Nonlinear Analysis: Real World Applications
|
|
- Harold Golden
- 8 years ago
- Views:
Transcription
1 Nonlinear Analysis: Real World Applications 11 (21) Contents lists available at ScienceDirect Nonlinear Analysis: Real World Applications journal homepage: Fuzzy epidemic model for the transmission of worms in computer network Bimal Kumar Mishra a,, Samir Kumar Pandey b a Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi, , India b Department of Applied Mathematics, Ramchandra Chandravansi Institute of Technology, Bishrampur, Palamau, , India a r t i c l e i n f o a b s t r a c t Article history: Received 3 February 21 Accepted 1 May 21 Keywords: Epidemic model Worms Fuzzy sets/logic Computer network Fuzzy reproductive number An e-epidemic SIRS (susceptible infectious recovered susceptible) model for the fuzzy transmission of worms in computer network is formulated. We have analyzed the comparison between classical basic reproduction number and fuzzy basic reproduction number, that is, when both coincide and when both differ. The three cases of epidemic control strategies of worms in the computer network low, medium, and, high are analyzed, which may help us to understand the attacking behavior and also may lead to control of worms. Numerical methods are employed to solve and simulate the system of equations developed. 21 Elsevier Ltd. All rights reserved. 1. Introduction The growth of Internet technology has thrown severe challenges in form of requirement of a suitable cyber defense system to safeguard the valuable information stored on system and for information in transit. Towards this goal it makes us necessary to study and understand the different type of worms and develop mathematical models to represent their behavior. Worms behave like infectious diseases and are epidemic in nature. A computer worm is a self contained program that is able to spread functional copies of itself or its segment to other computer system without a dependency on another program to host its code. Model s ability to predict worm s behavior depends greatly on the assumptions made in the modeling process. The mathematical models will be generalized to represent the behavior of numerous other worms. The generalized model will be incorporated into a cyber defense system to proactively safeguard the information and information interchange. The action of worms throughout a network can be studied by using epidemiological models for disease propagation [1 1]. Based on the Kermack and McKendrick SIR classical epidemic model [11 13], dynamical models for malicious objects propagation were proposed, providing estimations for temporal evolutions of nodes depending on network parameters considering topological aspects of the network [1 3,14 17]. The kind of approach was applied to propagation schemes [18] and modification of SIR models generated guides for infection prevention by using the concept of epidemiological threshold [1 3,19]. Richard and Mark [2] propose an improved SEI (susceptible exposed infected) model to simulate virus propagation. However, they do not show the length of latency and take into account the impact of anti-virus software. The model SEIR proposed by the authors [21] assumes that recovery hosts have a permanent immunization period with a certain probability, which is not consistent with real situation. In order to overcome limitation, Mishra and Saini [1] present an SEIRS model with latent and temporary immune periods, which can reveal common worm propagation. Recently, more research attention has been paid to the combination of virus propagation model and antivirus countermeasures to study the prevalence of virus, e.g., virus immunization [3,22 26] and quarantine [27 29]. Extending the SEIRS model of [1], Mishra et al. introduced new compartment quarantine and its effect has been analyzed in [3]. Corresponding author. Tel.: addresses: drbimalmishra@gmail.com (B.K. Mishra), samir.phd29@gmail.com (S.K. Pandey) /$ see front matter 21 Elsevier Ltd. All rights reserved. doi:1.116/j.nonrwa
