A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure Protection

Size: px
Start display at page:

Download "A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure Protection"

Transcription

1 A Proactve Rsk-Aware Robotc Sensor etwork for Crtcal Infrastructure Protecton Jameson McCausland, George D ardo 2, Rafael Falcon,2, Ram Abelmona,2, Vocu Groza, and Eml Petru School of Electrcal Engneerng and Computer Scence, Unversty of Ottawa, Ottawa, Canada 2 Research & Engneerng, Larus Technologes Corporaton, Ottawa, Canada E-mal: jmcca080@uottawa.ca; george.dnardo@larus.com; rafael.falcon@larus.com; ram.abelmona@larus.com; groza@ste.uottawa.ca; petru@eecs.uottawa.ca Abstract In ths paper, a rsk-aware robotc sensor network (RS) s proposed n the context of Crtcal Infrastructure Protecton. Such a network wll be comprsed of moble sensor nodes that perceve varous aspects of ther envronment and topologcally reconfgure n order to secure a strategc area of nterest. Rsk awareness s provded through the applcaton of a recently developed Rsk Management Framework to the RS. The rsk level of each node s assessed n terms of ther degree of dstress, proxmty factor, and terran maneuverablty. Rsk montorng alerts are ssued whenever any gven sensor node s quanttatve rsk metrc exceeds a user-defned threshold value. At ths pont, a node-n-dstress (ID) has been dentfed as the weak pont of the securng structure around whch the RS s deployed. The ID can no longer be used wth confdence and the effectve permeter coverage of the RS has been reduced, thus creatng potental securty breaches n the area of nterest. In response, the remanng nodes wll self-organze to maxmze the permeter coverage whle mnmzng the cost of dong so. A lmted set of contngency network topologes s produced va evolutonary mult-objectve optmzaton usng the on- Domnated Sortng Genetc Algorthm (SGA-II) and then ranked accordng to a human-guded alternatve selecton algorthm. The securty operator pcks the most sutable topology, whch s then effectuated upon the envronment. Results ndcate that SGA-II s capable of producng feasble network topologes to satsfy maxmum permeter coverage, whle reducng the energy requred for topology reconfguraton. As far as we are concerned, ths s the frst tme a RS appled to a CIP scenaro s self-organzed n response to a rsk analyss conducted on every sensor node on the bass of multple rsk features. Keywords robotc sensor networks; rsk management; selforganzaton; crtcal nfrastructure protecton; terrtoral securty I. ITRODUCTIO Robot Sensor etworks (RSs) [] can be appled n the doman of Crtcal Infrastructure Protecton (CIP). In such an applcaton, a RS s deployed to safe-guard some crtcal nfrastructure (e.g., buldng, ppelne, etc.) n a secure and relable fashon. The network would consst of a collecton of moble sensor nodes capable of percevng dfferent aspects about ther envronment. Unlke typcal wreless sensor network nodes, RS nodes are capable of movng whch n turn allows the network to dynamcally self-confgure by adoptng a dfferent topology. A self-organzng network s very approprate n CIP. Deployed sensor networks are subject to varous forms of unavodable rsk, thus ncreasng the probablty of sensor node falure and coverage gaps. Rsk can arse n many fashons such as: low battery power, harsh envronmental condtons, malcous attacks, terran hostlty, etc. Although a large body of research focuses on how to avod these rsks, an alternatve proposed n [2] features how rsk can be assessed, montored and mtgated. A rsk-aware RS node can utlze all ts sensng nstruments and evaluate ts total rsk at any pont n tme. Raw sensor data feeds are turned nto useful rsk features, specfcally degree of dstress, ntruder proxmty rsk, and terran maneuverablty rsk, all enablng the sensor network to montor the rsk feature space. A noden-dstress (ID) s dentfed (.e., a sensor node whose rsk value exceeds a certan threshold) and the network must explore a possble soluton to assst such a node n mmnent danger, as t may cause a coverage gap that ncreases the probablty of undetected ntrusons. In a RS, a new topology can be