Data security in Intelligent Transport Systems

Size: px
Start display at page:

Download "Data security in Intelligent Transport Systems"

Transcription

1 Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Zdenek LOKAJ Czech Techncal Unversty n rague, FTS raha 1, Czech Republc Martn SROTYR Czech Techncal Unversty n rague, FTS raha 1, Czech Republc ABSTRACT Intellgent Transport Servces expect avalablty of the secure seamless communcatons solutons typcally coverng wdely spread areas. Dfferent ITS solutons requre dfferent portfolo of telecommuncatons servce qualty. These parameters have to correspond wth ITS servce performance parameters requred by specfc servce. Even though qute extensve range of publc wreless data servces wth reasonable coverage are provded, most of them are provded wth no guaranteed qualty and securty. ITS requrements can be n most parameters easer reached f mult-path communcatons systems are appled core soluton s combned wth both publc as well as prvate ones where and when t s needed. Such soluton requres mplementaton of relevant flexble system archtecture supported by the effcent decson processes. Ths paper s concentrated the telecommuncatons securty ssues relevant to the ITS wde area networkng. Expected level of securty vares n dependence on relevant ITS servce requrements. Data volumes transferred both n prvate data vehcle on board networks as well as between vehcles and nfrastructure (C2I) or other vehcles (C2C) progressvely grow. Such trend upsurges the fatal problems appearance probablty n case securty of the wde area networks s not relevantly treated. That s reason why relevant communcatons securty treatment becomes crucal part of the ITS soluton. Besdes of avalable off shelf securty tools we present soluton based on non-publc unversal dentfer wth dynamcal extenson (tme and poston dependency as an autonomous varables) and data selecton accordng to actor role or category. resented results were obtaned wthn projects e-ident 1, DOTEK 2 and SRATVU 3. The effects of telematcs are based on synergy of both these dscplnes. Telematcs s appled n wde spectrum user areas, from an ndvdual multmeda communcaton towards ntellgent use and management of large-scale networks. Advanced telematcs solutons provde an ntellgent envronment for knowledge socety and allow expert knowledge descrpton of complex systems. It also ncludes legal, organzatonal, mplementaton and human aspects. Transport Telematcs/Intellgent Transport Systems (ITS) connects nformaton and telecommuncaton technologes wth transport engneerng to acheve better management of transport, travel and forwardng processes wth no addtonal requrements placed on the exstng transport nfrastructure. 2 ITS AND ITS ARCHITECTURE The ITS system model was adopted wthn ITS socety to support desgn process of the ITS applcatons. ITS soluton s expected to be desgned under prncples descrbed on Fgure [1].e. followng the ITS System Model rules. 1 INTRODUCTION Telematcs s a result of convergence and followng progressve synthess of telecommuncaton technology and nformatcs. 1 e-ident Electronc dentfcaton systems wthn transport process grant 2A-2T1/108.of Mnstry of Industry and Trade of the Czech Republc (MO), 2 DOTEK Communcaton module for transport telematc applcatons grant 2A-2T1/105 of MO, 3 SRATVU System Requrements and Archtecture of the unversal Telematc Vehcle Unt s grant 2A-1T1/138 of MO, Fg.1 ITS System Model Management process on Fgure 1 represents the methodology of smart ITS desgn and ts mantenance based on applcaton of well-tuned ITS system models. Defnton of set of the ndvdual system parameters was accepted wthn ITS socety, as well: Accuracy s the degree of conformance between system true parameters and ts measured values that can be defned as the probablty SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR

