Modelling of Conflict Controlled Networks

Size: px
Start display at page:

Download "Modelling of Conflict Controlled Networks"

Transcription

1 Oleksii Ignaenko 4, Glushkov Avenue, CSP 368, Kyiv 187, Ukraine ABSTRACT Game heoreical echniques have recenly become prevalen in many engineering applicaions, noably in communicaions. While developing an informaion nework managemen sysem ofen encounered a siuaion where one should deal wih malicious inrusion aemps aimed a obsrucing he rouing policy work. In his case, mehods of neworks managemen based on fluid models and a discree conrolled random walk model requires cerain changes. In his work we propose an approach based on conflic conrol poin of view ha could be useful for modeling of aacking acions and response behaviour of he sysem. 1. INTRODUCTION Today nework models are relaed o very differen areas informaion neworks, elecommunicaions, gas ransporaion and energy sysems, disribued producion processes. Complex neworks are everywhere. Unprecedened developing of informaion neworks (especially he Inerne gives example of dynamic inerconneced sysem. And his sysem is sill much less complex hen biological organisms or sociey of agens. For example, degree and mode of conneciviy in passive agens can combine o form images resembling crysals or snowflakes. The main focus wihin our own bodies is far more uiliarian. Endocrine, immune, and vascular sysems adjus chemical reacions o mainain equilibrium in he face of ongoing aacks from disease and die. In biology his is called homeosasis. In regulaion of a nework i is called conrol. So, here is need for mehods o model neworks in order o capure essenial srucure, dynamics, and uncerainy. Based on hese models one could explore ways o visualize nework behaviour so ha effecive conrol echniques can be synhesized and evaluaed. According o [1], modelling for he purposes of conrol and he developmen of conrol echniques for ruly complex neworks has become a major research aciviy over he pas wo decades. Informaion nework applicaions are especially imporan because hey inerfere wih almos all sides of human aciviy. As a resul, securiy and reliabiliy of informaion flows direcly affec he qualiy of service, efficiency and overall economic developmen of enire indusries. Reliable working of he informaion neworks has become vial for our day-o-day ransacions for he mos organizaions. Tha s why he Inerne becomes an aracive arge for cyber crime. Financially moivaed, he crime we see oday becomes more disribued, sophisicaed and dangerous. A few years ago aackers widely use remoely exploiing servers idenified by scanning he Inerne for vulnerable nework services. Significan facs of such scanning aacks were compuer worms such as Code Red and SQL Slammer. Their huge scale hreaens working of whole he Inerne a risk; for example, SQL Slammer generaed raffic sufficien o mel down backbones. Consequenly, academia and indusry developed effecive ways o forify he nework perimeer agains such aacks. Unforunaely, adversaries similarly changed acics moving away from noisy scanning o more sealhy aacks. No only did hey change heir acics, bu also heir moivaion. Previously, large-scale aacks were mosly expression of echnical superioriy. Now, cyber criminal are moivaed by economic benefis. They ry o no only exploi and seize conrol of compromised sysems for as long as possible bu o urn heir asses ino revenue. RTO-MP-MSG