computatonally derved to meet the operatonal goals of the network. We model the dscovery of a new network topology as a mult-objectve optmzaton problem over a combnatoral search space. Good solutons are sought va the on-domnated Sortng Genetc Algorthm II (SGA-II) [3], whch provdes a set of mutually non-domnated canddate network topologes. To the best of our knowledge, ths s the frst paper that addresses self-reconfgurablty ssues n a RS from a rsk-aware perspectve n a CIP scenaro. The remander of ths paper has been structured as follows. Secton II brefly touches on relevant works n the lterature. Secton III outlnes the applcaton of the rsk management framework (RMF) to a self-organzng RS n the CIP realm. Secton IV elaborates on the SGA-II confguraton as part of the RMF s response selecton module. Secton V sheds lght on the emprcal study whereas Secton VI concludes the work. II. RELATED WORK Ths secton brefly touches on some relevant works regardng CIP usng wreless sensors technology wth and wthout rsk analyss. Coppolno et al [4] put forth a hybrd ntruson detecton system (IDS) to protect crtcal nformaton structures. The IDS regards sensors as the source and target of potental attacks and develops a two-ter soluton to prevent snkhole and sleep deprvaton securty breaches. Gomez and Ulmer [5] ntroduce a system prototype for stadum survellance. Sensors detect dangerous crowd actvtes or stuatons and report alerts to a Command and Control (C2) centre, where a decson maker may choose to assgn frst responders and dspatch them to the

2 ncdent scene. These works nether nclude rsk analyss nor optmze the set of potental responses that wll mtgate the rsk condton. Aubert et al [6] and Schaberreter et al [7] propose rsk modelng approaches for crtcal nfrastructures. The former ams at modelng the securty propertes of nterdependent systems and measures ther rsk levels and assurances. The latter constructs the servce decomposton graph for rsk assessment and showcases an onlne montorng tool of three rsk parameters. Despte performng rsk feature extracton and assessment, these frameworks do not embrace consderng a set of prospectve responses to be actuated upon the envronment. Another loosely related group of studes optmze the sensor dstrbuton ether pror to or after deployment. Jn et al [8] employ a mult-objectve dfferental evoluton algorthm to derve sensor dstrbutons over the montorng regon wth maxmum coverage and mnmum overlap. Self-organzaton n cluster sensor networks after sensor falure s pursued va a local scheme n [9]. Intruson detecton n a moble sensor network (MS) s tackled n [0] by provdng k-barrer coverage. Our work touches on the three aspects mentoned above and, to the best of our knowledge, s yet novel n tself. We pursue self-organzaton n a RS that protects a crtcal nfrastructure n a proactve and rsk-aware fashon. The proposed approach s an extenson of the work presented n [2] n whch rsk analyss drves the entre operaton of a sensor and robot network for CIP. However, [2] was not concerned wth elctng a set of promsng responses to counter the perceved threat n the network. The authors recently augmented ther RMF n [] wth a response selecton module that utlzes SGA-II as a mult-objectve optmzaton method to evolve a group of promsng responses that could be actuated upon the envronment. The framework was successfully tested n the context of martme Search and Rescue operatons. Ths paper apples the RMF to a CIP scenaro smlar to the one n [2]. As far as we are concerned, ths s the frst tme a RS s self-organzed n response to a rsk analyss conducted on every sensor node on the bass of multple rsk features. III. RISK-AWARE ROBOTIC SESOR ETWORKS The proposed RS s rsk-aware, meanng that t s capable of evaluatng the rsk of each ndvdual node and flag some of them as IDs. Raw sensor data are transformed nto rsk features through the Rsk Feature Extracton module of the RMF n []. The three rsk features selected for ths applcaton are the followng: degree of dstress, ntruder proxmty rsk and terran maneuverablty rsk. Degree of Dstress: Ths rsk feature models the node s current battery