2 p p m, 1 1 (1) that the dfference between the requred system parameter and the measured parameter p m, wll not exceed the value 1 on probablty level 1 where ths defnton s applcable for all N system parameters p p,.., p,. 1 2 N Relablty s the ablty to perform a requred functon (process) under gven condtons for a gven tme nterval that can be defned as the probablty v v,t 0, (2) T t m,t 2 2 that the dfference between requred system functons (processes) represented by parameters measured parameters v m, t t p v and the vector of wll not exceed the value 2 on probablty level 2 n each tme nterval t from the nterval 0,T. Avalablty s the ablty to perform requred functons (processes) at the ntalzaton (trggerng) of the ntended operaton that can be defned as the probablty q q m, 3 3 (3) that the dfference between the requred rate 4 of successful performng of the functon (process ) q and the measured qm, wll not exceed the value at the probablty 3 level 3. Contnuty s the ablty to perform requred functons (processes) wthout non-scheduled nterrupton durng the ntended operaton that can be defned as the probablty r r m, 4 4 (4) that the dfference between the requred rate of successful performng of the functon (process ) wthout nterrupton and the measured rm, wll not exceed the value 4 at the probablty level 4. Integrty s the ablty to provde tmely and vald alerts to the user, when a system must not be used for the ntended operaton, that can be defned as the probablty S S m, 5 5 (5) that the dfference between the requred rate of successful performng of the alert lmt (AL) not later than predefned tme to alert (TTA) S and the measured wll not exceed the value 5 on the probablty level 5. Safety can also be covered among the performance parameters, but the rsk analyss and the rsk classfcaton must be done beforehand wth a knowledge of the system envronment and 4 Q qm where Q s the number of successful experments, Q (successful performng of the functon, successful performng of the process ) and Q s the number of all experments (both successful and unsuccessful). S m, r potental rsk, and then the safety can be defned as the probablty W W m, 6 6 (6) that the dfference between the requred rate of rsk stuatons W and the measured ones wll not exceed the value 6 on the probablty level 6. W A substantal part of the system parameters analyss s represented by a decomposton of system parameters nto ndvdual sub-systems of the telematc chan. One part of the analyss s the establshment of requrements on ndvdual functons and nformaton lnkage. Then, the whole telematc chan can comply wth the above defned system parameters. The completed decomposton of system parameters enables the development of a methodology for a follow-up analyss of telematc chans accordng to varous crtera (optmzaton of the nformaton transfer between a moble unt and a processng center, maxmum use of the exstng nformaton and telecommuncaton nfrastructure, etc.). In telecommuncaton exsts wde range of system parameters defntons. We adopted set of performance ndcators as follows: m, Avalablty o Servce Actvaton Tme, o Mean Tme to Restore (MTTR), o Mean Tme between Falure (MTBF) and o Vrtual Connecton Avalablty Delay as an accumulatve parameter effected by o Interfaces Rates, o Frame Sze, and o Load / Congeston of all actve nodes (swtches) n the lne acket/frames Loss Securty These telecommuncatons performance ndcators were specfcally redefned wth goal of compatblty wth telematcs performance parameters. Impact of telecommuncaton performance ndcators on the telematc performance must be ndcators transformablty smplfes system synthess. The addtve mpact of the communcatons performance ndcators vector tc on the vector of telematcs performance ndcators tm can be expressed as tm TM tc, where TM represents the transformaton matrx. It s vald, however, under condton that the probablty levels of all studed phenomena are on the same level and all performance ndcators are expressed exclusvely by parameters wth the same physcal dmenson typcally n tme or n tme convertble varable. The transformaton matrx constructon s dependent on the detaled communcaton soluton and ts ntegraton nto the telematc system. The probablty of the each phenomena appearance n context of the other processes s not deeply evaluated n the ntroductory perod, when the specfc structure of transformaton matrx s dentfed. In [7] [9] are presented detals of the proposed teratve method. Ths method s desgned as broadly as possble wth a clear am to be appled n the wdest possble range of telematc applcaton. Ths method can be also successfully used for dentfcaton of the decson processes crtera,.e. the tolerance range of each performance ndcator. Such nformaton represents necessary (but not suffcent) condton to let processes decde whch access path represents wthn the defned tme perod the best possble alternatve. 62 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012