2 4336 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) α ε γ Fig. 1. Schematic diagram for flow of worms in computer network. Transmissions of malicious objects (virus, worms, Trojans) in computer network are analogous to biological infectious diseases and are epidemic in nature. Epidemic systems, in particular those dealing with infectious diseases, have strong non-linearities and should be treated in a different way. These non-linearities are due to the fact that force of epidemic of an infectious agent, depends, among other things, on the fraction of susceptible nodes and fraction of infectious nodes. Both susceptibility and infectiousness are intrinsically fuzzy concepts and are, therefore, ideal subjects for fuzzy logic analysis. The mathematical models of transmission of worms in computer network are always subject to inaccuracies related to the nature of the state variables involved, parameters and/or initial conditions. In these models, the estimation of parameters is usually based on statistical methods, starting from data obtained experimentally to the choice of the method adapted to their identification. In this paper, we have used the concept of Fuzzy Set/Relations Theory which is an extension of the concept of a crisp set. It also deals with the techniques of computing and manipulating with fuzzy sets. Though Fuzzy epidemic models for human infectious disease have been well studied [31 39] but very few applications and research papers, using fuzzy logic, in the transmission of malicious objects in computer network exists in literature. 2. The simple SIRS model A simple classical SIRS model describe the dynamics of directly transmitted worms with interaction among susceptible, infected and recovered nodes in the computer network without neither vital dynamics (i.e. the rates of birth and mortality (reason other than attack of worms) are not considered), nor additional disease fatality rate. The Schematic diagram for the flow of worms in computer network (Fig. 1) model can be represented as: The system of differential equations of such models is given by: ds = αis + γ S di = αis εr dr = εr γ S where, S + I + R = 1, and S is the proportion of susceptible nodes, I is the proportion of infected nodes, R is the proportion of recovered nodes, α is the contact rate, ε is the recovery rate and γ is the rate of susceptible after recovery. We now suppose an extension of the SIRS model incorporating heterogeneities, considering that nodes with different amount of worms contribute differently to the worm propagation. 3. The SIRS fuzzy model We assume that the population heterogeneity is given by the worm load of infected nodes. That is, the higher the worm load, the higher will be the chance of worm transmission. We take α = α(x) measures the chance of a transmission to occur in a meeting between a susceptible and an infected nodes with an amount of worms x. Then some values of α are more possible than others and that turns α into a membership function of a fuzzy number. To obtain the membership function α, we assume when the amount of worms in a node is relatively low, the chance of transmission is negligible and that there is a minimum amount of worms x min needed to cause transmission. Furthermore, for a certain amount of worms x M, the chance of transmission is maximum and equal to one. We also suppose that the amount of worms in a node in a computer is always limited by. Then we define the following membership function, whose representation is depicted in Fig. 2 [39]. α(x) =, if x < x min x x min, if x min < x < x M x M x min 1, if x M < x <. Now, the node s recovery rate ε = ε(x) is also a function of the worm load. The higher the worm load, the longer it will take to recover from infection. i.e., ε should be a decreasing function of x (Fig. 3). That is, ε(x) = ε 1 x + 1 (4) where, ε > is the lowest recovery rate. (1) (2) (3)
3 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) α (x) x min x M Fig. 2. Fuzzy coefficient of worm transmission α = α(x). ε (x) ε x Fig. 3. Recovery fuzzy rate ε = ε(x). γ (x) γ x Fig. 4. Fuzzy rate of susceptibility γ = γ (x). Now, γ = γ (x) is the rate of susceptible after recovery, that is, the recovered nodes may be susceptible again. The higher we use secondary devices and/or internet services, the higher it will be susceptible after recovery. So, it will be increasing function of x (Fig. 4) and we define this function as, γ (x) = 1 γ x where, γ > (and <1) is the lowest susceptibility rate after recovery. We also assume that the amount of worms differ in different nodes of the computer network, that is, x can be seen as a fuzzy number with a triangular shape, according to the following membership function (Fig. 5): ρ(x) = x x 1, if x [ x δ, x + δ] δ, if x [ x δ, x + δ] where the parameter x is a central value and δ gives the dispersion of each one of the fuzzy sets assumed by x. For a fixed x, ρ(x) can has a linguistic meaning such as, low, medium and so on. (5) (6)
