Detection of DDoS Attack Scheme

Size: px
Start display at page:

Download "Detection of DDoS Attack Scheme"

Transcription

1 Chapter 4 Detection of DDoS Attac Scheme In IEEE low rate wireless personal area networ, a distributed denial of service attac can be launched by one of three adversary types, namely, jamming attac, exhaustion attac and collision attac, as described in Chapter 2. These malicious nodes participating in the attac, exploit the lac of a single entry point in a wireless networ, and generate large volumes of malicious traffic, from multiple-ends of the networ, towards a set of victim nodes. The purpose of such attacs is to overwhelm the limited energy resources of target nodes, disturb the wireless communication by emitting interference signal, weaen or zero availability of the system, quicly battery depletions, creates collision, tries to consume or waste away resources of other nodes, targeted battery power and bandwidth. For distributed attac detection, there exists a need for an efficient and accurate mechanism in place, to successfully recognize patterns of DDoS attacs. A centralized approach towards attac detection in such scenarios will incur significant delays, associated with constant monitoring of attac traffic by a single designated node, and will thus reduce the effectiveness of the outcomes of the detection process. In this chapter, we designed a fuzzy system to detect the DDoS attacs in IEEE MAC layer. It operates in a distributed manner and 60

2 distinguishes attac scenarios from the impact of traffic load on the networ behavior. The attac detection is done from the base station on the input values of detection metrics received by it s from the respective node. The base station uses the value of BPR and SNR as input to the fuzzy systems to get the level of attac (LOA) as the output of the system. The levels of attacs are categories into No (No attac), Low (jamming attac), Medium (exhaustion) and High (either exhaustion or collision attacs). Confirmation of attac detection using FCM, which can decide the lower cut-off value of LOA to conclude that all nodes whose LOAs are greater than lower cut-off values are malicious node, while other nodes are normal nodes. Power consumption model for LRWPAN, which is self organized cluster using FCM. A self-reconfiguring topology is proposed to manage the mobility and recursively update the networ topology and minimize the total energy of the system and to improve the performance of the networ. It helps to reduce the overall energy computation rates incurred by the DDoS attacs detection scheme. 4.1 Description We now propose a fuzzy system for detection of DDoS attacs in IEEE low rate wireless personal area networ, which follows a centralized approach, wherein the attac detection is done by the base station based on the input values of the detection metrics received by it from the respective nodes. There are three inputs required to be sent by the nodes to the base station: 1) the number of total 61

3 pacets received by it during a specified time period, 2) the number of pacets dropped by it during the period, and 3) the received signal strength (RSS). The third metric, RSS has to be additionally sent to the base station in our scheme. This can be preferably sent pacaged with the former two parameters, or else, sent independently. The base station computes the power received by the node from the attacer or jammer, if any, by finding the difference between the current RSS and normal RSS values. Thereafter, the base station computes the PDPT and SNR from these values, as discussed in the chapter 3. Then the base station uses the values of PDPT and SNR as inputs to a fuzzy inference system (Mamdani s Fuzzy Inference System ) to get Level of Attac (LOA) or Jamming Index (JI) as output of the system. The LOA/JI value varies from 0 to 100, signifying No attacs or DDoS attacs (may be jamming or exhaustion or collision) respectively. In this way, the base station is able to grade the intensity of DDoS being experienced by each node through the JI parameter, and thus build an overall picture. The base station, through the overall picture that it has, is now able to do a confirmatory chec through neighborhood study of any node to ascertain the correctness of the JI grade allotted to that node, as compared to the JI allotted to its neighbor nodes. This is done in our method through an algorithm called Fuzzy Cluster Means (FCM). The elegance of the method lies in doing away with the requirement of communicating with the neighbor nodes for neighborhood chec. This enhances the survivality of the system during attacs present in the networ. 62

4 Now, depending upon the overall picture we can decide the lower cut-off value of JI to conclude that all nodes whose JIs are greater than the lower cut-off value are malicious nodes while the others are normal nodes presents in the networ. 4.2 Detection of DDoS Attacs using Fuzzy Systems The purpose of DDoS attac detection is met in its entirety if the detection rate is close to 100%. It is achieved through fuzzy system. The fuzzy system is appropriate attac detection for the following two scenarios. First, attac detection involves various statistical measures as well numeric values of collected nodes information. Second, security that itself includes fuzziness as the boundary limit among the normal and malicious not definite. Hence our technique considers the fuzzy logic technique for estimating the level of attac. Fuzzy logic is capable of maing real-time decisions, even with incomplete information. Fuzzy logic systems which can manipulate the linguistic rules in a natural way are hence suitable in this respect. Fuzzy logic uses fuzzy set theory, in which a variable is a member of one or more sets, with a specified degree of membership. Fuzzy logic allow us to emulate the human reasoning process in computers, quantify imprecise information, mae decision based on vague and incomplete data, yet by applying a defuzzification process, arrive at definite conclusions. The FLS mainly consists of four blocs namely fuzzifier, fuzzy rule, fuzzy inference and defuzzifier as shown in the figure

