Data security in Intelligent Transport Systems
|
|
- Evangeline Long
- 8 years ago
- Views:
Transcription
1 Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Zdenek LOKAJ Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Martn SROTYR Czech Techncal Unversty n rague, FTS raha 1, Czech Republc ABSTRACT Intellgent Transport Servces expect avalablty of the secure seamless communcatons solutons typcally coverng wdely spread areas. Dfferent ITS solutons requre dfferent portfolo of telecommuncatons servce qualty. These parameters have to correspond wth ITS servce performance parameters requred by specfc servce. Even though qute extensve range of publc wreless data servces wth reasonable coverage are provded, most of them are provded wth no guaranteed qualty and securty. ITS requrements can be n most parameters easer reached f mult-path communcatons systems are appled core soluton s combned wth both publc as well as prvate ones where and when t s needed. Such soluton requres mplementaton of relevant flexble system archtecture supported by the effcent decson processes. Ths paper s concentrated the telecommuncatons securty ssues relevant to the ITS wde area networkng. Expected level of securty vares n dependence on relevant ITS servce requrements. Data volumes transferred both n prvate data vehcle on board networks as well as between vehcles and nfrastructure (C2I) or other vehcles (C2C) progressvely grow. Such trend upsurges the fatal problems appearance probablty n case securty of the wde area networks s not relevantly treated. That s reason why relevant communcatons securty treatment becomes crucal part of the ITS soluton. Besdes of avalable off shelf securty tools we present soluton based on non-publc unversal dentfer wth dynamcal extenson (tme and poston dependency as an autonomous varables) and data selecton accordng to actor role or category. resented results were obtaned wthn projects e-ident 1, DOTEK 2 and SRATVU 3. The effects of telematcs are based on synergy of both these dscplnes. Telematcs s appled n wde spectrum user areas, from an ndvdual multmeda communcaton towards ntellgent use and management of large-scale networks. Advanced telematcs solutons provde an ntellgent envronment for knowledge socety and allow expert knowledge descrpton of complex systems. It also ncludes legal, organzatonal, mplementaton and human aspects. Transport Telematcs/Intellgent Transport Systems (ITS) connects nformaton and telecommuncaton technologes wth transport engneerng to acheve better management of transport, travel and forwardng processes wth no addtonal requrements placed on the exstng transport nfrastructure. 2 ITS AND ITS ARCHITECTURE The ITS system model was adopted wthn ITS socety to support desgn process of the ITS applcatons. ITS soluton s expected to be desgned under prncples descrbed on Fgure [1].e. followng the ITS System Model rules. 1 INTRODUCTION Telematcs s a result of convergence and followng progressve synthess of telecommuncaton technology and nformatcs. 1 e-ident Electronc dentfcaton systems wthn transport process grant 2A-2T1/108.of Mnstry of Industry and Trade of the Czech Republc (MO), 2 DOTEK Communcaton module for transport telematc applcatons grant 2A-2T1/105 of MO, 3 SRATVU System Requrements and Archtecture of the unversal Telematc Vehcle Unt s grant 2A-1T1/138 of MO, Fg.1 ITS System Model Management process on Fgure 1 represents the methodology of smart ITS desgn and ts mantenance based on applcaton of well-tuned ITS system models. Defnton of set of the ndvdual system parameters was accepted wthn ITS socety, as well: Accuracy s the degree of conformance between system true parameters and ts measured values that can be defned as the probablty SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR
