Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
|
|
- Eleanor Barber
- 5 years ago
- Views:
Transcription
1 Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT, Information Technologie for Security Department, 1 Sofia, Bulgaria Abtract. Thi paper aim to how the major role mean of protection play for trengthening the cyberecurity of critical tranport infratructure by uing the advanced method of imulation modelling. The imulation model of a Traffic Control Centre (TTC) of an urban Automobile Tranport Sytem (ATS) i created by the author in the iverbed Modeler Academic Edition 17.5 computer network imulation ytem and i expoed to the impact of a Denial-of-Service attack. In addition, logical concluion have been made on the bai of the experimental reult obtained and evaluated by comparative analyi with reult from analogou previou tudie. 1 Introduction The focu of the preent reearch i on the meaure of trengthening and maintaining a ecure, operational and utainable critical tranport infratructure and in particular an urban Automobile Tranport Sytem (ATS) by building a reliable cyber protection of it Traffic Control Centre (TCC). For thi purpoe, the author ha tudied and analyzed variou advanced imulation environment baed on agent-baed modelling uch a NetLogo [1], Aimun 8., Cico Packet Tracer and iverbed Modeler. The capabilitie of iverbed Modeler Academic Edition 17.5 for modelling of computer network by uing a rich palette of realitic network device and component, which could be preciely configured, make it the preferable oftware for aeing the impact of a Denialof-Service attack on the TCC. It i logical that the choice of an impenetrable protection i preceded by a detection of the vulnerabilitie in a ytem. An example of an adaptive conceptual architecture for critical infratructure cyberecurity i hown in Fig. 1. A it can be een, the Topological Vulnerability Analyi (TVA) and the trategie for reducing the vulnerability are carried out at the prevention tage of the overall management, monitoring and analyi proce, while the reinforcement of ecurity by technical mean i recommended to be done at the lat tage. The advantage of complex ytem modelling by uing profeional imulation oftware are defined on the bai of a comparion with the other publicly known method of penetration tet for aeing the vulnerability of the critical infratructure againt cyber attack. Fig. 1. Adaptive conceptual architecture for critical infratructure cyberecurity. 2 Advantage of imulation modelling for aeing the vulnerability of critical infratructure to cyber attack Simulation modelling i the main tool of TVA that i expreed in monitoring the tate of network aet and maintaining model of network vulnerabilitie and reidual rik. It combine thee to produce model that how the impact of individual and combined vulnerabilitie on overall ecurity poture [2]. In iverbed Modeler Academic Edition 17.5 there i a poibility for pecifying the etting of the DoS-attack profile and the vulnerability called probability of * Correponding author: y.ivanova@ba.bg The Author, publihed by EDP Science. Thi i an open acce article ditributed under the term of the Creative Common Attribution Licene 4. (
2 infection in percentage, a it can be een from the creenhot hown in Fig. 2. The tudy could begin with abence of vulnerability (None) and continue to et the maximum vulnerability of 1 %. the method of imulation modelling the phae become fewer a there i no direct and continuou communication with the client who ha commiioned the penetration teting. Thi can be conidered a another advantage of imulation modelling, becaue the client i not contantly involved in the proce of performing a penetration tet, but get a finihed end product. Additionally, penetration teting i uually conducted on ite at the intitution or organization that ha commiioned it and thi caue a diruption of it normal functioning during thi proce. 3 Mean of protection againt cyber attack baed on the potential vulnerabilitie Fig. 2. Sytem vulnerability etting related to a DoS-attack. Penetration tet are ued to verify ecurity and, in particular to detect vulnerabilitie in ecurity ytem by attacking them in the ame way a a potential hacker would. One of the main difference between the two method i that penetration tet mut be implemented in "virtual machine" with vulnerable application in order to afely tet different technique that target a ytem breakthrough, uing publicly available tool [3]. Thi can be conidered a an advantage of imulation modelling a compared to penetration tet, becaue the direct intallation of imulation oftware on a peronal computer doe not poe a threat of infection. Indeed, both method in their eence are intended to detect vulnerabilitie in the ytem but differ in the purpoe of taking thi action. In imulation modelling vulnerability aement precede imulation execution, while in penetration tet the attacker wate time looking for weak point in the ytem. Practically, every complex ytem of great importance uch a a TCC i protected in ome way and it take the attacker a relatively long time to overcome thee mean of