A High-confidence Cyber-Physical Alarm System: Design and Implementation

Size: px
Start display at page:

Download "A High-confidence Cyber-Physical Alarm System: Design and Implementation"

Transcription

1 A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty, Hangzhou , Chna 2 School of Aeronautcs and Astronautcs, Zhejang Unversty, Hangzhou , Chna e-mal: lhma@pc.zju.edu.cn 3 School of Software, Dalan Unversty of Technology, Dalan , Chna e-mal: f.xa@eee.org 4 Computer Centre, Hangzhou Frst People s Hosptal, Hangzhou , Chna Abstract Most tradtonal alarm systems cannot address securty threats n a satsfactory manner. To allevate ths problem, we developed a hgh-confdence cyber-physcal alarm system (CPAS), a new knd of alarm systems. Ths system establshes the connecton of the Internet (.e. TCP/IP) through GPRS/CDMA/3G. It acheves mutual communcaton control among termnal equpments, human machne nterfaces and users by usng the exstng moble communcaton network. The CPAS wll enable the transformaton n alarm mode from tradtonal one-way alarm to two-way alarm. The system has been successfully appled n practce. The results show that the CPAS could avod false alarms and satsfy resdents securty needs. Keywords-cyber-physcal system; alarm servce; cvl securty; TCP/IP connecton; alarm communcaton system I. INTRODUCTION Wth the development of socety, socal securty has become ncreasngly demandng, and the tradtonal Passve-Alarm (PA) mode has been far from meetng our securty need. As we know, PA mode wll not trgger an alert sgnal untl the alarm condton occurs, whch can not allevate users securty threats. Meanwhle, the Cyber- Physcal System (CPS) s becomng an ncreasngly hot topc, and even beng as a natonal development strategy. For example, the US Natonal Scence Foundaton (NSF) has dentfed CPS a key area of research [1]. There are many felds nvolved n CPS, such as Smart Home, Smart Medcal, Intellgent Transportaton, Intellgent Power Grd, etc [2,3]. In ths paper, a hgh confdence Cyber-Physcal Alarm System (CPAS) s presented, whch wll acheve smart alarm, and brng unprecedented challenges and opportuntes for the securty ndustry smultaneously. CPS s a system featurng a tght combnaton of, and coordnaton between, the system s computatonal and physcal elements [4], and t s recognzed as the thrd wave of the world nformaton ndustry followed by the Computer, Internet and Moble Communcaton Network. Unlke more tradtonal embedded systems, a fll-fledged CPS s typcally desgned as a network of nteractng elements nstead of as standalone devces [5]. Whle CPAS s a system n whch the termnal equpment (TE), ntellgent and ntegrated, s able to connect wreless sensors, transmt alert nformaton and mages va the Internet. What s more, the montorng alarm servce based on network platform s ncluded. There s no doubt that the tradtonal one-way alarm system wll be replaced by CPAS, and the socal securty protecton wll get nto a new stage. The rest of the paper s organzed as follows. Secton II presents the model of CPAS. The requrements and features of the system are specfed. In Secton III, we dscuss the major challenges that need to be addressed when realzng a CPAS. Secton IV llustrates how we desgn and mplement the system. An applcaton case study s presented n Secton V. We fnally conclude the paper n Secton VI. II. CPAS MODELING A. System model In our daly lfe, the telephone communcaton network serves for communcatons among people. Sensor network s the perceptble network, servng for communcatons among objects. And the Internet, a vrtual nformaton space, s the nformaton-sharng network. The three are nformaton-transmsson network, nformaton-percepton network and nformaton-sharng network respectvely, whle CPS s the ntegraton of the three. The CPS brdges the vrtual world and the real word much closer wth the combnaton of sensors, ntellgent termnals and the Internet. Through embeddng a varety of sensors, such as mages, humdty, temperature, nfrared, etc., nto dfferent objects or the envronment, the nformaton of objects or envronment wll be combned wth the Internet by ntellgent network termnal, and then reaches to the ntegraton of human socety and physcal system. Fgure 1. Smplfed CPAS model