2 p p m, 1 1 (1) that the dfference between the requred system parameter and the measured parameter p m, wll not exceed the value 1 on probablty level 1 where ths defnton s applcable for all N system parameters p p,.., p,. 1 2 N Relablty s the ablty to perform a requred functon (process) under gven condtons for a gven tme nterval that can be defned as the probablty v v,t 0, (2) T t m,t 2 2 that the dfference between requred system functons (processes) represented by parameters measured parameters v m, t t p v and the vector of wll not exceed the value 2 on probablty level 2 n each tme nterval t from the nterval 0,T. Avalablty s the ablty to perform requred functons (processes) at the ntalzaton (trggerng) of the ntended operaton that can be defned as the probablty q q m, 3 3 (3) that the dfference between the requred rate 4 of successful performng of the functon (process ) q and the measured qm, wll not exceed the value at the probablty 3 level 3. Contnuty s the ablty to perform requred functons (processes) wthout non-scheduled nterrupton durng the ntended operaton that can be defned as the probablty r r m, 4 4 (4) that the dfference between the requred rate of successful performng of the functon (process ) wthout nterrupton and the measured rm, wll not exceed the value 4 at the probablty level 4. Integrty s the ablty to provde tmely and vald alerts to the user, when a system must not be used for the ntended operaton, that can be defned as the probablty S S m, 5 5 (5) that the dfference between the requred rate of successful performng of the alert lmt (AL) not later than predefned tme to alert (TTA) S and the measured wll not exceed the value 5 on the probablty level 5. Safety can also be covered among the performance parameters, but the rsk analyss and the rsk classfcaton must be done beforehand wth a knowledge of the system envronment and 4 Q qm where Q s the number of successful experments, Q (successful performng of the functon, successful performng of the process ) and Q s the number of all experments (both successful and unsuccessful). S m, r potental rsk, and then the safety can be defned as the probablty W W m, 6 6 (6) that the dfference between the requred rate of rsk stuatons W and the measured ones wll not exceed the value 6 on the probablty level 6. W A substantal part of the system parameters analyss s represented by a decomposton of system parameters nto ndvdual sub-systems of the telematc chan. One part of the analyss s the establshment of requrements on ndvdual functons and nformaton lnkage. Then, the whole telematc chan can comply wth the above defned system parameters. The completed decomposton of system parameters enables the development of a methodology for a follow-up analyss of telematc chans accordng to varous crtera (optmzaton of the nformaton transfer between a moble unt and a processng center, maxmum use of the exstng nformaton and telecommuncaton nfrastructure, etc.). In telecommuncaton exsts wde range of system parameters defntons. We adopted set of performance ndcators as follows: m, Avalablty o Servce Actvaton Tme, o Mean Tme to Restore (MTTR), o Mean Tme between Falure (MTBF) and o Vrtual Connecton Avalablty Delay as an accumulatve parameter effected by o Interfaces Rates, o Frame Sze, and o Load / Congeston of all actve nodes (swtches) n the lne acket/frames Loss Securty These telecommuncatons performance ndcators were specfcally redefned wth goal of compatblty wth telematcs performance parameters. Impact of telecommuncaton performance ndcators on the telematc performance must be ndcators transformablty smplfes system synthess. The addtve mpact of the communcatons performance ndcators vector tc on the vector of telematcs performance ndcators tm can be expressed as tm TM tc, where TM represents the transformaton matrx. It s vald, however, under condton that the probablty levels of all studed phenomena are on the same level and all performance ndcators are expressed exclusvely by parameters wth the same physcal dmenson typcally n tme or n tme convertble varable. The transformaton matrx constructon s dependent on the detaled communcaton soluton and ts ntegraton nto the telematc system. The probablty of the each phenomena appearance n context of the other processes s not deeply evaluated n the ntroductory perod, when the specfc structure of transformaton matrx s dentfed. In [7] [9] are presented detals of the proposed teratve method. Ths method s desgned as broadly as possble wth a clear am to be appled n the wdest possble range of telematc applcaton. Ths method can be also successfully used for dentfcaton of the decson processes crtera,.e. the tolerance range of each performance ndcator. Such nformaton represents necessary (but not suffcent) condton to let processes decde whch access path represents wthn the defned tme perod the best possble alternatve. 62 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012
