Surveillance coverage of sensor networks under a random mobility strategy
|
|
- Sara Thornton
- 8 years ago
- Views:
Transcription
1 µ Surveillane overage o sensor networks under a random moility strategy eorge Kesidis & CS Depts, Penn State University University Park, PA, USA kesidis@engrpsuedu Takis Konstantopoulos C Dept, University o Texas Austin, TX, USA takis@eeutexasedu Shashi Phoha ARL, Penn State University University Park, PA, USA sxp26@psuedu Astrat "$ %&$ &( $$ " &$,$ 0&1$$" 23$ 4 $56872&$ 93$ %%:<5&= % (&?@ "< % 0 A($ = 5& $ 3 B C $D &=% &$ %%: <% 3 H% 3 6I2 K PQ$$ R5& S3$% T:<5&= $UV$W Q $W$XDK F<%"$ Q " %%Z [% \ =NO%A3=H% \K % [`& $ M@ :" a6lm :NMQ&$ A %3 <$ K& ḦH%$ 3 5 & $ K<@ X68 $& d e@ %V$("@&$% R %3 <$ K2& U$" O% 4:NM6 INTRODUCTION Sensor network appliations range rom passive surveillane (searh to simultaneous traking o multiple targets and distriuted identiiation o their oordinated movement The targets will have speii spaetime neighorhoods (rom stationary pointtargets to large, rapidly moving ones xample targets range rom individual humans roaming through a rowd to platoons o tanks in a desert war theatre to point explosions to ativation sites o hemial or iologial weapons A wide variety o sensors ould also e used inluding image (video, 3dimensional, inrared, omnidiretional, aousti mirophones, seismi or radiation meters, 72g2W7 Wg27 and h The sensor nodes themselves ould e ixed (to, eg, monitor an airport or power plant or ould orm a moile expeditionary sensor grid Sensor nodes may have limited amounts o availale energy stored in atteries whih may require energy eiient routing and ommuniation medium aess ontrol The environment in whih the sensors and their targets operate ould range rom land (desert, jungle, mountains, sea and air Furthermore, environmental onditions ould inlude high levels o noise, low levels o amient light, loud over and other olusions, and enemy ativity that an ompromise target searh and traking and network ommuniation Individual sensors may need to oordinate in a distriuted ashion to maintain ommuniation onnetivity [8, 13, 5, i5jxkmlonxpq:nrqs5prtukwvas5nxw%xmymzq<z {}2~rkmqqZwq:ymnrq z 5s5ymt:q:z ƒ q:nq<s5prtuk p 5ˆq:tZ~n [q:ymtz}(š@x ƒ Œas5ymzs5zm Oloylonr~rq<prq:zW{}2~kmq p `} ƒxq:nq<s5ptk Ž Ot:q Š ƒxž Œ xmymzmq:p a? ƒx vxs5pzw m X ` <š Vœ Z u Z Bœ[ [œ5žm y} [Ÿmloymlo [yn mymzmloym [n< s5ymz t: [ymt: oxmnrlo [ymn [p prq:t< [ O Oq:ymzms~lo [ymnxqz Ÿmpq:nnrq:zloy~rkmlon Ÿmxm{m olot<s~rlo [ys5prq ~km [nrq 5w~kmq s5x~km [prn s5ymzwzm ym 5~ ymq:t:q:nns5plo }pqz =q:tz~~rkmq loqzvn 5w~rkmq ƒ [px~rkmq ƒxž` j kq =pn~s5x~km [p< nxpq:nq<s5ptkwvxs5n nxmÿÿ$ [p~q:zloyÿ=s5p~ {}W A [ps5y~ Bj ƒa Vœ[ < [ [ [ª2s5ymz nrq<t: [ymzs5x~k [p nxpq:nq<s5prtukwvxs5n nrxmÿmÿ [pr~rq:zloyÿ=s5pr~ {} A Vš[š[œ[ 5žš[ 1, target ontat, and surveillane overage to prespeiied degrees o onidene These are oten onliting goals requiring asi tradeos The ous o this paper is to study target detetion perormane or a sensor network under random moility This paper is organized as ollows We irst deine notation or our susequent prolem ormulation and give a rie overview o moility strategies in targetsearh mode Deterministi and random searh strategies are ompared Next, we desried the prolem o detetion o slowly moving (point targets in two and three dimensional environments, again under a random moility mehanism or the sensor grid For a twodimensional planar environment, we give a ound on the tail o the distriution o timeuntildetetion o a point target A more preise alulation is given or a threedimensional environment Our prolem ormulation allows us to onsider a large numer o sensors operating in a large region Finally, design issues pertaining to the single parameter o moility, the variane «a, are disussed TART SARCH STRATIS Consider a ontiguous region in the plane xtensions to threedimensions (undersea, air or spae environments are straightorward Let e the numer o moile sensors in that orm the nodes o our network The position o the ah node is assumed node at time is denoted y ² to have a maximum 5&$" <" %@& = At time, the total <"$ %@& =$ &$$ o the the intersetion o the set ²% with the region Here, ² [ V» ¾½ ÀK FÂ8»ÄÅ nodes is denotes a losed disk o radius and enter» The distane etween two points» \ is the ulidean distane»uâ X$ÈÇ ÉPÊ V» Ê Â8 Ê We assume in the ollowing that the maximum overage area (maximum assuming no overlapping disks is signiiantly less than the area o Thus, 3$%T: o the nodes is neessary to maintain surveillane overage o the whole region to some degree o onidene as desried elow
