Network traffic analysis optimization for signature-based intrusion detection systems

Size: px
Start display at page:

Download "Network traffic analysis optimization for signature-based intrusion detection systems"

Transcription

1 Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems lab at CMC MSU Abstract In ths paper we propose a method for sgnature matchng optmzaton n the feld of ntruson detecton and preventon. Sgnature matchng algorthm performance s one of the key factors n the overall qualty of the IDS/IPS, especally n hgh-speed networks. Optmzaton method proposed n ths paper reles on semantcs of the sgnature matchng task, typcal for such systems as Snort. The method mnmzes the number of patterns called by the detecton system for each network packet, reducng the tme of ts processng. Index Terms Securty, Intruson detecton, Networks, Snort. N I. INTRODUCTION ETWORK ntruson detecton and preventon systems (IDS/IPS), whch are qute common nowadays, mostly use sgnature-based method for attacks recognton. The dea of ths method s n comparson of real observed network traffc wth a set of known attack descrptons. The number of sgnatures n a typcal IDS database s usually several thousands (Snort system has about 7 thousand sgnatures [1]). A sngle sgnature can be magned as an ordered set of tests of network packet header and payload content values of some characterstc header felds, typcal textual substrngs, regular expressons, etc. Thus, straght testng of all the sgnatures set aganst a sngle network packet results n hundreds of thousands machne operatons. Ths s one of the key factors that hnder wde spreadng of those systems at hgh speed networks 1Gbt/s and beyond. Furthermore, there are 2 mportant trends, observed from the begnnng of computers and networks evoluton, called Moor s law and Glder s law. Moor s law reads that processor s throughput of a gven cost doubles every 2 years; Glder s law says that the network throughput trebles at the same perod. So, the network node s computatonal power growth s left behnd by the growth of volume of nformaton transferred through the network, whch contnuously make performance requrements of the securty systems algorthms to grow hgher as well, whch refers to IDSs too. Ths paper proposes a method for optmzed testng process of a gven sgnature set on a sngle packet. The basc model Manuscrpt receved March 31, D. S. Kazachkn s wth the Computatonal systems lab at CMC MSU, Moscow, Russa (e-mal: zok@lvk.cs.msu.su). D. U. Gamayunov s wth the Computatonal systems lab at CMC MSU, Moscow, Russa (e-mal: gamajun@lvk.cs.msu.su). for sgnature matchng, used s ths paper for evaluatng the optmzed method, s consecutve checkng of every sgnature untl the frst success (gettng true value), whch s n fact a brute-force search. Of course, modern IDSs do not use ths full search for sgnature matchng and most of them have some heurstcs for search space reducton (Snort optmzatons are shown below). The proposed method was mplemented for an expermental IDS, desgned at the Computatonal systems lab of Moscow State Unversty s Faculty of Computatonal Math and Cybernetcs [4], and Snort s sgnature base released at 2007 was used as an ntal pack of sgnatures. Implementng the optmzed sgnature matchng algorthm would be a hard task, for t mples alterng the Snort core engne. Yet, for expermental IDS ths method mplementaton s reduced to sgnature base translaton wthout meddlng n the IDS engne. Expermental IDS uses a specalzed behavor descrpton language called R-lang, whch use fnte automaton for descrbng network object behavor. A set of such descrptons, grouped by the object type (n our case network packets), s called module. R-lang language s based on deas of Eckmann s, Vgna s and Kemmerer s works and STATL language [5,6]. Implementaton of sgnatures matchng optmzaton method offers an optmzng translator from R-lang modules to R-lang modules, whch mnmze the total number of states and transtons n the module, and also the number of testng functons called for a sngle event. Evaluaton of the Snort s sgnature base wth optmzng translator revealed ts essental superfluty, that partally can be explaned by the fact, that ths base was formed by many ndependent developers, and seemngly some of them were usng automatc sgnature generators, based on attack samples. In the end of ths paper s shown how proposed sgnature matchng optmzaton has helped to reduce ths superfluty. II. SIGNATURE FORMAL DEFINITION Frst, we wll gve a formal sgnature defnton to use t afterwards. The object of analyss of a sgnature s a sngle network packet whch consst of header and packet payload. Header s a vector of some fxed felds H = {H 1,H 2,...,H n }, that belong to correspondng fnte spaces. Payload text lne P of unrestrcted length. Also, there s a varable vector C = {С 1,С 2,...,С k }, descrbng the sgnature-based analyzer nner state (so-called

