Detection and Elimination of Fake Access Points in WLAN using Multi Agents Sourcing Methodology

Size: px
Start display at page:

Download "Detection and Elimination of Fake Access Points in WLAN using Multi Agents Sourcing Methodology"

Transcription

1 Detectio ad Elimiatio of Fake Access Poits i WLAN usig Multi Agets Sourcig Methodology Priyaka G. Sasae Dept. of Computer Egi. SKNCOE, Vadgao Uiversity of Pue, Idia pdpatil.sae@sihgad.edu Prof. S. K. Patha Dept. of Computer Egi. SKNCOE, Vadgao Uiversity of Pue, Idia Abstract The major security issue i the Wireless LAN is, the presece of access poits which are ot approved by the admiistrator. If this issue is ot detected o time, them it may lead to serious etwork damage ad may result ito major data loss or data impact. May researchers have already proposed various solutios to overcome the above metioed situatio, but either most of them are limited i techiques or they are ot automated to absorb the frequecy alteratios i WLAN. This is the proposed research paper i which the ew approach is preseted which is based o Master ad Slave Topology. This is specially desiged approach which is ot oly workig o Fast Detectio of Rough Access Poits (FDRAP) but also icludes the solutios of mitigatig these Rough Access Poits. I the overview, this ew framework will be hadlig the Detectio as well Elimiatio of Rough Access Poits i the etwork. This Master ad Slave agets will automatically sca the etwork ad detect the uauthorized access poits usig various skew itervals. We have attempted to focus o followig methodologies for makig it successful 1) this specially desiged approach does ot require ay special hardware 2) Algorithm is desiged to work o both Detectio as well as Elimiatio 3) As o special hardware is ivolved, it becomes a very cost effective solutio 4) Due to multiple Master agets i actio, possibility of etwork cogestio or delay i packet sigalig is also reduced. This algorithm is proposed to block the RAPs ad also to remove them from the etwork with coverig both aspects like uauthorized APs or Rough Cliets actig as Ap s. Keywords- Itrusio Detectio System; Maet; Master; Rogue/Fake Access Poit; Slave; WLAN ***** I. INTRODUCTION Wireless LAN System (WLANs) is oe of the fastest growig techologies i the Commuicatio world. With the fastest growig & commuicatig world, the demad of devices which ca work or commuicate without cables are icreasig day by day. Primarily Wireless etworks are predomiatly used by mobile or omadic computig devices to provide them the etwork access without cables. It serves its ow attractive purposes likes mobility, greater flexibility i device hadlig ad operatig, portability, ad more importatly freedom of access with sigificat security. There is possibility that soopig of the wireless commuicatio, because the sigals from wireless etworks are usually uidirectioal ad due to its variety i rage projectios it may get reach beyod the iteded coverage area. Here this situatio it becomes primary alert to secure the etwork physically because eve ayoe with wireless receiver ca attempt to soop the etwork ad may times this type of itrusio is virtually udetectable. To overcome this type of security threat, may researchers have proposed various papers, discussig about most commo security protocols; also it has bee observed that Wired Equivalet Privacy (WEP) also faces breakdows if it is cofigured improperly. Oe of the most impressive security challeges for the etwork admiistrator amog rest all is the, desigig prevetive majors to block the Rough Access Poits (RAPs) [10-12]. This attack of RAP is cosidered as Serious Threat to the etwork because, may other threats are either based o very high-level of techical kowledge represetatios or to breakdow the security very sophisticated & costly istrumets are required, but this type of RAPs could be easily accomplished eve by people with limited kowledge related with etwork security. I the literature the Rough Access Poits are referred as Uauthorized AP. I descriptio, it ca be described as, a wireless poit which is either istalled o secure etwork without takig ito cosideratio the explicit authorizatio from local admiistrator [15], or maybe it has bee falsely cofigured which may allow cracker to coduct a ma-imiddle attack, or i worst situatio, it ca be used by adversaries for committig soopig ad executig various attacks. The Rough APs ca be classified broadly ito various categories based o levels like Uauthorized Rough APs, Improperly Cofigured Rough APs, ad Compromised Rough APs ad used for Phishig Rough APs. To get more iformatio about them alog with possible scearios, readers are advised to refer [5] for i-depth taxoomy of all metioed categories. Cosiderig the fact that may commercial products are available readily i the market for detectig the RAPs [10-12], ad also studies proved that extesive research work has ot bee carried out, here i this area ad moreover may are performig oly RAP detectio ad very few amog them are focusig o elimiatig / blockig of these RAPs. So to fill this gap, this paper we are proposig a completely ew & ovel approach with Multi Aget Sourcig Methodology for detectio ad elimiatio of RAPs. The project flow of this paper will be like Sectio (II) will discuss the related work ad Curret Approaches. Ad 1673