2 Repor Documenaion Page Form Approved OMB No Public reporing burden for he collecion of informaion is esimaed o average 1 hour per response, including he ime for reviewing insrucions, searching exising daa sources, gahering and mainaining he daa needed, and compleing and reviewing he collecion of informaion. Send commens regarding his burden esimae or any oher aspec of his collecion of informaion, including suggesions for reducing his burden, o Washingon Headquarers Services, Direcorae for Informaion Operaions and Repors, 115 Jefferson Davis Highway, Suie 14, Arlingon VA -43. Respondens should be aware ha nowihsanding any oher provision of law, no person shall be subjec o a penaly for failing o comply wih a collecion of informaion if i does no display a currenly valid OMB conrol number. 1. REPORT DATE OCT 9. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Modelling of Conflic Conrolled Neworks 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 4, Glushkov Avenue, CSP 368, Kyiv 187, Ukraine 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 1. SPONSOR/MONITOR S ACRONYM(S) 1. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, disribuion unlimied 11. SPONSOR/MONITOR S REPORT NUMBER(S) 13. SUPPLEMENTARY NOTES See also ADA RTO-MP-MSG-69 Curren Uses of M&S Covering Suppor o Operaions, Human Behaviour Represenaion, Irregular Warfare, Defence agains Terrorism and Coaliion Tacical Force Inegraion (Uilisaion acuelle M&S couvran le souien aux operaions, la represenaion du comporemen humain, la guerre asymerique, la defense conre le errorisme e l inegraion d une force acique de coaliion). Proceedings of he NATO RTO Modelling and Simulaion Group Symposium held in Brussels, Belgium on 15 and 16 Ocober 9., The original documen conains color images. 14. ABSTRACT Game heoreical echniques have recenly become prevalen in many engineering applicaions, noably in communicaions. While developing an informaion nework managemen sysem ofen encounered a siuaion where one should deal wih malicious inrusion aemps aimed a obsrucing he rouing policy work. In his case, mehods of neworks managemen based on fluid models and a discree conrolled random walk model requires cerain changes. In his work we propose an approach based on conflic conrol poin of view ha could be useful for modeling of aacking acions and response behaviour of he sysem. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 1 19a. NAME OF RESPONSIBLE PERSON Sandard Form 98 (Rev. 8-98) Prescribed by ANSI Sd Z39-18

3 The Web offers hem a powerful infrasrucure o compromise compuer sysems. Aackers achieve his by employing he Web o serve malicious Web conen capable of compromising users compuers and running special code on hem. This has been enabled due o he increased complexiy of Web browsers and he resuling vulnerabiliies ha come wih complex sofware. For example, a modern Web browser provides a powerful compuing plaform wih access o differen scriping languages, (for example, Javascrip as well as exernal plugins ha may no follow he same securiy policies applied by he browser (for example, Flash, Java). While hese capabiliies enable sophisicaed Web applicaions, hey also allow aackers o collec informaion abou he arge sysem and deliver explois specifically ailored o a user s compuer. Web aacks render perimeer defences ha disallow incoming connecions useless agains exploiaion as hackers use he browser o iniiae ou-bound connecions o download aack payloads. This ype of raffic looks almos idenical o he users normal browsing raffic and is no usually blocked by nework firewalls. Tha s why compuer and nework securiy nowadays has become a major prioriy for boh nework design and implemenaion. Nework engineers use simulaion ools o help hem undersand and develop complex sysem. I is an effecive ool o save ime and money during developmen and implemenaion. To be able o simulae complex sysems, modeling is a necessary foundaion. Wihou an accurae model of he sysem or process here will be no successful simulaion. Simulaion depends on verified and validaed models. Modeling and Simulaion (M&S) ools are become sandard procedure oday before building compuer neworks o save ime and money. M&S ools become more and more widespread o differen areas in compuer sciences as well as oher fields for represening simulaion of realiy. Is i possible wih help from M&S o simulae compuer/nework securiy mechanism such as firewalls, Virual Privae Nework (VPN), key disribuion, and wha are he consequences of a simulae compuer nework aack? If i works, wha is possible o simulae wih M&S ools? The possible opposie case could be; is i possible a all o simulae compuer nework aacks and compuer/nework securiy on a compuer oday wih an M&S ool? An ideal scenario for M&S ool would be if i could be used o model and simulae differen compuer nework aack mehods which es compuer and nework securiy. A nework engineer could predefine his/her compuer nework in advance in a simulaion ool such as OPNET before building he compuer nework in realiy o see wha will happen o he nework and/or nework nodes if he nework is aacked wih differen kind of aack echniques. The nework engineer would hen have a virual model of he nework inside of he simulaion ool and press a buon o see wha happens when he aack srikes. The simulaed nework will have nework nodes such as worksaions (wih differen kinds of services and Operaing Sysems (OS) such as; Windows, UNIX, and Mac OS), swiches, rouers, firewalls, Inrusion Deecion Sysem (IDS), and servers and oher ypes of producs you will find in a ypical compuer nework. The differen simulaed compuer nework aacks would be used as a predicion ool o see wha happen when aacks occurs on he nework and how good he securiy is in he simulaed nework. Which nodes in he compuer nework will be aacked and affeced of he aack? Will he whole nework go down because a sraegically node goes down? The fundamenal quesion of issue is; is i possible o use M&S for modeling and simulaion of compuer/nework securiy and compuer nework aacks. Nework aacks are pure conflic siuaion, so we should urn our aenion o heory of conflic beween players. Game heoreical echniques have recenly become prevalen in many engineering applicaions, noably in communicaions. Wih he emergence of cooperaion as a new communicaion paradigm, and he need for self-organizing, decenralized, and auonomic neworks, i has become imperaive o seek suiable game heoreical ools ha allow o analyze and o sudy he behavior and ineracions of he nodes in fuure communicaion neworks RTO-MP-MSG-69