level as a fuzzy set μ DD (x battery ). Wth the followng trangular membershp functon: A=0, B=0, C=00. Intruder Proxmty Rsk: The proxmty of detectons by the sensor node can contrbute to the overall rsk of the sensor unt. An equpped laser range fnder (LRF) provdes depth percepton to the sensor node. If we consder x detecton to be the dstance (n m) to the nearest LRF-detected ntruder, then μ proxmty (x detecton ) s the fuzzy set modelng the object proxmty rsk. Ths fuzzy set uses a trapezodal membershp functon wth parameters A=0, B=0, C=, and D=3.5; Terran Maneuverablty Rsk: Ths rsk feature s a nomnal rsk feature, whch provdes a terran maneuverablty metrc gven some localzaton context. The rsk metrc can be confgured manually as approprate for the deployment envronment, or n the case of ths paper, a random real value between 0.0 and.0 Future work wll allow sensor nodes to update the KB from sensor percepts. That beng sad, the terran nformaton can be quered from the KB by provdng the sensor s Cartesan coordnates, P node (p x, p y, p z ). Localzaton nformaton can be provded by ether a Global Postonng System (GPS) module or any other localzaton algorthm. The terran maneuverablty rsk values are normalzed between 0.0 (no terran rsk) and.0 (hghest terran rsk). The RMF s Rsk Assessment module consders these rsk features to produce an overall rsk metrc for the sensor unt. We have followed the same evaluaton scheme used n [2]. A user-defned rsk threshold s compared aganst the overall rsk of each sensor node n the network. Unts exceedng the rsk threshold are marked as IDs, whch represent a network vulnerabltes. Ths trggers the nvocaton of the RMF s Response Selecton module so as to determne a new feasble network topology to mtgate the threat. The response selecton process s explaned n the next secton. IV. RISK-DRIVE SELF-ORGAIZATIO I A RS Each canddate response topology s evaluated accordng to two dfferent (and conflctng) objectves: F = Total Permeter Coverage: The total area (n %) of the crtcal nfrastructure covered by the RS. F2 = Total Moblzaton Cost: The total cost (n %) of moblzng the nodes to ther target locatons. An optmal soluton s one that maxmzes F and mnmzes F2. Often, n a mult-objectve optmzaton problem we run nto a set of mutually non-domnated solutons (meanng that none s superor to the others). SGA- II [3] s a well-known algorthm that effcently produces a good spread of Pareto-optmal (.e. non-domnated) solutons. The SGA-II optmzaton algorthm, wll mantan a Pareto Archve Set (PAS) over each generaton. In the followng, the SGA-II s confguraton for the problem under consderaton s unfolded. A. Algorthm Confguraton Once a ID s elcted by the RMF s Rsk Assessment module, a snapshot of the network s current state s acqured and becomes the startng pont for the self-organzaton phase. To begn explorng the soluton space for new network

3 topologes, the followng nformaton must be retreved/derved from the RS:. Sensor ode State, Φ node (t), =.. a 2. Sensor ode Response Regons, Ω response 3. Securty Permeter Contour, c securty ) Sensor ode State The a sensor nodes are represented at tme t by a smple model: to as a decay rate for the exponental functon (shown n Fgure ), whch produced desrable results. R response = R max e d ID β (4) So, we can defne the response vector as n (5): Ω response = [P response R response ] (5) Φ node (t) = [ x battery (t) P node (t) x a battery(t) a Pnode ] () (t) The smulated battery level on board each node s provded as a percentage quantty. A constant dscharge rate γ dscharge (n %) occurs for a deployed sensor node. A power consumpton rate of γ movement (n % per meter travelled) s used durng sensor locomoton. Let Φ network (t) be the state of the network at tme t. Φ network (t) = [Φ node (t) Φ a node(t)] (2) A detected ID wll trgger a snapshot, whch captures the ID network state Φ network (t ID ) = Φ network. Ths state wll smply contan the set of battery levels and the set of locatons of each sensor node requred for algorthm confguraton. The state of each sensor node s crucal for the next steps of the algorthm confguraton. 