Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Size: px
Start display at page:

Download "Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity"

Transcription

1 Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT, Information Technologie for Security Department, 1 Sofia, Bulgaria Abtract. Thi paper aim to how the major role mean of protection play for trengthening the cyberecurity of critical tranport infratructure by uing the advanced method of imulation modelling. The imulation model of a Traffic Control Centre (TTC) of an urban Automobile Tranport Sytem (ATS) i created by the author in the iverbed Modeler Academic Edition 17.5 computer network imulation ytem and i expoed to the impact of a Denial-of-Service attack. In addition, logical concluion have been made on the bai of the experimental reult obtained and evaluated by comparative analyi with reult from analogou previou tudie. 1 Introduction The focu of the preent reearch i on the meaure of trengthening and maintaining a ecure, operational and utainable critical tranport infratructure and in particular an urban Automobile Tranport Sytem (ATS) by building a reliable cyber protection of it Traffic Control Centre (TCC). For thi purpoe, the author ha tudied and analyzed variou advanced imulation environment baed on agent-baed modelling uch a NetLogo [1], Aimun 8., Cico Packet Tracer and iverbed Modeler. The capabilitie of iverbed Modeler Academic Edition 17.5 for modelling of computer network by uing a rich palette of realitic network device and component, which could be preciely configured, make it the preferable oftware for aeing the impact of a Denialof-Service attack on the TCC. It i logical that the choice of an impenetrable protection i preceded by a detection of the vulnerabilitie in a ytem. An example of an adaptive conceptual architecture for critical infratructure cyberecurity i hown in Fig. 1. A it can be een, the Topological Vulnerability Analyi (TVA) and the trategie for reducing the vulnerability are carried out at the prevention tage of the overall management, monitoring and analyi proce, while the reinforcement of ecurity by technical mean i recommended to be done at the lat tage. The advantage of complex ytem modelling by uing profeional imulation oftware are defined on the bai of a comparion with the other publicly known method of penetration tet for aeing the vulnerability of the critical infratructure againt cyber attack. Fig. 1. Adaptive conceptual architecture for critical infratructure cyberecurity. 2 Advantage of imulation modelling for aeing the vulnerability of critical infratructure to cyber attack Simulation modelling i the main tool of TVA that i expreed in monitoring the tate of network aet and maintaining model of network vulnerabilitie and reidual rik. It combine thee to produce model that how the impact of individual and combined vulnerabilitie on overall ecurity poture [2]. In iverbed Modeler Academic Edition 17.5 there i a poibility for pecifying the etting of the DoS-attack profile and the vulnerability called probability of * Correponding author: y.ivanova@ba.bg The Author, publihed by EDP Science. Thi i an open acce article ditributed under the term of the Creative Common Attribution Licene 4. (