3 3 COMMUNICATIONS SOLUTION STRUCTURE Fgure 2 presents telecommuncatons chan dagram, orgnally appled wthn the plot project at Arport rague (see e.g. [7] [10]). We accepted ths structure as typcal archtecture of ITS telematc solutons. On Board Unts (OBU), GNSS Sensng System (SS) and set of Wreless Unts (WL) are nstalled n the movng object. SS apples now exclusvely GS (Global ostonng System wth no SLA publcly avalable), but there s expected launch of the European Galleo GNSS servces as well as the second generaton of the GS servces wth guaranteed qualty of servce. OBU represents not only control but also dsplay and human communcaton servces and WL represents -th cellular technology of the wreless complex soluton. Terrestral communcaton part consst of set of moble cellular Base Statons (BS j ) (-th bases staton of the j-th cellular system) ntegrated by the terrestral network based on L3/L2 swtches/nodes (TN ) nterconnected wth Servers (S ). E2E (End to End) servce s provded based on I protocol, L2 swtchng s Ethernet protocol based. Fg. 2. Telematc telecommuncaton scheme n chan dagram One, preferred core access wreless technology would be accepted (f possble) as the core soluton to be combned wth alternatve solutons when and where t s needed. The core soluton would meet domnant servce qualty and coverage requrements beng corrected n the case where such parameters do not meet requrements under specfc condtons. Table 1 descrbes typcal behavor of prvate/publc telecommuncatons solutons. Tab. 1 ublc vs. prvate servces parameters rvate ublc Servce qualty Typcally Avalable Low (f any) management SLA Sgnal coverage Cost dependent - Hgh Typcally low (-er), rcng/cost Hgh (-er) Low (-er) If we evaluate realstcally telecommuncatons data servces market there are only few technology streams avalable for the ITS demandng applcatons. Each of these alternatves was studed n detal by authors n specalzed laboratores. 4 CALM - SECOND GENERATION HANDOVER RINCILES rncples of procedures supportng selecton of the best possble communcatons soluton quantfed both by performance ndcators and some other parameters e.g. servce cost, company polcy. ISO TC204, WG16.1 Communcatons Ar nterface for Long and Medum range (CALM) group presented ther complex approach to resolve descrbed procedures see. [11] or [12]. A basc tool the second generaton of the handover prncples are defned by CALM standards. Complexty of the ISO approach offers soluton wth transparent RM OSI compatble archtecture, however, such approach also represents hghly demandng mplementaton phase requrng most probably some addtonal years to ntroduce on the market products wth reasonable prcng. The IEEE presents handover n heterogeneous networks standard known as Meda-Independent Handovers (MIH). The standard s desgned to enable moble users to use full advantage of overlappng and dverse of access networks. IEEE provdes propertes that meet the requrements of effectve heterogeneous handovers. It allows transparent servce contnuty durng handovers by specfyng mechansms to gather and dstrbute nformaton from varous lnk types. The collected nformaton comprses tmely and consstent notfcatons about changes n lnk condtons and avalable access networks. Scope of IEEE s restrcted to access technology ndependent handovers and addtonal actvtes n ths area are on the way. Handover decson and target assessment consttute a multphase process where the assstance of IEEE s essental. However, the actual handover executon s outsde the scope of the IEEE standard. Authors of ths paper recently ntroduced an easly mplementable alternatve soluton. It s applcable namely for compact solutons lke On Boar Unts (OBU) where all telecommuncatons technologes unts are ntegrated nto one compact system wth smart decson adaptve processes process replacng commonly used BM (see e.g. [14]). Ths alternatve was adoptable n much shorter tme horzon f compared wth system based on complex ISO CALM approach or IEEE standard. Authors research team goal has been to enable ts soluton for mplementatons n tme perod before solutons based on accepted CALM or standards are commercally avalable n reasonable prcng. Authors adopted L3 ntellgent routng whch allows fast mplementaton namely n compact unts lke vehcle OBUs. It s based exclusvely on the SW package system ntegraton wth mnmal or no addtonal requrements on HW specfc support. Results of the research are step by step descrbed n [27] - [31]. 