protection. In thi cae, the advantage of imulation modelling i the poibility for the impact of a cyber attack to be een intantly by relevant etting for ignoring the protection. Actually, the full proce of penetration teting i executed in even ucceive phae a follow: Preengagement, Information gathering, Threat modelling, Vulnerability analyi, Exploitation, Pot exploitation, eporting [3]. An analogou equence of five phae in modelling a DoS-attack on a TCC in iverbed Modeler Academic Edition 17.5 can be preented a a comparion: Gathering information about the DoS-attack, Attack modelling, Vulnerability aement, Simulation execution, Summary evaluation of the reult. By uing The firt tep in defining an optimal protection trategy i to determine preciely the vulnerability of the pecific management ytem which could be related to lape in: network configuration not uing flow management method; unencrypted paword; bad device configuration in term of ecurity. network hardware unafe phyical port and unreliable phyical protection. mean of protection miconfigured firewall, undefined network ecurity perimeter. oftware buffer overflow, DoS-attack, lack of Intruion Detection Sytem (IDS), failure to maintain Log and monitor them in real time. hardware inufficient teting, unreliable phyical protection, unauthorized acce, inecure remote acce, Electromagnetic Interference (EMI). communication ytem unuitable Log of firewall and router, lack of monitoring, authentication and verification of data integrity. ecurity policie and procedure [4]. On the bai of the claified main vulnerabilitie the author recommend the following mean for overall improvement of cyberecurity: antiviru oftware contant update of the oftware i required to prevent penetration into the ytem. router thi autonomou device working with IP addree can be defined a a mart device compared to the witch, becaue except for ditributing the traffic it i alo able to reduce the vulnerability of the ytem to cyber threat from Internet. Virtual Private Network (VPN) they enure remote acce, preerving the high quality and integrity of the output information. For example, IP VPN i a ervice deigned to meet the need of corporate buine, where high quality, ecurity and rich capabilitie for integrated data, voice, video and multimedia tranmiion hould be guaranteed. Firewall thi i an advanced approach to cyberecurity that i implemented a a trong authentication intead of tatic paword through oftware and hardware complexe, router, and other ecurity meaure. The interpretation of rule i implemented conitently by filter that allow for or prohibit the tranmiion of data (packet) to the next filter or protocol level. Honeypot and Honeynet honeypot repreent fake computer ytem, etup a a "decoy", that are ued to 2
3 collect data on intruder. Thi "decoy" appear to contain operating ytem vulnerabilitie that make it an attractive target for hacker. While it appear vulnerable to attack, it actually prevent acce to valuable data, adminitrative control and other computer. Adminitrator can collect data on the identity, acce, and compromie method ued by the intruder. Honeynet are network, where all inbound and outbound data i analyzed and collected [5]. Unified Threat Management (UTM) complex olution for cyber threat protection including all neceary module. 4 Modelling the impact of a DoS-attack on the Traffic Control Centre of an urban Automobile Tranport Sytem through a firewall inertion Being a profeional imulation oftware iverbed Modeler i widely ued in ecurity and defene for modelling all network type and technologie (VoIP, TCP, OSPFv3, MPLS, IPv6) and analying network. It i uitable for teting and demontrating technology deign before production; increaing network &D productivity; developing proprietary wirele protocol and technologie; and evaluating enhancement to tandardbaed protocol [6]. For a comparion NetLogo i an open ource multiagent programmable modelling environment with a wide range of application in different area that make it very ueful for tudent. But it i not pecialized in computer network modelling and analyi like iverbed Modeler and Cico Packet Tracer. The imilarity between iverbed Modeler and Cico Packet Tracer i the poibility to imulate the complete network by connecting real type network device and component. The main advantage of iverbed Modeler compared to Cico Packet Tracer i the poibility for directly imulating the impact of cyberattack on different computer network. For thi reaon the author ha preferred iverbed Modeler Academic Edition 17.5 to make the part of thi reearch related to modelling the TCC and a cyberattack on it. The reearch can be continued uing the profeional traffic modelling oftware Aimun 8. after a logical aumption that the erver or ervice top reponding to client requet a a reult of the imulated DoS-attack and thi affect the Traffic Signal Control Sytem. In thi paper the focu i on trengthening the protection through a firewall inertion in order to reduce the probability of infection and repectively traffic change under the impact of a DoS-atack to be prevented. Diturbance in normal