2 state vector). Varables C also have a fnte value ranges. Header condton CondH (H) s a logcal predcate, whch takes header felds H as ts arguments. A sample of such condton s a testng of the equalty of source port (one of the header felds) to value 80. Payload condton s an array of functons: CondP ( s a logcal predcate, whch takes packet payload and state vector as ts arguments, Effects = {Effect,j (} each functon n ths set (for =1...k) represents the sde effect on varable С k, performed durng CondP ( checkng. It s sad that payload condton evaluates successfully, f CondP ( returns 1. At the same tme, all the varables b C vector smultaneously get the new values C' j =Effect,j (, based on payload text and ther old values. When consecutve payload condtons are evaluated, each of them feels sde effects from already evaluated condtons, and the result s ther complex superposton. Ths means there s no way of cachng condtons evaluaton result n a general case. A sample of such condton s a test of substrng presence n payload P between markers С 1 and С 2 wth a sde effect of movng left marker С 1 to the end of found substrng. Reacton s an element of some fnte set of event classes. Sgnature s a trplet <SH,SR>, where SH set of header condtons, SP ordered set of payload condtons, R reacton. Sgnature evaluaton result <SH,SR>,H,:, f all the header condtons return true and all the payload condtons successfully evaluate consecutve., else III. CONVERTED SIGNATURES Snort s sgnatures are qute strctly descrbed by suggested formal model. Let s examne Snort s sgnature structure and descrbe the way to buld a correspondng formal sgnature. Snort s sgnature conssts of 4 sectons: acton acton performed on rule actvaton (usually, alert ). Corresponds to reacton functon. ( msg: Panc alert tcp any:80 -> any:any (content: qwerty ; acton header optons nfo Fg. 1. Snort s sgnature structure. header context-ndependent condtons on packet header: protocol, IP addresses and ports (f defned by protocol) of source and destnaton, drecton. Corresponds to header condtons from the model. optons context-dependent condtons on packet payload. Conssts of dfferent tests of text, contaned n payload after a sngle movng marker. Marker s moved dependng on a condton type. Corresponds to payload condtons from the model. nfo rule nfo and message, generated at rule actvaton. Corresponds to reacton functon arguments. Let s defne vector H n the followng way: H 1 protocol type (TCP / UDP / ICMP / other IP), H 2 and H 3 IP and port of packet source, H 4 packet drecton (from server/to server), H 5 and H 6 IP and port of packet destnaton. Ports range s , IPs range s Regardng to so defned vector H, for any header feld a set of header condtons {CondH (H)} exsts, havng the same functonalty. Vector C s defned as a sngle-varable vector. C 1 current state of the text marker, after whch the pattern matchng takes place. Regardng to so defned vector C, for any optons chan a chan of payload condtons [<CondP(, Effect(>] exsts, havng the same functonalty, ncludng both return value and sde-effects. Reactons space, whch contan dfferent classes of events we can defne as a space of dfferent possble values of classtype feld, whch s representng class of detected attack. The reacton of each sgnature s the value of classtype feld. Ths defnton s correct, because for each sgnature reacton exsts and only one. IV. R-LANG LANGUAGE R-lang s the language used n expermental IDS. It descrbes the behavor of observed system wth a scenaro fnte automaton wth memory, each transton of whch s marked by type, condton and body of transton. There are 3 types of transtons consumng (smply performs a transton), non-consumng (creates automaton exact copy and perform a transton there), unwndng (destroys current automaton copy). Condton s a logcal expresson that should be true to perform transton. Body a program nstructon block, that executes durng the transton. In fact, automaton s an extenson of structure concept, because t can contan functons (methods of scenaro), and automaton s memory s а mplemented n form of nner varables (felds of scenaro), that are globally vsble n all the transtons. There s an mportant partcularty of R-lang language: there s totally no dynamc memory n t, so the framework s safe from troubles caused by scenaro errors. Also there are no global varable, vsble n all the scenaros, so for a lbrary functon, desgned as a functon that s external to scenaro, sde-effect can be performed only over ts drect arguments (structures are passed by reference). Functons, defned nsde scenaro can also perform sde-effects on ts felds, even f they are not passed as arguments. V. CONVERSION TO R-LANG A.Smple converson Structure smlarty of R-lang and STATL languages allows usng converson deas, descrbed by S.T. Eckmann n [2], the paper about translatng snort rules to STATL scenaros. Network sensor of expermental IDS provdes typfed events to scenaros on gettng every packet. Each event contans IP-addresses and ports of packet source and destnaton (IPSrc, PortSrc, IPDst and PortDst), ts drecton

