MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

Size: px
Start display at page:

Download "MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION"

Transcription

1 Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp , Aticle ID: IJCIET_09_06_032 Available online at ISSN Pint: and ISSN Online: IAEME Publication Scopus Indexed MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Aleksei A. Sychugov Associate Pofesso, Depatment of Infomation Secuity, Tula State Univesity, Tula, Russian Fedeation Vycheslav L. Tokaev Associate Pofesso, Depatment of Infomation Secuity, Tula State Univesity, Tula, Russian Fedeation ABSTRACT Vius potection is necessay to peseve infomation. Netwok data esouce secuity is povided with the help of fiewalls, antivius solutions, attack detection systems, integity monitoing systems and encyption. This aticle offes a method fo netwok attack detection, based on a multi-agent system, in which each agent is installed on each of the netwok nodes. A knowledge-based achitectue, in which the agents ae inteconnected accoding to fuzzy elational model, is intoduced as the fundamental pinciple of the system. The offeed method povides eal-time anomaly detection. he study has showed that the poposed method can be applied to detect anomalies in eal-time mode, which is the majo advantage of the method. Method implementation poved that its efficiency depends on the chosen pogamming language. Key wods: netwok attacks, apid anomaly detection, poposed method, communication, incoming agent. Cite this Aticle: Aleksei A. Sychugov and Vycheslav L. Tokaev, Multi-Agent System fo Netwok Attack Detection, Intenational Jounal of Civil Engineeing and Technology, 9(6), 2018, pp INTRODUCTION Netwok data esouce secuity is povided with the help of fiewalls, antivius solutions, attack detection systems, integity monitoing systems and encyption. All of these systems ae chaacteized eithe by thei peiodic o shot-tem application fo solving a paticula poblem, o by pemanent use with static settings [1]. As a esult, the analysis methods used in such systems fo the detection of stictly specified netwok intusion types tun out to be inefficient in case of yet unknown intusion types o modifications of the existing ones. Theefoe, ou cuent task is to find the methods to detect fobidden events in the netwok that is to say, the anomalies caused by unauthoized intusions. One of the majo equiements edito@iaeme.com

2 Multi-Agent System fo Netwok Attack Detection fo such methods is the ability to detect unspecified anomalies, including new and distibuted ones [2]. Most of the netwok attacks can be conditionally divided into thee types: 1) econnaissance attack aimed at gaining infomation about the tageted compute (ping sweep, DNS zone tansfe, TCP o DNS pots scanning, econnaissance, etc.); 2) exploit, which is a piece of softwae attacking softwae vulneabilities (the aim is to gain contol ove the system, to cause its malfunction, etc.); 3) denial-of-sevice attacks by means of unauthoized oveloading of CPU, exhausting had dive stoage space o binging down the sevices. The attacks may oiginate eithe fom a single souce o fom seveal ones [3]. Distibuted attacks constitute a type of denial-of-sevice attacks, fo example, flood and stom attacks, emote intusion (NetBus, BackOifice), local intusion (GetAdmin), emote denial of sevice (Teadop, tin00) o local denial of sevice. 2. TYPES OF NETWORK ATTACKS Thee is a huge numbe of ways to implement these attacks and that numbe is constantly gowing. This point can be illustated by bief desciption of seveal netwok attacks. Data fagmentation. When tansmitting IP data packets ove the netwok, the packet can be divided into seveal fagments. Late, upon eaching the ecipient, the packet is ecoveed fom these fagments. The attacke can send a lage numbe of fagments, which leads to the oveflow of softwae buffes at the ecipient s compute and sometimes to system cash. Ping flooding attack. To pefom this attack the malefacto needs an access to high-speed Intenet connection. Ping sends ICMP echo equest packet with specified time and identifie. The coe of the taget compute sends back an ICMP echo eply. Upon eceiving it, the pogam epots the ound-tip time. Nomally the packets ae sent with some time intevals in ode not to cause netwok oveload. But in the aggessive mode the flow of ICMP echo equest/eply-packets can oveload a small channel, causing a disuption of useful infomation tansmission. IP encapsulated non-standad potocols. IP packet contains a field, that specifies the potocol of encapsulated packet (TCP, UDP, ICMP). The attackes can use a non-standad field value to tansmit the data, that can not be detected by standad means of flow contol [4]. Smuf attack consists in flooding the netwok with boadcast ICMP equests on behalf of the victim. As a esult, the computes, eceiving these boadcast packets, eply to the victim, which leads to a consideable bandwidth decease and in some cases to complete isolation of the attacked netwok. Smuf attack is exceptionally effective and widespead. In ode to detect this attack it is necessay to analyze the channel load and identify the easons of low bandwidth. DNS spoofing. This attack esults in foced matching of IP-addess and domain name in DNS seve cash. Consequently all uses of the DNS seve get false infomation about domain names and IP-addesses. DNS spoofing is chaacteized by a huge numbe of DNS packets with the same domain name due to the need to match some DNS exchange paametes. To detect such attack it is equied to analyze DNS taffic content o use DNSSEC edito@iaeme.com