2 infection in percentage, a it can be een from the creenhot hown in Fig. 2. The tudy could begin with abence of vulnerability (None) and continue to et the maximum vulnerability of 1 %. the method of imulation modelling the phae become fewer a there i no direct and continuou communication with the client who ha commiioned the penetration teting. Thi can be conidered a another advantage of imulation modelling, becaue the client i not contantly involved in the proce of performing a penetration tet, but get a finihed end product. Additionally, penetration teting i uually conducted on ite at the intitution or organization that ha commiioned it and thi caue a diruption of it normal functioning during thi proce. 3 Mean of protection againt cyber attack baed on the potential vulnerabilitie Fig. 2. Sytem vulnerability etting related to a DoS-attack. Penetration tet are ued to verify ecurity and, in particular to detect vulnerabilitie in ecurity ytem by attacking them in the ame way a a potential hacker would. One of the main difference between the two method i that penetration tet mut be implemented in "virtual machine" with vulnerable application in order to afely tet different technique that target a ytem breakthrough, uing publicly available tool [3]. Thi can be conidered a an advantage of imulation modelling a compared to penetration tet, becaue the direct intallation of imulation oftware on a peronal computer doe not poe a threat of infection. Indeed, both method in their eence are intended to detect vulnerabilitie in the ytem but differ in the purpoe of taking thi action. In imulation modelling vulnerability aement precede imulation execution, while in penetration tet the attacker wate time looking for weak point in the ytem. Practically, every complex ytem of great importance uch a a TCC i protected in ome way and it take the attacker a relatively long time to overcome thee mean of protection. In thi cae, the advantage of imulation modelling i the poibility for the impact of a cyber attack to be een intantly by relevant etting for ignoring the protection. Actually, the full proce of penetration teting i executed in even ucceive phae a follow: Preengagement, Information gathering, Threat modelling, Vulnerability analyi, Exploitation, Pot exploitation, eporting [3]. An analogou equence of five phae in modelling a DoS-attack on a TCC in iverbed Modeler Academic Edition 17.5 can be preented a a comparion: Gathering information about the DoS-attack, Attack modelling, Vulnerability aement, Simulation execution, Summary evaluation of the reult. By uing The firt tep in defining an optimal protection trategy i to determine preciely the vulnerability of the pecific management ytem which could be related to lape in: network configuration not uing flow management method; unencrypted paword; bad device configuration in term of ecurity. network hardware unafe phyical port and unreliable phyical protection. mean of protection miconfigured firewall, undefined network ecurity perimeter. oftware buffer overflow, DoS-attack, lack of Intruion Detection Sytem (IDS), failure to maintain Log and monitor them in real time. hardware inufficient teting, unreliable phyical protection, unauthorized acce, inecure remote acce, Electromagnetic Interference (EMI). communication ytem unuitable Log of firewall and router, lack of monitoring, authentication and verification of data integrity. ecurity policie and procedure [4]. On the bai of the claified main vulnerabilitie the author recommend the following mean for overall improvement of cyberecurity: antiviru oftware contant update of the oftware i required to prevent penetration into the ytem. router thi autonomou device working with IP addree can be defined a a mart device compared to the witch, becaue except for ditributing the traffic it i alo able to reduce the vulnerability of the ytem to cyber threat from Internet. Virtual Private Network (VPN) they enure remote acce, preerving the high quality and integrity of the output information. For example, IP VPN i a ervice deigned to meet the need of corporate buine, where high quality, ecurity and rich capabilitie for integrated data, voice, video and multimedia tranmiion hould be guaranteed. Firewall thi i an advanced approach to cyberecurity that i implemented a a trong authentication intead of tatic paword through oftware and hardware complexe, router, and other ecurity meaure. The interpretation of rule i implemented conitently by filter that allow for or prohibit the tranmiion of data (packet) to the next filter or protocol level. Honeypot and Honeynet honeypot repreent fake computer ytem, etup a a "decoy", that are ued to 2