4 In general, game heory can be divided ino wo branches: non-cooperaive and cooperaive game heory. Non-cooperaive game heory sudies he sraegic choices resuling from he ineracions among compeing players, where each player chooses is sraegy independenly for improving is own performance (uiliy) or reducing is losses (coss). In his conex, nework denial of service aacks could be considered as a cones beween wo players (aacker and defense sysem) a game or a conflic conrolled sysem.. CYBER CRIME. DENIAL OF SERVICE ATTACKS The Inerne (originally known as ARPANET) was firs creaed in 1969 as a research nework sponsored by he Advanced Research Projecs Agency (ARPA) of he Deparmen of Defense (DoD) in he Unied Saes of America. The original aim was o provide an open nework for researchers o share heir research resources. Therefore, openness and growh of he nework were he design prioriies while securiy issues less of a concern. The occurrence of he Morris Worm in 1988 marked he firs major compuer securiy inciden on he Inerne. However, he world was no so dependen on he Inerne as i is now. The Inerne was sill limied o research and educaional communiies unil he lae 199s. Hence, no much aenion was paid o Inerne securiy. In he las decade, he phenomenal growh and success of he Inerne is changing is radiional role. The Inerne is no longer jus a ool for he researchers. I has become he main infrasrucure of he global informaion sociey. Governmens use he Inerne o provide informaion o he ciizens and he world a large, and hey will increasingly use he Inerne o provide governmen services. Companies share and exchange informaion wih heir divisions, suppliers, parners and cusomers efficienly and seamlessly. Research and educaional insiues depend more on he Inerne as a plaform for collaboraion and as a medium for disseminaing heir research discoveries rapidly. Unforunaely, wih he growh of he Inerne, he aacks o he Inerne have also increased incredibly fas. According o CERT [], a cener of Inerne securiy experise locaed in he U.S., he number of repored Inerne securiy incidens has jumped from 6 in 1988 o 8,94 in, and he esimaed number of Inerne securiy incidens in 3 is 153,14. The growh in he number of incidens repored beween 1998 o 3 is shown in Figure 1. Figure 1: Number of Inerne securiy incidens More imporanly, radiional operaions in essenial services, such as banking, ransporaion, power, medicine, and defense are being progressively replaced by cheaper, more efficien Inerne-based applicaions. Hisorically, an aack o a naion's criical services involves acions ha need o cross a physical boundary. These acions can be inerceped and prevened by a naion's securiy services. However, he global conneciviy of he Inerne renders physical boundaries meaningless. Inerne based aacks can be launched anywhere in he world, and unforunaely no Inerne based services are immune from hese aacks. Therefore, he reliabiliy and securiy of he Inerne no only benefis on-line businesses, bu is also an issue for naional securiy. RTO-MP-MSG