ignalling of traffic light are oberved after the erver ha topped working due to the communication between the erver and the ignal controller of the traffic light [7]. Uing reliable protection in TCC hould help to upport the normal traffic flow without increaing time delay and mean queue oberved under the impact of ucceful cyberattack. The reearch of Prof. J. Alex Halderman from the Univerity of Michigan in the field of computer ecurity can be ued in upport of the claim about the coure and conequence of cyberattack on an urban ATS. In thi tudy, the team led by Prof. Halderman conclude that the vulnerabilitie they dicovered in the infratructure are not a fault of any one device or deign choice, but rather how a ytemic lack of ecurity concioune, which i expreed in: unencrypted radio ignal; ue uername and paword by default; a debug port that i eay to be attacked; uing an older verion of the intalled oftware [8]. The author reference model (M ef ) of TCC ha a typical network configuration including 3 worktation, 3 erver and a witch connected in a linear bu network. It ha been developed in iverbed Modeler Academic Edition 17.5 uing built-in protection imulated by pecific etting. The model i ubjected to the impact of a DoS-attack that caue uch an intenive traffic (flooding) that the proceing of the requet i impeded [9]. The author ha choen to work with a firewall type ethernet2_lip8_firewall_adv, which i a pecially programmed router. A creenhot of the model i hown in Fig. 3. Fig. 3. The model of TCC with a firewall inertion under the impact of a DoS-attack. The duration of thi imulation i 3 and i divided into ix equal interval of 5. Table 1 contain imulation reult from 1 cenario. In the current reearch, the method ued for verification of the model i baed on the reaction time that repreent а time interval between the beginning of an action and beginning of the correponding repone. The reearch i made for 1 conecutive cenario. Thi method ha been preferred by the author, becaue it demontrate one of the great advantage of imulation modelling. It provide an opportunity the reearch to be done entirely in a virtual environment in order to ave financial reource for realization in a phyical environment uing a hardware prototype. Therefore, the imulation reult can be accepted a ufficiently reliable and at thi tage it i not required to be compared with reult of other analogou tudie. The comparative diagram in Figure 4, 5 and 6 how in which econd of running the imulation are regitered peak level of T S and T, repectively with built-in protection and a firewall. The dark blue chart how T without a firewall, while the red one how T with a firewall. The green chart how T S without a firewall, while the light blue one how T S with a firewall. 3
4 , T Table 1. Peak level of traffic ent (TS, max) and traffic received (T, max), depending on the inter arrival time (T) for the model under the impact of a DoS-attack repectively without and with a firewall ,7 6,7 3, ,7 6,7 3,4,5 1 13,5 13,5 3,4,25 16,5 13,5 13,5 6,7,2 16,8 13,5 2 1, ,5 16,4 6,4,1 33, , , ,5 34,5, Fig. 4. ТS = f (T) and T = f (T) at Т = 2., Fig. 5. ТS = f (T) and T = f (T) at Т =,2., , Fig. 6. ТS = f (T) and T = f (T) at Т =,2.,, Table 2, 3 and 4 contain the ummary reult of all three chart and how in which time interval in econd are regitered peak level of T S and T a function of the elected three value of the inter arrival time T, repectively without and with a firewall. Table 2. Peak level of traffic ent (TS, max) and traffic received (T, max) at T = 2. [1; 5] 3,3 3,4 [5; 1] 3,3 3,3 6,7 [1; 15] 3,3 6,7 3,4 [15; 2] 6,7 3,3 6,7 3,4 [2; 25] 1 6,7 3,4 [25; 3] 6,7 3,3 Table 3. Peak level of traffic ent (TS, max) and traffic received (T, max) at T =,2. [1; 5] 3 3 3,4 [5; 1] 13,5 6,7 13,4 3,4 [1; 15] 13, [15; 2] 13,5 13,5 13,4 6,7 [2; 25] 13,5 6,7 2 3,4 [25; 3] 16,7 1 13,4 3,4 Table 4. Peak level of traffic ent (TS, max) and traffic received (T, max) at T =,2. [1; 5] [5; 1] [1; 15] [15; 2] [2; 25] [25; 3] Summary evaluation On the bai of the tabular and graphical reult the author ha come to the following concluion. When a firewall i ued the number of ent packet T S, max i generally lower than the number of packet ent when built-in protection by vulnerability etting are ued. Before the time interval [25; 3], when the number of ent packet i le than 8, a better filtration of the packet ent i oberved due to the firewall inertion a compared with the cae of uing only built-in device protection. In the lat time interval, when the number of ent packet exceed 8, there i a aturation which may be due to a limitation of the ued type of a firewall. 4