2 i ext Sectio (III) we are discussig about the System Architecture. Mathematical model at sectio (IV) followed by result at (V). At the coclusio portio the Sectio (VI) is dedicated followed by Refereces i Sectio (VII). II. RELATED WORK Mobile Ad-hoc Networks abbreviated as MANETs are ifamous for their ifrastructural support ad trasiet or short-lived ature. These characteristics of MANETs are really providig challegig platform for IDS executios. The major fact of MANETs is, eve frequet chages i topology ad commuicatio patters requires the use of specialized protocols ad specially desiged strategies for successful routig, trasportig ad securities. The researches i MANET are majorly focused o Private Public Key Maagemet, Routig Protocols ad Itrusio Detectio Systems, but past experimets ad researches have proved that the desiged itrusio prevetio algorithms ad ecryptio techiques are ot sufficiet, ad if we attempt to complex it, it will lead to more complex security problems. O the cotrary, the itrusio techiques used i wired etworks are caot be directly applied as it is to Mobile Ad Hoc Networks, based o special characteristics possessed by this type of etworks. To take research oe step ahead, most curret MANET IDS are still i pre-mature stage, which directly implies huge scope ad aggressive developmet i the program of makig Ad Hoc Network more secure which ca be achieved by desigig more advaced ad itelliget itrusio detectio systems. Whe we make compariso with wired etworks ad wireless ad hoc etworks, we eed to cosider the importat differeces while desigig a itelliget itrusio detectio system. To summarize, we are suggestig few major differeces betwee wired ad wireless etworks wired etworks are usig variety of devices like gateways, routers, ad switches for traffic moitorig purposes, but wireless ad hoc etworks are purely lackig traffic maagemet aspect. I result the IDS i wireless etworks are based o local security audit data. We ca suggest to take followig aspect ito cosideratio i usig IDS i wireless etworks because of limited resources, oe should emphasis o securig it with keepig i mid the resource cosumptio characteristics, which meas it is most preferred to use periodic itrusio detectio system istead of a Always ON prevetive cofiguratios. A. Itroductio to Mobile Agets Mobile Agets (MA) is basically software etities which ca physically travel across the etwork ad perform various assiged tasks o targeted machies which provide the hostig capacity for this aget. This allows processes to migrate from oe computer to other, or sometimes base o requiremets processes gets spilt ito multiple istaces that will get executed o differet machies ad will retur to their poit of origis. Here term migratios of mobile agets essetially implies that, some code with required set of data i trasferred to aother ode for remote executio of that code. B. Rogue Access Poit The Rogue Access Poit ca be defied as: Fig 1. System Architecture [6] Rough Access Poits are usually istalled over the etwork without autheticatig itself ad also it will violate the security policies. Basically these Rough Access Poits are istalled to the etwork with the major itetio to attack o the cofidetial iformatio. Based o above two defiitios we ca easily idetify the Rough Access Poits. I above figure we have attempted to show the approaches we have take for this paper. While desigig this proposed approach, we have take ito cosideratio followig elemets which will be the limitatio for this work - Due to use of Multi-Aget System, the performace of this proposed system alog with overall etwork may get impacted like overall throughput or wireless etwork, packet drop ratio, ed to ed delay etc. - While autheticatig the ew the access poit for its validity, Heavy load o oe Master Aget may ivolve uecessarily extra time, which will result ito icremet i extra etwork overhead ad may decrease the overall etwork throughput. III. ADVANCEMENT IN THE PROJECT There are few researches that have already performed i the field of detectig ad blockig these Rough Access Poits, but oe of them is able to provide the really fruitful solutio o this. Most of the developmets are doe o the base of eed of dedicated piece of software ad hardware, or eve some special qualified employees for performig differet types of etwork scas also sometimes it is like usig curret employees for regular scaig of their viciity for cross checkig ay uauthorized access poits active aroud them. To overcome this type of depedecies o specially customized hardware or depedecies o maual efforts which are most of the time subjected to be error proe, here we are proposig the fully automated cocept of detectig the elimiatig RAPs by applyig the Mobile Multi-Agets effectively o to the etwork. Here we are usig ew approach with usig two differet levels of Mobile Agets uder ew classificatios Master & Slave Mobile Agets. To achieve this we exteded the system architecture with additio of skew itervals to periodically sca the etworks 1674