5 DOTEK ROJECT The man objectve of the DOTEK project was motvated by the CALM famly of standards. However, exclusvely routng on L3 layer adopted responsblty n the change to the other path process. Results of the DOTEK project can be summarzed as follows: Analyss and selecton of avalable wreless servces applcable for dfferent studed transport telematcs servces. Desgn of tools for contnuous montorng and evaluaton of servces qualty, Realzaton of the decson to change to the alternatve path decson. Namely due to lmted R&D man power resources the frst project phase appled Extended BM prncples. The complex verson below descrbed statstcal approach was due to ts mplementaton complexty above the research team capacty. Nevertheless, smplfed approach was successfully mplemented and tested and authors dentfed that the 2nd generaton handover tme-duratons are prmarly nfluenced by the GSM network response tmes, and obtaned results presented n the Table 2 reach the only fracton of the crtcal transport delay tmes dentfed wth GRS or EDGE data servces (see Fg. 2 and 3). SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR
4 Table 2. Results of test scenaro focused on the tme of handover Test no. Handover tme [ms) The materalzaton of the project results represents exclusvely the SW package wth no addtonal HW requrements. The SW package has got modular structure and soluton s practcally technologcally ndependent,.e. ntegrate-able n most of on the market avalable OBUs. Tests results confrmed ts wde range of ts applcablty n telematcs, namely, n areas where GSM data servces performance s acceptable as core communcaton servce. 6 DATA SECURITY Securty performance ndcator see e.g. [15] descrbes ablty of the system to ensure that no materal damage or losses of human lfe wll occur n cases of non-standard events (e.g. fake transacton). It means that system detects the forgery on a defned level of probablty. provde to defned actor). These tools must be combned wth other avalable securty tools. A Unque dentfer resented approach s based on usage of Unversal Identfer of Vehcle (UIV) s generated as set of all mportant partal vehcle dentfers where each of them descrbes non-changeable part of the car detaled dentfcaton. There are some examples of dentfers: VIN Nr. of axels Emsson class Weght Year of manufacture The UIV represents set of partal dentfers extended by unque non-publc part generated from agreed data by standard cryptography algorthm (e.g. AES or SHA-2) to prevent possblty of UIV algorthm dentfcaton n case set of dentfers s for any reason known to the hacker. Check part at the end of dentfer s connected for fast check of dentfer valdty (lke valdty check of credt card number). The example of UIV s on the Fg. 3.. (7) W W m, Ths equaton descrbes that the dfference between desred or non-standard rsk stuaton W and real stuatons of rsk or abnormal W m, does not exceed the level of probablty. Car to Infrastructure (C2I) and Car to Car (C2C) communcaton as well as vehcles on board data communcaton va Controlled Area Network (CAN) bus are areas wth progressve growth of transferred data volumes. If prvate on board network soluton s not connected to any communcaton cannel than t remans reasonably secure and no addtonal securty treatment s typcally needed and mplemented. However, vehcle prvate data network securty and ntegrty can be volated n a moment when ths network s connected to any other devce or network. It s absolutely necessary to take n account that most of CAN based vehcles are mnmally equpped wth nterface for dagnostcs purposes, anyhow. Above that nterconnecton of the CAN bus to the C2C or C2I communcatons structures becomes trendy namely due to on network representatve data avalablty applcable for servces lke car dentty or car unts ntegrty or functonalty remote dentfcaton. However, data securty n such