2 In our approach, the alarm TE, ntegrated wth nfrared (IR) and vdeo survellance, wll trgger vdeo survellance as soon as the IR probe detects an alert, and transmt the ste mage n real tme. Then, an alarm task s fnshed. Fgure 1 llustrates a smplfed CPAS model. The Alarm Communcaton System (ACS) s a TE, used to detect the physcal world. Through the Human Machne Interface (HMI), we may observe nformaton about the physcal world, whch s transmtted va the ACS. We could also control and manage the physcal world n turn through the network. In ths way, the mutual dalogue among the physcal world, cyber world and human world s acheved, n whch a hgh confdence CPAS wll be formed. B. Requrements To establsh an effectve CPS, the followng two factors need to be consdered. (1) Scale. It s only when the scale of smart TEs reaches to a certan sze that the ntellgent aspect of an object can take effect. For example, f there are one mllon cars, and only 10 thousands of them are embedded wth ntellgent systems, then t wll be very dffcult, f not mpossble, to form an ntellgent transportaton system. (2) Moblty. Objects are usually not statc, but n a state of movement. On the other hand, the communcaton control among objects s supposed to be acheved at any tme, whether n moton or even under hgh speed. As a consequence, a moble CPS s often requred. Nowadays, the wreless moble communcaton network (WMCN) has covered most areas n Chna, from bustlng ctes to remote rural areas, from sland to Mount Everest. Consderng ths fact, our embedded ACS s desgned to access to Internet by the way of GPRS/CDMA. Compared to 3G or 4G, GPRS(2.5G)/CDMA(2.75G) has wder coverage of the WMCN, whch s more accepted by users. Of course, we wll try to use 3G/4G when the coverage of 3G/4G s more wdespread n future. C. Features Unlke tradtonal alarm systems, the CPAS has ts own functons. Intellgent alarm host may connect to a varety of wreless sensors to acheve the percepton of external envronment. For example, n case of fre, the temperature and smoke sensors wll transmt related data mmedately to the alarm host n a wreless way at the begnnng stage of fre. After recevng the data, the alarm host wll make a determnaton whether to send out a warnng alert, so that the user may take tmely actons to reduce loss as much as possble. By usng low-power mcroprocessor MSPF430/ARM7, the CPAS trggers vdeo survellance through IR probe and transmts montorng mages n real tme, whch facltates green montorng alarm. In bref, the new generaton alarm system (.e. CPAS) has these characterstcs: small-sze, lowcost, low power dsspaton, and combnaton of montorng, mage analyss, ntellgent processng, sren, actve-alarm (AA) and other ntellgent functons. III. CHALLENGES One of the challenges to make a CPAS to work s to urge the embedded alarm system to access to the Internet. It s necessary to examne both advantages and dsadvantages of dfferent ways of enterng the Internet. For example, we should take real-tme, cost, relablty, etc., nto consderaton when transmttng alert nformaton. Another challenge s that HMI must support multthreads, more specfcally, thousands and even ten thousands of threads at run tme. Ths s because the HMI usually needs to receve alert nformaton from a large number of alarm TEs placed n varous envronments, where a Dstrbuted Cyber- Physcal System (DCPS) [6] wll be constructed. In addton, the HMI s supposed to be n connecton wth users, n order to ensure that the correspondng user wll be nformed when an alarm occurs. Thus a Dstrbuted Cyber-Physcal Alarm System (DCPAS) may be formed n a certan place. Fgure 2 shows some knd of DCPAS. Fgure 2. DCPAS schematc dagram A thrd challenge s the communcaton protocol among the TE, HMI and user. As n other networked systems, the protocol has a drect mpact on the relablty of the CPAS system. A wdely-accepted, unfed protocol s the premse of mplementng a large-scale CPAS. IV. SYSTEM DESIGN AND IMPLEMENTATION A. TCP/IP Connecton of TEs A wreless communcaton module, embedded wth TCP/IP protocol, s requred for the TE to establsh TCP/IP connecton. Examples of such modules nclude GPRS wreless module MC55 by Semens, 3G-WCDMA wreless module MU103 by Huawe, etc. The transmsson rate of GPRS already satsfes the requrements of cvl embedded securty systems, whose average rate ranges from 20kb/s to 30kb/s, and ts maxmum theoretcal speed may reach to 171.2kb/s. Although the rate of CDMA s much hgher than that of GPRS, the expense of CDMA s much hgher too, and the expense of 3G s far hgher. Therefore, GPRS s much more popular before the expense of CDMA or 3G cuts down. The embedded alarm system selects GPRS to establsh the TCP/IP connecton,