2 »» Â ½ Let e the mean density o nodes in the given region, ie, or i is random The ojetive o surveillane is to gather inormation aout ertain target ojets that move through the region These ojets exist in a soalled timespae neighorhood haraterized y a timevarying untion or times in some inite interval o (ontinuous time where takes values in the susets o For onveniene o notation, we an ` deine or In the ollowing, we simply assume that i [ Ê ² [ then sensor node ojet at time Certain targets may e :5&=% & in the sense that, or a ixed and» <, or all times where is the enter (ground zero o, or example, an explosion and is its duration An expanding ojet s detetion region grows as a untion o time, eg, a iologial weapon» < < whose agents diuse through the air ie, or some inreasing untion o Finally, a single 3=H ojet ould e haraterized y a (one dimensional K&= in,» or as well as a radius 2, ie, V» < We oviously assume that no sensor node is &$ aware o any suh attriutes o a target ojet In [7, a data usion ramework or sensor data is given and, in partiular, a mehanism is desried or estimation o ojet veloity involving a triangulation etween two nodes sensing the ojet Prolems in surveillane overage Moility strategies have two modes o operation depending on the presene (data aquisition, target traking or asene (searh o a [ target ojet(s In searh mode, moility strategies an e roughly lassiied into two groups: random and deterministi In deterministi strategies, region ould e partitioned a priori into piees and $3 a sensor node assigned to eah piee that eomes the area o the node The node sweeps its home area in, eg, a deterministi zigzag pattern o a lawnmower, searhing or targets Under random searh strategies, eah node moves at random or diuses" through Random moility an e made somewhat more eiient y adopting strategies wherein nodes loally repel" eah other and are then less likely to visit areas very reently visited Alternatively, proximal nodes an dynamially elet a luster head" whih remains ative while the other proximal nodes sleep" to onserve energy and redue ommuniation ongestion in the luster neighorhood [15, 4, 12 Clearly, hyrid and hierarhial moility patterns ould also e devised, eg, a oarser partition o in whih eah element o the partition has more than one node and eah node employs a random sweep pattern within its (now larger and shared home area In dataaquisition mode, the irst node to sense an ojet ould e deemed the oordinator" or that ojet and the alarm to the rest o the network Certain nodes would then deterministially drit toward the target In the ollowing, we ous on sensor networks only in searh mode Roustness o moility strategies A sensor node may ail eause o eletromehanial prolems, unoreseen ostrutions or hazards (inluding traps plaed y the enemy, exhaustion o its power supply, or y overt enemy ativity leading to destrution or apturinghijaking o the node When a node ails in the deterministi moility setting, the remaining nodes need to quikly eome aware o the ailure (note that this assumption would require a nontrivial intrusion detetion system An advantage o random moility strategies is that they require minimal oordination (ommuniation overhead espeially when a node ails and experiene graeul degradation in surveillane overage in that event On the other hand, random moility strategies will, in general, have poorer target detetion perormane Sensor networks with unontrolled random moility Reently, networks o extremely small sensors have een proposed, in partiular the smart dust" projet [9, 10 In suh networks, ontrol o sensor moility may highly limited y energy supply and environmental onditions, an example o the latter eing turulent air For suh networks, moility may e impliitly random, ie, moility may e modeled with diusion dynamis together with a drit imparted at the time o deployment POINT TART DTCTION UNDR BROWNIAN MOVMNT Consider an aritrary point in or, representing a stationary point target, taken to e the origin and taken to ome into existene at time zero (oth without loss o generality sine our sensor moility models are spatial and temporal translation invariant In this setion, we study the distriution o time required