3 collect data on intruder. Thi "decoy" appear to contain operating ytem vulnerabilitie that make it an attractive target for hacker. While it appear vulnerable to attack, it actually prevent acce to valuable data, adminitrative control and other computer. Adminitrator can collect data on the identity, acce, and compromie method ued by the intruder. Honeynet are network, where all inbound and outbound data i analyzed and collected [5]. Unified Threat Management (UTM) complex olution for cyber threat protection including all neceary module. 4 Modelling the impact of a DoS-attack on the Traffic Control Centre of an urban Automobile Tranport Sytem through a firewall inertion Being a profeional imulation oftware iverbed Modeler i widely ued in ecurity and defene for modelling all network type and technologie (VoIP, TCP, OSPFv3, MPLS, IPv6) and analying network. It i uitable for teting and demontrating technology deign before production; increaing network &D productivity; developing proprietary wirele protocol and technologie; and evaluating enhancement to tandardbaed protocol [6]. For a comparion NetLogo i an open ource multiagent programmable modelling environment with a wide range of application in different area that make it very ueful for tudent. But it i not pecialized in computer network modelling and analyi like iverbed Modeler and Cico Packet Tracer. The imilarity between iverbed Modeler and Cico Packet Tracer i the poibility to imulate the complete network by connecting real type network device and component. The main advantage of iverbed Modeler compared to Cico Packet Tracer i the poibility for directly imulating the impact of cyberattack on different computer network. For thi reaon the author ha preferred iverbed Modeler Academic Edition 17.5 to make the part of thi reearch related to modelling the TCC and a cyberattack on it. The reearch can be continued uing the profeional traffic modelling oftware Aimun 8. after a logical aumption that the erver or ervice top reponding to client requet a a reult of the imulated DoS-attack and thi affect the Traffic Signal Control Sytem. In thi paper the focu i on trengthening the protection through a firewall inertion in order to reduce the probability of infection and repectively traffic change under the impact of a DoS-atack to be prevented. Diturbance in normal ignalling of traffic light are oberved after the erver ha topped working due to the communication between the erver and the ignal controller of the traffic light [7]. Uing reliable protection in TCC hould help to upport the normal traffic flow without increaing time delay and mean queue oberved under the impact of ucceful cyberattack. The reearch of Prof. J. Alex Halderman from the Univerity of Michigan in the field of computer ecurity can be ued in upport of the claim about the coure and conequence of cyberattack on an urban ATS. In thi tudy, the team led by Prof. Halderman conclude that the vulnerabilitie they dicovered in the infratructure are not a fault of any one device or deign choice, but rather how a ytemic lack of ecurity concioune, which i expreed in: unencrypted radio ignal; ue uername and paword by default; a debug port that i eay to be attacked; uing an older verion of the intalled oftware [8]. The author reference model (M ef ) of TCC ha a typical network configuration including 3 worktation, 3 erver and a witch connected in a linear bu network. It ha been developed in iverbed Modeler Academic Edition 17.5 uing built-in protection imulated by pecific etting. The model i ubjected to the impact of a DoS-attack that caue uch an intenive traffic (flooding) that the proceing of the requet i impeded [9]. The author ha choen to work with a firewall type ethernet2_lip8_firewall_adv, which i a pecially programmed router. A creenhot of the model i hown in Fig. 3. Fig. 3. The model of TCC with a firewall inertion under the impact of a DoS-attack. The duration of thi imulation i 3 and i divided into ix equal interval of 5. Table 1 contain imulation reult from 1 cenario. In the current reearch, the method ued for verification of the model i baed on the reaction time that repreent а time interval between the beginning of an action and beginning of the correponding repone. The reearch i made for 1 conecutive cenario. Thi method ha been preferred by the author, becaue it demontrate one of the great advantage of imulation modelling. It provide an opportunity the reearch to be done entirely in a virtual environment in order to ave financial reource for realization in a phyical environment uing a hardware prototype. Therefore, the imulation reult can be accepted a ufficiently reliable and at thi tage it i not required to be compared with reult of other analogou tudie. The comparative diagram in Figure 4, 5 and 6 how in which econd of running the imulation are regitered peak level of T S and T, repectively with built-in protection and a firewall. The dark blue chart how T without a firewall, while the red one how T with a firewall. The green chart how T S without a firewall, while the light blue one how T S with a firewall. 3

4 , T Table 1. Peak level of traffic ent (TS, max) and traffic received (T, max), depending on the inter arrival time (T) for the model under the impact of a DoS-attack repectively without and with a firewall ,7 6,7 3, ,7 6,7 3,4,5 1 13,5 13,5 3,4,25 16,5 13,5 13,5 6,7,2 16,8 13,5 2 1, ,5 16,4 6,4,1 33, , , ,5 34,5, Fig. 4. ТS = f (T) and T = f (T) at Т = 2., Fig. 5. ТS = f (T) and T = f (T) at Т =,2., , Fig. 6. ТS = f (T) and T = f (T) at Т =,2.,, Table 2, 3 and 4 contain the ummary reult of all three chart and how in which time interval in econd are regitered peak level of T S and T a function of the elected three value of the inter arrival time T, repectively without and with a firewall. Table 2. Peak level of traffic ent (TS, max) and traffic received (T, max) at T = 2. [1; 5] 3,3 3,4 [5; 1] 3,3 3,3 6,7 [1; 15] 3,3 6,7 3,4 [15; 2] 6,7 3,3 6,7 3,4 [2; 25] 1 6,7 3,4 [25; 3] 6,7 3,3 Table 3. Peak level of traffic ent (TS, max) and traffic received (T, max) at T =,2. [1; 5] 3 3 3,4 [5; 1] 13,5 6,7 13,4 3,4 [1; 15] 13, [15; 2] 13,5 13,5 13,4 6,7 [2; 25] 13,5 6,7 2 3,4 [25; 3] 16,7 1 13,4 3,4 Table 4. Peak level of traffic ent (TS, max) and traffic received (T, max) at T =,2. [1; 5] [5; 1] [1; 15] [15; 2] [2; 25] [25; 3] Summary evaluation On the bai of the tabular and graphical reult the author ha come to the following concluion. When a firewall i ued the number of ent packet T S, max i generally lower than the number of packet ent when built-in protection by vulnerability etting are ued. Before the time interval [25; 3], when the number of ent packet i le than 8, a better filtration of the packet ent i oberved due to the firewall inertion a compared with the cae of uing only built-in device protection. In the lat time interval, when the number of ent packet exceed 8, there i a aturation which may be due to a limitation of the ued type of a firewall. 4