5 A DoS aack is a malicious aemp by a single person or a group of people o disrup an online service. DoS aacks can be launched agains boh services, e.g., a web server, and neworks, e.g., he nework connecion o a server. The impac of DoS aacks can vary from minor inconvenience o users of a websie, o serious financial losses for companies ha rely on heir on-line availabiliy o do business. On February 9,, Yahoo, ebay, Amazon.com, E*Trade, ZDne, Buy.com, he FBI, and several oher Web sies fell vicim o DoS aacks resuling in subsanial damage and inconvenience [3]. As emergency and essenial services become relian on he Inerne as par of heir communicaion infrasrucure, he consequences of DoS aacks could even become life-hreaening. Hence, i is crucial o deer, or oherwise minimize, he damage caused by DoS aacks. In general, a denial of service (DoS) aack is any aack which makes an on-line service (e.g., Web Service) unavailable. The aack could involve a single packe (e.g., he \land" aack ) exploiing sofware bugs in a server, or a raffic sream wih a remendous number of packes ha conges he arge's server or nework. We define a bandwidh aack as any aack ha consumes a arge's resources hrough a massive raffic volume. In his hesis, we focus on bandwidh aacks, and henceforh we mean bandwidh aack when we refer o denial of service aacks unless oherwise saed. The disribued denial of service (DDoS) aack is a bandwidh aack whose aack raffic comes from muliple sources. To launch a DDoS aack, an aacker usually compromises many insecure compuers conneced o he Inerne firs. Then a DDoS aack is launched from hese compromised compuers. The reflecor aack is an aack where innocen hird-paries (reflecors) are used o bounce aack raffic from he aacker o he arge. A reflecor can be any nework device ha responds o any incoming packe, for example, a web server. The aacker can make he aack raffic highly disribued by using many reflecors. The reflecor aack is a ype of DDoS aack. Currenly we have numerous DoS aack ypes. Each aack use some special exploi of Inerne proocols or sofware weaknesses. For example, his aacks could be launched direcly overwhelming by large packes (UDP, ICMP flood), using reflecors (Smurf, Fraggle), sending oo long packes (Ping of Deah), wrong packes (Land). Recenly one can see progress in his field new aack ypes cause damage o compuer sysems. Novel ype of aack, wih a low average rae, explois he ransiens of a sysem s dynamic behavior. The low-rae aacks inroduce significan inefficiencies ha remendously reduce sysem capaciy or service qualiy. In he lieraure, his kind of nework assaul is called shrew aack or Reducion of Qualiy (RoQ) aack. Various aacks has special characerisic. In work [4] we propose following parameer se. (Fig.): Aack ype. Securiy expers segregae DoS aacks ino wo caegories: disribued (aack from many sources) and non-disribued (aack from one compuer). Aack direcion. Aack direcions divided on nework resources and arge resources. Aack scheme. Generally speaking, aack scheme can be direc (direc sending of malicious raffic), reflecor (raffic reflecs from oher compuers) or hidden (malicious raffic hidden in legal). Aack mehod. Mehod defines vulnerabiliy ha used during aack. Targeed aack uses vulnerabiliy of sofware, services, and proocols. The primary goal of a consumpion aack is o consume all possible available resources (usually nework resources) o shu down a sysem. Exploiive aacks arge bugs in operaing sysems RTO-MP-MSG-69

6 Figure : Nework Sysem 3. CONFLICT CONTROLLED NETWORKS. MODELLING AND SIMULATIONS Nework models are used o describe power grids, cellular elecommunicaions sysems, large scale manufacuring processes, compuer sysems, and even sysems of elevaors in large office buildings. Alhough he applicaions are diverse, here are many common goals (such ha, sabiliy, performance, robusness and flexibiliy). Alhough complexiy of he physical sysem is boh inimidaing and unavoidable in ypical neworks, for he purposes of conrol design i is frequenly possible o consruc models of reduced complexiy ha lead o effecive conrol soluions for he physical sysem of ineres. These idealized models also serve o enhance inuiion regarding nework behavior. Neworks considered here consis of finie se of nodes, each conaining finie se of buffers. Packes arrive from ouside he nework o various buffers. One or more servers process packes a a given node, afer which a packe eiher leaves he nework or visis anoher node (Fig. 3). ( v( k Buffers q 1 ( q ( ) Server u ( ) 1 u ( ) Figure 3: Nework node RTO-MP-MSG