3 istead of scaig i a Always ON mode. The executios 6. If ew Access Poit is detected, the cloed aget will build process will be like the INFO Packet automatically cotaiig importat - Iitially a master aget is geerated o the DHCP-M Server, iformatio about ewly detected Access Poit. which will be resposible for all regulatig all the 7. This INFO packet is haded over to the related Slave Aget authorizatio procedures for the wireless etwork. 8. Now, Slave Aget will had over this INFO packet to the - I later stages, the Master Aget will geerate the Slave Master Aget ad the Master Aget will trasfer this etire Aget based o umber of Active Access Poit coected packet to the DHCP Server for testig Autheticity of the to the server at that momet of time. Iformatio cotaied i the INFO Packet - Based o the supplied data, these Slave Agets are 9. If the DHCP server does NOT foud ay match of ew dispatched to the respective APs coected. iformatio i the firstly created Geuie Database, the it - Now, all these Slave Agets will be cloed o every Access will declare it as Rough Access Poit. Poit ad beig dispatched to the every coected cliets 10. Now to block or deactivate this Rough Access Poit, over that Access Poit. followig steps are performed, esurig o mistakes - Now this ewly Cloed Slave Agets will costatly a. First to get highest accuracy, the INFO packet is moitor the cliet systems ad detects ew Access Poits if extracted properly to get the correct MAC address ay b. Based o this MAC address, the exact Network - If these ewly Cloe Slave Agets detect ew Access Poit, Switch Address is idetified. it will automatically build iformatio packets INFO c. After successfully idetifyig the Network Switch, cotaiig followig iformatio about detected the ext target is to locate the exact port umber. Uauthorized APs SSID of Uauthorized APs, MAC- d. Oce the accurate port umber is calculated, the the Address of Uauthorized APs, Vedors Name used for fial task will be blockig it from ay other wireless Uauthorized APs, Chael Used by Uauthorized APs, etc etwork traffic. - This INFO packets are the trasferred to mai Slave Aget ad this Slave Aget will deliver this packet safely to the B. Clock Skew Master Aget o the sever. The Clock Skew ca be defied as the variaces betwee - At server, this ewly arrived iformatio is compared with the times publicized by the clocks at various odes at the same the stored repositories of all valid Access Poits. time iterval. As this Clock Skew idicatig the time - If foud that AP is authorized, the ew Slave Aget will be differeces betwee odes, so we ca use it to idetify ad geerated ad set over the respective AP to moitor it categories various etwork devices fallig ito similar or agai for ext attempt of itrusios. differet time itervals.studies have show that we ca implemet the usability of these clock skews to isolate more - But if AP is foud uauthorized, the Disassociatio Frame tha 512 uique access poits. is set to all APs iformig them ot to coect with this uauthorized AP a. Liear Programmig Method (LPM) - Else if details does t match with the repository, the the I this LP Method, first we eed to miimize or reduce MAC- Address of the AP will be fetched from the INFO, followig fuctio carefully by eterig appropriate values i ad the port at which the MAC-Address is coected will be the fuctio. get searched ad the it will be blocked for ay sort of LAN Traffic. - This will automatically deactivate the RAP ad also 1 prevets cliets (if ay) from droppig the active coectio (δ xi φ oi) ad allows cliets to get associate with the earest AP i=1 which is authorized. - This is a very simple ad most effective techique for The major drawback of this method is it idicates High completely routig out the RAP from the etwork [1]. tolerace icliig towards the outliers. Please fid the ext steps from algorithm desiged for the Skew Itervals A. Steps to implemet 1. First create Master Aget o the DHCP server 2 From Master Aget Geerate the Slave Aget based o umber of access poits 3. Oce Slave Agets are geerated, trasfer them to all access poits 4. Whe Slave Agets are arrived at all the Access Poits, cloe all the Slave Agets agai. 5. Now, by geeratig Clock Skews at each Slave Aget, sca all the Access Poits. Ad it will create first Geuie Database. b. Least Square Fit (LSF) I this method, we have to focus o miimizig the followig equatio, by submittig the exact figures from the calculated iputs. [oi (δxi + φ)] 2 i=1 The master advatage of this methodology is, it allows low tolerace towards outliers which is really importat elemet i this proposed architecture. As a outcome, we ca distiguish betwee two Access Poits, eve if their Clock Skew values are very closely located alogside each other s. Idicatig, we ca use this methodology to idetify the Fake Access Poits, by takig 1675