3 (Drecton), and also ts drecton (Payload). Below s an algorthm of sgnature converson, wrtten n terms of formal model. The result s a R-lang scenaro. If protocol Pr (TC UD IP or ICMP) s granted by header condtons {CondH (H)} (vector H * ={Pr, IPSrc *, PortSrc *, Dr *, IPDst *, PortDst * } exsts and all the condtons return true value on t), then the sgnature has a correspondng scenaro, acceptng events of correspondng packet type. Each header condton has a correspondng logcal expresson n R-lang language, whch tests network event felds, correspondng to H vector elements. Ths expresson s a model of CondH (H) n R-lang. For example, correspondng code for CondH(H):(H 3 =80) s ev.tcpsrcport==80. Each payload condton s assgned to a logcal expresson n R-lang language, whch tests packet payload text P and condton vector C. Ths expresson returns a Boolean value, smulatng CondP (. Also durng ts evaluaton condton vector C can be modfed, smulatng Effect (. For example, CondP(: true, f packet payload contans substrng «qwerty» after the marker C 1, EffectP 1 ( moves C 1 to the end of found substrng. The code correspondng to payload condton <Cond EffectP> s a call content( qwerty, C, ev.payload), where content external functon, modelng the descrbed functonalty, ncludng sdeeffect on passed-by-reference vector C. Each reacton s assgned to an alert sendng code, whch sends to IDS a message, contanng found attack classfcaton. Here s the scheme of sgnature evaluaton performng scenaro n R-lang: scenaro sc(<event correspondng to packet type> ev) { <Secondary varables defnton> ntal state st0; consumng transton st0->st0 event <event correspondng to packet type> ( <Header condton 1> && && <Header condton N> ){ f(<payload condton 1>) f(<payload condton M>) <Reacton>; } }; Before optmzatons, descrbed n ths paper, Snort2R-lang converter worked ths way. B.Header-based optmzaton Condtons alternatve a set of pars <SP,R >, where SP ordered set of payload condtons, R reacton. Alternatve-contanng sgnature a par <SH, SA>, where SH set header condtons, SA condton alternatve. Set of sgnatures wth the same header are converted to alternatve-contanng sgnature ths trval way: { < SH, SB, R > } < SH,{ < SB, R > } > Alternatve-contanng sgnature evaluaton result s defned as: < SH, SA>, H, = U N = 1 < SH, S R >, H, Also, let s defne condton alternatve evaluaton result: U N = 1 SA, = < / ο, SP, R >, H, Here s the structure of transton body at the R-lang model of alternatve-contanng sgnature (anythng else s just as n smple sgnature scenaro): C1=C; f(<seres of payload condtons 1>) <Reacton 1>; C=C1; f(<seres of payload condtons 2>) <Reacton 2>; C=C1; f(<seres of payload condtons N>) <Reacton N>; Tests on Snort sgnature base revealed consderable economy on header condton evaluaton provded by ths optmzaton: there are only 519 dfferent header condton sets for base of 6372 sgnatures. The burden of ths optmzaton s n replacement of excess header condton evaluatons wth context vector restorng operaton, much smpler n the case of Snort s sgnatures, where context vector contan one nteger only. Let a set of alternatve-contanng sgnatures s gven, grantng the same protocol. Because of context ndependency of header condtons, they could be evaluated n tree-style order that provdes a good economy. Ths addtonal optmzaton can be organzed n R-lang by scenaro combnng wth the use of nested f s: consumng transton st0->st0 event <event correspondng to packet type>(true){ f(<header condton 1> f(<header condton 2>) <predcate alternatve for header granted by 1,2> f(<header condton 3>) f(<header condton 4>) <predcate alternatve for header granted by 1,3,4> }} Snort analyss engne use that header optmzaton only, that does not allow achevng further speed-up on a fxed sgnature set. C.Predcate tree The computatonal complexty of payload condton evaluaton usually much hgher than the computatonal complexty of header condton evaluaton. That s why the task of optmzng condtons alternatves evaluaton s urgent. Condton chans contaned n condtons alternatve can have the same begnnngs. A huge beneft can be acheved by usng ths fact. Predcate tree ST tree: the edges are marked wth a payload condton the nodes are marked wth a reacton set, possbly empty the leafs are marked wth non-empty reacton sets Algorthm of buldng a predcate tree based on a condton alternatve s ntutve clear: when addng a next chan of payload condtons to a tree, a ponter moves from root node through the edges marked wth correspondng payload condtons f they exst, otherwse a new branch, contanng left condtons s created and lnked to the current ponter poston.