3 3 COMMUNICATIONS SOLUTION STRUCTURE Fgure 2 presents telecommuncatons chan dagram, orgnally appled wthn the plot project at Arport rague (see e.g. [7] [10]). We accepted ths structure as typcal archtecture of ITS telematc solutons. On Board Unts (OBU), GNSS Sensng System (SS) and set of Wreless Unts (WL) are nstalled n the movng object. SS apples now exclusvely GS (Global ostonng System wth no SLA publcly avalable), but there s expected launch of the European Galleo GNSS servces as well as the second generaton of the GS servces wth guaranteed qualty of servce. OBU represents not only control but also dsplay and human communcaton servces and WL represents -th cellular technology of the wreless complex soluton. Terrestral communcaton part consst of set of moble cellular Base Statons (BS j ) (-th bases staton of the j-th cellular system) ntegrated by the terrestral network based on L3/L2 swtches/nodes (TN ) nterconnected wth Servers (S ). E2E (End to End) servce s provded based on I protocol, L2 swtchng s Ethernet protocol based. Fg. 2. Telematc telecommuncaton scheme n chan dagram One, preferred core access wreless technology would be accepted (f possble) as the core soluton to be combned wth alternatve solutons when and where t s needed. The core soluton would meet domnant servce qualty and coverage requrements beng corrected n the case where such parameters do not meet requrements under specfc condtons. Table 1 descrbes typcal behavor of prvate/publc telecommuncatons solutons. Tab. 1 ublc vs. prvate servces parameters rvate ublc Servce qualty Typcally Avalable Low (f any) management SLA Sgnal coverage Cost dependent - Hgh Typcally low (-er), rcng/cost Hgh (-er) Low (-er) If we evaluate realstcally telecommuncatons data servces market there are only few technology streams avalable for the ITS demandng applcatons. Each of these alternatves was studed n detal by authors n specalzed laboratores. 4 CALM - SECOND GENERATION HANDOVER RINCILES rncples of procedures supportng selecton of the best possble communcatons soluton quantfed both by performance ndcators and some other parameters e.g. servce cost, company polcy. ISO TC204, WG16.1 Communcatons Ar nterface for Long and Medum range (CALM) group presented ther complex approach to resolve descrbed procedures see. [11] or [12]. A basc tool the second generaton of the handover prncples are defned by CALM standards. Complexty of the ISO approach offers soluton wth transparent RM OSI compatble archtecture, however, such approach also represents hghly demandng mplementaton phase requrng most probably some addtonal years to ntroduce on the market products wth reasonable prcng. The IEEE presents handover n heterogeneous networks standard known as Meda-Independent Handovers (MIH). The standard s desgned to enable moble users to use full advantage of overlappng and dverse of access networks. IEEE provdes propertes that meet the requrements of effectve heterogeneous handovers. It allows transparent servce contnuty durng handovers by specfyng mechansms to gather and dstrbute nformaton from varous lnk types. The collected nformaton comprses tmely and consstent notfcatons about changes n lnk condtons and avalable access networks. Scope of IEEE s restrcted to access technology ndependent handovers and addtonal actvtes n ths area are on the way. Handover decson and target assessment consttute a multphase process where the assstance of IEEE s essental. However, the actual handover executon s outsde the scope of the IEEE standard. Authors of ths paper recently ntroduced an easly mplementable alternatve soluton. It s applcable namely for compact solutons lke On Boar Unts (OBU) where all telecommuncatons technologes unts are ntegrated nto one compact system wth smart decson adaptve processes process replacng commonly used BM (see e.g. [14]). Ths alternatve was adoptable n much shorter tme horzon f compared wth system based on complex ISO CALM approach or IEEE standard. Authors research team goal has been to enable ts soluton for mplementatons n tme perod before solutons based on accepted CALM or standards are commercally avalable n reasonable prcng. Authors adopted L3 ntellgent routng whch allows fast mplementaton namely n compact unts lke vehcle OBUs. It s based exclusvely on the SW package system ntegraton wth mnmal or no addtonal requrements on HW specfc support. Results of the research are step by step descrbed n [27] - [31]. 5 DOTEK ROJECT The man objectve of the DOTEK project was motvated by the CALM famly of standards. However, exclusvely routng on L3 layer adopted responsblty n the change to the other path process. Results of the DOTEK project can be summarzed as follows: Analyss and selecton of avalable wreless servces applcable for dfferent studed transport telematcs servces. Desgn of tools for contnuous montorng and evaluaton of servces qualty, Realzaton of the decson to change to the alternatve path decson. Namely due to lmted R&D man power resources the frst project phase appled Extended BM prncples. The complex verson below descrbed statstcal approach was due to ts mplementaton complexty above the research team capacty. Nevertheless, smplfed approach was successfully mplemented and tested and authors dentfed that the 2nd generaton handover tme-duratons are prmarly nfluenced by the GSM network response tmes, and obtaned results presented n the Table 2 reach the only fracton of the crtcal transport delay tmes dentfed wth GRS or EDGE data servces (see Fg. 2 and 3). SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR

4 Table 2. Results of test scenaro focused on the tme of handover Test no. Handover tme [ms) The materalzaton of the project results represents exclusvely the SW package wth no addtonal HW requrements. The SW package has got modular structure and soluton s practcally technologcally ndependent,.e. ntegrate-able n most of on the market avalable OBUs. Tests results confrmed ts wde range of ts applcablty n telematcs, namely, n areas where GSM data servces performance s acceptable as core communcaton servce. 6 DATA SECURITY Securty performance ndcator see e.g. [15] descrbes ablty of the system to ensure that no materal damage or losses of human lfe wll occur n cases of non-standard events (e.g. fake transacton). It means that system detects the forgery on a defned level of probablty. provde to defned actor). These tools must be combned wth other avalable securty tools. A Unque dentfer resented approach s based on usage of Unversal Identfer of Vehcle (UIV) s generated as set of all mportant partal vehcle dentfers where each of them descrbes non-changeable part of the car detaled dentfcaton. There are some examples of dentfers: VIN Nr. of axels Emsson class Weght Year of manufacture The UIV represents set of partal dentfers extended by unque non-publc part generated from agreed data by standard cryptography algorthm (e.g. AES or SHA-2) to prevent possblty of UIV algorthm dentfcaton n case set of dentfers s for any reason known to the hacker. Check part at the end of dentfer s connected for fast check of dentfer valdty (lke valdty check of credt card number). The example of UIV s on the Fg. 3.. (7) W W m, Ths equaton descrbes that the dfference between desred or non-standard rsk stuaton W and real stuatons of rsk or abnormal W m, does not exceed the level of probablty. Car to Infrastructure (C2I) and Car to Car (C2C) communcaton as well as vehcles on board data communcaton va Controlled Area Network (CAN) bus are areas wth progressve growth of transferred data volumes. If prvate on board network soluton s not connected to any communcaton cannel than t remans reasonably secure and no addtonal securty treatment s typcally needed and mplemented. However, vehcle prvate data network securty and ntegrty can be volated n a moment when ths network s connected to any other devce or network. It s absolutely necessary to take n account that most of CAN based vehcles are mnmally equpped wth nterface for dagnostcs purposes, anyhow. Above that nterconnecton of the CAN bus to the C2C or C2I communcatons structures becomes trendy namely due to on network representatve data avalablty applcable for servces lke car dentty or car unts ntegrty or functonalty remote dentfcaton. However, data securty n such applcatons represents senstve ssue to be carefully studed and treated. There are many n vehcle systems nterconnected va CAN whch can be attacked by hackers wth potental of even fatal consequences. Relable and secure dentfcaton of both partners for remote communcaton represents between others one of mportant securty tools to prevent unauthorzed exchange of any data. It must be combned wth other securty tools lke encrypton or more effectve tunnelng. Authentcaton of two actors for mutual communcaton based on dentfer lke VIN code or OBU-ID, however, s not acceptable as suffcent tool and extended approach must be appled. Second securty aspect whch follows authentcaton s data prvacy and actors authorzaton to data content knowledge. Authors approach s based on selectve data transmsson accordng to actor role/category. Securty approach s covered n two steps relable and secure authentcaton and the only relevant to actor s rghts data exchange (data whch can be Fg.3. Example of unque dentfer It s not necessary to take care of UIV unqueness because ths functonalty s ensured by unque VIN code. Advantage of such approach s that complex nformaton about vehcle ntegrated n the UIV can be used for dfferent telematc applcatons. Threat of senstve data abuse s prevented by data selecton avalablty to user n dependence on servce class assgnment to each one. System allows to use the only that parts of dentfer whch s dedcated to dentfed servce class lke emergency, publc and commercal servces. B Communcaton and securty dentfcaton As descrbed above due to hgh senstvty on data prvacy exchanged between vehcle and servce nfrastructure VID must be reasonably protected aganst potental hackers attacks. Three categores of telematc system securty n ITS are provded: Identfer and data securty n vehcle (Vehcle envronment), Identfer and data securty for data transmsson (wreless envronment), Identfer and data securty n recever part (server area). In ths paper the only wreless envronment part wll be dscussed. The communcaton channel mght be secured by standard cryptography methods, however, nsuffcent protecton mght be broken and hacker s successful attack can msuse transferred data wth fatal consequences. roposed approach to data securty yelds n dynamcal component extenson (tme and poston dependency) and symmetrc or asymmetrc encrypton, whch s chosen dependng on applcaton. For ont to ont (2) communcaton typcally symmetrc encrypton s appled - e.g. lke radar control on the hghway. In case of ont to Multpont (2M) communcatons namely f large number of actve termnals are served asymmetrc 64 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012