y a sensor grid, under a Brownian moility strategy, to detet the ojet Our prolem ormulation allows us to onsider a large numer o sensors operating in a large region d We assume the initial positions o the sensors 5Å" are distriuted as a Poisson point proess with intensity nodesm or nodesm (depending on whether the network is two or threedimensional Reall, at this point, L`H % & $ the notion o a [14 It is onstruted y drawing iid opies o some random set (eg, a disk or a all that are known as $5& and y translating eah opy at the point o a Poisson proess these points are known as $ A and are taken to e independent o the grains LM=NO &$ 2L`H % & % Below we model the network as a (BBM wherey the nodes exeute independent Brownian (, motions,, & The assumption o iid node displaements means that the sensor positions orm a Poisson proess or all [6
3 k The threedimensional environment In this setion, eah stohasti proess is a 3dimensional Brownian motion with independent Cartesian oordinates and variane oeiient «(measured in m s Without loss o generality, suppose that a target is loated at the origin Let = e the all o radius (the surveillane radius entered at the origin At eah point o time, the area that an e monitored y the sensor network is represented y the set ( where : < denotes Minkowski addition o two sets ½ ÀÄ Thus, at eah, the random set ( W Å = is a Boolean model We are interested in the time required or the target detetion: Deine We have 3ä½ " FÀ 3( m [Å or all Now note that, or eah, is itsel a Boolean model Indeed, we may take as enters (or germs the initial Poisson points, and as sets around them (or grains iid opies o the set $ %m& < [ ie, a all arried around y the trajetory o a % % Brownian motion etween and that is a soalled Wiener sausage Hene, is atually the volume ration o the Boolean model with Wiener sausage grains [14: ( d e : $ r where is the target hitting time o a single grain Clearly, y Fuini s theorem, $ <,021 ½» [Å d» Note that» V» :8H U ÀW»Â À3»Â À3T» =««&  << d» < À»U %mm %mp < P =«< m &0 where is a standard Brownian motion (variane 1 with Letting <"= = denote the irst hitting time o the all y a standard Brownian motion started at», we thereore have Hene, $»?4@6 < < = < = Now onsider again the Bessel proess C or a standard Brownian motion started at» It is known ` that C is a onedimensional diusion with C»F d3% ½ QÀ Ä Å Deine <IH C and note that sine there is isotropy (rotational invariane, the hitting time depends on the initial position only through its magnitude, ie, <I= or all» suh that QÈ» Thus, $ r < F K The random variale < H MA < H We see that ON P MA < H ALB Hene we may take «< H ALB 2 d»»d < H d $ has a wellknown distriution [2: Q H$R S XWX e[z$â Q H$R HUT LV MA < H \ S K " d % «, to alleviate notation, and in the end replae y «X With this in mind, and using the expression aove, we have $ r < d `a H((Â8 Â8 ehixâ Ç Ude d d V A The irst integral is learly, the volume o the all = For the seond È integral we use Fuini and a hange o variales (setting Â3» to get that the seond integral equals g ((Â8= R ADh ((Â8 H e  g i d d R A h»v»d H e:âo» m g»9i d d R A$j d Let» e :ÂO» m
4 j R  k» g e the density o, where is a standard normal distriuted random variale Thus, m»»@ H e:âo» m d» A»V»D 1 ½» U 0 1 ½,0 1 ½ Åm&0 Colleting the alulations together, we get $ < g Å R A» Å d» 1 ½ a A Åm m Now reall that the atual variane is «(hene replae y «X in the last expression and inally sustitute in the expression m to get: e  «This is a distriution with a Weiulltype tail The twodimensional environment In a twodimensional (planar environment, the expression or the distriution o the hitting time < given in (3 aove is not availale We an, however, use the Cherno upper ound: (O < H < H OÂ8 e  " where the expression or ex ½ < H ex «< H is given as a ratio o modiied Bessel untions in 201, p 297, o [2 This lower ound ould then e sustituted into (2 to otain a lower ound on $$ and thus otain an upper ound on the tail o the target detetion time distriution (1 Random moility design A design ojetive here ould e as ollows: Suppose that a point target is required to e deteted within a prespeiied time with an error proaility less than R, where is a positive numer Our design variale is the variane «o the node moility When is very small, the target detetion goal an e : ahieved i we hoose «X roughly larger than «[Å d