4 4338 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) ρ + Fig. 5. Membership function of the variable x, mount of the worms ρ [39]. 4. Solution and equilibrium points To study the evolution of number of infected nodes, that is, if the number of infected nodes increases indefinitely or not, we study the stability of equilibrium points. For this, from the system (1) and Eq. (2), we have ds = αis + γ S di = αis ε(1 S I). Then, for the equilibrium points, we take, ds = and di =, we get three equilibrium points P 1 (1,, ), P 2 (, 1, ) and ( ) ε(α γ ) P 3 α(γ +ε), γ α, γ (α γ ). The analysis of the stability of the system (1) shows that P α(γ +ε) 1, P 2 are unstable but P 3 (with γ α) is asymptotically stable, which indicates that even if the number of infected nodes increases (supposing initially I small), this number will stabilize in γ (α γ ) ε(α γ ). Moreover, of the population will not be affected. α(γ +ε) α(γ +ε) Now, taking into account the worm load, we have, ( ε(x)(α(x) γ (x)) P 3 = α(x)(γ (x) + ε(x)), γ (x) ) γ (x)(α(x) γ (x)),. α(x) α(x)(γ (x) + ε(x)) As γ (x) α(x) < 1, so, a value of bifurcation for x is x, the solution of the equation γ (x) = α(x) will be, x = x M + (1 γ )(x M x min ). And x min x x M. The worm load x is the value of the bifurcation of the model since for the values x < x the model has two unstable equilibrium points P 1 and P 2 and if x > x the model has an asymptotically stable point P 3. In this way, we can think of x as a parameter related to the worm control in the sense that if a worm is transmitted in some number of nodes, it should be noted that, x is not higher than x. (A) (7) 5. The basic reproduction number As we know that, the basic reproduction number (R ) is obtained through the analysis of the stability of the trivial equilibrium point. For the classical SIRS model R = α ε, that is, the worms will not be in nodes if α ε < 1 and it will be if α ε > 1. As in this case, we have taken, α = α(x) and ε = ε(x), then we write, R (x) = α(x) ε(x). To control the worm transmission, we impose max R (x) < 1. But it is better to take an average value of R (x) because it can be an extreme attitude. For this, we consider the distribution of the worm load as given by a triangular fuzzy number ρ(x). Then, we define the fuzzy basic reproduction number, R f = 1 ε FEV[ε R (x)] (8)
5 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) where FEV is Fuzzy Expected Value. Note that R (x) may be greater than one but ε R (x) 1, so that the value R f is well defined. This is defined as the average number of secondary cases caused by just one infected node introduced into entirely susceptible nodes. To get FEV[ε R (x)] we need to define a fuzzy measure µ and use the possibility measure: µ(a) = sup ρ(x), A R. x A This is a measure tells that the infectivity of a group is the one presented by the node belonging to the group with the maximal infectivity. We now estimate R f assuming that the amount of worms classified as low, medium and high. The fuzzy sets given by the membership function ρ(x) for different cases are: (a) low, if x + δ < x min ; (b) medium, if x δ > x min and x + δ x M ; and (c) high, if x δ > x M. Case (a) It is quite obvious that R f < 1 if x is low. Now, to obtain R f for cases (b) and (c), since R (x) = α(x) ε(x) is an increasing function of x, then H(θ) = µ[x, ] = sup x x ρ(x), where, H(θ) = µ{i(x, t) θ} and FEV[I(x, t)] is the fixed point of H(θ) [38] and x is the solution of the α(x) equation ε ε(x) = θ. Since the fixed point of H(θ) is same as that of FEV[ε R (x)]. Case (b) By the direct calculation, we conclude that, α( x) 1 if θ ε ε( x) H(θ) = ρ(x α( x) ) if ε ε( x) < θ ε α( x + δ). ε( x + δ) α( x + δ) if ε ε( x + δ) < θ 1 Obviously, if δ >, H is a continuous and decreasing function, and in this case, we have that FEV[ε R (x)] is equal to the fixed point of H. Also, we have by direct calculation, α( x) ε x < FEV[ε R (x)] α( x + δ) < ε ε( x + δ) Case (c) As in the previous case, we conclude that, R f > 1 ε( x) > 1. or R ( x) < R f < R ( x + δ). 1 < R f ε( x) < 1 and it guarantees that the worms invade since ε( x+δ) 6. Comparison between R and R f Here we have analyzed the three cases discussed in the previous section related to the three classifications for the amount of infections: low, medium and high worm load. In any of the three cases, we have, α( x) ε( x) < FEV[ε R (x)] α( x + δ) < ε ε( x + δ) or R ( x) < R f < R ( x + δ). As the function R (x) = α(x) is continuous and curved shape based on the Intermediate Value Theorem, there is only one ˆx, ε(x) with x < ˆx < x + δ, so that: R f = R (ˆx) > R ( x). (9) It means that, there is an amount of infection ˆx where R (classical) and the R f (fuzzy) coincide. Moreover, the medium value of the number of secondary cases (R f ) is higher than the number of secondary cases due to the medium amount of infection (R ( x)). 