applcatons represents senstve ssue to be carefully studed and treated. There are many n vehcle systems nterconnected va CAN whch can be attacked by hackers wth potental of even fatal consequences. Relable and secure dentfcaton of both partners for remote communcaton represents between others one of mportant securty tools to prevent unauthorzed exchange of any data. It must be combned wth other securty tools lke encrypton or more effectve tunnelng. Authentcaton of two actors for mutual communcaton based on dentfer lke VIN code or OBU-ID, however, s not acceptable as suffcent tool and extended approach must be appled. Second securty aspect whch follows authentcaton s data prvacy and actors authorzaton to data content knowledge. Authors approach s based on selectve data transmsson accordng to actor role/category. Securty approach s covered n two steps relable and secure authentcaton and the only relevant to actor s rghts data exchange (data whch can be Fg.3. Example of unque dentfer It s not necessary to take care of UIV unqueness because ths functonalty s ensured by unque VIN code. Advantage of such approach s that complex nformaton about vehcle ntegrated n the UIV can be used for dfferent telematc applcatons. Threat of senstve data abuse s prevented by data selecton avalablty to user n dependence on servce class assgnment to each one. System allows to use the only that parts of dentfer whch s dedcated to dentfed servce class lke emergency, publc and commercal servces. B Communcaton and securty dentfcaton As descrbed above due to hgh senstvty on data prvacy exchanged between vehcle and servce nfrastructure VID must be reasonably protected aganst potental hackers attacks. Three categores of telematc system securty n ITS are provded: Identfer and data securty n vehcle (Vehcle envronment), Identfer and data securty for data transmsson (wreless envronment), Identfer and data securty n recever part (server area). In ths paper the only wreless envronment part wll be dscussed. The communcaton channel mght be secured by standard cryptography methods, however, nsuffcent protecton mght be broken and hacker s successful attack can msuse transferred data wth fatal consequences. roposed approach to data securty yelds n dynamcal component extenson (tme and poston dependency) and symmetrc or asymmetrc encrypton, whch s chosen dependng on applcaton. For ont to ont (2) communcaton typcally symmetrc encrypton s appled - e.g. lke radar control on the hghway. In case of ont to Multpont (2M) communcatons namely f large number of actve termnals are served asymmetrc 64 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012
5 cryptography can be effcently used, as well. Such approach s relevant n case communcaton between systems of dfferent owners wth sgnfcant dffcultes to manage relevant keys dstrbuton. In ths soluton the dentfer s concatenated by actual tme, current GNSS coordnates (.e. exclusvely n drecton from by GNSS equpped vehcle to nfrastructure) and fnally by the user ID. Identfer s than encrypted by ether asymmetrc or symmetrc cryptographc algorthm. Examples descrbed on the Fgure 4. to the vehcle unt - encrypted message contans user ublc Encrypton Key (EK). Fg. 4. Dynamc verson of the dentfer Encrypton of the UIV s descrbed as follows: where M 1 = E K (UIV II T II ), (8) UIV = Unversal Identfer of the Vehcle, E K = asymmetrc encrypton wth publc key K of the end recever, T = clock state n tme of message generaton, = poston n tme of message generaton, UIV II T II = dentfer wth lnk to current tme and poston. After recevng the request by system central system, the message M1 s decrypted and UIV s read n statc form - receved tme T and are checked for valdty. It means, that the message s not older than n seconds and the message has been sent from area wth maxmum of m meters tolerated dfference. Data message wth dentfer n dynamc format s not mpacted by ths process and ths approach doesn t nfluence usage of the other securty tools. The goal of ths approach s to hghly secure data aganst attacks manly lke eavesdroppng and usage of the data for forgery. 