5 4.2.1 Fuzzy Sets and Membership functions If X is a collection of objects, called the universe of discourse denoted generically by q, then a fuzzy set A in X is defined as a set of ordered pairs: A { ( q, A( q)) : qq } (4.1) Where, A(q) is called the membership function (MF) for the fuzzy set A. The MF maps each element of Q to a membership grade (or membership value) between 0 and 1. RULES INPUT SNR,PDPT FUZZIFIER INFERENCE DEFUZZIFIER OUTPUT LOA Figure 4.1: Fuzzy System for detection of attacs with respect to the input SNR and PDPT In simple terms, fuzzy means one which cannot be quantified crisply, e.g., the set Tall defined over the universe of discourse, Height (measurable in cm), may mean different things for different people. Some may consider persons of height 180 cm or more to be tall, while for others a person of height 175 cm may also be tall. Therefore, the set Tall is a fuzzy set. It must be noted that while the set Tall defined over universe of discourse Height ( which may generically be 64

6 denoted by h), is fuzzy, the universe of discourse Height is a crisp set because its members will assume crisp quantifiable values in cm. Fuzzy logic is a computational paradigm that provides a mathematical tool for representing and manipulating information in a way that resembles human communication and reasoning process [52],[53].We defines three fuzzy sets each over the two universes of discourse for input namely, SNR and PDPT; the values are LOW, MEDIUM, and HIGH. For output, four fuzzy sets are defined over the universe of discourse, LOA: the values are NO, LOW, MEDIUM, and HIGH. We use Mamdani model [54], where SNR and PDPT are the crisp inputs to the system and JI/LOA is the crisp output obtained from the system after defuzzification using the centroid method Fuzzification Fuzzification is the process of mapping the real valued point to a fuzzy set. It converts obtained inputs into fuzzy linguistic variable inputs. The two parameters are taen into account for determining the level of attac. Fuzzification of the two crisp inputs SNR and PDPT are determining the degree to which these inputs belong to each of the appropriate fuzzy sets, as generated through NS2 simulations ( the simulation setup will be describe in the section 6) which are mapped into fuzzy membership functions. To define the fuzzy membership function, trapezoid shape has been chosen in this detection method because of two reasons: first, it can be mathematically manipulated to be very close to the most 65

7 natural function, the Gaussian or Bell function, and second, it can be easily manipulated to be an unsymmetrical function where the same cannot be done so easily with the Gaussian or Bell functions. We define the membership function below: ( q) A q b 1, d d 0, a, a q, c a q b b q c c q d otherwise (4.2) Where the different values of the variables are as given in table 4.1: The graphical representation of these trapezoidal functions in respect of SNR, PDPT and JI are shown in figures 4.2, 4.3 and 4.4 respectively. Table 4.1: Values of variables used in definitions of membership functions Universe of Discourse (q ) A Set a b c d LOW SNR MEDIUM HIGH LOW PDPT MEDIUM HIGH NO LOA LOW MEDIUM HIGH

8 LOW MEDIUM HIGH 1.0 Degree of membership SNR Figure 4.2: Graphical representation of the trapezoidal function for the input signal - to - noise ratio (SNR) 1.0 LOW MEDIUM HIGH Degree of membership PDPT Figure 4.3: Graphical representation of the trapezoidal function for the input bad pacet ratio (BPR) or pacets dropped per terminal (PDPT) 67

9 NO LOW MEDIUM HIGH 1.0 Degree of membership LOA/JI Figure 4.4: Graphical representation of the trapezoidal function for output, Level of Attac (LOA) or Jamming Index (JI) Fuzzy Inference When an input is applied to a FLS, the inference engine computes the output set corresponding to each rule. The behavior of the control surface which relates the inputs (SNR, PDPT) and output (LOA) variables of the system is governed by a set of rules. A typical rule would be if x is A (SNR) then y is B (PDPT), when a set of input variables are read each of the rule that has any degree of truth in its premise is fired and contributes to the forming of the control surface by approximately modifying it. When all the rules are fired, the resulting control surface is expressed as a fuzzy set to represent the constraint output. Based on the lingusitic variables, nine rules are framed that represent the membership 68