7. Epidemic control strategies The system of Eqs. (1) is the classical mathematical model to study about the worm transmission of SIRS type in a homogeneous system of total number of nodes in computer network. Although we use such a system of equations to model the evolution of worm transmission in a heterogeneous system of nodes, such as the one presented in our model where the nodes are distinguished by the amount of infection and, consequently, they present different rates of contact α(x), of recovery ε(x) and of susceptibility γ (x). We understand (1) as a family of systems depending on the parameter x. However,
6 434 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) POPULATION GROUPS- S, I AND R GRAPHS FOR THE SIR MODEL SUSCEPTIBLE INFECTED REMOVED TIME Fig. 6. Dynamical behavior of the system with α =.4, ε =.2, γ =.24. if we intend to simplify it in the sense of replacing that family of systems by a unique system of equations, with the same outcomes (that is, the same number of secondary cases) that the family as a whole, the above analysis shows that, among the different systems of families, there is one which performs this role, namely, that which parameters are α = α(ˆx), ε = ε(ˆx) and γ = γ (ˆx) and not that which represents the system of nodes with medium amount of infection ˆx. Moreover, according to (9), R ( x) as an indicator of worm control forces us to find out the correct parameter for the total number of nodes as a whole, that is R (ˆx). To justify even more the legitimacy of system (1) with the parameter ˆx, to describe the dynamics of the worms in the total number of nodes as a whole, we will study the control of the worms in the total number of nodes through R (ˆx) = R f : i. For the case where the amount of infection is low, we have ˆx < x + δ x min. Therefore R (ˆx) = and the worm will not establish itself. ii. For the case the amount of infection is high, we have ˆx > x > x + δ x M. Therefore, R (ˆx) = 1 ε( x) the worm will invade. iii. For the case of medium amount of infection we have: a. if x > ˆx then R (ˆx) = α(ˆx) ε(ˆx) < α(x ) ε(x = 1, indicating that the worm will not invade; and ) b. if x < ˆx then R (ˆx) = α(ˆx) ε(ˆx) > α(x ) ε(x = 1 indicating that the worm will invade. ) > 1, indicating that Finally, it is shown that R f is the positive solution of an equation of second degree, with characteristics that allow us to deduce and decrease the medium amount of infection, by the use of continuous run of anti-virus software, for example, and quarantine (decreasing δ) of the infected nodes. 8. Conclusion A compartmental e-epidemic model SIRS for the transmission of worms in computer network is studied. Numerical methods are employed to solve the system (A) and the behavior of the susceptible, infectious, and recovered nodes with respect to time are observed which is depicted in Fig. 6. Stability of the system can be observed from Fig. 6. The parameters, we have used to develop the system of equations, are treated as a membership function depending on x, a fuzzy number, and also the family of system depending on this fuzzy number x. Using this, we get R f (fuzzy basic reproduction number), by the help of R (classical basic reproduction number) and conclude that, by the help of Intermediate Value Theorem, there will be an amount of infected nodes in the computer network, where both R and R f coincides. We also analyzed the three cases of epidemic control strategies as, when the amount of infection will be low, worms will not be in the network, for the high amount of infection, worm will invade and for the medium amount of infection, worm may or may not invade the computer network.
7 B.K. Mishra, S.K. Pandey / Nonlinear Analysis: Real World Applications 11 (21) References [1] Bimal Kumar Mishra, D.K. Saini, SEIRS epidemic model with delay for transmission of malicious objects in computer network, Appl. Math. Comput. 188 (2) (27) [2] Bimal Kumar Mishra, Dinesh Saini, Mathematical models on computer viruses, Appl. Math. Comput. 187 (2) (27) [3] Bimal Kumar Mishra, Navnit Jha, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Appl. Math. Comput. 