2) Sensor ode Response Regon A response regon s assgned to each sensor node potentally nvolved n the response (new topology). A response regon s defned as the area that contans a possble target locaton for a sensor node. The regon tself s crcular and defned by a center and a radus. The center of the regon s set to the sensor node s current locaton whereas the radus (r response ) s a functon of battery level (x battery ), dstance to the ID (d ID ), and battery level threshold (λ battery ). The avalable battery power on the sensor node s a constrant on the maxmum dstance travelled. The battery level threshold s the mnmum battery level necessary to engage the robotc platforms that are carryng the sensors n dfferental drve operatons. Thus, the maxmum response rng radus s: = { R max x battery γ movement 0 x battery < λ battery λ battery otherwse (3) Ths s the maxmum change n poston possble wthout depletng the battery below the λ battery level. The response radus s vald on the nterval 0 R response R max. The radus of the response regon s defned n (4) usng a combnaton of the maxmum response radus and a monotoncally decreasng exponental functon of the dstance from the ID. A value of β=0.45 was expermentally chosen Fg. Response regon radus calculaton. An exponental relatonshp (e d ID β ) s defned between R response and d ID. β = 0.45 Each sensor node s equpped wth multple sensors mounted on a dfferental drve robotc platform. Gven a target locaton, a dsplacement vector for the sensor node can be calculated. A set of target locatons are generated for each sensor node f ( R response > 0). Let the set of target locatons be: S targe = {(r cos (θ ), r sn (θ )),, (r t cos (θ t ), r t sn (θ t )) } Where r ~U(0, R response ) and θ ~U(0, 2π). U(a, b) s a unform dstrbuton between a and b. Let C represent the algorthm s ntalzaton matrx defned as n (6): C = [ Ω response P node S target ] (6) Ω response P node S target 3) Sensor etwork Coverage Objectve Sensor network coverage represents the extent of the securty permeter that can be surveyed by the sensor nodes. The permeter s represented by a contour csecurty around the crtcal nfrastructure. The RS must have near-complete coverage of ths contour to succeed n detectng any ntruson attempts. Each sensor node n the RS wll contrbute to the permeter coverage by ntersectng the sensor node s feld of vew wth the entre contour or a segment of the contour. For computatonal purposes, let the contour be a set of permeter

4 ponts unformly dstrbuted on the contour, P s k (x s k, y s k, z s k ), where k=..k represents the ndex of the permeter pont. Let the feld of vew radus for the th sensor be r fov. By evaluatng the dstance between the sensor node s poston and each dscrete contour pont, a node wll have a contour pont surveyed f and only f (P k s P node ) f fov. The coverage of the securty permeter s the rato of the number of permeter ponts covered to the total number of permeter ponts. SGA- II wll seek topology solutons whch produce large permeter coverage values. Coverage gaps (.e. lower permeter coverage values) must be avoded to reduce undetected ntrusons. 4) Energy Cost Objectve The power requred to execute a topologcal change must be mnmzed when explorng the search space for canddate solutons. Gven γ movement (power consumpton % per meter travelled), the total power requred by the RS to selforganze nto the new topology can be estmated by (9): deployed n an outdoor CIP scenaro n a secluded area. Sensor nodes are shown as whte rectangular unts formng a permeter around the buldng (.e., crtcal nfrastructure). A total of seven sensor nodes are used n ths experment to form a secure permeter around the buldng. The sensor node resdes on a smple dfferental drve robotc platform and produces raw sensor data from a GPS, an electronc compass, and a laser range fnder. The laser range fnder equps the node wth a sensor feld of vew (FOV) capable of detectng ntrusons on the securty permeter. The FOV s modeled as a crcular regon wth a sensng radus of 3.5 m. Sensor Feld of Vew Robotc Moble ode Securty Permeter Crtcal Infrastructure Cost = = d response