10 functions. Relations obtained from the rule base are interpreted using the minimum operator AND. The outputs obtained from the rule base are interpreted using maximum operator OR. The fuzzy rule for the input SNR, PDPT and the output JI/LOA are given in table 1. Table 4.2: Fuzzy inference rule for the input SNR, PDPT and the output JI/LOA Sl.No SNR PDPT JI/LOA 1 LOW LOW HIGH 2 LOW MEDIUM HIGH 3 LOW HIGH HIGH 4 MEDIUM LOW LOW 5 MEDIUM MEDIUM MEDIUM 6 MEDIUM HIGH HIGH 7 HIGH LOW NO 8 HIGH MEDIUM LOW 9 HIGH HIGH MEDIUM Defuzzification The output of the inference mechanism is fuzzy output variables. Defuzzification is the process of conversion of fuzzy output variables into crisp values. The defuzzifier computes a crisp output from these rule output sets. It can be 69

11 performed in different methods. We have chosen the centroid of region gravity (COG). In this method, the centroid of each membership function for each rule is first evaluated. The final output LOA, which is equal to COG, is then calculated as the average of the individual centroid weighted by their membership values as follows: LOA COG ( b qa ( q) * q) b qa A ( q) A (4.3) Where LOA/COG is the output of the defuzzification, A(q) and q are the input variables of the membership function A. The complete process of calculating the crisp values of the LOA from the input values SNR and PDPT for every node is done through NS-2 stimulation. This approach reduces the processing load in the nodes, transferring most of the necessary calculations to the PAN coordinators. This model is able to detect unfair nodes in the MAC layer, so that it can be used to hinder attacs. 4.3 Confirmation of DDoS Attac on a Node using Fuzzy Clustering Means (FCM) The base station, through the overall picture that it has, is now able to do a confirmatory chec through neighborhood study of any node to ascertain the correctness of the JI grade allotted to that node, as compared to the JI allotted to its neighbor nodes. This is done in our method through an algorithm called Fuzzy 70

12 Cluster Means (FCM). The elegance of the method lies in doing away with the requirement of communicating with the neighbor nodes for neighborhood chec. This enhances the survivability of the system during attacer present in the networ. Now, depending upon the overall picture can decide the lower cut-off value of JI to conclude that all nodes whose JIs are greater than the lower cut-off value are malicious nodes while the others are normal nodes and then deletes the malicious nodes from the MAC layer. After each node has been assigned a crisp jamming index (JI) as per its SNR and PDPT values by the base station through the aforesaid method, the base station now confirms whether a node can be declared malicious (jammed) or not malicious by looing at the jamming indices of neighboring nodes. This is done by the base station as follows: 1. Depending upon the collision, it decides the lower cut-off value of JI, LC for declaring all nodes with JI LC, as jammed nodes, i.e., DDoS attacs detected at these nodes. 2. It maes a list of all jammed nodes, i.e., of nodes having JI LC and finds the number, t of such nodes. 3. For each of the t jammed nodes, it does the following: (i) Identifies and counts the number of one-hop neighbors, n. (ii) Out of the n neighbors, it identifies those neighbors who are in the list of jammed nodes and counts their number, nj and names the group of these nodes as jammed neighbors cluster. 71

13 (iii) Out of the n neighbors, it identifies those neighbors who are not in the list of jammed nodes and counts their number (n- nj) and names the group of these nodes as non-jammed neighbors cluster. We thus have a total of n nodes divided into two clusters in neighborhood of a node under consideration. Therefore, the deciding figure is n/2. If the number of nodes (nj) in the jammed neighbors cluster is more than n/2 then majority of the neighbors are jammed and hence it is confirmed that the node under consideration is also jammed. If nj is less than or equal to n/2, further examination is required for taing any decision. The subsequent steps of the algorithm proceed accordingly. (iv) If nj > n/2, then it confirms that the node is jammed. (v) If nj n/2, then it does the following: (a) Find the mean jamming index of jammed neighbor s cluster, jij using the formula: jij nj 1 ji nj (4.4) (b)finds the mean jamming index of non-jammed neighbors cluster, jinj using the formula: jinj n nj 1 ji n nj (4.5) 72