3 whch yelds lower cost and makes t more affordable for users. The approach for the alarm TE to establsh a TCP/IP connecton to access the Internet s through AT commands control. Takng MC55 for example, Fgure 3 llustrates ts process of TCP/IP connecton. Fgure 3. Process of TCP/IP connecton To ensure the relablty of connected TCP/IP, much experence and technology are requred. There are two factors closely related to relablty: (1) hardware: the tmng condton of the module tself; and (2) software: the mcrocontroller s supposed to actvate the wreless module contnungly through AT commands so that the module wll not dsconnect TCP/IP abnormally. Takng agan MC55 for nstance, Fgure 4 llustrates the tmng of power-on process of the GPRS wreless module [7]. Fgure 4. Tmng of power-on process of MC55 The gnton lne should not be swtched low untl 10ms delay after the wreless module s powered up. The gnton lne should be mantaned n the state of low-pulled more than 100ms, so that the module wll start to work effectvely. In addton, we also need to swtch the gnton lne low and hgh,.e. equal to HZ (hgh mpedance), now and then durng run tme. By dong ths, the module wll contnue to work spontaneously as soon as the module fals. From the software perspectve, the wreless module would dsconnect TCP/IP abnormally f we do not transmt data through GPRS for a long tme. Thus the mcrocontroller needs to control wreless module to enable GPRS at perodc ntervals to ensure that the connecton of TCP/IP s normal. For nstance, we may send a packet through GPRS every mnute. B. Mult-threadng Soluton Thread s the basc atomc unt of executon of a procedure, and a process can be composed of multple threads. The mplementaton strategy s to dvde a process nto multple threads, and then let them execute concurrently and asynchronously n order to mprove operatonal effcency. Concurrent executon does not mean that all threads run at the same tme (occupyng CPU smultaneously), but only one thread s admtted to occupy CPU at any tme. Snce some threads compete for CPU more frequently, they seem to run smultaneously. In dstrbuted programmng, the proper use of threads can be very good to enhance the performance and effcency of applcaton procedure. However, multthreadng gves rse to new problems. For example, f many threads must occupy a certan resource or several resources, ths may possbly cause threads to be mxed, or even collapsed. To avod these problems, the Resource Allocaton Algorthm (RAA) or Tme-Slce Rotaton Schedulng Algorthm (TSRSA) [8] s needed. In ths work, we adopt TSRSA. The basc dea behnd ths algorthm s: frstly, dvde the processng tme of CPU nto a slce of tme; then, each thread n ready queue takes turns to use CPU resources accordng to assgned tme slce. When the allotted tme slce runs out, the thread wll be forced to gve up CPU, and re-enter the end lne of the ready queue to wat for the next schedulng. Meanwhle, the process of schedulng goes to select the frst thread n the ready queue, and allocates tme slce to t. The followng s a smplfed mathematcal model of TSRSA, takng n threads for nstance: n P = xt (1) = 1 x = 1 st.. (2) x x + 1 where P stands for process, T s the -th thread. The P s dynamcally changng, snce the frst thread wll go out of n the schedule of xt as soon as t s fnshed. For ths = 1 reason, the condtons gven n (2) can ensure that P wll always deal wth the frst thread of the current ready queue. C. Communcaton Control The most sgnfcant dfference between CPAS and tradtonal alarm systems s reflected n the communcaton control. We acheve the communcaton control between TE and HMI based on GPRS, communcaton between TE and user based on SMS. What s more, users can control the TE and check the current status of TE n turn accordng to the agreed protocol through SMS, and securty guards could also use HMI to control the TE and query the current state of TE n accordance wth agreed protocol through GPRS. It can be seen that the CPAS has obvous advantages, and ts two-way communcaton control can releve the users securty threats completely. Consderng the protecton of the CPS, much effort has been done n relablty (the protecton aganst unpredctable falures) [9,10,11]. Our communcaton control among the TE, HMI and user may face nformaton transmsson

4 securty problems. Therefore, the protecton aganst malcous cyber attacks should be concerned. Secure control had been descrbed n e.g. [12], whch s sutable for our CPAS to protect the communcaton control. V. AN APPLICATION CASE The CPAS we developed have been appled n Dongyang Cty, Chna. The HMI succeeds to hold more than 2000 ntellgent TEs from dfferent users. Fgure 6 gves the networked alarm nterface, whch comes from a testng experment, wth 45 TEs. Fgure 6. An nterface of CPAS Fgure 5. Process of communcaton control Fgure 5 shows the process of communcaton control among the TE, HMI and user, where n stands for the number of GPRS sendng falures. To allevate the problem of communcaton falures caused by network congeston, the ntellgent TE wll dsconnect GPRS ndependently when n>3, and then reconnect GPRS mmedately to ensure that the TE remans onlne almost all the tme. Fgure 7. Intellgent alarm TE As we can see from Fgure 6, a state of on-lne (ndcated by black) means that the alarm TE s montorng, whle a state of off-lne (n red) mples that the alarm TE s not workng. If an alert occurs, the alarm wll be fnshed n about 2 seconds. The HMI wll prompt to the alarm nterface, producng a sound to draw the securty-guard s attenton to take tmely actons. At the same tme, the