4 A B {R1} A C D A {R3} Fg. 2. Predcate tree buldng sketch. {R2} Predcate tree evaluaton recursve traversal of tree from root node. Sub-trees are evaluated only f correspondng condton could be evaluated successfully n current context. Predcate tree evaluaton result ST, a set of all the reacton, that were acheved durng the predcate tree evaluaton. Statement. Let predcate tree ST s converted from condton alternatve SA. Then ST,=SA,. D.Statc result analyss Due to that optmzaton, a hgh beneft s acheved at some scenaros. Here are defned two statc characterstc of ths optmzaton. Tree proft s the dfference between edges number n the tree and the total number of payload condtons n a condtons alternatve that was the source of the predcate tree. Relatonal tree proft s the raton between thee proft and total number of payload condtons n a condtons alternatve. For two sgnature groups n the Snort Base the tree proft exceeds for each group, and the relatonal tree proft for them s about 80%. These groups contan about 2000 sgnatures,.e. about 1/3 off the whole base. On average, the relatonal tree proft s about 62%. Also, whle buldng those trees, 38 par of dentcal sgnatures and 2 groups of sx dentcal sgnatures were found. The number of context restorng s not ncreased at all comparng to condton alternatve usage. The number of context backups s ncreased by the number of addtonal branchng, whch s not more than the tree proft. Thus, consderng heavness of payload condton evaluaton, burden of ths optmzaton s nsgnfcant n comparson wth economy, acheved by the lowerng the number of condtons. E.Addtonal optmzatons Consder a set of leafs, that are all marked wth same reacton R and beng drect chldren of the same node. Sometmes t s possble to thnk of a payload condton B, so <,[B],R>,H, would be equal to evaluaton result of a sub-tree that ncludes these gven leafs and a parent node, and the computatonal costs of B evaluaton s lower than costs for evaluaton of A 1, A 2... A n n total. For example, payload condtons, whch perform regular expresson analyss (pcre) can be combned nto a sngle predcate, that performs the search of frst pattern, found of ths set. For mplementng ths optmzaton for R-lang scenaros, A C B {R3} D {R1} {R2} A 1 A 2 A n callout mechansm of PCRE lbrary was used. It allows not only to stop the ongong regular expressons set testng after the frst match, but also returns d of matched pattern, whch allows to nform IDS of matched sgnature d and classfcaton text, not only classtype. Also t s proposed to unte payload predcates, performng substrng search (contest) usng Aho-Corasck algorthms [3], whch allows savng on substrng search, performng all the patterns look-up at once. These predcate combnaton methods of qute effectve when performng condtons set evaluaton untl the frst match. But when searchng all the matches (that s necessary, f the branchng node s not pre-leaf) at some strngs, ths method works even worther, than separate matchng. Nevertheless, they demonstrate a good performance n average, so ther applcaton for non-pre-leaf branchng nodes needs further research. VI. CONCLUSION Usng the proposed optmzaton method wth the Snort sgnature base allowed reducng the number of testng functons calls by 60% (see table below). Consderng that most of superfluous condtons were heavy-wegh functons such as substrng search and regular expressons matchng, the real gan could be even hgher. A seres of experments usng dfferent types of traffc s planned to fnd out the numercal evaluaton of that gan. The deas, used n optmzng translator are wth mnmal changes applcable for some R-lang constructons, not overvewed n ths paper. Here are some examples of ths constructons: several consequent transtons of the same type to the same state (condton of transton s a analogue of a payload condtons chan, because some sde-effects are possble here, body of transtons s and analogue of reacton) ; several consequent f-blocks, etc. Implementng these deas would help to develop a unversal optmzng translator for ths language. TABLE I STATIC CHARACTERISTICS OF PROPOSED OPTIMIZATION Characterstc Fg. 3. Addtonal optmzaton scheme. The source sgnatures Usng proposed optmzaton Number of header condtons sets Number of payload condtons Ths table llustrates advantages of proposed method. The presented data was collected usng Snort IDS sgnature base dated B