19 (2) (27) [4] E. Gelenbe, Dealing with software viruses: a biological paradigm, Inform. Secur. Tech. Rep. 12 (4) (27) [5] Erol Gelenbe, Keeping viruses under control, in: Computer and Information Sciences ISCIS 25, 2th International Symposium, in: Lecturer Notes in Computer Science, vol. 3733, Springer, 25. [6] Erol Gelenbe, Varol Kaptan, Yu Wang, Biological metaphors for agent behavior, in: Computer and Information Sciences ISCIS 24, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 328, Springer-Verlag, 24, pp [7] J.R.C. Piqueira, F.B. Cesar, Dynamic models for computer virus propagation, Math. Probl. Eng. doi:1.1155/28/ [8] J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1) (25) [9] S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp [1] Y. Wang, C.X. Wang, Modeling the effect of timing parameters on virus propagation, in: 23 ACM Workshop on Rapid Malcode, ACM, 23, pp [11] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115 (1927) [12] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138 (1932) [13] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141 (1933) [14] C.C. Zou, W.B. Gong, D. Towsley, L.X. Gao, The monitoring and early detection of internet worms, IEEE/ACM Trans. Netw. 13 (5) (25) [15] J.O. Kephart, S.R. White, D.M. Chess, Computers and epidemiology, IEEE Spectr. (1993) [16] M.J. Keeling, K.T.D. Eames, Network and epidemic models, J. R. Soc. Interface 2 (4) (25) [17] Ma.M. Williamson, J. Leill, An epidemiological model of virus spread and cleanup, [18] M.E.J. Newman, S. Forrest, J. Balthrop, networks and the spread of computer virus, Phys. Rev. E 66 (22) [19] M. Draief, A. Ganesh, L. Massouili, Thresholds for virus spread on network, Ann. Appl. Probab. 18 (2) (28) [2] W.T. Richard, J.C. Mark, Modeling virus propagation in peer-to-peer networks, in: IEEE International Conference on Information, Communication and Signal Processing, ICICS, 25, pp [21] Ping Yan, Shengqiang Liu, SEIR epidemic model with delay, J. Aust. Math. Soc. Ser. B 48 (1) (26) [22] J.O. Kephart, A biologically inspired immune system for computers, in: Proceeding of International Joint Conference on Artificial Intelligence, [23] N. Madar, T. Kalisky, R. Cohen, D. Ben Avraham, S. Havlin, Immunization and epidemic dynamics in complex networks, Eur. Phys. J. B 38 (24) [24] R. Pastor-Satorras, A. Vespignani, Epidemics and immunization in scale-free networks, in: Handbook of Graphs and Network: From the Genome to the Internet, Wiley-VCH, Berlin, 22. [25] R.M. May, A.L. Lloyd, Infection dynamics on scale-free networks, Phys. Rev. E 64 (66112) (21) 1 3. [26] S. Datta, H. Wang, The effectiveness of vaccinations on the spread of -borne computer virus, in: IEEE CCECE/CCGEL, IEEE, 25, pp [27] C.C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: Proceeding of the ACM CCS Workshop on Rapid Malcode, ACM, 23, pp [28] D. Moore, C. Shannon, G.M. Voelker, S. Savage, Internet quarantine: requirements for containing self-propagating code, in: Proceeding of IEEE INFOCOM 23, IEEE, 23. [29] T. Chen, N. Jamil, Effectiveness of quarantine in worm epidemic, in: IEEE International Conference on Communications 26, IEEE, 26, pp [3] Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (21) [31] G.J. Klir, B. Yuan, Fuzzy Sets and Fuzzy Logic, Prentice Hall, Upper Saddle River, [32] E. Massad, M.N. Burattini, N.R.S. Ortega, Fuzzy logic and measles vaccination: designing a control strategy, Int. J. Epidemiol. 28 (3) (1999) [33] N.R.S. Ortega, P.C. Sallum, E. Massad, Fuzzy dynamical systems in epidemic modelling, Kybernetes 29 (12) (2) [34] K.J. Rothman, S. Greenland, Modern Epidemiology, Lippincott-Raven, Philadelphia, [35] G. Shafer, Belief functions and possibility measures, in: Bezdek J.C. (Ed.), Analysis of Fuzzy Information Mathematics and Logic, vol. 1, USA, 1987, pp [36] R.R. Yager, D.P. Filev, Essentials of Fuzzy Modeling and Control, Wiley-Interscience, New York, [37] J. Yen, R. Langari, Fuzzy Logic: Intelligence, Control, and Information, Prentice-Hall, New Jersey, [38] E. Massad, et al., Fuzzy Logic in Action: Applications and Epidemiology and Beyond, in: STUDFUZZ, vol. 232, Springer-Verlag, Berlin, Heidelberg, 28. [39] L.C. Barros, R.C. Bassanezi, M.B.F. Leite, The epidemiological models SI with a fuzzy transmission, Comput. Math. Appl. 45 (23)
Study of Virus Propagation Model Under the Cloud
Tongrang Fan, Yanjing Li, Feng Gao School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, 543, China Fantr29@26.com, 532465444 @qq.com, f.gao@live.com bstract. The
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationThe Effect of Infection Time on Internet Worm Propagation
The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1 Background Worms are self propagating programs that spread over a network,
More informationStability analysis of a novel VEISV propagation model of computer worm attacks