5 It i alo neceary to etablih whether the packet themelve repreent a threat or not. In cae that certain packet threaten the ytem i neceary to improve the elected firewall model by replacing it with another model, or by integrating it with other mean of protection. In addition, when a firewall i ued the cae of flooding are reduced to only one in the lat time interval from all ten cenario, while without the inerted mean of enhanced protection the flooding tart in the time interval [2; 25] and it deepen in the lat time interval [25; 3]. Thi mean that a ytem denial can be oberved in at leat two of all 1 cenario. If thi hould be preented with the probability of an advere event, then when a firewall i ued, thi probability i equal to 1 %, but it i at leat twice a much if there i not a firewall inertion. ecommendation to enhance the protection ued One of the reliable olution for analyzing the received packet are Intruion Detection Sytem (IDS), which evaluate each packet and ae whether it i a hazard or not. If a packet i defined a a ource of a cyber threat, the ytem decide whether to ignore it completely, log it to be analyzed by the adminitrator or immediately alert that uch a packet ha infiltrated the network. The IDS can be placed in different location in the network, a well a in the firewall itelf. The advantage of placing it in the firewall i that many of the upiciou packet will be blocked at the entrance and potential cyber threat will be prevented. Beide, IDS control the firewall. An IP addre of the network controller that monitor the traffic hould not be et when configuring IDS to prevent a potential attacker from detecting the device. The aim i for the IDS enor to be protected from network can and attack that it i trying to find. In thi cae the diadvantage i that the removal of the IP addre caue problem for adminitrator to manage the proce. The olution i to ue two network interface, one of which i configured without IP and work a a enor, and the other one i connected to a eparate local area network that collect information and manage IDS device [1]. meaurement in a phyical environment. In the preent cae, uch tudy i not intended becaue the aim i to emphaize the advantage of imulation modelling itelf. eference 1. Y. Ivanova, Military Journal, Sofia, 4, (215). 2. S. Jajodia, S. Noel, B. O Berry, Managing Cyber Threat: Iue, Approache and Challenge, Kluwer Academic Publiher, (25). 3. G. Weidman, No Starch Pre Inc., San Francico, 2-6 (214). 4. E. Stoilov, Department of Informatic at NBU, Sofia, (21). 5. SANS Intitute. Honey Pot and Honey Net - Security through Deception, 1-5 (23). 6. iverbed Technology, iverbed Modeler: A Suite of Protocol and Technologie with a Sophiticated Development Environment, San Francico (217). 7. Y. Ivanova, IJITS, iue 3, vol. 9, (217). 8. Y. Ivanova, IJITS, iue 2, vol. 9, (217). 9. B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek. & A. J. Halderman, Green Light Forever: Analyzing the Security of Traffic Infratructure, Proceeding of the 8th USENIX Workhop on Offenive Technologie (WOOT 14) (214). 1. E. Stoilov, Department of Informatic at NBU, Sofia, (211). 5 Concluion Thi reearch i an example of applying imulation modelling for olving problem related to cyberecurity of critical tranport infratructure. There are poibilitie for the tudy to be extended in order to improve the method and mean of protection uing the imulation reult. It ha been demontrated that the negative impact of a cyber attack on the TCC can be reduced by uing appropriate protection, but the wide variety of exiting cyber threat require that the mean of protection are contantly teted, updated and improved. The demontrated method prove that the ue of a imulation environment i a very effective way to achieve that aim. One of the direction in which the reearch can be expanded i an additional verification baed on the margin of error by comparing the imulation reult with 5
Laboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationIntegration of Digital Test Tools to the Internet-Based Environment MOSCITO
Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationETSI TS V ( )
TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationSoftware Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks
Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationA Basic Prototype for Enterprise Level Project Management
A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationAalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces
Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding
More informationSCHEDULE DOCUMENT CONNECT MPLS SERVICES PUBLIC NODE4 LIMITED 17/07/2017
SCHEDULE DOCUMENT CONNECT MPLS SERVICES PUBLIC NODE4 LIMITED 17/07/017 SCHEDULE DOCUMENT CONNECT MPLS SERVICES Additional term, Service Decription & Service Level Agreement for ConnectMPLS Service 1. SERVICE
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationPolicy-based Injection of Private Traffic into a Public SDN Testbed
Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationFocused Video Estimation from Defocused Video Sequences
Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization
More informationAnalytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation
Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationPERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM
PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication
More informationEthernet Peer-To-Peer Communication With Model 353 And Procidia i pac Controllers