5 It i alo neceary to etablih whether the packet themelve repreent a threat or not. In cae that certain packet threaten the ytem i neceary to improve the elected firewall model by replacing it with another model, or by integrating it with other mean of protection. In addition, when a firewall i ued the cae of flooding are reduced to only one in the lat time interval from all ten cenario, while without the inerted mean of enhanced protection the flooding tart in the time interval [2; 25] and it deepen in the lat time interval [25; 3]. Thi mean that a ytem denial can be oberved in at leat two of all 1 cenario. If thi hould be preented with the probability of an advere event, then when a firewall i ued, thi probability i equal to 1 %, but it i at leat twice a much if there i not a firewall inertion. ecommendation to enhance the protection ued One of the reliable olution for analyzing the received packet are Intruion Detection Sytem (IDS), which evaluate each packet and ae whether it i a hazard or not. If a packet i defined a a ource of a cyber threat, the ytem decide whether to ignore it completely, log it to be analyzed by the adminitrator or immediately alert that uch a packet ha infiltrated the network. The IDS can be placed in different location in the network, a well a in the firewall itelf. The advantage of placing it in the firewall i that many of the upiciou packet will be blocked at the entrance and potential cyber threat will be prevented. Beide, IDS control the firewall. An IP addre of the network controller that monitor the traffic hould not be et when configuring IDS to prevent a potential attacker from detecting the device. The aim i for the IDS enor to be protected from network can and attack that it i trying to find. In thi cae the diadvantage i that the removal of the IP addre caue problem for adminitrator to manage the proce. The olution i to ue two network interface, one of which i configured without IP and work a a enor, and the other one i connected to a eparate local area network that collect information and manage IDS device [1]. meaurement in a phyical environment. In the preent cae, uch tudy i not intended becaue the aim i to emphaize the advantage of imulation modelling itelf. eference 1. Y. Ivanova, Military Journal, Sofia, 4, (215). 2. S. Jajodia, S. Noel, B. O Berry, Managing Cyber Threat: Iue, Approache and Challenge, Kluwer Academic Publiher, (25). 3. G. Weidman, No Starch Pre Inc., San Francico, 2-6 (214). 4. E. Stoilov, Department of Informatic at NBU, Sofia, (21). 5. SANS Intitute. Honey Pot and Honey Net - Security through Deception, 1-5 (23). 6. iverbed Technology, iverbed Modeler: A Suite of Protocol and Technologie with a Sophiticated Development Environment, San Francico (217). 7. Y. Ivanova, IJITS, iue 3, vol. 9, (217). 8. Y. Ivanova, IJITS, iue 2, vol. 9, (217). 9. B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek. & A. J. Halderman, Green Light Forever: Analyzing the Security of Traffic Infratructure, Proceeding of the 8th USENIX Workhop on Offenive Technologie (WOOT 14) (214). 1. E. Stoilov, Department of Informatic at NBU, Sofia, (211). 5 Concluion Thi reearch i an example of applying imulation modelling for olving problem related to cyberecurity of critical tranport infratructure. There are poibilitie for the tudy to be extended in order to improve the method and mean of protection uing the imulation reult. It ha been demontrated that the negative impact of a cyber attack on the TCC can be reduced by uing appropriate protection, but the wide variety of exiting cyber threat require that the mean of protection are contantly teted, updated and improved. The demontrated method prove that the ue of a imulation environment i a very effective way to achieve that aim. One of the direction in which the reearch can be expanded i an additional verification baed on the margin of error by comparing the imulation reult with 5