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 3, pp. 163-174 Stability analysis of a novel VEISV propagation model of computer worm attacks M. Javidi 1, N. Nyamorady
More informationApplications of improved grey prediction model for power demand forecasting
Energy Conversion and Management 44 (2003) 2241 2249 www.elsevier.com/locate/enconman Applications of improved grey prediction model for power demand forecasting Che-Chiang Hsu a, *, Chia-Yon Chen b a
More informationMitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme
Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with
More informationIntelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
More informationAn Approach against a Computer Worm Attack
48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono;
More informationResearch Article Adaptive Human Behavior in a Two-Worm Interaction Model
Discrete Dynamics in ature and Society Volume 22, Article ID 828246, 3 pages doi:.55/22/828246 Research Article Adaptive Human Behavior in a Two-Worm Interaction Model Li-Peng Song,, 2 Xie Han,, 2 Dong-Ming
More informationarxiv:cond-mat/0207387v3 [cond-mat.dis-nn] 10 Dec 2003
Efficient Immunization Strategies for Computer Networs and Populations Reuven Cohen, Shlomo Havlin, and Daniel ben-avraham 2 Minerva Center and Department of Physics, Bar-Ilan University, Ramat-Gan, 529,
More informationUsing Real Data in an SIR Model
Using Real Data in an SIR Model D. Sulsky June 21, 2012 In most epidemics it is difficult to determine how many new infectives there are each day since only those that are removed, for medical aid or other
More informationTowards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
More informationEpidemic Enhancement in Partially Immune Populations
in Partially Immune Populations Juliet R. C. Pulliam 1 *, Jonathan G. Dushoff 1,2, Simon A. Levin 1, Andrew P. Dobson 1 1 Department of Ecology and Evolutionary Biology, Princeton University, Princeton,
More informationEinführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models
Einführung in die Mathematische Epidemiologie: Introduction to Mathematical Epidemiology: Deterministic Compartmental Models Nakul Chitnis Universität Basel Mathematisches Institut Swiss Tropical and Public
More informationFeedback Email Worm Defense System for Enterprise Networks
Feedback Email Worm Defense System for Enterprise Networks Cliff C. Zou*, Weibo Gong*, Don Towsley *Dept. Electrical & Computer Engineering Dept. Computer Science University of Massachusetts, Amherst Technical
More informationNetwork Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
More informationDisease Transmission Networks
Dynamics of Disease Transmission Networks Winfried Just Ohio University Presented at the workshop Teaching Discrete and Algebraic Mathematical Biology to Undergraduates MBI, Columbus, OH, July 31, 2013
More informationUnderstanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)
Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay ttachibana@csumb.edu
More informationEFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
More informationCoordination in Network Security Games
Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating
More informationREQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS
REQUIREMENTS ON WORM MITIGATION TECHNOLOGIES IN MANETS Robert G. Cole and Nam Phamdo JHU Applied Physics Laboratory {robert.cole,nam.phamdo}@jhuapl.edu Moheeb A. Rajab and Andreas Terzis Johns Hopkins
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationEffects of node buffer and capacity on network traffic
Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,
More informationModel-Based Analysis of Two Fighting Worms
ICCCE '6, Kuala Lumpur, alaysia, ay 26, Vol-I, Page 157-163. odel-based Analysis of Two Fighting Worms Zakiya. Tamimi 1 1 Faculty of Information Technology Arab American University- Jenin Jenin, Palestine,
More informationPareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing
Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing Atsushi Inoie, Hisao Kameda, Corinne Touati Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba
More informationDetermining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
More informationEstimation of effective vaccination rate: pertussis in New Zealand as a case study
Journal of Theoretical Biology 224 (2003) 269 275 Estimation of effective vaccination rate: pertussis in New Zealand as a case study A. Korobeinikov a, *,1, P.K. Maini a,2, W.J. Walker b a Centre for Mathematical
More informationBiology and Computer Science, Northeastern University, Boston, MA 02115. Massachusetts Institute of Technology, Cambridge, MA 02139.