iemen Energy & utomation pplication ata Ethernet Peer-To-Peer Communication With odel 353 nd Procidia ipac Controller 353-113 Rev. 1 July Ethernet i a leading form of network communication that i often
More informationNew DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index
New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of
More informationSIMIT 7. Profinet IO Gateway. User Manual
SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion
More informationDesign of a Stewart Platform for General Machining Using Magnetic Bearings
eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationDWH Performance Tuning For Better Reporting
DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationChapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service
Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork
More informationThe development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit
The development of the South African ehealth Strategy aeed againt the recommendation of the WHO/ITU ehealth Strategy Toolkit Roemary Foter PhD a,b a ehealth Strategy and Policy Diviion, Medical Reearch
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationA Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology
A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationThrough the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview
I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique
More informationFrequency Table Computation on Dataflow Architecture
Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity
More informationHardware-Based IPS for Embedded Systems
Hardware-Baed IPS for Embedded Sytem Tomoaki SATO, C&C Sytem Center, Hiroaki Univerity Hiroaki 036-8561 Japan Shuya IMARUOKA and Maa-aki FUKASE Graduate School of Science and Technology, Hiroaki Univerity
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationOn combining Learning Vector Quantization and the Bayesian classifiers for natural textured images
On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationA NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL
International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE
More informationFinite Elements Method in Split Hopkinson Pressure Bar developing process
6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 1-3, 007 63 Finite Element Method in Split Hopkinon Preure Bar developing proce ROTARIU ADRIAN
More informationANALYSIS OF PILE DRIVING IN VERTICAL AND HORIZONTAL DIRECTIONS USING A HYBRID MODEL
ANALYSIS OF PILE DRIVING IN VERTICAL AND HORIZONTAL DIRECTIONS USING A HYBRID MODEL TATSUNORI MATSUMOTO i) PASTSAKORN KITIYODOM ii) EIJI KOJIMA iii) HIROMICHI KUMAGAI iv) SATOSHI NISHIMOTO v) and KOUICHI
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More information(12) Patent Application Publication (10) Pub. No.: US 2002/ A1
(19) United State US 2002O129111A1 (12) Patent Application Publication (10) Pub. No.: US 2002/0129111A1 Cooper (43) Pub. Date: (54) FILTERING UNSOLICITED EMAIL (76) Inventor: Gerald M. Cooper, Gretna,
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationToward Software Defined Smart Home
Green Communication and Computing Network Toward Software Defined Smart Home Ke Xu, Xiaoliang Wang, Wei Wei, Houbing Song, and Bo ao In recent year, the mart home field ha caught wide attention and witneed
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationThe Performance Evaluation of Qos in Wireless Personal Area Network (WPAN) on Impact of Bluetooth Worms
Journal of Wirele Networking and Communication 2012, 2(5): 111-116 DOI: 10.5923/j.jwnc.20120205.05 The Performance Evaluation of Qo in Wirele Peronal Area Network (WPAN) on Impact of Bluetooth Worm M.
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More informationDigifort Standard. Architecture
Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010
ESRP Stor Program EMC Celerra NX4 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion. Teted Date: 6/25/21 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-91
More informationML85C. Data Sheet. Press fit monitoring module. Special features. Block. diagram PLC. B en
ML85C Pre fit monitoring module Special feature Data Sheet Meaurement and evaluation ytem for force/diplacement coure in fitting procee Graphical repreentation of the procee with zoom function Immediate
More informationHow to. write a paper. The basics writing a solid paper Different communities/different standards Common errors
How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationA QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming
A QoS-aware Service Compoition Approach baed on Semantic Annotation and Integer Programming I. INTRODUCTION Service Oriented Architecture (SOA) i a widely adopted paradigm for developing ditributed application
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationESRP Storage Program EMC VNXe3100 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010
ESRP Stor Program EMC VNXe31 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion 3. Teted Date: 4/25/211 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-913
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More information