7 A general fluid model can be described by he differenial equaion q Aq ( Bu( Cv(, (1) n where q ( is he n-dimensional vecor of queue process, ( : R R denoes he packe arrival rae, u ( - he rouing policy, v ( - aack policy. Marix A represens an inner nework consrucion, marix B - rouing process and C describes aack process. The conrolled differenial equaion (1) can be viewed as a sae space model, as frequenly used in conrol applicaions, wih conrols u (, v ( and independen funcion (. We consider model (1) as a saring poin o invesigae conflic problem of ineracion beween a rouing policy and an aacker. If a successful design is obained, we could generalize his soluion on he case of Markov processes [1, 5]. The problem of finding of conrol u ( can be described as follows. We choose a conrol funcion u ( in purpose of minimizing vecor q ( under several special condiions (e.g. for minimal ime) and any possible funcions v (, (. Le us fix some funcion u (, hen soluion of (1) can be found using following formula: q( e A( ) q( ) e A( ) Bu( d ) e A( ) Cv( ) d e A( ) ( ) d (). If we assume, ha A, B I, C and (, () could be rewriing as: q( q( ) u(. (3) This is well-known single server queue fluid model. The single server queue is a useful model for a dynamic invesigaion of very differen sysems. Now we inroduce an exension of he fluid model [1] in he case of conflic process [6]. Le us consider dynamic sysem defined for an iniial condiion q( ( q1 (, q( ) R by he sysem of linear equaions: q ( k q ( u ( ), 1( 1 q v( u ( ),. (5) ( Phase sae is described by he phase vecor q( ( q1 (, q( ) R, where q 1 ( R is he queue lengh a max ime. The queue lengh is subjec o he linear phase consrain q ( q for all. Parameer q ( R is associaed wih he aacker player which rying o overwhelm our nework (or maximize q 1( in oher words) using conrol parameer v (, v (, v (. By choosing v ( a ime aacker ses aack power ( q ( ) ) which is subjec o he linear phase consrain q( for all. Parameer q ( influences on queue q 1( wih a coefficien k. The oher player defender has a conrol vecor u( ( u1(, u( ). He divides his conrol resources beween wo direcions: u 1( - for service of he arrived packes, u ( ) - for couneracion of he aacker aciviy. Conrol parameer u ( is 1 ) RTO-MP-MSG-69

8 subjec of following consrains u (, u (, u u ( ), for all. 1 1( Suppose ha defender has informaion abou (, v ( and q ( a ime. Funcion describe packes arrival service a ime. Suppose he following assumpions hold: ( ) : R R n ( ) max for all ; ( - coninuous funcion. ( ) d in This model is sabilizable if sraegy gives by following formula v for iniial posiion such ha q ( ) q max ( max ) max in. Time opimal u( ( u1(,), where, q( u (., q( To solve (1) we should find an admissible sraegy u (, q(, v( ) and momen of ime T such ha q ( for all T. We denoe his sraegy u(, q(, v( ) as he soluion of game (5). Noe ha his resul mus be achieved over all an admissible funcions v (. Le us wrie equaions (5) in sandard form. Denoe k A, hen ( u1( q ( Aq( (6). v( u( Conrol ses are respecively U { u R : u1 u } and V { vr : v1 max, v }. We solve his problem using he idea of he firs direc mehod of Ponryagin [7, 8]. k ( q()) Theorem. Consider he conflic conrolled sysem (6). If v and q1( ) in q can consruc he soluion u ( and momen of ime T, such ha q ( for T. (for proof see [9]) max 1, hen we Simulaions Le us illusrae obained resul on he example. Consider he model (5). This model was implemened in discree even nework simulaion framework OMNeT++. OMNeT++ is an objec-oriened modular discree even nework simulaion framework. I has a generic archiecure, so i can be (and has been) used in various problem domains: modeling of wired and wireless communicaion neworks proocol modeling RTO-MP-MSG

9 modeling of queuing neworks modeling of muliprocessors and oher disribued hardware sysems validaing of hardware archiecures evaluaing performance aspecs of complex sofware sysems and in general, i can be used for he modeling and simulaion of any sysem where he discree even approach is suiable, and which can be convenienly mapped ino eniies communicaing by exchanging messages. OMNeT++ iself is no a simulaor of anyhing concree, bu i raher provides infrasrucure and ools for wriing simulaions. One of he fundamenal ingrediens of his infrasrucure is a componen archiecure for simulaion models. Models are assembled from reusable componens ermed modules. Well-wrien modules are ruly reusable, and can be combined in various ways like LEGO blocks. Modules can be conneced wih each oher via gaes (oher sysems would call hem pors), and combined o form compound modules. Modules communicae hrough message passing, where messages may carry arbirary daa srucures. Modules can may messages along predefined pahs via gaes and connecions, or direcly o heir desinaion; he laer is useful for wireless simulaions, for example. Modules may have parameers, which can be used o cusomize module behaviour, and/or o parameerize he model s opology. Graphical, animaing user inerfaces are highly useful for demonsraion and debugging purposes (Figure 4.). Figure 4: Nework Sysem OMNe++ has he queue simulaion library. This library includes modules for communicaion neworks modeling. The model (5) was developed using sandard and new modules (Figure 5.). I consiss of users, aacking source, several queues wih shared resource, classifier, rouer and sink nodes. Users send packes o a rouer. Rouer performs disribuion among queues for processing. Queues use par of resource for working (if resource no available queue wai some ime). Then packes go o DaaProcessing node and lef sysem RTO-MP-MSG-69