5 cryptography can be effcently used, as well. Such approach s relevant n case communcaton between systems of dfferent owners wth sgnfcant dffcultes to manage relevant keys dstrbuton. In ths soluton the dentfer s concatenated by actual tme, current GNSS coordnates (.e. exclusvely n drecton from by GNSS equpped vehcle to nfrastructure) and fnally by the user ID. Identfer s than encrypted by ether asymmetrc or symmetrc cryptographc algorthm. Examples descrbed on the Fgure 4. to the vehcle unt - encrypted message contans user ublc Encrypton Key (EK). Fg. 4. Dynamc verson of the dentfer Encrypton of the UIV s descrbed as follows: where M 1 = E K (UIV II T II ), (8) UIV = Unversal Identfer of the Vehcle, E K = asymmetrc encrypton wth publc key K of the end recever, T = clock state n tme of message generaton, = poston n tme of message generaton, UIV II T II = dentfer wth lnk to current tme and poston. After recevng the request by system central system, the message M1 s decrypted and UIV s read n statc form - receved tme T and are checked for valdty. It means, that the message s not older than n seconds and the message has been sent from area wth maxmum of m meters tolerated dfference. Data message wth dentfer n dynamc format s not mpacted by ths process and ths approach doesn t nfluence usage of the other securty tools. The goal of ths approach s to hghly secure data aganst attacks manly lke eavesdroppng and usage of the data for forgery. 7 SERVICE CATEGORIES roposed approach covers categorzaton of the telematc servces. Each category has defned set of data allowed to user applcaton. Because the unque dentfer ncludes complex nformaton about vehcle there must be specal tool mplemented on both sdes (sender and recever) whch process ncomng dentfer and transfers and publsh the only relevant data to user. On Fgure 5 ths component s descrbed as an Interface. Ths component also covers dynamsaton of the message content as t was already descrbed above. Three servce categores were defned: Securty servces e.g. emergency, fre dept., polce, ublc servces (publc authortes) e.g. customs, Commercal servces. Example on Fgure 5 descrbes publc servces support dedcated for publc nsttutons. Set of avalable data s dentfed by the unque dentfer. Hand reader operated by customs offcer generates request for dentfcaton and sends t Fg. 5. ublc servce example customs admnstraton Vehcle unt processes the request and sends relevant servce category data accordng to the rghts of customs admnstratons. Category s dentfed by EK. User requres for example emsson class, number of axles, lcense plate number, country of orgn and OBU ID. Even though the other publc class data are ncluded n a sent UIV, the nterface component splts the unque dentfer and the only relevant data are publsh,.e. n ths case just emsson class, number of axles, lcense plate number, country of orgn and OBU ID. Remanng data from the dentfer are suppressed and are kept unreadable for the system. CONCLUSION Due to complexty of ITS solutons and mplementatons typcally moble servces wde area coverage and selectable classes of servces are requred. Authors based on general analyss of ITS archtecture and desgn prncples focused ther afford on wreless access soluton desgned as seamless combnaton of more ndependent access solutons of the same or alternatve technology. Before analyss of the seamless handover/handoff based soluton was desgned and mplemented the detaled analyss of the most frequently used communcatons solutons was processed n detal. Authors decded to desgn quckly and easly mplementable alternatve soluton to complex soluton based ether on famly of ISO standards known as CALM or IEEE Soluton adopts software based L3 routng effectve n mplementatons n compact unts lke vehcles OBU. Car to Infrastructure (C2I) and Car to Car (C2C) communcaton as well as vehcles on board data communcaton va Controlled Area Network (CAN) bus are areas wth transferred data volumes progressve growth. If vehcle on board network soluton s not connected to any communcaton cannel than system remans reasonably secure and no addtonal securty treatment s typcally needed and mplemented. However, vehcle prvate data network securty and ntegrty can be volated n a moment when ths network s connected va OBU to any other devces or networks. OBU wreless nterconnect (C2I) wll be provded more and more frequently namely due to representatve data avalable va the CAN vehcle network applcable for telematcs servces. However, data securty n such applcatons represents senstve ssue whch must be carefully studed and treated. Securty of telecommuncatons channel can be resolved wth wde range of avalable securty tools. Strongly requred relable SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR

6 and secure authentcaton of the actors and such data prvacy are not frequently suffcently resolvable by standardly avalable securty tools. Ths paper presents soluton based on non-publc unversal dentfer wth dynamcal extenson (tme and poston dependency as autonomous varables where relevant) as well as provded data selecton accordng to actor role or category. These tools have been mplemented n laboratory OBU and relevant processes have been under procedure of the complex tests. REFERENCES [1] M. Svtek, Archtecture of ITS Systems and Servces n the Czech Republc, Internatonal Conference Smart Movng 2005, Brmngham 2005, England. [2] M. Svtek, Intellgent Transport Systems - Archtecture, Desgn methodology and ractcal Implementaton, Keynote lesson, 5th WSEAS/IASME Int. Conf. on Systems Theory and Scentfc Computaton, Malta [3] M. Svtek,, T. Zelnka, Communcatons Tools for Intellgent Transport Systems, roceedngs od 10th WSEAS Internatonal Conference on Communcatons, pp , Athens 2006, ISSN , ISBN [4] M. Svtek,, T. Zelnka, T., Communcatons Solutons for ITS Telematc Subsystems, WSEAS Transactons on Busness and Economcs, Issue 4 (2006), Vol. 3, pp , Athens 2006, ISSN , [5] M. Svtek,, T. Zelnka, Telecommuncatons solutons for ITS. Towards Common Engneerng &Technology for Land, Martme, ar and Space Transportaton ITCT 2006, CNISF, ars [6] M. Svítek,, T. Zelnka, Communcaton soluton for GS based arport servce vehcles navgaton, EATIS 97 ACM- DL roceedngs, Faro (ortugal) 2007, ISBN # [7] T. Zelnka, M. Svtek, Communcaton soluton for Vehcles Navgaton on the Arport terrtory, roceedngs of the 2007 IEEE Intellgent Vehcle Symposum, Istanbul, Turkey, pp , IEEE Catalogue number 07TH8947, ISBN [8] M. Svtek, T. Zelnka, Communcatons Envronment for Telematc Subsystems, roceedngs of 11-th World Mult- Conference on Systemc, Cybernetcs and Informatcs, Volume II, pp , IIIS/IFSR, Orlando, FL, USA, ISBN-10: , ISBN-13: [9] M. Svtek,, T. Zelnka, Communcatons Challenges of the Arport Over-ground Traffc Management, roceedngs of the 11th WSEAS Internatonal Mult-conference CSCC, Volume Advances n Communcatons, pp , Agon Nkolaos, Crete Island, Greece, ISSN , ISBN [10] T. Zelnka, M. Svtek, Communcatons Scheme for Arport Servce Vehcles Navgaton, roceedngs of Internatonal Conference TRANSTEC rague, Czech Techncal Unversty, Faculty of Transport Scence and Unversty of Calforna, Santa Barbara, raha 2007, pp , ISBN [11] B. Wllams, CALM handbook V1.0. Document ISO TC204 WG.16.1 CALM, [12] N. Wall, CALM - why ITS needs t, ITSS 6 (September), 2006 [13] T. Zelnka, M. Svtek, CALM - Telecommuncaton Envronment for Transport Telematcs, Technology & rosperty, 2006, Vol. XI, specal edton (11/06), ISSN [14] K. Yang, J. Wttgreffe, M. Azmoodeh: olcy-based Model-Drven Creaton of Adaptve Servces n Wreless Envronments. IEEE Vehcular technology Magazne, September 2007, pp [15] M. Svtek, Dynamcal Systems wth Reduced Dmensonalty, Neural Network World edton, II ASCR and CTU FTS, raha 2006, ISBN: , EAN: [16] A. Dempster, N. Lard, D. Rubn, Maxmum lkelhood from ncomplete data va EM algorthm. J. Royal Stat. Soc. 39, 1977, pp [17] T. Zelnka, M. Svtek, Communcaton Scheme of Arport Over-ground Traffc Navgaton System. roceedngs of the Internatonal Symposum on Communcatons and Informaton Technologes - ISCIT IEEE Sydney, 2007, pp IEEE Catalogue No. 07EX1682(C), ISBN , Lbrary of Congress [18] M. Svtek,, T. Zelnka, Montorng of Transport Means on Arport Surface. roceedngs of 7-th Internatonal Conference on Transport Systems Telematcs, Katovce-Ustron, 2007, pp , ISBN [19] M. Svtek,, T. Zelnka, Montorng of Transport Means on Arport Surface. Advances n Transport Systems Telematcs, Monograph edted by Jerzy Mkulsk, Selesan Unversty of Technology, Katowce, pp , ISBN [20] T. Zelnka, M. Svtek, Decson processes n telematc mult-path communcatons access systems. Internatonal Journal of Communcatons, North Atlantc Unversty Network NOUN, Issue 2, Volume 1, 2007, pp [21] M. Svtek,, T. Zelnka, Communcatons mult-path access decson scheme. Neural Network World, ICS AS CR and CTU, FTS, raha, No. 6.,2008, pp 3-14, 2008, ISSN , [22] M. Svtek,, T. Zelnka, Decson processes n Communcatons Mult-path Access Systems appled wthn ITS. Transactons on Transport Scence, MTCR, raha, No. 1, 2008, pp 3-12, ISSN X, [23] T. Zelnka, M. Svtek, Identfcaton of Communcaton Soluton desgnated for Transport Telematc Applcatons. WSEAS Transactons on Communcatons, Issue 2, Volume 7, Athens, 2008, pp , ISSN: [24] T. Zelnka, M. Svtek, Mult-path communcatons access decson scheme. roceedngs of the 12-th World Mult- Conference on Systemcs, Cybernetcs and Informatcs, Volume III, pp , IIIS/IFSR, Orlando, FL, USA, ISBN-10: , ISBN-13: [25] T. Zelnka, M. Svtek,: Adaptve communcatons solutons n complex transport telematcs systems. roceedngs of the 11th WSEAS Internatonal Multconference CSCC 2008, Volume New Aspects of Communcaton, pp , Heraklon, Greece, ISSN , ISBN SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR 2012