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO

Integration of Digital Test Tools to the Internet-Based Environment MOSCITO Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according

More information

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder

Computer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal

More information

ETSI TS V ( )

ETSI TS V ( ) TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Application of Social Relation Graphs for Early Detection of Transient Spammers

Application of Social Relation Graphs for Early Detection of Transient Spammers Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department

More information

A Basic Prototype for Enterprise Level Project Management

A Basic Prototype for Enterprise Level Project Management A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces

Aalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding

More information

SCHEDULE DOCUMENT CONNECT MPLS SERVICES PUBLIC NODE4 LIMITED 17/07/2017

SCHEDULE DOCUMENT CONNECT MPLS SERVICES PUBLIC NODE4 LIMITED 17/07/2017 SCHEDULE DOCUMENT CONNECT MPLS SERVICES PUBLIC NODE4 LIMITED 17/07/017 SCHEDULE DOCUMENT CONNECT MPLS SERVICES Additional term, Service Decription & Service Level Agreement for ConnectMPLS Service 1. SERVICE

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Policy-based Injection of Private Traffic into a Public SDN Testbed

Policy-based Injection of Private Traffic into a Public SDN Testbed Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation

Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compensation Analytical Redundancy and Fuzzy Inference in AUV Fault Detection and Compenation A. J. Healey Profeor and Director Center for AUV Reearch Naval Potgraduate School Monterey, CA 93953 healey@me.np.navy.mil

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM

PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM PERFORMANCE EVALUATION OF TRANSMISSION DISTANCE AND BIT RATES IN INTER-SATELLITE OPTICAL WIRELESS COMMUNICATION SYSTEM Rohni Joy 1, Ami Lavingia 2, Prof. Kruti Lavingia 3 1 Electronic and Communication

More information

Ethernet Peer-To-Peer Communication With Model 353 And Procidia i pac Controllers

Ethernet Peer-To-Peer Communication With Model 353 And Procidia i pac Controllers iemen Energy & utomation pplication ata Ethernet Peer-To-Peer Communication With odel 353 nd Procidia ipac Controller 353-113 Rev. 1 July Ethernet i a leading form of network communication that i often

More information

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index

New DSP to measure acoustic efficiency of road barriers. Part 2: Sound Insulation Index New DSP to meaure acoutic efficiency of road barrier. Part 2: Sound Inulation Index LAMBERTO TRONCHIN 1, KRISTIAN FABBRI 1, JELENA VASILJEVIC 2 1 DIENCA CIARM, Univerity of Bologna, Italy 2 Univerity of

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

Design of a Stewart Platform for General Machining Using Magnetic Bearings

Design of a Stewart Platform for General Machining Using Magnetic Bearings eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

DWH Performance Tuning For Better Reporting

DWH Performance Tuning For Better Reporting DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service

Chapter 7 Packet-Switching Networks. Chapter 7 Packet-Switching Networks. Packet Switching. Network Layer. Network Service Chapter 7 Packet-Switching etwork etwork Operation & Topology Datagram and Virtual Circuit Structure of a Packet Switch Routing in Packet etwork Shortet Path Routing etwork Chapter 7 Packet-Switching etwork

More information

The development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit

The development of the South African ehealth Strategy assessed against the recommendations of the WHO/ITU ehealth Strategy Toolkit The development of the South African ehealth Strategy aeed againt the recommendation of the WHO/ITU ehealth Strategy Toolkit Roemary Foter PhD a,b a ehealth Strategy and Policy Diviion, Medical Reearch

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology

A Study of a Variable Compression Ratio and Displacement Mechanism Using Design of Experiments Methodology A Study of a Variable Compreion Ratio and Diplacement Mechanim Uing Deign of Experiment Methodology Shugang Jiang, Michael H. Smith, Maanobu Takekohi Abtract Due to the ever increaing requirement for engine

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview

Through the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique

More information

Frequency Table Computation on Dataflow Architecture

Frequency Table Computation on Dataflow Architecture Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity

More information

Hardware-Based IPS for Embedded Systems

Hardware-Based IPS for Embedded Systems Hardware-Baed IPS for Embedded Sytem Tomoaki SATO, C&C Sytem Center, Hiroaki Univerity Hiroaki 036-8561 Japan Shuya IMARUOKA and Maa-aki FUKASE Graduate School of Science and Technology, Hiroaki Univerity