3 Aleksei A. Sychugov and Vycheslav L. Tokaev IP spoofing. Many Intenet attacks ae associated with spoofing of the souce IP-addess. One of these attacks is called syslog spoofing and consists in sending a message to the victim compute on behalf of anothe compute within the intenal netwok. As fa as syslog potocol is used to log system events, it is possible to impose data o cove up tacks afte an unauthoized intusion by sending false messages to the victim compute. IP spoofing can be detected by means of monitoing souce addess matching in sent and eceived packets within a single inteface o by means of contolling the eceipt of packets with intenal netwok IP-addesses on the extenal inteface. Replay attack. The malefacto sends packets with a fake etun addess. This way the attacke can get access to the connection between othe computes. In this case attacke s access ights ae equal to those of the use, whose seve connection was switched to malefacto s compute. Sniffing. This type of attack can occu only in a local aea netwok. All netwok inteface cads have the option of captuing packets, tansmitted ove a shaed LAN channel. Futhemoe the wok station compute is able to eceive packets, addessed to othe computes of the same LAN segment [5]. Thus the entie data exchange pocess within the netwok segment can be accessed by the attacke. Malefacto s compute and the tageted one have to be connected to the same LAN segment fo the successful ealization of the attack. Route packets sniffing. Route netwok softwae has an access to all the netwok packets, tansmitted via the oute, and this allows captuing the packets. The attacke needs to have pivileged access at least to one of the netwok outes. Since a oute usually tansmits a lot of packets, thei total sniffing becomes impossible. Howeve some sepaate packets can be captued and kept fo futhe analysis by the attacke. The most efficient type of this attack is sniffing FTP packets with uses pofile and passwods. The above mentioned findings demonstate that thee is a specific set of chaacteistics that can seve as a sign of anomalies caused by unauthoized intusions, when occuing sepaately (o collectively, which is even bette). Theefoe ou majo task is to povide apid and automatic detection of these anomalies Detect Netwok Attacks This aticle investigates poblem solution with the help of multi-agent system that is to say, a numbe of intelligent agents ( softwae obots ) distibuted ove the netwok, moving aound it in seach of elevant data, knowledge and pocedues and coopeating while solving the poblems [6]. An agent is an entity in the envionment, poviding data, capable of eflecting and intepeting the events in that envionment and of executing commands. In ode to detect netwok attacks the agent needs to have softwae components, which allow having the following chaacteistics: autonomy (the ability to function with total self-contol of the actions and intenal state); coopeativity (the ability to coopeate with othe agents, exchanging messages encoded with the help of a common language); fast esponse (the ability to peceive the state of the envionment and esponse to the changes in due time); poactivity (the ability to take up the unning, that is the ability to geneate tasks and act ationally); edito@iaeme.com