NEW GENERATION OF MOBILE PHONE VIRUSES AND CORRESPONDING COUNTERMEASURES Pu Wang 1,2,3, Marta C. González 1,3, Ronaldo Menezes 4 & Albert-LászlóBarabási 1,5 1 Center for Complex Network Research, Department
More informationA New Nature-inspired Algorithm for Load Balancing
A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of
More informationHow to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help
How to Explain (and Overcome) 2% Barrier in Teaching Computer Science: Fuzzy Ideas Can Help Olga Kosheleva 1 and Vladik Kreinovich 2 1 Department of Teacher Education 2 Department of Computer Science University
More informationA DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM
A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College
More informationNetwork protection against worms and cascading failures using modularity partitioning
Network protection against worms and cascading failures using modularity partitioning Jasmina Omić Network Architectures and Services Delft University of Technology Delft, Netherlands Email: J.Omic@tudelft.nl
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationLeast Effort Strategies for Cybersecurity
GORMAN, KULKARNI, SCHINTLER, AND STOUGH: LEAST EFFORT STRATEGIES FOR CYBERSECURITY 1 Least Effort Strategies for Cybersecurity Sean P. Gorman*, Rajendra G. Kulkarni, Laurie A. Schintler, Ph.D., and Roger
More informationBifurcation analysis in a delayed computer virus model with the effect of external computers
Zhang and Bi Advances in Difference Equations (215) 215:317 DOI 1.1186/s13662-15-652-y R E S E A R C H Open Access Bifurcation analysis in a delayed computer virus model with the effect of external computers
More informationBRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
More informationHow To Find Influence Between Two Concepts In A Network
2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing
More informationOptimization of PID parameters with an improved simplex PSO
Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng
More informationCHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationOptimal worm-scanning method using vulnerable-host distributions
Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,
More informationComputer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
More informationMathematical Approaches to Infectious Disease Prediction and Control
Mathematical Approaches to Infectious Disease Prediction and Control Nedialko B. Dimitrov Operations Research Department, Naval Postgraduate School, Monterey, California ned@alumni.cs.utexas.edu Lauren
More informationDiána H. Knipl PhD student University of Szeged, Hungary
ANTI-GRAVITY MODELS FOR EPIDEMIC SPREAD OF INFECTIOUS DISEASES ON LONG DISTANCE TRAVEL NETWORKS Diána H. Knipl PhD student University of Szeged, Hungary Based on the joint work with G. Röst (U of Szeged)
More informationAN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationOPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 Virender Kumar Department of Electronics & Communication Engineering, HCTM Technical Campus, Kaithal, India gangotrahctm@gmail.com ABSTRACT Mobile
More informationTowards Better Definitions and Measures of Internet Security (Position Paper)
Towards Better Definitions and Measures of Internet Security (Position Paper) J. Aspnes and J. Feigenbaum Yale University {aspnes,feigenbaum}@cs.yale.edu M. Mitzenmacher and D. Parkes Harvard University
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationSpectral Flatness Measurements for Detection of C-Worms
Spectral Flatness Measurements for Detection of C-Worms Rajesh Jaladi #1, Mr. Rakesh Nayak #`2 #1M.tech Student,Dept of CSE, 1 Sri Vasavi Engineering College, Tadepalligudem, Andhra Pradesh, #2Assoc.Professor,Dept
More informationFuzzy regression model with fuzzy input and output data for manpower forecasting
Fuzzy Sets and Systems 9 (200) 205 23 www.elsevier.com/locate/fss Fuzzy regression model with fuzzy input and output data for manpower forecasting Hong Tau Lee, Sheu Hua Chen Department of Industrial Engineering
More informationChapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
More informationDynamic Quarantine of Internet Worms
The International Conference on Dependable Systems and Networks (DSN-24). Palazzo dei Congressi, Florence, Italy. June 28th - July, 24. Dynamic Quarantine of Internet Worms Cynthia Wong, Chenxi Wang, Dawn
More informationTime series analysis as a framework for the characterization of waterborne disease outbreaks
Interdisciplinary Perspectives on Drinking Water Risk Assessment and Management (Proceedings of the Santiago (Chile) Symposium, September 1998). IAHS Publ. no. 260, 2000. 127 Time series analysis as a
More informationA Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationA Robust Method for Solving Transcendental Equations
www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,
More informationThe Theory of Concept Analysis and Customer Relationship Mining
The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com
More informationMathematical Modeling of Dengue - Temperature Effect on Vectorial Capacity
Mathematical Modeling of Dengue - Temperature Effect on Vectorial Capacity Jing Helmersson 2012 Supervisor: Joacim Rocklöv Abstract Background As climate change and globalization continues, the vector
More informationStatistical Forecasting of High-Way Traffic Jam at a Bottleneck
Metodološki zvezki, Vol. 9, No. 1, 2012, 81-93 Statistical Forecasting of High-Way Traffic Jam at a Bottleneck Igor Grabec and Franc Švegl 1 Abstract Maintenance works on high-ways usually require installation
More informationAn Experimental Study of the Performance of Histogram Equalization for Image Enhancement