14 (c) Find the centroid X and Y coordinates of jammed neighbor s, using the formula: x j nj 1 nj 1 ji. x ji, y j nj 1 nj 1 ji. y ji (4.6) (d) Find the centroid X and Y coordinates of non- jammed neighbor s, using the formula: x j nnj 1 nnj 1 ji. x ji, y j nnj 1 nnj 1 ji. y ji (4.7) (e) Finds the square of the distance, d j of the node under consideration from the centroid of the jammed neighbors cluster using the formula: d j = (x - x j ) 2 + (y - y j ) 2 (4.8) (f) Finds the square of the distance, d nj of the node under consideration from the centroid of the jammed neighbors cluster using the formula: d nj = (x - x nj ) 2 + (y - y nj ) 2 (4.9) 73

15 (g) If: ( jij / d 2 j ) jinj / d 2 nj ) (4.10) then it declare malicious nodes otherwise it declares the others are normal nodes and then deletes the malicious nodes in the networ from the MAC layer. 4.4 Energy Consumption Model for LRWPAN There are three energy consumption models are often used for wireless communications: energy loss (power exhaustion), large-scale variations, and small-scale variations [55]. Similar to minimum power energy for wireless sensor networ[56], we concentrate only on energy loss that has distance dependence which is well modelled by 1/d p, where d denotes the distance between the PAN coordinator (transmitter) and other clusters (receiver), and the exponent p is determined by the field measurements for the particular system at hand, for example, p = 2 for free space, p = 1.6 to 1.8 for in building line-of-sight, and p = 4 to 6 for obstructed in building. Suppose there are c clusters in the LRWPAN, and m i is the nodes in the i th cluster, we use the following cost function to minimize the power consumption. J c m i i1 1 p ( di ) (4.11) Where d i is the degree of membership of x, p is a constant for a fixed 74

16 environment, and d i (4.12) x vi Where. is the Euclidean distance between one node (x ) and its cluster center (v i ), where x and v i can be 2-D or 3-D geography information. We partition the networ to clusters via minimizing the total power consumption using an unsupervised fuzzy c-means (FCM) Networ Partition Using an Unsupervised Clustering in FCM FCM clustering is a data clustering technique where each data point belongs to a cluster to a degree specified by a membership grade. This technique was originally introduced by Bezde [57] as an improvement on earlier clustering methods. Here we apply FCM clustering to LRWPAN partition. Our objective is to partition n nodes to c clusters which will consume minimum power. Fuzzy c- partition for LRWPAN: Let X =x 1, x 2,, x n be n nodes, V cn be the set of real c n matrices, where 2 c < n. The Fuzzy c-partition space for X is the set M fc UV u [0,1] i, ; (4.13) cn i where 75

17 c i1 u i 1 and 0 u n 1 i n i The row i of matrix U M fc contains values of the i th membership function, u i, in the fuzzy c-partition U of X. We modify equation (4.11) to c n 2 p J( U, v) ( u i ) ( d i ) (4.14) i1 1 Where u M fc is a fuzzy c- partition of X; (v=v 1, v2,...v c ) where v i is the cluster center of prototype u i, 1 i c; and, u i is the membership of x in fuzzy cluster u i. J (U, v) represents the distance from any given data point to a cluster weighted by that point s membership grade. The solution of min U J, v ( U, v) (4.15) M fc are least-squared error stationary points of J. The fuzzy clustering algorithm is obtained using the necessary conditions for solutions of equation (4.15), as summarized in the following: In equation (4.12) Assume. to be an inner product induced norm, let X have at least c < n distinct points, and define the sets ( ) I { i i c; d x v 0} (4.16) i i ~ I {1,2,..., c} I (4.17) 76

18 Then (U, v) is globally minimal for J only if ( denotes an empty sets) I c d i p ui 1/ ( ) (4.18) j1 d j or I u i ~ 0i I and ui 0 (4.19) i I and v i n n 2 ui ) x / ( ( u ) i (4.20) i The following iterative method is used to minimize J(U, v): 1. Initialize U ( 0) M fc (e.g., choose its elements randomly from the values between 0 and 1). Then at step l (l = 1, 2...) 2. Calculate the c fuzzy cluster centers 3. Update 4. Compare (l) U using (4.18) or (4.19). (l) U to (l) vi using (4.20) and (l) U ( l1) ( l) ( l1) U using a convenient matrix norm, i.e., if U U ε L stop; otherwise, return to step Each node has c membership degrees with respect to the c clusters. Determine which cluster this node belongs to based on the maximum membership. By 77