5 ntellgent TE wll send an alert message to the user, thus achevng double protecton. Fgure 7 shows the ntellgent alarm TE. At present, the alarm TE can satsfy the users needs wthout vdeo survellance. It s ntutve that more cost would be nvolved when startng vdeo survellance. The TEs have been on runnng for more than half a year, relably and stably, n Dongyang Cty, where a small CPAS can succeed to operate and solve the problem of securty threats for local resdents. VI. CONCLUSIONS The work presented n ths paper represents a promsng step towards the next generaton of CPAS. We frst modeled a smplfed CPAS, and analyzed ts requrements and key characterstcs that are dfferent from tradtonal alarm systems. We then dscussed three man mplementaton challenges, and succeeded to solve them fnally. A small CPAS was deployed n Dongyang Cty, Chna, demonstratng qute satsfactory performance. Emprcal results show that the system we developed s well suted for satsfyng cvl securty needs. ACKNOWLEDGMENT Ths work s supported n part by Natural Scence Foundaton of Chna under Grant No , Zhejang Provncal Natural Scence Foundaton of Chna under Grant No. R and Grant No. Y108685, and the Fundamental Research Funds for the Central Unverstes. REFERENCES [1] Wayne Wolf. The Good News and the Bad News (Embedded Computng Column). IEEE Computer [2] Lu Sha, Sathsh Gopalakrshnan, Xue Lu, Qxn Wang. Cyber- Physcal System: A New Fronter. The 2008 IEEE Internatonal Conference on Sensor Networks, Ubqutous, and Trustworthy Computng. 2008, pp.1-9. [3] Ayman Z. Faza, Sahra Sedgh, Bruce M.McMlln. Relablty Analyss for the Advance Electrc Power Grd. B.Buth, G.Rabe, T.Seyfarth (Eds.): SAFECOMP 2009, LNCS, pp [4] Cyber-physcal system, May [5] Edward Lee. Cyber Physcal System: Desgn Challenges. Unversty of Calforna, Berkeley Techncal Report NO.UCB/EECS [6] Yuanfang Zhang, Chrstopher Gll, and Chenyang Lu. Reconfgurable Real-Tme Mddleware for Dstrbuted Cyber- Physcal Systems wth Aperodc Events. The 28 th Internatonal Conference on Dstrbuted Computng System, ICDCS, 2008: [7] Semens. MC55/56 Hardware Interface Descrpton [8] SLB ER SCHATZ A. Appled Operaton System Concepts. John Wley & Sons, Inc, [9] J. Esenhauer, P. Donnelly, M. Ells, and M. O Bren. Roadmap to Secure Control Systems n the Energy Sector. Energetcs Incorporated. Sponsored by the U.S. Department of Energy and the U.S. Department of Homeland Securty, January [10] U.S.G.A. Offce. Crtcal nfrastructure protecton. Multple efforts to secure control systems are under way, but challenge reman. Techncal Report GAO , Report to Congressonal Requesters, [11] R.J. Turk. Cyber ncdents nvolvng control systems. Techncal Report INL/EXT , Idao Natonal Laboratory, October, [12] Alvaro A. Cardenas, Saurabh Amn, and Shankar Sastry. Secure Control: Towards Survvable Cyber-Physcal System. The 28 th Internatonal Conference on Dstrbute Computng Systems Workshops. IEEE, pp

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Safety instructions VEGAVIB VB6*.GI*******

Safety instructions VEGAVIB VB6*.GI******* Safety nstructons VEGAVIB VB6*.GI******* Kosha 14-AV4BO-0107 Ex td A20, A20/21, A21 IP66 T** 0044 Document ID: 48578 Contents 1 Area of applcablty... 3 2 General nformaton... 3 3 Techncal data... 3 4 Applcaton

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Multitone Electronics Plc. delivering certainty

Multitone Electronics Plc. delivering certainty Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

GR-303 Solution For Access Gateways

GR-303 Solution For Access Gateways GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

A powerful tool designed to enhance innovation and business performance

A powerful tool designed to enhance innovation and business performance A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Sciences Shenyang, Shenyang, China.

Sciences Shenyang, Shenyang, China. Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng

More information

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server

A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 2, JUNE 2013 187 A Genetc Algorthm Based Approach for Campus Equpment Management System n Cloud Server Yu-Cheng Ln Abstract In ths paper, we proposed

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Dsaster Management and Network Analysis

Dsaster Management and Network Analysis A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory

More information

Auditing Cloud Service Level Agreement on VM CPU Speed

Auditing Cloud Service Level Agreement on VM CPU Speed Audtng Cloud Servce Level Agreement on VM CPU Speed Ryan Houlhan, aojang Du, Chu C. Tan, Je Wu Department of Computer and Informaton Scences Temple Unversty Phladelpha, PA 19122, USA Emal: {ryan.houlhan,

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

An Optimal Model for Priority based Service Scheduling Policy for Cloud Computing Environment

An Optimal Model for Priority based Service Scheduling Policy for Cloud Computing Environment An Optmal Model for Prorty based Servce Schedulng Polcy for Cloud Computng Envronment Dr. M. Dakshayn Dept. of ISE, BMS College of Engneerng, Bangalore, Inda. Dr. H. S. Guruprasad Dept. of ISE, BMS College

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information