This is ound y solving a quadrati inequality and taking asymptotis when eomes small We omit the details o the omputation We next ompute the expetation o the target hitting time as ollows First rewrite ( R RT P with the ovious hoie o the onstants The integration d an e perormed to give O % A V» where is the tail o the standard normal distriution untion Using the inequality V» R = ounds an e otained Finally, y sustituting the values o the onstants, we otain an exat expression: R  R «This is a rapidly dereasing untion o A, (exponential deay SUMMAR We onsidered the prolem o surveillane o a potentially large region undertaken y a potentially large group o moile sensors Under a random moility strategy or the sensor grid, the distriution o the ontat time etween two nodes and the distriution o the timeuntildetetion o slowly moving (point targets were studied Both two and three dimensional environments were onsidered Finally, design issues pertaining to the single parameter o moility, the variane «a, were disussed RFRNCS [1 Bettstetter, C On the minimum node degree and H $6 onnetivity o a wireless multihop network " $$&%, Lausanne, Switzerland, une 2002 W& KH$,? [2 Borodin, AN and Salminen, P LM=NO &$ $$ ( & [ &$ $("&$ Birkhäuser, Boston, 1996 [3 Canny Complexity o Root Motion Planning MIT Press, Camridge, MA, une 1988 [4 C Chevally, R Van Dyk and TA Hall, Selorganization or Wireless Sensor Networks In 6,, Prineton, Marh 2002 [5 Dowell, L and Bruno, ML Connetivity o random graphs in moile sensor networks: validation o Monte 6" 72L " Carlo simulation results, Berlin, 2000 [6 Frey, A and Shmidt, V Marked point proesses in the plane I 6 <V A& K 2 &$r6, 65110, 1998 [7 Friedlander, D and Phoha, S Semanti inormation usion or oordinated signal proessing in moile
5 h,z Ẍ66 2$ V$3&$ sensor networks `$3"% 26 Speial issue on sensor networks,, August 2002 [8 upta, P and Kumar, PR Critial power onnetivity 5& : & <@D in wireless networks In: `$ $D%W3 &=% ẌD& KU &=$ KÀ $"3 % $ M$ 6 6 3, WM Mneany, in, and Q Zhang (eds Birkhäuser, Boston, , 1998 [9 Kahn, M, Katz, RH and Pister, KS Moile H $6", $ ` 3" &$ :NM$,H% networking or smart dust In `$ :6$, Seattle, 1999 [10 Kahn, M, Katz, RH and Pister, KS merging Challenges: moile networking or smart dust $ " & &=% & :NM$,H,Z 6, Vol 2, No 3, 2000 [11 Kesidis, R Rao and S Phoha, "Moility management o adho sensor networks using distriuted annealing", CS Dept, Penn State University, Tehnial Report, CS 03017, Sept 29, 2003 [12 Krishnamahari, B, Wiker, SB, and Bejar, R Phase transition phenomena in wireless ad ho networks 6, 3 %" $ H d 2 :Ǹ,D :" $ \NOT, % L %, San Antonio, TX, Novemer 2001 [13 Q Li, R Peterson, M DeRosa, and D Rus Reative Behavior in Selreoniguring Sensor Networks in 6" % L, %, Atlanta, 2002 [14 Santi, P, Blough, DM, and Vainstein, F A proailisti analysis or the range assignment 6" $ % prolem in ad ho networks, Long Beah, CA, 2001 [15 Stoyan, D, Kendall, WS, and Meke, Q?& K,u522%@ & $ 6 5& : Wiley, New ork, 1996 [16 L Suramanian and RH Katz An arhiteture or 6, uilding selonigurale systems In $$H, 2000
ECONOMICS OF SECURITY PATCH MANAGEMENT
ECONOMCS OF SECURTY PATCH MANAGEMENT Huseyin Cavusoglu * Hasan Cavusoglu Jun Zhang AB Freeman Shool o Business, Tulane University 7 MAlister Drive, New Orleans, LA 70118, USA Sauder Shool o Business, The
More informationFOOD FOR THOUGHT Topical Insights from our Subject Matter Experts
FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene
More information5.2 The Master Theorem
170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended
More informationChannel Assignment Strategies for Cellular Phone Systems
Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious
More informationComputer Networks Framing
Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial
More informationWireless Networking Guide 2007 www.lexmark.com
Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the
More informationAutomated Test Generation from Vulnerability Signatures
Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu
More information) ( )( ) ( ) ( )( ) ( ) ( ) (1)
OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples
More informationREDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION
C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -
More informationEfficient Mobile Asset Tracking and Localization in ZigBee Wireless Network