4 Multi-Agent System fo Netwok Attack Detection awaeness (possession of pemanent knowledge, unchangeable duing agent s activity and of opeational knowledge, which can vay with time and even become false); sense of pupose (the ability to plan the actions, aimed at achieving goals, that is the equied states and situations); ationality the ability to act in such a way as to achieve the goals with minimal time and esouces. Thee ae two types of poblems to be solved fo the pupose of fomal desciption of mental notions: syntactic and semantic ones. Knowledge fomalism (as well as the desciption of any othe infomation) should have the following two aspects: its own language fo fomal desciption and its own semantic model [7]. It is poposed to apply fuzzy logic to the desciption of syntax. Howeve due to the dynamic natue of agent s activity and multi-agent system, these logic should be supplemented by desciption methods applied to tempoal aspects of knowledge, and in some cases by means of desciption of eal-time chaacteistics. Fom the point of view of fomalization semantics, symbolic stuctues can be intepeted with the help of coesponding functions (algoithms) and data stuctues. 3. THE PROPOSED METHOD FOR DESIGNING A MULTI-AGENT SYSTEM The distibuted solution fo netwok anomaly detection by seveal agent can be divided into the following stages: 1) agent-manage (cental agent) decomposes the oiginal task into sepaate tasks, which ae distibuted among executive agents; 2) each executive agent solves its task, also dividing it into subtasks in some cases; 3) sepaate esults fo the selected tasks ae integated to get a geneal solution. We offe the following fuzzy elational model to be used as the basis of the executive agent R : A B, R m m2 jk 1 p 2 p mp whee A A 1,A2,...,A m functions A x0,1 fo j=1,,m; x x x x i 1, 2,..., m paametes of netwok opeation; B 1,B 2,...,B m Y with membeship functions B y0,1 k a value anging fom 0 to 1 this value estimates the pesence of anomalies; 0,1 j=1,,m, k=1,,p. is a set of linguistic tems, defined on X with membeship is the vecto of fuzzy cuent B is a set of linguistic tems defined on fo k=1,,p; y is a fuzzy output vaiable with When obtaining the tem values of A A,A (1), 1 2,...,A m - a fuzzy set, eflecting the vecto of values of diffeent vaiables, including the symbolic ones, with the values of jk edito@iaeme.com

5 membeship functions x0,1 fuzzy infeence: Aleksei A. Sychugov and Vycheslav L. Tokaev allows estimating the anomaly esulting fom the Ai B A A B (2) The pocess of finding a coopeative solution can be divided into fou stages: 1. Detection. Coopeative solution finding pocess stats at the moment when the agent detects the easonability of such actions. Fo example, in case when the agent lacks infomation to ensue the eliability of the logical infeence. 2. Agent teaming. At this stage the agent, that has detected the feasibility of coopeation, is seaching fo patnes. If this stage is successfully completed, a team of agents with equal esponsibilities in collective actions is fomed. 3. Collective planning. At this stage the agents exchange the infomation (messages) in ode to wok out a collective plan aimed at the ealization of the equied goal. 4. Collective actions. At this stage the agents ae acting accoding to the obtained plan, inteacting within the potocol. Detection is based upon the estimation of agent coopeation potential. Thee is a coopeation potential in elation to the goal g of an agent i if: (1) thee is a team q, such that i believes that q can collectively gain g and eithe (2) i can not each g acting sepaately o (3) i believes that fo each action а, that could be pefomed in ode to get a goal g it has anothe goal esulting in failue to pefom action а. Team fomation pocedue is as follows: agent i (with goal g), that has a potential fo coopeation with the team q, is tying to each such state of the team q in which it could collectively get the goal g and in which the team q is obliged to pefom the actions collectively [8]. Collective planning stats if the pevious stage was successful. Then thee is a team of agents, obliged to pefom the actions collectively. Howeve collective opeation can not stat until the team agees upon the specific functions of each agent. Collective actions begin at the end the pevious stage. In the initial state of collective actions stage thee is a geneal plan of the team q and it (q) intends to continue woking togethe. Nomally the actions duing this pocess ae pefomed accoding to the accepted plan until the moment of its completion. Howeve sometimes collective actions can be inteupted. The system is managed only due to the local inteactions among the agents. A coodinating agent is needed to suppot such management. The coodinating agent can be attached to АМР (Agent Meeting Place) [9]. АМР is the agent acting as a boke between the agents, equesting some esouces belonging to othe agents and the agents that can povide these esouces. It is a egula agent, supplemented by auxiliay components. These auxiliay components should contain a unified desciption of agents available at AMP and thei abilities (esouces, functions, etc.) on the one hand and on the othe hand they should povide a unified access to them [10]. These conditions ae guaanteed by the following АМР components: 1. Basic sevices; these can include emote invoking of the objects, thei systematization, doubling and othe basic options. 2. Linked pots fo eceiving and sending agents to AMP with the help of elevant potocols. 3. Agent name authentication component (agent identification, authoization ) edito@iaeme.com