7 SERVICE CATEGORIES roposed approach covers categorzaton of the telematc servces. Each category has defned set of data allowed to user applcaton. Because the unque dentfer ncludes complex nformaton about vehcle there must be specal tool mplemented on both sdes (sender and recever) whch process ncomng dentfer and transfers and publsh the only relevant data to user. On Fgure 5 ths component s descrbed as an Interface. Ths component also covers dynamsaton of the message content as t was already descrbed above. Three servce categores were defned: Securty servces e.g. emergency, fre dept., polce, ublc servces (publc authortes) e.g. customs, Commercal servces. Example on Fgure 5 descrbes publc servces support dedcated for publc nsttutons. Set of avalable data s dentfed by the unque dentfer. Hand reader operated by customs offcer generates request for dentfcaton and sends t Fg. 5. ublc servce example customs admnstraton Vehcle unt processes the request and sends relevant servce category data accordng to the rghts of customs admnstratons. Category s dentfed by EK. User requres for example emsson class, number of axles, lcense plate number, country of orgn and OBU ID. Even though the other publc class data are ncluded n a sent UIV, the nterface component splts the unque dentfer and the only relevant data are publsh,.e. n ths case just emsson class, number of axles, lcense plate number, country of orgn and OBU ID. Remanng data from the dentfer are suppressed and are kept unreadable for the system. CONCLUSION Due to complexty of ITS solutons and mplementatons typcally moble servces wde area coverage and selectable classes of servces are requred. Authors based on general analyss of ITS archtecture and desgn prncples focused ther afford on wreless access soluton desgned as seamless combnaton of more ndependent access solutons of the same or alternatve technology. Before analyss of the seamless handover/handoff based soluton was desgned and mplemented the detaled analyss of the most frequently used communcatons solutons was processed n detal. Authors decded to desgn quckly and easly mplementable alternatve soluton to complex soluton based ether on famly of ISO standards known as CALM or IEEE Soluton adopts software based L3 routng effectve n mplementatons n compact unts lke vehcles OBU. Car to Infrastructure (C2I) and Car to Car (C2C) communcaton as well as vehcles on board data communcaton va Controlled Area Network (CAN) bus are areas wth transferred data volumes progressve growth. If vehcle on board network soluton s not connected to any communcaton cannel than system remans reasonably secure and no addtonal securty treatment s typcally needed and mplemented. However, vehcle prvate data network securty and ntegrty can be volated n a moment when ths network s connected va OBU to any other devces or networks. OBU wreless nterconnect (C2I) wll be provded more and more frequently namely due to representatve data avalable va the CAN vehcle network applcable for telematcs servces. However, data securty n such applcatons represents senstve ssue whch must be carefully studed and treated. Securty of telecommuncatons channel can be resolved wth wde range of avalable securty tools. Strongly requred relable SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR
6 and secure authentcaton of the actors and such data prvacy are not frequently suffcently resolvable by standardly avalable securty tools. Ths paper presents soluton based on non-publc unversal dentfer wth dynamcal extenson (tme and poston dependency as autonomous varables where relevant) as well as provded data selecton accordng to actor role or category. These tools have been mplemented n laboratory OBU and relevant processes have been under procedure of the complex tests. REFERENCES [1] M. Svtek, Archtecture of ITS Systems and Servces n the Czech Republc, Internatonal Conference Smart Movng 2005, Brmngham 2005, England. [2] M. Svtek, Intellgent Transport Systems - Archtecture, Desgn methodology and ractcal Implementaton, Keynote lesson, 5th WSEAS/IASME Int. Conf. on Systems Theory and Scentfc Computaton, Malta [3] M. Svtek,, T. Zelnka, Communcatons Tools for Intellgent Transport Systems, roceedngs od 10th WSEAS Internatonal Conference on Communcatons, pp , Athens 2006, ISSN , ISBN [4] M. Svtek,, T. Zelnka, T., Communcatons Solutons for ITS Telematc Subsystems, WSEAS Transactons