10 Aack source node ry o disrup working. Aacker sars he flooding aack by sending idenical packes o rouer. Defense sysem makes filraion and drop ou fixed percen of all flooding packes. Figure 5: Model of nework Graph of packes delay rae shown on Figure 6. Figure 6: Sysem dynamic 4. SUMMARY To make rapid advances in cyber securiy defense, we mus improve he sae of he ar in evaluaion of nework securiy mechanisms. Evaluaion is currenly impeded by lack of scienific rigor, lack of relevan and represenaive nework daa, inadequae models of defense mechanisms, and inadequae models of he nework and boh he background and aack raffic daa [1]. Numerous feaures mus sill be implemened, verified, and validaed before a serious aemp can be made for simulaing compuer and nework securiy in M&S fashion. Verified and validaed models of nework raffic and aack raffic mus be conduced o be able o make accurae simulaion of a real even. Differen aack models mus be fabricaed for verificaion and validaion before hey can be used for aack simulaion. Very imporan issue is a heoreical background of aack models. The mos naural approach for dealing wih hese inerconneced neworks sysems is heory of conflic conrolled processes or game heory. Game heory provides a formal analyical framework wih a se of mahemaical ools o sudy he complex ineracions among raional players. Throughou he pas decades, game heory has made revoluionary impac on a large number of disciplines ranging from engineering, economics, poliical science, philosophy, or even psychology. In recen years, here has been a significan growh in research aciviies ha use game heory for analyzing communicaion neworks. RTO-MP-MSG

11 This is mainly due o: he need for developing auonomous, disribued, and flexible mobile neworks where he nework devices can make independen and raional sraegic decisions; he need for low complexiy disribued algorihms ha can efficienly represen compeiive or collaboraive scenarios beween nework eniies. In his work we proposed model of nework sysem wih conflic based on he differenial game heory background. This approach could be useful for modeling of aacking acions and response behaviour of he sysem. The model was developed and simulaed using environmen OMNe++. Simulaions resuls presened on graphs. [1] S. Meyn, Conrol Techniques for Complex Neworks, Cambridge Universiy Press, 7. [] CERT/CC Saisics, URL hp:// [3] L. Garber. Denial-of-service aacks rip he Inerne". IEEE Compuer 33(4), 1-17 (). [4] O. Ignaenko, P. Andon. Couneracion o denial of service aacks in Inerne: approach concep // Problems of programming, -3, 8, P [5] D. Bersekas, Nework opimizaion: coninuous and discree models, Ahena Scienific, Belmond, [6] A.A. Chikrii, Conflic-conrolled Processes, Kluwer Academic Publisher, Boson-London- Dordrech, [7] M.S. Nikolskii, L.S. Ponryagin's Firs Direc Mehod in Differenial Games, Izda. Gos. Univ., Moscow, [8] L.S. Ponryagin, Seleced Scienific Papers, Vol., Nauka, Moscow, [9] O. Ignaenko Conflic modeling of single server queue wih inegral consrains // PMCCS: The Inernaional Workshop on Performabiliy Modeling of Compuer and Communicaion Sysems, Eger, Hungary, Sepember, 9. (acceped) [1] Deer/Deerlab based on emulab. A Laboraory for Securiy Research. Revived Mars 18, 5 a URL: hp:// RTO-MP-MSG-69

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

Overview of Anti-Terrorism Related Research Ongoing at the TNO Defence Research Organisation