6 Multi-Agent System fo Netwok Attack Detection 4. Access subsystem, monitoing the functions of the incoming agent, pesence of the equied sevice at АМР and helping the agent select futhe oute, etc. 5. Suface oute, acting as an inteface between the agents and AMP components, egisteed in this inteface. This oute has a limited vocabulay to satisfy agents equests. 6. Linguistic log which is a database helping agents and AMP successfully communicate. The log egistes vocabulaies and languages, but instead of languages desciption o tems definitions thee ae links to them, i.e. the log povides the infomation that can possibly be undestood at АМР. 8. Resouce manage egistes the agents at AMP and thei esouces and manages AMP esouces. 9. Agent execution envionment, egisteed at AMP. It contols the access to agent s components, analyzes scipts and povides access to the basic featues, etc. 10. Message delivey system; any local tools, esident agents of AMP, etc. can send the messages; the system logs the events and seaches fo the agents fo specific type of events o messages. 4. MULTI-AGENT SYSTEM ARCHITECTURE In geneal multi-agent system fo netwok attack detection has a knowledge-based achitectue. The following equiements define the featues of the poposed achitectue. 1. In the eal application the agent deals with unfoeseen events in space (netwok) and time and in the pesence of othe agents. 2. The agent has to etain the ability to espond adequately and to make decisions. 3. The agent must have an achitectue that would allow coping with uncetainty and lack of infomation, esponding to unfoeseen events using elatively simple ules [11]. The agent s competence in such achitectue is based upon the following types of knowledge: 1) knowledge of the netwok; 2) knowledge of agents capabilities; 3) knowledge of othe agents capabilities; 4) knowledge of inteaction with netwok nodes; 5) knowledge of communication with othe agents (which types of communication ae feasible and useful fo obtaining additional infomation) [12]. The achitectue includes thee levels, with each one coesponding to diffeent types of agent s capabilities: event esponse level helps maintain agent s ability to espond to the events coming fom uppe levels, even if they wee not planned; planning level geneates, executes and dynamically econstucts patial plans, fo example, fo choosing mobile obot s oute; expectance and modeling level simulates the behavio of extenal envionment entities and of the agent itself, which can be used fo intepetation of the obseved behavio and pediction of a possible one in futue. Each of these levels has its own featues. 5. CONCLUSIONS The system is implemented as a combination of message exchange technology and a contextual activation of contolling ules (accoding to the chaacteistics of the subject aea), acting as an intemediay examining data at diffeent levels (peceived input and output data of diffeent levels), adding new data at diffeent levels and deleting some old one edito@iaeme.com

7 Aleksei A. Sychugov and Vycheslav L. Tokaev In fact subsystem ules act as a filte between the sensos of the agent and its intenal levels as well as between the levels and the executive elements. Othe components of the analyzed system consist of intemediate memoy, communication manage and man-machine inteface. Intemediate memoy seves to stoe use s and communication manage s cuent data, geneated by contolling level. Thee ae the following types of infomation stoed in the memoy: goals to be achieved, state of the tasks in pocess of making ageements with othe agents. Expeimental studies of the system have showed: 1) athe high accuacy of anomaly detection (96% on aveage); 2) athe wide ange of detected anomalies. To estimate the poposed method we used KDD Cup 1999 Data. kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html. This aticle has intoduced a method fo netwok attack detection with the help of the detection of compute netwok malfunctions, caused likely by an unauthoized intusion into the netwok. The study has showed that the poposed method can be applied to detect anomalies in eal-time mode, which is the majo advantage of the method. Method implementation poved that its efficiency depends on the chosen pogamming language. The choice is esticted by the equiements to suppot: 1) netwok inteaction, 2) multithead pocessing, 3) symbolic computation, and to conside pocedue calls as messages between the objects. ACKNOWLEDGEMENTS The esults of the eseach poject ae published with the financial suppot of Tula State Univesity within the famewok of the scientific poject PUBL REFERENCES [1] Ayatollahi H., Khansai M., Rabie H. R. A push-pull netwok coding potocol fo live pee-to-pee steaming. Compute Netwoks 130, (2017), pp [2] Cui Y., Lai Z., Dai N. A fist look at mobile cloud stoage sevices: achitectue, expeimentation, and challenges. IEEE Netwok Vol. 30 No 4, (2016), pp [3] Aslam S., Ul Islam S., Khan A., Ahmed M., Akhundzada A., Khan M.K. Infomation collection centic techniques fo cloud esouce management: Taxonomy, analysis and challenges Jounal of Netwok and Compute Applications Vol. 100 No 15, (2017), pp [4] Ha T., Yoon S., Risdianto A.C., Kim J.W., Lim H. Suspicious Flow Fowading fo Multiple Intusion Detection Systems on Softwae-Defined Netwoks IEEE Netwok Vol. 30 No 6, (2016), pp [5] Vieia T.P.B., Tenóio D.F., Da Costa J., Feitas E., Del Galdo G., De Sousa Júnio R.T. Model ode selection and eigen similaity based famewok fo detection and identification of netwok attacks Jounal of Netwok and Compute Applications Vol. 90 No 15, (2017), pp [6] Russell S. and Novig P Atificial Intelligence: A Moden Appoach. Willians, Moscow. [7] Anwa S., Inayat Z., Zolkipli M.F., Zain J.M., Gani A., Anua N.B., Khan M.K., Chang V. Coss-VM cache-based side channel attacks and poposed pevention mechanisms: A edito@iaeme.com