19 this means, every node is classified to one cluster and the networ is partitioned to c clusters. The PAN coordinator for each cluster can be selected based on the centroid (center) of each cluster v i (i = 1, 2,, c), and the remaining power of each node (a PAN Coordinator needs more power than a regular node). An ideal PAN coordinator should be very close to the cluster centroid and has very high remaining battery capacity. But generally both conditions are not satisfied at the same time. To compromise this, we apply a fuzzy logic system to PAN coordinator selection with the help of the PDPT and SNR from these values, as discussed in the chapter 3. The detailed experimental results are discussed in chapter Self-Reconfiguring Topology for Energy Consumption in LRWPAN A Networ protocol that can update its lins to maintain strong connectivity with the nodes is said to be self reconfiguring. There exist different mobility patterns in a LRWPAN. 1. Nodes are moving in different directions with different speeds. 2. Some nodes die out while others are mobile. 3. New nodes join in while others are mobile. 4. Some nodes die out and some new nodes join in while other nodes are mobile. 78

20 In case 1, the total number of nodes doesn t change and in cases 2-4, the number of nodes may change. Without loss of generality, we assume that the number of nodes and their locations may change from time to time. We dynamically and recursively update the partition of clusters based on the assumption that the number of clusters is constant. This approach is possible because our approach is an iterative optimization method. We summarize the procedures for updating the connectivity among nodes: 1. Collect the status of each node including its geography information and its remaining battery capacity. 2. For every new node, randomly choose its membership degree to each c cluster u i i and u 1. If a node dies out or leaves the networ, delete its membership. i1 3. Update the total number of nodes n. Keep the existing c cluster centers as the initial values for the next iteration. 4. Calculate the c fuzzy cluster centers 5. Update (l) u using (8) or (9). (l) v i using (10)and (l) u (l) v i 6. Compare (l) ( l1) u tou using a convenient matrix norm, i.e., if ( ) ( 1) u l u l ) L stop; otherwise, return to step Each node has c membership degrees with respect to the c clusters. Determine which cluster this node belongs to based on the maximum 79

21 membership. By this means, every node is classified to one cluster and the networ is partitioned to c clusters. 8. Select the PAN coordinator for each cluster based on the scheme presented in section Setup the star topology based on the partitioned clusters and selected PAN coordinator for each cluster. The above procedure can be used by a networ periodically for every short period of time since every node is mobile and its remaining battery capacity is time varying. 4.5 Conclusions The critical nature of applications of IEEE MAC Layer demand the need for their protection against malicious attacs that may be launched against sensory resources by the adversary-class. Several attacs such as: Jamming attac, exhaustion attac and collision attac have been modeled and analyzed in the literature survey as described in chapter 2. All the techniques are detecting the attacs by individual nodes, there is no communication with their neighbors, so that possible for more malicious nodes are present in the networ. An improved version of an attac against the availability of sensory resources is the distributed denial of service attac by using fuzzy system to detect the DDoS attacs in the IEEE MAC layer which is able to communicate with all the neighbors present in the networ. The attac detection is done by the base station on the 80

22 input values of detection metrics received by it, from the respective node. The base station uses the value of BPR and SNR as input to the fuzzy systems to get the level of attac (LOA) as the output of the system. The levels of attacs are categories into No (No attac), Low (jamming attac), Medium (exhaustion) and High (exhaustion and collision attacs). Confirmation of attac detection using FCM, which can decide the lower cut-off value of LOA to conclude that all nodes whose LOAs are greater than lower cut-off values are malicious node, while other are normal nodes. Next the power consumption model for LRWPAN, which is self organized to clusters using FCM. The FCM is applied to PAN coordinator selection for each cluster. A self-reconfiguring topology is proposed to manage the mobility and recursively update the networ topology and to minimize the total energy of the system and improve the performance of the networ. It helps to reduce the overall energy computation rates incurred by the DDoS attacs detection scheme. All the detailed experimental results and performance analysis are discussed in the chapter 6. The next chapter explains the proposed mechanism for prediction of attac and also able to prediction the type of DDoS attac using fuzzy systems. 81

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

A FUZZY LOGIC APPROACH FOR SALES FORECASTING

A FUZZY LOGIC APPROACH FOR SALES FORECASTING A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for

More information

Real Time Traffic Balancing in Cellular Network by Multi- Criteria Handoff Algorithm Using Fuzzy Logic

Real Time Traffic Balancing in Cellular Network by Multi- Criteria Handoff Algorithm Using Fuzzy Logic Real Time Traffic Balancing in Cellular Network by Multi- Criteria Handoff Algorithm Using Fuzzy Logic Solomon.T.Girma 1, Dominic B. O. Konditi 2, Edward N. Ndungu 3 1 Department of Electrical Engineering,