Overview of Anti-Terrorism Related Research Ongoing at the TNO Defence Research Organisation UNCLASSIFIED/UNLIMITED Overview of Ani-Terrorism Relaed Research Ongoing a he TNO Defence Research Organisaion J.C.A.M. van Doormaal (M.Sc.) and Dr. L.H.J. Absil TNO Prins Mauris Laboraory Research Group

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help

More information

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,

More information

Web System for the Remote Control and Execution of an IEC Application

Web System for the Remote Control and Execution of an IEC Application Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

Video streaming over Vajda Tamás

Video streaming over Vajda Tamás Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate 20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

/85/ $ IEEE

/85/ $ IEEE 174 Saged Circui Swiching MAURICIO ARANGO, HUSSEIN BADR, AND DAVID GELERNTER Absrac -Saged circui swiching (S) is a message-swiching echnique ha combines a new proocol wih new communicaion hardware. Proocol

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

Let s get physical - EDA Tools for Mobility

Let s get physical - EDA Tools for Mobility Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened

More information

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages An HTTP Web Traffic Model Based on he Top One Million Visied Web Pages Rasin Pries, Zsol Magyari, Phuoc Tran-Gia Universiy of Würzburg, Insiue of Compuer Science, Germany Email: {pries,rangia}@informaik.uni-wuerzburg.de

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

FUZZY HUMAN/MACHINE RELIABILITY USING VHDL

FUZZY HUMAN/MACHINE RELIABILITY USING VHDL FUZZY HUMN/MCHINE RELIBILITY USING VHDL Carlos. Graciós M. 1, lejandro Díaz S. 2, Efrén Gorroiea H. 3 (1) Insiuo Tecnológico de Puebla v. Tecnológico 420. Col. Maravillas, C. P. 72220, Puebla, Pue. México

More information

Hyelim Oh. School of Computing, National University of Singapore, 13 Computing Drive, Singapore SINGAPORE

Hyelim Oh. School of Computing, National University of Singapore, 13 Computing Drive, Singapore SINGAPORE RESEARCH ARTICLE FREE VERSUS FOR-A-FEE: THE IMPACT OF A PAYWALL ON THE PATTERN AND EFFECTIVENESS OF WORD-OF-MOUTH VIA SOCIAL MEDIA Hyelim Oh School of Compuing, Naional Universiy of Singapore, 13 Compuing

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

A Survey on mobility Models & Its Applications

A Survey on mobility Models & Its Applications A Survey on mobiliy Models & Is Applicaions Prof. Vikas Kumar Jain 1, Prof. Raju Sharma 2, Prof. Bhavana Gupa 3 1,2,3 Compuer Science & Engineering, CIST Absrac In his paper, we survey he curren scenario

More information

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker.

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker. Slide A Principled Approach o MILP Modeling John Hooer Carnegie Mellon Universiy Worshop on MIP Columbia Universiy, Augus 008 Proposal MILP modeling is an ar, bu i need no be unprincipled. Slide Proposal

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS Jun Peng Elecrical Engineering Deparmen, Universiy of Texas Rio Grande Valley, Edinburg, Texas, USA ABSTRACT Unmanned

More information

EVALUATING ACCURACY OF A TIME ESTIMATOR IN A PROJECT

EVALUATING ACCURACY OF A TIME ESTIMATOR IN A PROJECT EVALUATING ACCURACY OF A TIME ESTIMATOR IN A PROJECT Thanh-Lam Nguyen, Graduae Insiue of Mechanical and Precision Engineering Wei-Ju Hung, Deparmen of Indusrial Engineering and Managemen Ming-Hung Shu,

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

Discrete Event Systems. Lecture 14: Discrete Control. Continuous System. Discrete Event System. Discrete Control Systems.

Discrete Event Systems. Lecture 14: Discrete Control. Continuous System. Discrete Event System. Discrete Control Systems. Lecure 14: Discree Conrol Discree Even Sysems [Chaper: Sequenial Conrol + These Slides] Discree Even Sysems Sae Machine-Based Formalisms Saechars Grafce Laboraory 2 Peri Nes Implemenaion No covered in

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen

More information

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available

More information

A NEW APPROACH FOR 3D MODELS TRANSMISSION

A NEW APPROACH FOR 3D MODELS TRANSMISSION A NEW APPROACH FOR 3D MODELS TRANSMISSION A. Guarnieri a, F. Piroi a, M. Ponin a, A. Veore a a CIRGEO, Inerdep. Research Cener of Carography, Phoogrammery, Remoe Sensing and GIS Universiy of Padova, Agripolis