Journal of Advanes in Computer Networks, Vol. 3, No., Marh 05 Effiient Moile Asset Traking and Loalization in ZigBee Wireless Network R. Mardeni, Senior Memer, IACSIT, and Shaifull Nizam Othman offer a
More informationChapter 1 Microeconomics of Consumer Theory
Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some
More information10.1 The Lorentz force law
Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been
More informationPerformance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19
More informationImpedance Method for Leak Detection in Zigzag Pipelines
10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria
More informationA DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD
International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,
More informationChapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112
More informationTHE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES
Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess
More informationgloser og kommentarer til Macbeth ( sidetal henviser til "Illustrated Shakespeare") GS 96
side 1! " # $ % &! " '! ( $ ) *! " & +! '!, $ #! "! - % " "! &. / 0 1 & +! '! ' & ( ' 2 ) % $ 2 3 % # 2! &. 2! ' 2! '! $ $! " 2! $ ( ' 4! " 3 & % / ( / ( ' 5! * ( 2 & )! 2 5! 2 &! # '! " & +! '! ' & &!
More informationTrade Information, Not Spectrum: A Novel TV White Space Information Market Model
Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,
More informationUNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE
UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers
More informationThe Price of Uncertainty in Security Games
The Prie of Unertainty in Seurity Games Tehnial Report Jens Grossklags a Benjamin Johnson iolas Christin a Shool of Information University of California, Berkeley Berkeley, CA 947 jensg@ishool.erkeley.edu
More informationSebastián Bravo López
Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that
More informationCapacity at Unsignalized Two-Stage Priority Intersections
Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways
More informationBypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State
More informationKnown: long, aluminum cylinder acts as an extended surface.
Prolem : A long, irular aluminium rod attahed at one end to the heated all and transers heat through onvetion to a old luid. (a) I the diameter o the rod is triples, y ho muh ould the rate o heat removal
More informationMATE: MPLS Adaptive Traffic Engineering
MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,
More informationIntegrating Parallel File I/O and Database Support for High-Performance Scientific Data Management
In Pro of SC: High Performane Networking and Computing, Novemer Integrating Parallel File I/O and Dataase Support for High-Performane Sientifi Data Management Jaehun No Rajeev Thakur Alok Choudhary Math
More informationBehavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona
More informationUser s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities
File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationThe analysis of brushing tool characteristics
ARCHIVES OF CIVIL AND MECHANICAL ENGINEERING Vol. IV 004 No. 4 The analysis of rushing tool harateristis Kiele University of Tehnology, al. Tysiąleia P. P. 7, 5-34 Kiele In this paper, an analytial proedure
More informationarxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA
LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory
More information1.3 Complex Numbers; Quadratic Equations in the Complex Number System*
04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x
More informationIntelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds
Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.
More informationWeighting Methods in Survey Sampling
Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter
More informationSuggested Answers, Problem Set 5 Health Economics
Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all
More informationTS150 Visible (exposed) fixing with screws on a timber sub-frame
TS150 Visile (exposed) fixing with srews on a timer su-frame This system offers a ost effetive solution for installing Trespa Meteon panels in a large variety of panel dimensions. Trespa Meteon panels
More informationProgramming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html
CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.