More information

Project Management Efficiency A Fuzzy Logic Approach

Project Management Efficiency A Fuzzy Logic Approach Project Management Efficiency A Fuzzy Logic Approach Vinay Kumar Nassa, Sri Krishan Yadav Abstract Fuzzy logic is a relatively new technique for solving engineering control problems. This technique can

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in

More information

How To Solve The Cluster Algorithm

How To Solve The Cluster Algorithm Cluster Algorithms Adriano Cruz adriano@nce.ufrj.br 28 de outubro de 2013 Adriano Cruz adriano@nce.ufrj.br () Cluster Algorithms 28 de outubro de 2013 1 / 80 Summary 1 K-Means Adriano Cruz adriano@nce.ufrj.br

More information

Introduction to Fuzzy Control

Introduction to Fuzzy Control Introduction to Fuzzy Control Marcelo Godoy Simoes Colorado School of Mines Engineering Division 1610 Illinois Street Golden, Colorado 80401-1887 USA Abstract In the last few years the applications of

More information

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR

Fuzzy Logic Based Revised Defect Rating for Software Lifecycle Performance. Prediction Using GMR BIJIT - BVICAM s International Journal of Information Technology Bharati Vidyapeeth s Institute of Computer Applications and Management (BVICAM), New Delhi Fuzzy Logic Based Revised Defect Rating for Software

More information

Intelligent Agent Based Delay Aware QoS Unicast Routing in Mobile Ad hoc Networks

Intelligent Agent Based Delay Aware QoS Unicast Routing in Mobile Ad hoc Networks Intelligent Agent Based Delay Aware QoS Unicast Routing in Mobile Ad hoc Networks V. R. Budyal 1 and S. S. Manvi 2 1 Department of Electronics and Communication Engineering Basaveshwar Engineering College,

More information

A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic

A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic Shivani, Er. Amandeep Singh, Dr. Ramesh Chand Kashyap Abstract In this advanced smart life, internet and computer

More information

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING Sumit Goswami 1 and Mayank Singh Shishodia 2 1 Indian Institute of Technology-Kharagpur, Kharagpur, India sumit_13@yahoo.com 2 School of Computer

More information

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Cluster Analysis: Advanced Concepts

Cluster Analysis: Advanced Concepts Cluster Analysis: Advanced Concepts and dalgorithms Dr. Hui Xiong Rutgers University Introduction to Data Mining 08/06/2006 1 Introduction to Data Mining 08/06/2006 1 Outline Prototype-based Fuzzy c-means

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

AS MORE WIRELESS and sensor networks are deployed,

AS MORE WIRELESS and sensor networks are deployed, 2418 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks Yingying Chen, Member, IEEE, Jie Yang, Student

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud

FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud 2015 (8): 131-135 FLBVFT: A Fuzzy Load Balancing Technique for Virtualization and Fault Tolerance in Cloud Rogheyeh Salehi 1, Alireza Mahini 2 1. Sama technical and vocational training college, Islamic

More information

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network

A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network Ansuman Mahapatra, Nachiketa Tarasia School of Computer Engineering KIIT University, Bhubaneswar, Orissa, India

More information

Application of Virtual Instrumentation for Sensor Network Monitoring

Application of Virtual Instrumentation for Sensor Network Monitoring Application of Virtual Instrumentation for Sensor etwor Monitoring COSTATI VOLOSECU VICTOR MALITA Department of Automatics and Applied Informatics Politehnica University of Timisoara Bd. V. Parvan nr.

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Internet Sustainability and Network Marketing Safety

Internet Sustainability and Network Marketing Safety Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been

More information

Design of Prediction System for Key Performance Indicators in Balanced Scorecard

Design of Prediction System for Key Performance Indicators in Balanced Scorecard Design of Prediction System for Key Performance Indicators in Balanced Scorecard Ahmed Mohamed Abd El-Mongy. Faculty of Systems and Computers Engineering, Al-Azhar University Cairo, Egypt. Alaa el-deen

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and

STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and Clustering Techniques and STATISTICA Case Study: Defining Clusters of Shopping Center Patrons STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS

A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A.Vanitha Katherine (1) and K.Alagarsamy (2 ) 1 Department of Master of Computer Applications, PSNA College

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Fuzzy Candlestick Approach to Trade S&P CNX NIFTY 50 Index using Engulfing Patterns