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng 3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions

More information

Evaluation and Improvement of Multicast Service in b

Evaluation and Improvement of Multicast Service in b Evaluaion and Improvemen of Mulicas Service in 802.11b Chrisian Bravo 1 and Agusín González 2 1 Universidad Federico Sana María, Deparmen of Elecronics. Valparaíso, Chile chbravo@elo.ufsm.cl 2 Universidad

More information

Using CANopen Slave Driver

Using CANopen Slave Driver CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..

More information

Delay in Packet Switched Networks

Delay in Packet Switched Networks 1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

Computer representations of piecewise

Computer representations of piecewise Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

Lecture 4. Programming with Message Passing: Applications and Performance

Lecture 4. Programming with Message Passing: Applications and Performance Lecure 4 Programming wih Message Passing: Applicaions and Performance Announcemens Quiz #1 in secion on 10/13 Miderm: evening of 10/30, 7:00 o 8:20 PM Wednesday s office hours sar a 1.30 (res of he quarer)

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15)

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15) IROS 2015 Workshop on On-line decision-making in muli-robo coordinaion () OPTIMIZATION-BASED COOPERATIVE MULTI-ROBOT TARGET TRACKING WITH REASONING ABOUT OCCLUSIONS KAROL HAUSMAN a,, GREGORY KAHN b, SACHIN

More information

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available.

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Provided by he auhor(s) and NUI Galway in accordance wih publisher policies. Please cie he published version when available. Tile Conneciviy soluions o link a blueooh camera o he inerne Auhor(s) Ionas,

More information

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game The Beer Dock 2002-08-13 17:55:44-0700 The Beer Dock: Three and a Half Implemenaions of he Beer Disribuion Game Michael J. Norh[1] and Charles M. Macal Argonne Naional Laboraory, Argonne, Illinois Absrac

More information

A Web Browsing Traffic Model for Simulation: Measurement and Analysis

A Web Browsing Traffic Model for Simulation: Measurement and Analysis A Web Browsing Traffic Model for Simulaion: Measuremen and Analysis Lourens O. Walers Daa Neworks Archiecure Group Universiy of Cape Town Privae Bag, Rondebosch, 7701 Tel: (021) 650 2663, Fax: (021) 689

More information

ECO-friendly Distributed Routing Protocol for Reducing Network Energy Consumption

ECO-friendly Distributed Routing Protocol for Reducing Network Energy Consumption ECO-friendly Disribued Rouing Proocol for Reducing Nework Energy Consumpion Daisuke Arai and Kiyohio Yoshihara KDDI R&D Laboraories Inc. 2-1-15 Ohara Fujimino-shi Saiama, Japan Email: {di-arai, yosshy}@kddilabs.jp

More information

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,

More information

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder, Jun Wang and Jie Shan Geomaics Engineering, School of Civil Engineering, Purdue Universiy 550 Sadium Mall Drive, Wes

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Trust-based Service Management of Mobile Devices in Ad Hoc Networks

Trust-based Service Management of Mobile Devices in Ad Hoc Networks Trus-based Service Managemen of Mobile Devices in Ad Hoc Neworks Yaing Wang, Ing-Ray Chen Virginia Tech Deparmen of Compuer Science Falls Church, VA, USA Email: {yaingw, irchen}@v.edu Jin-Hee Cho U.S.

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

ON THE 3D PARAMETRIC MODELING OF MANUFACTURING SYSTEMS UDC: ; ; 338.3;

ON THE 3D PARAMETRIC MODELING OF MANUFACTURING SYSTEMS UDC: ; ; 338.3; 3 rd 7 h June, 2013. year, Belgrade, Serbia. ON THE 3D PARAMETRIC MODEING OF MANUFACTURING SYSTEMS UDC: 519.876.5; 004.896; 338.3; Agahocles A. Krimpenis 1, Nikolaos A. Founas 2, George D. Noeas 3, Dimiris

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1 This is he auhor's version of an aricle ha has been published in his journal. Changes were made o his version by he publisher prior o publicaion. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX,

More information