on Busness and Economcs, Issue 4 (2006), Vol. 3, pp , Athens 2006, ISSN , [5] M. Svtek,, T. Zelnka, Telecommuncatons solutons for ITS. Towards Common Engneerng &Technology for Land, Martme, ar and Space Transportaton ITCT 2006, CNISF, ars [6] M. Svítek,, T. Zelnka, Communcaton soluton for GS based arport servce vehcles navgaton, EATIS 97 ACM- DL roceedngs, Faro (ortugal) 2007, ISBN # [7] T. Zelnka, M. Svtek, Communcaton soluton for Vehcles Navgaton on the Arport terrtory, roceedngs of the 2007 IEEE Intellgent Vehcle Symposum, Istanbul, Turkey, pp , IEEE Catalogue number 07TH8947, ISBN [8] M. Svtek, T. Zelnka, Communcatons Envronment for Telematc Subsystems, roceedngs of 11-th World Mult- Conference on Systemc, Cybernetcs and Informatcs, Volume II, pp , IIIS/IFSR, Orlando, FL, USA, ISBN-10: , ISBN-13: [9] M. Svtek,, T. Zelnka, Communcatons Challenges of the Arport Over-ground Traffc Management, roceedngs of the 11th WSEAS Internatonal Mult-conference CSCC, Volume Advances n Communcatons, pp , Agon Nkolaos, Crete Island, Greece, ISSN , ISBN [10] T. Zelnka, M. Svtek, Communcatons Scheme for Arport Servce Vehcles Navgaton, roceedngs of Internatonal Conference TRANSTEC rague, Czech Techncal Unversty, Faculty of Transport Scence and Unversty of Calforna, Santa Barbara, raha 2007, pp , ISBN [11] B. Wllams, CALM handbook V1.0. Document ISO TC204 WG.16.1 CALM, [12] N. Wall, CALM - why ITS needs t, ITSS 6 (September), 2006 [13] T. Zelnka, M. Svtek, CALM - Telecommuncaton Envronment for Transport Telematcs, Technology & rosperty, 2006, Vol. XI, specal edton (11/06), ISSN [14] K. Yang, J. Wttgreffe, M. Azmoodeh: olcy-based Model-Drven Creaton of Adaptve Servces n Wreless Envronments. IEEE Vehcular technology Magazne, September 2007, pp [15] M. Svtek, Dynamcal Systems wth Reduced Dmensonalty, Neural Network World edton, II ASCR and CTU FTS, raha 2006, ISBN: , EAN: [16] A. Dempster, N. Lard, D. Rubn, Maxmum lkelhood from ncomplete data va EM algorthm. J. Royal Stat. Soc. 39, 1977, pp [17] T. Zelnka, M. Svtek, Communcaton Scheme of Arport Over-ground Traffc Navgaton System. roceedngs of the Internatonal Symposum on Communcatons and Informaton Technologes - ISCIT IEEE Sydney, 2007, pp IEEE Catalogue No. 07EX1682(C), ISBN , Lbrary of Congress [18] M. Svtek,, T. Zelnka, Montorng of Transport Means on Arport Surface. roceedngs of 7-th Internatonal Conference on Transport Systems Telematcs, Katovce-Ustron, 2007, pp , ISBN [19] M. Svtek,, T. Zelnka, Montorng of Transport Means on Arport Surface. Advances n Transport Systems Telematcs, Monograph edted by Jerzy Mkulsk, Selesan Unversty of Technology, Katowce, pp , ISBN [20] T. Zelnka, M. Svtek, Decson processes n telematc mult-path communcatons access systems. Internatonal Journal of Communcatons, North Atlantc Unversty Network NOUN, Issue 2, Volume 1, 2007, pp [21] M. Svtek,, T. Zelnka, Communcatons mult-path access decson scheme. Neural Network World, ICS AS CR and CTU, FTS, raha, No. 6.,2008, pp 3-14, 2008, ISSN , [22] M. Svtek,, T. Zelnka, Decson processes n Communcatons Mult-path Access Systems appled wthn ITS. Transactons on Transport Scence, MTCR, raha, No. 1, 2008, pp 3-12, ISSN X, [23] T. Zelnka, M. Svtek, Identfcaton of Communcaton Soluton desgnated for Transport Telematc Applcatons. WSEAS Transactons on Communcatons, Issue 2, Volume 7, Athens, 2008, pp , ISSN: [24] T. Zelnka, M. Svtek, Mult-path communcatons access decson scheme. roceedngs of the 12-th World Mult- Conference on Systemcs, Cybernetcs and Informatcs, Volume III, pp , IIIS/IFSR, Orlando, FL, USA, ISBN-10: , ISBN-13: [25] T. Zelnka, M. Svtek,: Adaptve communcatons solutons n complex transport telematcs systems. roceedngs of the 11th WSEAS Internatonal Multconference CSCC 2008, Volume New Aspects of Communcaton, pp , Heraklon, Greece, ISSN , ISBN SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012