7 [26] T. Zelnka, M. Svtek, Adaptve communcatons solutons n complex transport telematcs systems. Monograph on Computers and Smulaton n Modern Scence- Volume II, WSEAS ress, Athens 2009, pp , ISBN [27] T. Zelnka, M. Svtek, Adaptve Wreless Access Envronment n Transport Solutons. roceedngs of, 13-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, Volume IV, pp , IIIS/IFSR, Orlando, FL, ISBN [28] T. Zelnka, M. Svtek, M. Vosatka, Adaptve Approach to Management of the Mult-path Wrelesss Solutons. roceedngs of the Symposum Recent Advance n Data Network, Communcatons, Computers, WSEAS ress, Morgan State Unversty, Baltmore, 2009, pp , ISBN [29] T. Zelnka, M. Svtek, M. Srotyr, M. Vosatka, Adaptve mult-path Telecommuncatons Solutons for ITS. roceedngs of, 14-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, Volume I, pp 89-94, IIIS/IFSR, Orlando, FL, USA, ISBN [30] T.Zelnka, M. Svtek, Z. Lokaj, Adaptve Decson rocesses the Mult-path Wreless Access Solutons Implementable on the I Routng layer. EATIS 10 roceedngs, anama Cty (anama), 2010, IS BN [31] T. Zelnka, M. Svtek,, M. Srotyr, M. Vosatka, Adaptve Mult-path Telecommuncatons Solutons for ITS, Journal of Systemcs, Cybernetcs and Informatcs Volume 9, No. 1, pp , Orlando, 2011,. [32] T. Zelnka, Z. Lokaj, Data securty n transportaton solutons, 15-th World Mult-Conference on Systemcs, Cybernetcs and Informatcs, pp , IIIS/IFSR, Orlando, FL, USA, ISBN SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 10 - NUMBER 5 - YEAR