4 accurate judgmet o the Access Poits which are egieered IV. UML DIAGRAMS very close to the Clock Skew of the Authorized Access Poits. 1. USE case diagram c. Implemetatio of LSF: We have already defied a fuctio f = [yi δxi + φ ] 2 i=1 Applyig stadard procedure to fid miima, we differetiate it partially with respect to δ ad equate it to zero. A. f/ δ = 0 ad f / = 0 Solvig them simultaeously, we get estimated value of δ as δ = xy x y x 2 x 2 C. Major Compoets of System: DHCP-M: This is cetral repository resposible for moitorig autheticatio process of active wireless etworks. Master Aget: Geerated at DHCP Server. Slave Aget: Geerated at every access poit i etwork Cloe Aget: Resided at cliet side. Access Poit: Coected with DHCP sever Cliet: Coected with AP. Fig 3. USE case Diagram 2. Sequece diagram Fig 2. RAP Detectio ad Elimiatio System architecture Fig 4. Sequece Diagram 1676

5 3. Flowchart Rogue Access Poits. (The port umber is calculated from the MAC Address) To evaluate the performace we ca produce the graphs like Time Graph ad Chael Graph ad also we ca provide filterig mechaisms for filterig the Access Poits based o APs Age, Chael Number etc. Please see followig represetatio for the results acquired Fig 5 RAP Detectio Algorithm V. RESULT As described, the practical evaluatios ca be expressed by cosiderig followig while developig this applicatio, we have developed a small desktop applicatio usig C#.et ad makig this code act like a Rogue Access Poit. Also similarly we will develop aother applicatio which will check the data provided by the Access Poits. The mai achievable from all this is to detect the Rogue Access Poits preset i the etwork. I the simulatio we will activate both above metioed modules ad o executio we will check for Origial ad Rogue Access Poits, ad if we locate the Rogue Access Poits, the block that port from trasferrig data usig our applicatio. The major modules of this applicatio ca be summarized as 1. Detectio of access poits. 2. Checkig of access poit. Rogue (Fake)/origial 3. Blockig the access poit from trasferrig data. The first module will eed Wi-Fi coectio ad some access poits which we will be detectig. (Laptop devices have the Wi-Fi hardware ibuilt, so we ca use laptop here). Now oce the secod module gets iitiated, it will collect the valuable data about access poits like MAC Address, SSID, RSI etc. ad this data will be reported to the server. Now at server level, this data is processed o the skew itervals alog with estimatig secod skew itervals for some equatio ad will be checked for equality if both the results are idicatig idetical iformatio, if they are same, the we ca declare that the metioed Access Poit is Origial, otherwise if results are ot similar we ca declare that Access Poit as Fake. Oce this Access Poit judgmet is doe, the fial module will get ivolved ad it will block the data commuicatio from the Fake Access Poits, by blockig the port umbers of those Fig. 3 Mai scree of proposed architecture Above figure showig that access poit scaig widows is ready to capture all the available access poits i etworks i your area. VI. CONCLUSION AND FUTURE SCOPE I this paper, we proposed a ew methodology of usig Multi- Aget as a itegrated solutio for both detectig ad elimiatig the Rogue Access Poits from the etwork. Clear ad easy to implemet algorithm makes this architecture robust. This multi aget based architecture proved to ot oly idetify but also elimiate the rogue access poits completely. Our proposed techique is very reliable ad cost effective, as it deals with multiple level of detectio ad does t require ay specialized hardware device; implemetatio performed also supports our belief ad results i a very effective methodology of complete removal of RAPs. ACKNOWLEDGMENT I feel happiess i forwardig this paper as a image of sicere efforts. The successful project desig reflects my work, effort of my guide i givig me good iformatio. My sicere thaks to my guide Prof. S.K. Patha who has bee a costat source of ispiratio ad guidig star i achievig my goal. I express my deep gratitude to all staff members who led me their valuable support ad cooperatio to eable me to complete my project desig paper successfully. REFERENCES [1] V. S. Shakar Sriram, G. Sahoo, Ashish P. Sigh, Abhishek Kumar Maurya Securig IEEE Wireless LANs - A Mobile Aget Based Architecture 2009 IEEE Iteratioal Advace Computig Coferece (IACC 2009) Patiala, Idia, 6-7 March [2] Prof.S.B.Vajale (Ph.D Studet), J.A.Dave(M.Tech. Studet), Uapproved Access Poit Elimiatio I 1677