7 [26] T. Zelnka, M. Svtek, Adaptve communcatons solutons n complex transport telematcs systems. Monograph on Computers and Smulaton n Modern Scence- Volume II, WSEAS ress, Athens 2009, pp , ISBN [27] T. Zelnka, M. Svtek, Adaptve Wreless Access Envronment n Transport Solutons. roceedngs of, 13-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, Volume IV, pp , IIIS/IFSR, Orlando, FL, ISBN [28] T. Zelnka, M. Svtek, M. Vosatka, Adaptve Approach to Management of the Mult-path Wrelesss Solutons. roceedngs of the Symposum Recent Advance n Data Network, Communcatons, Computers, WSEAS ress, Morgan State Unversty, Baltmore, 2009, pp , ISBN [29] T. Zelnka, M. Svtek, M. Srotyr, M. Vosatka, Adaptve mult-path Telecommuncatons Solutons for ITS. roceedngs of, 14-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, Volume I, pp 89-94, IIIS/IFSR, Orlando, FL, USA, ISBN [30] T.Zelnka, M. Svtek, Z. Lokaj, Adaptve Decson rocesses the Mult-path Wreless Access Solutons Implementable on the I Routng layer. EATIS 10 roceedngs, anama Cty (anama), 2010, IS BN [31] T. Zelnka, M. Svtek,, M. Srotyr, M. Vosatka, Adaptve Mult-path Telecommuncatons Solutons for ITS, Journal of Systemcs, Cybernetcs and Informatcs Volume 9, No. 1, pp , Orlando, 2011,. [32] T. Zelnka, Z. Lokaj, Data securty n transportaton solutons, 15-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, pp , IIIS/IFSR, Orlando, FL, USA, ISBN SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR
Recent Researches in Communications and IT
Data security in ITS telecommunications solutions TOMAS ZELINKA, ZDENEK LOKAJ, MIROSLAV SVITEK Faculty of Transportation Sciences Czech Technical University in Prague, Konviktská 20, 110 00 Prague 1, CZECH
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationApplication of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationHP Mission-Critical Services
HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to
More informationThe Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise
V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationComplex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More informationOverview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationHosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
More informationScreening Tools Chart As of November 2011
Screenng Chart As of November 2011 Ths tools chart reflects the results of the fourth annual revew of screenng tools by the Center s Techncal Revew Commttee (TRC). The Center defnes screenng as follows:
More informationEnterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationPolitecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
More informationCooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationGR-303 Solution For Access Gateways
GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationA Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
More informationA Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationM-applications Development using High Performance Project Management Techniques
M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA
More informationP2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks
PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu
More informationAn agent architecture for network support of distributed simulation systems
An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,
More informationA FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationAbstract. 1. Introduction
System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,
More informationVIP X1600 M4S Encoder module. Installation and Operating Manual
VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationMONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS
Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008
More informationAn Introduction to 3G Monte-Carlo simulations within ProMan
An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationTest Model and Coverage Analysis for Location-based Mobile Services
Test Model and erage Analyss for Locaton-based Moble Servces Tao Zhang School of software and Mcroelectronc Northwest Polytechncal Unversty X an, Chna tao_zhang@nwpu.edu.cn Jerry Gao Department of Computer
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationTesting and Debugging Resource Allocation for Fault Detection and Removal Process
Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton
More informationRisk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
More informationA Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics
Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College
More information