γ movement (8) 5) Algorthm Stop Crtera The stoppng crteron for the optmzaton algorthm s based on the algorthm s runtme ξ runtme (n sec.). B. Chromosome Desgn A chromosome n our SGA-II mplementaton represents a possble soluton to the RS self-organzaton problem. Each node s response regon wll consst of t possble target locatons. Let α be the ndex of the j th target pont for the th node n the RS. α Z and can be a value on the nterval of - to ( t ). The ndex value of - ndcates that the asset s not used n the soluton. Each chromosome can then be represented by the followng vector: 2 Chromosome = [α α α a ] (9) A chromosome s a set of target locaton ndces, one for each RS node. The ntal chromosome populaton n SGA- II s randomly ntalzed usng a unform dstrbuton n the specfed range. Each node nvolved n the soluton wll be assgned a random ndex. C. Crossover and Mutaton We mplement unform crossover wth probablty p crossover. When two parent chromosomes are selected from the populaton to crossover, genes are randomly chosen from ether parent. Durng a mutaton operaton, all chromosomes n SGA- II s extended populaton are nvestgated. For a gven chromosome, the probablty of a gene value beng mutated s p mutaton. The algorthm wll terate through each gene value f the gene s to be mutated then a new random value n the range [0; t ] s selected to replace the exstng one. V. EXPERIMETAL RESULTS A set of experments usng Mcrosoft Robotcs Developer Studo (MRDS)[2] have been created to smulate a RS Fg. 2 A 2-D graphcal representaton of the 20.0 m (along x) by 22.5 m (along y) smulaton envronment. The red rectangle s the crtcal nfrastructure. The dashed contour around the crtcal nfrastructure represents the securty permeter. Dots encapsulated by crcular regons are the sensor nodes and sensor FOVs. The shape of the securty permeter s defned by an ellpse centered at the poston of the buldng. The sem-major axs (along x-axs) s 5.42 m and the sem-mnor axs (along z-axs) s 9.0 m. The ellptcal contour s dscretzed nto 200 ponts. Fgure 2 shows a 2-dmensonal representaton of the scenaro ncludng addtonal vsual enttes to help vsualze sensor FOVs and the ellptcal securty permeter. Table I outlnes the ntal condtons for the smulaton. depcted n Fgure 2. TABLE I. SIMULATIO IITIAL STATE Asset, Smulaton Intal State, S[t 0] Sensor odes Pntal(x, z)[m] xbattery (%) f fov [m] (2.8, -2.4) (0.8, -7.8) (.9, -24.2) (6.8, -26.6) (20.4, -22.4)

5 Asset, Smulaton Intal State, S[t 0] Sensor odes Pntal(x, z)[m] xbattery (%) f fov [m] 6 (2.2, -7.) (8.5, -2.2) To detect a ID n the RS, raw data streams from sensor nodes are used to extract the three rsk features outlned n Secton III. Rsk Assessment. Durng the course of the smulaton, moble sensor becomes the ID as ts overall rsk s 0.73; ths s attrbuted to the degree of dstress rsk feature as ths node was deployed n the montorng regon wth a battery level of 30%. After the dentfcaton of the ID, the SGA-II optmzaton algorthm can proceed to ntalze the populaton once the followng nformaton s calculated: the dstances to the ID from each node; the set of response regons for each node; the target locatons for each node The set of dstances of each sensor node s locaton to the locaton of the ID can be quckly computed by: d ID = (P x node P x ID ) 2 + (P y node P y ID ) 2 (0) The response regon s a functon of both the battery power avalable on the node and the dstance from the node to the ID. Evaluatng equaton (4), gven that β = 0.45, λ battery = 0.30, and γ movement = 0.05 for each node, produces a set of response regons. The center of each response regon P response s set to the locaton of the assets from the ntal condtons (Table ). The response regon rad are descrbed n Table IV. TABLE II. RESPOSE REGIO RADII Response Regon Rad, R response (m) ode Value A set of target ponts are generated S targe for 0 j t, t = 200. Wth target locatons for each node, the chromosome populaton can be ntalzed. A populaton sze of 00 chromosomes, p crossover = 0.8, and p mutaton = 0. were used. The optmzaton runs untl the stop crteron s satsfed, whch n ths case s a runtme of 20 seconds. The