Fuzzy Candlestick Approach to Trade S&P CNX NIFTY 50 Index using Engulfing Patterns Fuzzy Candlestick Approach to Trade S&P CNX NIFTY 50 Index using Engulfing Patterns Partha Roy 1, Sanjay Sharma 2 and M. K. Kowar 3 1 Department of Computer Sc. & Engineering 2 Department of Applied Mathematics

More information

Bank Customers (Credit) Rating System Based On Expert System and ANN

Bank Customers (Credit) Rating System Based On Expert System and ANN Bank Customers (Credit) Rating System Based On Expert System and ANN Project Review Yingzhen Li Abstract The precise rating of customers has a decisive impact on loan business. We constructed the BP network,

More information

Threat Modeling Using Fuzzy Logic Paradigm

Threat Modeling Using Fuzzy Logic Paradigm Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Scheduling Algorithm for Delivery and Collection System

Scheduling Algorithm for Delivery and Collection System Scheduling Algorithm for Delivery and Collection System Kanwal Prakash Singh Data Scientist, DSL, Housing.com Abstract Extreme teams, large-scale agents teams operating in dynamic environments are quite

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Optimized Fuzzy Control by Particle Swarm Optimization Technique for Control of CSTR

Optimized Fuzzy Control by Particle Swarm Optimization Technique for Control of CSTR International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:5, No:, 20 Optimized Fuzzy Control by Particle Swarm Optimization Technique for Control of CSTR Saeed

More information

Conception and Development of a Health Care Risk Management System

Conception and Development of a Health Care Risk Management System 2011 International Conference on Biomedical Engineering and Technology IPCBEE vol.11 (2011) (2011) IACSIT Press, Singapore Conception and Development of a Health Care Risk Management System Nesrine Zoghlami,

More information

Adaptive Optimal Scheduling of Public Utility Buses in Metro Manila Using Fuzzy Logic Controller

Adaptive Optimal Scheduling of Public Utility Buses in Metro Manila Using Fuzzy Logic Controller Adaptive Optimal Scheduling of Public Utility Buses in Metro Manila Using Fuzzy Logic Controller Cyrill O. Escolano a*, Elmer P. Dadios a, and Alexis D. Fillone a a Gokongwei College of Engineering De

More information

Group Testing a tool of protecting Network Security

Group Testing a tool of protecting Network Security Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612

International Journal of Recent Trends in Electrical & Electronics Engg., Feb. 2014. IJRTE ISSN: 2231-6612 Spoofing Attack Detection and Localization of Multiple Adversaries in Wireless Networks S. Bhava Dharani, P. Kumar Department of Computer Science and Engineering, Nandha College of Technology, Erode, Tamilnadu,

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets

Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets Methodology for Emulating Self Organizing Maps for Visualization of Large Datasets Macario O. Cordel II and Arnulfo P. Azcarraga College of Computer Studies *Corresponding Author: macario.cordel@dlsu.edu.ph

More information

Experiment #1, Analyze Data using Excel, Calculator and Graphs.

Experiment #1, Analyze Data using Excel, Calculator and Graphs. Physics 182 - Fall 2014 - Experiment #1 1 Experiment #1, Analyze Data using Excel, Calculator and Graphs. 1 Purpose (5 Points, Including Title. Points apply to your lab report.) Before we start measuring

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Power management of video transmission on wireless networks for multiple receivers

Power management of video transmission on wireless networks for multiple receivers Power management of video transmission on wireless networks for multiple receivers Christos Bouras, Kostas Stamos and Giannis Zaoudis Research Academic Computer Technology Institute and Computer Engineering

More information

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks H. T. Kung Dario Vlah {htk, dario}@eecs.harvard.edu Harvard School of Engineering and Applied Sciences

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

DESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS

DESIGN AND STRUCTURE OF FUZZY LOGIC USING ADAPTIVE ONLINE LEARNING SYSTEMS Abstract: Fuzzy logic has rapidly become one of the most successful of today s technologies for developing sophisticated control systems. The reason for which is very simple. Fuzzy logic addresses such

More information

COMPUTER NETWORKS - LAN Interconnection

COMPUTER NETWORKS - LAN Interconnection LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Attacks on neighbor discovery

Attacks on neighbor discovery Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

A Novel Fuzzy Clustering Method for Outlier Detection in Data Mining

A Novel Fuzzy Clustering Method for Outlier Detection in Data Mining A Novel Fuzzy Clustering Method for Outlier Detection in Data Mining Binu Thomas and Rau G 2, Research Scholar, Mahatma Gandhi University,Kerala, India. binumarian@rediffmail.com 2 SCMS School of Technology