5 REFERENCES [1] Snort IDS, [2] S.T. Eckmann, "Translatng Snort rules to STATL scenaros" presented at the 4th Internatonal Symposum on Recent Advances n Intruson Detecton (RAID 2001), Davs, CA, October 2001, LNCS 2212, pp [3] M. Norton, "Optmzng Pattern Matchng for Intruson Detecton," whte paper, Sourcefre Inc., 2004 [Onlne] Avalable: docs.dsresearch.org/optmzngpatternmatchng/forids.pdf. [4] D.U. Gamayunov, Network objects behavor analyss for detectng computer attacks PhD thess, Faculty of Computatonal Math and Cybernetcs, Moscow State Unversty, Moscow, [5] S.T. Eckmann, G. Vgna, and R. A. Kemmerer. STATL: An Attack Language for State-based Intruson Detecton Dept. of Computer Scence, Unversty of Calforna, Santa Barbara, [6] G. Vgna, R. Kemmerer, "NetSTAT: A Network-based Intruson Detecton Approach." Proceedngs of the 14th Annual Computer Securty Applcaton Conference, Scottsdale, Arzona, December [7] M. Roesch. "Wrtng Snort Rules: How To wrte Snort rules and keep your santy" [Onlne] Avalable:

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Testing CAB-IDS through Mutations: on the Identification of Network Scans

Testing CAB-IDS through Mutations: on the Identification of Network Scans Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Towards Specialization of the Contract-Aware Software Development Process

Towards Specialization of the Contract-Aware Software Development Process Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova

COMPUTER SUPPORT OF SEMANTIC TEXT ANALYSIS OF A TECHNICAL SPECIFICATION ON DESIGNING SOFTWARE. Alla Zaboleeva-Zotova, Yulia Orlova Internatonal Book Seres "Informaton Scence and Computng" 29 COMPUTE SUPPOT O SEMANTIC TEXT ANALYSIS O A TECHNICAL SPECIICATION ON DESIGNING SOTWAE Alla Zaboleeva-Zotova, Yula Orlova Abstract: The gven

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Prefix Code Matching Parallel Load-Balancing Method for Solution-Adaptive Unstructured Finite Element Graphs on Distributed Memory Multicomputers

A Prefix Code Matching Parallel Load-Balancing Method for Solution-Adaptive Unstructured Finite Element Graphs on Distributed Memory Multicomputers Ž. The Journal of Supercomputng, 15, 25 49 2000 2000 Kluwer Academc Publshers. Manufactured n The Netherlands. A Prefx Code Matchng Parallel Load-Balancng Method for Soluton-Adaptve Unstructured Fnte Element

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

: ;,i! i.i.i; " '^! THE LOGIC THEORY MACHINE; EMPIRICAL EXPLORATIONS WITH A CASE STUDY IN HEURISTICS

: ;,i! i.i.i;  '^! THE LOGIC THEORY MACHINE; EMPIRICAL EXPLORATIONS WITH A CASE STUDY IN HEURISTICS ! EMPRCAL EXPLORATONS WTH THE LOGC THEORY MACHNE; A CASE STUDY N HEURSTCS. :, by Allen Newell, J. C. Shaw, & H. A. Smon Ths s a case study n problem-solvng, representng part of a program of research on

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS.

STANDING WAVE TUBE TECHNIQUES FOR MEASURING THE NORMAL INCIDENCE ABSORPTION COEFFICIENT: COMPARISON OF DIFFERENT EXPERIMENTAL SETUPS. STADIG WAVE TUBE TECHIQUES FOR MEASURIG THE ORMAL ICIDECE ABSORPTIO COEFFICIET: COMPARISO OF DIFFERET EXPERIMETAL SETUPS. Angelo Farna (*), Patrzo Faust (**) (*) Dpart. d Ing. Industrale, Unverstà d Parma,

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

A Crossplatform ECG Compression Library for Mobile HealthCare Services

A Crossplatform ECG Compression Library for Mobile HealthCare Services A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

Search Efficient Representation of Healthcare Data based on the HL7 RIM

Search Efficient Representation of Healthcare Data based on the HL7 RIM 181 JOURNAL OF COMPUTERS, VOL. 5, NO. 12, DECEMBER 21 Search Effcent Representaton of Healthcare Data based on the HL7 RIM Razan Paul Department of Computer Scence and Engneerng, Bangladesh Unversty of

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Construction Rules for Morningstar Canada Target Dividend Index SM

Construction Rules for Morningstar Canada Target Dividend Index SM Constructon Rules for Mornngstar Canada Target Dvdend Index SM Mornngstar Methodology Paper October 2014 Verson 1.2 2014 Mornngstar, Inc. All rghts reserved. The nformaton n ths document s the property

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information