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images

On combining Learning Vector Quantization and the Bayesian classifiers for natural textured images On combining Learning Vector Quantization and the Bayeian claifier for natural textured image María Guiarro Dept. Ingeniería del Software e Inteligencia Artificial Facultad Informática Univeridad Complutene

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL

A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE CONSTITUTED WITH MACHINING PROCESS BY MATERIAL REMOVAL International Journal of Mechanical and Production Engineering Reearch and Development (IJMPERD) ISSN 49-689 Vol. 3, Iue, Mar 3, 4-5 TJPRC Pvt. Ltd. A NEW APPROACH IN MEASURING OF THE ROUGHNESS FOR SURFACE

More information

Finite Elements Method in Split Hopkinson Pressure Bar developing process

Finite Elements Method in Split Hopkinson Pressure Bar developing process 6th WSEAS International Conference on SYSTEM SCIENCE and SIMULATION in ENGINEERING, Venice, Italy, November 1-3, 007 63 Finite Element Method in Split Hopkinon Preure Bar developing proce ROTARIU ADRIAN

More information

ANALYSIS OF PILE DRIVING IN VERTICAL AND HORIZONTAL DIRECTIONS USING A HYBRID MODEL

ANALYSIS OF PILE DRIVING IN VERTICAL AND HORIZONTAL DIRECTIONS USING A HYBRID MODEL ANALYSIS OF PILE DRIVING IN VERTICAL AND HORIZONTAL DIRECTIONS USING A HYBRID MODEL TATSUNORI MATSUMOTO i) PASTSAKORN KITIYODOM ii) EIJI KOJIMA iii) HIROMICHI KUMAGAI iv) SATOSHI NISHIMOTO v) and KOUICHI

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1

(12) Patent Application Publication (10) Pub. No.: US 2002/ A1 (19) United State US 2002O129111A1 (12) Patent Application Publication (10) Pub. No.: US 2002/0129111A1 Cooper (43) Pub. Date: (54) FILTERING UNSOLICITED EMAIL (76) Inventor: Gerald M. Cooper, Gretna,

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Toward Software Defined Smart Home

Toward Software Defined Smart Home Green Communication and Computing Network Toward Software Defined Smart Home Ke Xu, Xiaoliang Wang, Wei Wei, Houbing Song, and Bo ao In recent year, the mart home field ha caught wide attention and witneed

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

The Performance Evaluation of Qos in Wireless Personal Area Network (WPAN) on Impact of Bluetooth Worms

The Performance Evaluation of Qos in Wireless Personal Area Network (WPAN) on Impact of Bluetooth Worms Journal of Wirele Networking and Communication 2012, 2(5): 111-116 DOI: 10.5923/j.jwnc.20120205.05 The Performance Evaluation of Qo in Wirele Peronal Area Network (WPAN) on Impact of Bluetooth Worm M.

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Digifort Standard. Architecture

Digifort Standard. Architecture Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog

More information

ESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010

ESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010 ESRP Stor Program EMC Celerra NX4 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion. Teted Date: 6/25/21 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-91

More information

ML85C. Data Sheet. Press fit monitoring module. Special features. Block. diagram PLC. B en

ML85C. Data Sheet. Press fit monitoring module. Special features. Block. diagram PLC. B en ML85C Pre fit monitoring module Special feature Data Sheet Meaurement and evaluation ytem for force/diplacement coure in fitting procee Graphical repreentation of the procee with zoom function Immediate

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

A QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming

A QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming A QoS-aware Service Compoition Approach baed on Semantic Annotation and Integer Programming I. INTRODUCTION Service Oriented Architecture (SOA) i a widely adopted paradigm for developing ditributed application

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

ESRP Storage Program EMC VNXe3100 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010

ESRP Storage Program EMC VNXe3100 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010 ESRP Stor Program EMC VNXe31 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion 3. Teted Date: 4/25/211 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-913

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Course Project: Adders, Subtractors, and Multipliers a

Course Project: Adders, Subtractors, and Multipliers a In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject

More information