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 216 E-ISSN: 2347-2693 An Experimental Study of the Performance of Histogram Equalization
More informationIdentification of TV Programs Based on Provider s Logo Analysis
AUTOMATYKA 2010 Tom 14 Zeszyt 3/1 Marta Chodyka*, W³odzimierz Mosorow** Identification of TV Programs Based on Provider s Logo Analysis 1. Introduction The problem of an easy access of underage persons
More informationA Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks
A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,
More informationGA as a Data Optimization Tool for Predictive Analytics
GA as a Data Optimization Tool for Predictive Analytics Chandra.J 1, Dr.Nachamai.M 2,Dr.Anitha.S.Pillai 3 1Assistant Professor, Department of computer Science, Christ University, Bangalore,India, chandra.j@christunivesity.in
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationThe Optimistic Total Order Protocol
From Spontaneous Total Order to Uniform Total Order: different degrees of optimistic delivery Luís Rodrigues Universidade de Lisboa ler@di.fc.ul.pt José Mocito Universidade de Lisboa jmocito@lasige.di.fc.ul.pt
More informationA Performance Comparison of Five Algorithms for Graph Isomorphism
A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,
More informationBio-inspired mechanisms for efficient and adaptive network security
Bio-inspired mechanisms for efficient and adaptive network security Falko Dressler Computer Networks and Communication Systems University of Erlangen-Nuremberg, Germany dressler@informatik.uni-erlangen.de
More informationISSH 2011 ABM Track - Hands-on Exercise
ISSH 2011 ABM Track - Hands-on Exercise Authors: Shawn Brown, University of Pittsburgh, stbrown@psc.edu John Grefenstette, University of Pittsburgh, gref@pitt.edu Nathan Stone, Pittsburgh Supercomputing
More informationAn Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers
An Evaluation of Network Survivability When Defense Levels Are Discounted by the Accumulated Experience of Attackers Frank Yeong-Sung Lin National Tatiwan University, Taiwan yslin@im.ntu.edu.tw Pei-Yu
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationReal Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
More informationCURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING
Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila
More informationScale-free user-network approach to telephone network traffic analysis
Scale-free user-network approach to telephone network traffic analysis Yongxiang Xia,* Chi K. Tse, WaiM.Tam, Francis C. M. Lau, and Michael Small Department of Electronic and Information Engineering, Hong
More informationHow To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
More informationOn the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
More informationA Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy
International Journal of Modeling Optimization, Vol 5, No 3, June 2015 A Local Stability of Mathematical Models for Cancer Treatment by Using Gene Therapy Dwi Lestari Ratnasari Dwi Ambarwati Abstract This
More informationPeer to Peer Networks for Defense Against Internet Worms
Peer to Peer etworks for Defense Against Internet Worms Srinivas Shakkottai Dept. of Electrical and Computer Engineering and Coordinated Science Laboratory University of Illinois at Urbana-Champaign sshakkot@uiuc.edu
More informationResearch Article Worms Propagation Modeling and Analysis in Big Data Environment
Distributed Sensor Networks Volume 2015, Article ID 985856, 8 pages http://dxdoiorg/101155/2015/985856 Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang,
More informationFlexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com
More informationResponse time behavior of distributed voting algorithms for managing replicated data
Information Processing Letters 75 (2000) 247 253 Response time behavior of distributed voting algorithms for managing replicated data Ing-Ray Chen a,, Ding-Chau Wang b, Chih-Ping Chu b a Department of
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationSustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,
More informationReview Study on Techniques for Network worm Signatures Automation
Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationA Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks
A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,
More informationOn Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?
On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka
More informationNew Approach to Analysis of the Switching Current Data in Ferroelectric Thin Films
Ferroelectrics, 291: 27 35, 2003 Copyright c Taylor & Francis Inc. ISSN: 0015-0193 print / 1563-5112 online DOI: 10.1080/00150190390222510 New Approach to Analysis of the Switching Current Data in Ferroelectric
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationEFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationIntelligent Agents Serving Based On The Society Information
Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical
More informationUltrasonic Detection Algorithm Research on the Damage Depth of Concrete after Fire Jiangtao Yu 1,a, Yuan Liu 1,b, Zhoudao Lu 1,c, Peng Zhao 2,d
Advanced Materials Research Vols. 368-373 (2012) pp 2229-2234 Online available since 2011/Oct/24 at www.scientific.net (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.368-373.2229
More informationCOMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationFuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
More informationEdge-based active queue management
Edge-based active queue management L. Zhu, N. Ansari, G. Cheng and K. Xu Abstract: In the paper, a new framework of active queue management, namely, edge-based active queue management (), is proposed.
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More information