8 Multi-Agent System fo Netwok Attack Detection suvey Jounal of Netwok and Compute Applications Vol. 100 No 15, (2017), pp [8] Poject of multi-agent technology in difficult systems. Open Univesity of the Nethelands, Available at: [9] Nieto A., Roman R., Lopez J. Digital Witness: Safeguading Digital Evidence by Using Secue Achitectues in Pesonal Devices IEEE Netwok Vol. 30 No 6, (2016), pp [10] Choi J. Secet Key Tansmission fo OFDM based Machine Type Communications Jounal of Communications and Netwoks Vol. 19 No 4, (2017), pp [11] Kamal A.E., Iman M., Chen H.-H., Vasilakos A.V. Suvivability stategies fo emeging wieless netwoks Compute Netwoks 128, (2017), pp [12] Izaddoost A., Heydai S.S. Risk-Adaptive Stategic Netwok Potection in Disaste Scenaios Jounal of Communications and Netwoks Vol. 19 No 5, (2017), pp [13] Dimplepeet Kau, Tanisha and Amit Vema, A Fast Handoff Technique in VANET to Decease Delay in Netwok Using Mobile Nodes. Intenational Jounal of Electonics and Communication Engineeing and Technology, 7(6), 2016, pp edito@iaeme.com

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR

AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES ALI JAWAD GHANDOUR AMERICAN UNIVERSITY OF BEIRUT IMPROVING DATA COMMUNICATIONS IN VEHICULAR AD HOC NETWORKS VIA COGNITIVE NETWORKS TECHNIQUES by ALI JAWAD GHANDOUR A thesis submitted in patial fulfillment of the equiements

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.

In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

IS-IS Protocol Hardware Implementation for VPN Solutions

IS-IS Protocol Hardware Implementation for VPN Solutions IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks 206 IEEE Intenational Symposium on Infomation Theoy Cloud-Aided Wieless Netwos with Edge Caching: Fundamental Latency Tade-Offs in Fog Radio Access Netwos Ravi Tandon Osvaldo Simeone Depatment of ECE Univesity

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

SIMOCODE pro. Motor Management and Control Devices. SIMOCODE pro for Modbus RTU. Answers for industry. Edition 04/2015

SIMOCODE pro. Motor Management and Control Devices. SIMOCODE pro for Modbus RTU. Answers for industry. Edition 04/2015 SIMOCODE po Moto Management and Contol Devices SIMOCODE po fo Modbus RTU Geätehandbuch Configuation Manual Edition 04/2015 Answes fo industy. Intoduction 1 System configuation and commissioning with RTU

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011 CS 61C: Geat Ideas in Compute Achitectue (Machine Stuctues) Instuction Level Paallelism: Multiple Instuction Issue Guest Lectue: Justin Hsia Softwae Paallel Requests Assigned to compute e.g., Seach Katz

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile

More information

Voting-Based Grouping and Interpretation of Visual Motion

Voting-Based Grouping and Interpretation of Visual Motion Voting-Based Gouping and Intepetation of Visual Motion Micea Nicolescu Depatment of Compute Science Univesity of Nevada, Reno Reno, NV 89557 micea@cs.un.edu Géad Medioni Integated Media Systems Cente Univesity

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Tissue Classification Based on 3D Local Intensity Structures for Volume Rendering

Tissue Classification Based on 3D Local Intensity Structures for Volume Rendering 160 IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 6, NO., APRIL-JUNE 000 Tissue Classification Based on 3D Local Intensity Stuctues fo Volume Rendeing Yoshinobu Sato, Membe, IEEE, Cal-Fedik

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses

1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:

More information

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks

Heterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks 1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information