More informationEarthquake Loss for Reinforced Concrete Building Structures Before and After Fire damage
Earthquake Loss for Reinfored Conrete Building Strutures Before and After Fire damage Pai-Mei LIU, Yi-Hsuan Tu and Maw-Shyong SHEU 3 ABSTRACT The purpose of this paper is to propose a rational analytial
More informationJournal of Engineering Science and Technology Review 6 (5) (2013) 143-148. Research Article
Jestr Journal o Engineering Siene and Tehnology Review 6 (5) (13) 143-148 Researh Artile JOURNAL OF Engineering Siene and Tehnology Review www.jestr.org Numerial Analyses on Seismi Behaviour o Conrete-illed
More informationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401
IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,
More informationIncome Protection CLAIM FORM
Inome Protetion CLAIM FORM PLEASE COMPLETE THIS APPLICATION IN BLACK PEN ONLY USING BLOCK LETTERS 1 PERSONAL DETAILS Poliy numer Important notes: a This form must e ompleted in full and returned to PO
More informationPlanning Approximations to the average length of vehicle routing problems with time window constraints
Planning Aroximations to the average length of vehile routing rolems with time window onstraints Miguel Andres Figliozzi ABSTRACT This aer studies aroximations to the average length of Vehile Routing Prolems
More informationDSP-I DSP-I DSP-I DSP-I
DSP-I DSP-I DSP-I DSP-I Digital Signal Proessing I (8-79) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:
More informationcos t sin t sin t cos t
Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the
More informationHow To Fator
CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems
More informationAsymmetric Error Correction and Flash-Memory Rewriting using Polar Codes
1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes
More informationState of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts
State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions
More informationRecovering Articulated Motion with a Hierarchical Factorization Method
Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu
More informationAUDITING COST OVERRUN CLAIMS *
AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing
More informationthe machine and check the components
Quik Setup Guide Start Here MFC-7860DW Please read the Safety and Legal ooklet first efore you set up your mahine. Then, please read this Quik Setup Guide for the orret setup and installation. To view
More informationFixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb
Fixed-inome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates
More informationA Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T
9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth
More informationSupply chain coordination; A Game Theory approach
aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université
More information3 Game Theory: Basic Concepts
3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and
More informationIn order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method
BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight
More informationIs the trailing-stop strategy always good for stock trading?
Is the trailing-stop strategy always good or stock trading? Zhe George Zhang, Yu Benjamin Fu December 27, 2011 Abstract This paper characterizes the trailing-stop strategy or stock trading and provides
More informationSoftware Reliability Measuring using Modified Maximum Likelihood Estimation and SPC
Software Reliaility Measuring using Modified Maximum Likelihood Estimation and SPC Dr. R Satya Prasad Associate Prof, Dept. of CSE Acharya Nagarjuna University Guntur, INDIA K Ramchand H Rao Dept. of CSE
More informationSOFTWARE ENGINEERING I
SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation
More informationHierarchical Clustering and Sampling Techniques for Network Monitoring
S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are
More informationWORKFLOW CONTROL-FLOW PATTERNS A Revised View
WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au
More informationUsing Live Chat in your Call Centre
Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now
More informationHEAT CONDUCTION. q A q T
HEAT CONDUCTION When a temperature gradient eist in a material, heat flows from the high temperature region to the low temperature region. The heat transfer mehanism is referred to as ondution and the
More informationMeasurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines
Measurement of Powder Flow Properties that relate to Gravity Flow ehaviour through Industrial Proessing Lines A typial industrial powder proessing line will inlude several storage vessels (e.g. bins, bunkers,
More informationStrategic Plan. Achieving our 2020 vision. Faculty of Health Sciences
Strategi Plan Ahieving our 00 vision Faulty of Health Sienes Our Values guide our ations Health and Understanding, promoting, and influening the holisti well-eing of self and others Our Vision To e a national
More informationHybrid linear programming to estimate CAP impacts of flatter rates and environmental top-ups
AUA Working Paper Series No. 2010-?? September 2010 Hybrid linear programming to estimate CAP impats o latter rates and environmental top-ups The ase o arable ropping in Kopais plain, Greee Stelios Rozakis
More informationAn Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism
An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.
More informationDiscovering Trends in Large Datasets Using Neural Networks
Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge
More informationThe Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits
The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread
More informationPattern Recognition Techniques in Microarray Data Analysis
Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu
More informationInstructions BEFORE Cataract Surgery
Instrutions BEFORE Catarat Surgery Your Surgery is at the Surgery Center of Southern Illinois: Loated at: 806 N. Treas, Marion, Ill. 618-993-2113 The surgery enter will all you prior to your surgery and
More informationA Context-Aware Preference Database System
J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia
More informationFIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero
FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University
More informationProcurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.
Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats
More informationNeural network-based Load Balancing and Reactive Power Control by Static VAR Compensator
nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti
More informationMarker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System
Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae
More informationA Holistic Method for Selecting Web Services in Design of Composite Applications
A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,
More informationImproved SOM-Based High-Dimensional Data Visualization Algorithm
Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang
More informationCIS570 Lecture 4 Introduction to Data-flow Analysis 3
Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to
More informationA novel active mass damper for vibration control of bridges
IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural
More informationAUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS
AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis
More informationOptimal Base Station Density for Power Efficiency in Cellular Networks
Optimal Base Station Density for Power Efficiency in Cellular Networks Sanglap Sarkar, Radha Krishna Ganti Dept. of Electrical Engineering Indian Institute of Technology Chennai, 636, India Email:{ee11s53,
More informationOpen and Extensible Business Process Simulator
UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,
More informationModeling and analyzing interference signal in a complex electromagnetic environment
Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong
More informationJEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia
A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty
More informationBandwidth Allocation and Session Scheduling using SIP
JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat
More information' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF
' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations
More informationModelling and Simulation of Closed Loop Controlled Buck Converter Fed Pmbldc Drive System
Researh Journal of Applied Sienes, Engineering and Tehnology 3(4): 284-289, 2011 ISSN: 2040-7467 Maxwell Sientifi Organization, 2011 Reeived: Feruary 14, 2011 Aepted: Marh 15, 2011 Pulished: April 20,
More informationExplanatory Examples on Indian Seismic Code IS 1893 (Part I)
Doument No. :: IITK-GSDMA-EQ1-V.0 inal Report :: A - Earthquake Codes IITK-GSDMA Projet on Building Codes Explanatory Examples on Indian Seismi Code IS 1893 (Part I) by Dr. Sudhir K Jain Department of
More informationHOW TO CALCULATE PRESSURE ANYWHERE IN A PUMP SYSTEM? Jacques Chaurette p. eng. www.lightmypump.com April 2003
HOW TO CALCULATE PRESSURE ANYWHERE IN A PUMP SYSTEM? Jaques Chaurette p. en. www.lihtmypump.om April 003 Synopsis Calulatin the total head of the pump is not the only task of the pump system desiner. Often
More informationProfessional Certificate Training in Business Writing
Professional Certifiate Training in Business Writing About Training in Business Writing ZeebraCross Centre for Management Exellene (ZCME) is an initiative of ZeebraCross (Unit of InfousRx Marketing and
More informationOn Some Mathematics for Visualizing High Dimensional Data
On Some Mathematis for Visualizing High Dimensional Data Edward J. Wegman Jeffrey L. Solka Center for Computational Statistis George Mason University Fairfax, VA 22030 This paper is dediated to Professor
More informationStatic Fairness Criteria in Telecommunications
Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi
More informationActuarial Present Values of Annuities under Stochastic Interest Rate
Int. Journal of Math. Analysis, Vol. 7, 03, no. 59, 93-99 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ijma.03.3033 Actuarial Present Values of Annuities under Stochastic Interest Rate Zhao Xia
More informationA Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks
1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat
More informationCHAPTER J DESIGN OF CONNECTIONS
J-1 CHAPTER J DESIGN OF CONNECTIONS INTRODUCTION Chapter J of the addresses the design and heking of onnetions. The hapter s primary fous is the design of welded and bolted onnetions. Design requirements
More informationRelativity in the Global Positioning System
Relativity in the Global Positioning System Neil Ashby Department of Physis,UCB 390 University of Colorado, Boulder, CO 80309-00390 NIST Affiliate Email: ashby@boulder.nist.gov July 0, 006 AAPT workshop
More informationAngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction
AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros
More informationOptimal Allocation of Filters against DDoS Attacks
Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:
More informationA Robust Optimization Approach to Dynamic Pricing and Inventory Control with no Backorders
A Robust Optimization Approah to Dynami Priing and Inventory Control with no Bakorders Elodie Adida and Georgia Perakis July 24 revised July 25 Abstrat In this paper, we present a robust optimization formulation
More information