umbers of those Fig. 3 Mai scree of proposed architecture Above figure showig that access poit scaig widows is ready to capture all the available access poits i etworks i your area. VI. CONCLUSION AND FUTURE SCOPE I this paper, we proposed a ew methodology of usig Multi- Aget as a itegrated solutio for both detectig ad elimiatig the Rogue Access Poits from the etwork. Clear ad easy to implemet algorithm makes this architecture robust. This multi aget based architecture proved to ot oly idetify but also elimiate the rogue access poits completely. Our proposed techique is very reliable ad cost effective, as it deals with multiple level of detectio ad does t require ay specialized hardware device; implemetatio performed also supports our belief ad results i a very effective methodology of complete removal of RAPs. ACKNOWLEDGMENT I feel happiess i forwardig this paper as a image of sicere efforts. The successful project desig reflects my work, effort of my guide i givig me good iformatio. My sicere thaks to my guide Prof. S.K. Patha who has bee a costat source of ispiratio ad guidig star i achievig my goal. I express my deep gratitude to all staff members who led me their valuable support ad cooperatio to eable me to complete my project desig paper successfully. REFERENCES [1] V. S. Shakar Sriram, G. Sahoo, Ashish P. Sigh, Abhishek Kumar Maurya Securig IEEE Wireless LANs - A Mobile Aget Based Architecture 2009 IEEE Iteratioal Advace Computig Coferece (IACC 2009) Patiala, Idia, 6-7 March [2] Prof.S.B.Vajale (Ph.D Studet), J.A.Dave(M.Tech. Studet), Uapproved Access Poit Elimiatio I 1677
6 Wla Usig Multiple Agets Ad Skew Itervals, Departmet of Computer Egg Bharati Vidyapeeth Deemed Uiversity College of Egieerig Pue, Iteratioal Joural of Egieerig Sciece ad Techology (IJEST), Feb [3] V. S. Shakar Sriram, G. Sahoo A Mobile Aget Based Architecture for Securig WLANs Iteratioal Joural of Recet Treds i Egieerig, Vol 1, No. 1, May [4] Sogrit Srilasak, Kitti Wogthavarawat ad Aa Phophoem, Itelliget Wireless Network Group (IWING) Itegrated Wireless Rogue Access Poit Detectio ad Couterattack System published i 2008 Iteratioal Coferece o Iformatio Security ad Assurace. [5] Lira Ma, Ami Y. Teymoria, Xiuzhe Cheg A Hybrid Rogue Access Poit Protectio Framework for Commodity Wi-Fi Networks published i the IEEE INFOCOM [6] Ahmed Ayad Abdalhameed, Detectig ad Elimiatig Rogue Access Poits i IEEE WLAN Based o Agets Termiology ad Skew Itervals: A Proposal, Iteratioal Joural of Egieerig ad Advaced Techology (IJEAT) ISSN: , Volume-2, Issue-4, April 2013 [7] Laier Watkis, Raheem Beyah, Cherita Corbett A Passive Approach to Rogue Access Poit Detectio X/07/$ IEEE. [8] Sogrit Srilasak, Kitti Wogthavarawat, Aa Phophoem Itegrated Wireless Rogue Access Poit Detectio ad Couterattack System 2008 Iteratioal Coferece 1678
Ones Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationA Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna
al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationHADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING
Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationProject 2.5 Improved Euler Implementation
Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationSOFTWARE usually does not work alone. It must have
Proceedigs of the 203 Federated Coferece o Computer Sciece ad Iformatio Systems pp. 343 348 A method for selectig eviromets for software compatibility testig Łukasz Pobereżik AGH Uiversity of Sciece ad
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationOntology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection
2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationPosition and Velocity Estimation by Ultrasonic Sensor
Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:
More informationOCR Statistics 1. Working with data. Section 3: Measures of spread
Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationOPC Server ECL Comfort 210/310 OPC Server
OPC Server Descriptio j l j o j l k j l j Modbus-RS485 k Etheret or Iteret l Modbus-TCP ECL Cofort cotroller Heat eter o SCADA server The Dafoss is a OPC-copliat server that serves data to OPC cliets.
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationDesign and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance
Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13
CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More informationChapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationEMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL
Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationSCI Reflective Memory
Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationKeywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency
Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More information% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationImplementation of a Timestamping Service for SunSPOT Sensors
Available olie at www.sciecedirect.com Procedia Techology 7 ( 2013 ) 4 10 The 2013 Iberoamerica Coferece o Electroics Egieerig ad Computer Sciece Implemetatio of a Timestampig Service for SuSPOT Sesors
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationAPPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview
APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More informationA Study on the Performance of Cholesky-Factorization using MPI
A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio
More informationLU Decomposition Method
SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio
More informationFAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS
SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationSchema for the DCE Security Registry Server
Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More information