Recent Researches in Communications and IT

Recent Researches in Communications and IT Data security in ITS telecommunications solutions TOMAS ZELINKA, ZDENEK LOKAJ, MIROSLAV SVITEK Faculty of Transportation Sciences Czech Technical University in Prague, Konviktská 20, 110 00 Prague 1, CZECH

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

Screening Tools Chart As of November 2011

Screening Tools Chart As of November 2011 Screenng Chart As of November 2011 Ths tools chart reflects the results of the fourth annual revew of screenng tools by the Center s Techncal Revew Commttee (TRC). The Center defnes screenng as follows:

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

GR-303 Solution For Access Gateways

GR-303 Solution For Access Gateways GR-303 Soluton for Access Gateways GR-303 Soluton For Access Gateways Verson 1.0 October 2003 Page 1 of 18 GR-303 Soluton for Access Gateways COPYRIGHT Ths materal s the propretary property of and confdental

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Abstract. 1. Introduction

Abstract. 1. Introduction System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,

More information

VIP X1600 M4S Encoder module. Installation and Operating Manual

VIP X1600 M4S Encoder module. Installation and Operating Manual VIP X1600 M4S Encoder module en Installaton and Operatng Manual VIP X1600 XFM4 VIP X1600 Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual 7 1.3 Intended

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS

MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Test Model and Coverage Analysis for Location-based Mobile Services

Test Model and Coverage Analysis for Location-based Mobile Services Test Model and erage Analyss for Locaton-based Moble Servces Tao Zhang School of software and Mcroelectronc Northwest Polytechncal Unversty X an, Chna tao_zhang@nwpu.edu.cn Jerry Gao Department of Computer

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College

More information