More information

A Quality of Service Scheduling Technique for Optical LANs

A Quality of Service Scheduling Technique for Optical LANs A Quality of Service Scheduling Technique for Optical LANs Panagiotis G. Sarigiannidis, Member, IEEE, Sophia G. Petridou, Member, IEEE, Georgios I. Papadimitriou, Senior Member, IEEE Department of Informatics

More information

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying

More information

About the NeuroFuzzy Module of the FuzzyTECH5.5 Software

About the NeuroFuzzy Module of the FuzzyTECH5.5 Software About the NeuroFuzzy Module of the FuzzyTECH5.5 Software Ágnes B. Simon, Dániel Biró College of Nyíregyháza, Sóstói út 31, simona@nyf.hu, bibby@freemail.hu Abstract: Our online edition of the software

More information

Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networks

Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networks Agent-based Simulation Study of Behavioral Anticipation: Anticipatory Fault Management in Computer Networs Avdhoot Saple M&SNet: AMSL (The Auburn Modeling and Simulation Laboratory) Computer Science and

More information

Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time

Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Tamsui Oxford Journal of Management Sciences, Vol. 0, No. (-6) Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Chih-Hsun Hsieh (Received September 9, 00; Revised October,

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System

Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System Megumi Kaneo # and Petar Popovsi Center for TeleInFrastructure (CTIF), Aalborg University Niels Jernes Vej 1, DK-90 Aalborg, Denmar

More information

Intelligent Agents Serving Based On The Society Information

Intelligent Agents Serving Based On The Society Information Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Fast Fuzzy Control of Warranty Claims System

Fast Fuzzy Control of Warranty Claims System Journal of Information Processing Systems, Vol.6, No.2, June 2010 DOI : 10.3745/JIPS.2010.6.2.209 Fast Fuzzy Control of Warranty Claims System Sang-Hyun Lee*, Sung Eui Cho* and Kyung-li Moon** Abstract

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

A Fuzzy Logic Based Approach for Selecting the Software Development Methodologies Based on Factors Affecting the Development Strategies

A Fuzzy Logic Based Approach for Selecting the Software Development Methodologies Based on Factors Affecting the Development Strategies Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(7): 70-75 Research Article ISSN: 2394-658X A Fuzzy Logic Based Approach for Selecting the Software Development

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

A Fuzzy System Approach of Feed Rate Determination for CNC Milling

A Fuzzy System Approach of Feed Rate Determination for CNC Milling A Fuzzy System Approach of Determination for CNC Milling Zhibin Miao Department of Mechanical and Electrical Engineering Heilongjiang Institute of Technology Harbin, China e-mail:miaozhibin99@yahoo.com.cn

More information

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Saumil Navalbhai Patel B.E., Gujarat University, India, 2007 PROJECT. Submitted in partial satisfaction of the requirements for the degree of

Saumil Navalbhai Patel B.E., Gujarat University, India, 2007 PROJECT. Submitted in partial satisfaction of the requirements for the degree of POWER LOAD BALANCING USING FUZZY LOGIC Saumil Navalbhai Patel B.E., Gujarat University, India, 2007 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Clustering. Data Mining. Abraham Otero. Data Mining. Agenda

Clustering. Data Mining. Abraham Otero. Data Mining. Agenda Clustering 1/46 Agenda Introduction Distance K-nearest neighbors Hierarchical clustering Quick reference 2/46 1 Introduction It seems logical that in a new situation we should act in a similar way as in

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Strategic Online Advertising: Modeling Internet User Behavior with

Strategic Online Advertising: Modeling Internet User Behavior with 2 Strategic Online Advertising: Modeling Internet User Behavior with Patrick Johnston, Nicholas Kristoff, Heather McGinness, Phuong Vu, Nathaniel Wong, Jason Wright with William T. Scherer and Matthew

More information

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University

More information

A Neuro-Fuzzy Classifier for Customer Churn Prediction

A Neuro-Fuzzy Classifier for Customer Churn Prediction A Neuro-Fuzzy Classifier for Customer Churn Prediction Hossein Abbasimehr K. N. Toosi University of Tech Tehran, Iran Mostafa Setak K. N. Toosi University of Tech Tehran, Iran M. J. Tarokh K. N. Toosi

More information

Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and Motion Optimization for Maritime Robotic Research

Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and Motion Optimization for Maritime Robotic Research 20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and

More information

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

More information