6 Wla Usig Multiple Agets Ad Skew Itervals, Departmet of Computer Egg Bharati Vidyapeeth Deemed Uiversity College of Egieerig Pue, Iteratioal Joural of Egieerig Sciece ad Techology (IJEST), Feb [3] V. S. Shakar Sriram, G. Sahoo A Mobile Aget Based Architecture for Securig WLANs Iteratioal Joural of Recet Treds i Egieerig, Vol 1, No. 1, May [4] Sogrit Srilasak, Kitti Wogthavarawat ad Aa Phophoem, Itelliget Wireless Network Group (IWING) Itegrated Wireless Rogue Access Poit Detectio ad Couterattack System published i 2008 Iteratioal Coferece o Iformatio Security ad Assurace. [5] Lira Ma, Ami Y. Teymoria, Xiuzhe Cheg A Hybrid Rogue Access Poit Protectio Framework for Commodity Wi-Fi Networks published i the IEEE INFOCOM [6] Ahmed Ayad Abdalhameed, Detectig ad Elimiatig Rogue Access Poits i IEEE WLAN Based o Agets Termiology ad Skew Itervals: A Proposal, Iteratioal Joural of Egieerig ad Advaced Techology (IJEAT) ISSN: , Volume-2, Issue-4, April 2013 [7] Laier Watkis, Raheem Beyah, Cherita Corbett A Passive Approach to Rogue Access Poit Detectio X/07/$ IEEE. [8] Sogrit Srilasak, Kitti Wogthavarawat, Aa Phophoem Itegrated Wireless Rogue Access Poit Detectio ad Couterattack System 2008 Iteratioal Coferece 1678

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna

A Modified Multiband U Shaped and Microcontroller Shaped Fractal Antenna al Joural o Recet ad Iovatio Treds i Computig ad Commuicatio ISSN: 221-8169 A Modified Multibad U Shaped ad Microcotroller Shaped Fractal Atea Shweta Goyal 1, Yogedra Kumar Katiyar 2 1 M.tech Scholar,

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

SOFTWARE usually does not work alone. It must have

SOFTWARE usually does not work alone. It must have Proceedigs of the 203 Federated Coferece o Computer Sciece ad Iformatio Systems pp. 343 348 A method for selectig eviromets for software compatibility testig Łukasz Pobereżik AGH Uiversity of Sciece ad

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Position and Velocity Estimation by Ultrasonic Sensor

Position and Velocity Estimation by Ultrasonic Sensor Positio ad Velocity Estimatio by Ultrasoic Sesor N Ramarao 1, A R Subramayam 2, J Chara Raj 2, Lalith B V 2, Varu K R 2 1 (Faculty of EEE, BMSIT & M, INDIA) 2 (Studets of EEE, BMSIT & M, INDIA) Abstract:

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

OPC Server ECL Comfort 210/310 OPC Server

OPC Server ECL Comfort 210/310 OPC Server OPC Server Descriptio j l j o j l k j l j Modbus-RS485 k Etheret or Iteret l Modbus-TCP ECL Cofort cotroller Heat eter o SCADA server The Dafoss is a OPC-copliat server that serves data to OPC cliets.

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance

Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Implementation of a Timestamping Service for SunSPOT Sensors

Implementation of a Timestamping Service for SunSPOT Sensors Available olie at www.sciecedirect.com Procedia Techology 7 ( 2013 ) 4 10 The 2013 Iberoamerica Coferece o Electroics Egieerig ad Computer Sciece Implemetatio of a Timestampig Service for SuSPOT Sesors

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Schema for the DCE Security Registry Server

Schema for the DCE Security Registry Server Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information