SGA-II parameters of [] were used as startng pont, but were adjusted through expermentaton to acheve desrable results. Fg. 3 Plots of the frst three Pareto Fronts are dsplayed n ascendng order from green, red, and blue. The remanng solutons (front > 4) are plotted as blue scatter ponts. The Pareto Fronts from the PAS are dsplayed n Fgure 3 to pant a clear pcture of the non-domnated solutons dscovered n the soluton space. The frst front ndcates the truly non-domnated solutons dscovered n the search space. The maxmum coverage and mnmum energy objectve functons share equal weghtng n the optmzaton by SGA- II. It s due to ths that extreme solutons are presented wth poor coverage but wth mnmal energy cost along wth others that present excellent coverage combned wth very hgh energy cost values. Fgure 4 shows a subset of the total set of optmzed solutons. It can be observed that solutons are well spread across the Pareto front whch confrms SGA-II s ablty to obtan such a unform dstrbuton of the solutons. Fg. 4 Response Selecton form dsplayng a lst of optmzed solutons. It s up to a decson maker to select a feasble response for ths RS. Fgure 5 depcts the resultng topology when selectng network response 5, whch provdes an approprate tradeoff between coverage and energy usage. Conversely, network response 7 provdes the maxmum permeter coverage (95.5%), but wth the use of sgnfcant energy (39.7%). ew sensor locaton Orgnal sensor locaton Asset 3 Asset 4 Asset 5 Asset 6 ew sensor FOV Asset 2 Asset ID

6 Fg. 5 (left) A 2-D graphcal representaton of the network response 5. The orgnal and fnal sensor locatons are shown. ew sensor FOVs are dsplayed as the red crcular regons. (rght) A 3-D graphcal vew of the response network. Red dots denote the new node locatons. Whte dots ndcate the orgnal node locaton. etwork response 5 provdes a coverage metrc of 92.0% (a loss of -3.5% from response 7); however t can be acheved usng 27.5% (savngs of 3.8% from response 7) energy collectvely from the network. A decson maker wll lkely choose a response that leans towards hgh coverage but wth the energy cost mnmzed (.e., select network response 5 nstead of 7). The algorthm was also tested on a smulated RS of 47 robotc nodes, protectng a large L-shaped permeter. After an optmzaton tme of 20 seconds, the PAS contans four solutons. The ntal coverage for the network s 99% and the ID causes a coverage gap of 2.23 m thus reducng the permeter coverage to 97%. Fgure 6 depcts the optmzed soluton wth maxmum permeter coverage of 99.2% and a collectve energy consumpton of.58%. Fg. 6 (left) A 2-D graphcal representaton of the network response for maxmum coverage. The orgnal and fnal sensor locatons are shown. ew sensor FOVs are shown as the red crcular regons. (rght) A 3-D graphcal vew of the response network. Red dots denote the new node locatons. Whte dots ndcate the orgnal node locatons. VI. ID COCLUSIOS It s mpossble to escape the varous rsks assocated wth the operaton of a RS n any envronment. The use of a rskaware RS grants a new level of percepton to antcpate the falure of any gven sensor node. In ths paper, a smulated RS was appled to crtcal nfrastructure protecton. The deployment goals of the network are: to mantan maxmum permeter coverage and to stay operatonal for as long as possble. In the event of the presence of a ID, the network s subject to a coverage gap; dramatcally ncreasng the rsk of undetected ntruson of the secure permeter. Through multobjectve optmzaton wth the SGA-II t s possble to obtan a new network topology for the RS that maxmzes sensor coverage whle balancng energy cost. The current work s lmted to a sngle response for mtgatng rsk. Future work wll ntroduce multple detected IDs and the mtgaton of the nduced rsk usng smultaneous network responses. In ths research we hope to develop a more robust rsk-aware RS. VII. REFERECES [] R. Falcon: Towards Fault Reactveness n Wreless Sensor etworks wth Moble Carrer Robots, PhD Dssertaton, Unversty of Ottawa, Aprl 202. [2] R. Falcon, R. Abelmona and, A. ayak: "An Evolvng Rsk Management Framework for Wreless Sensor etworks," n 20 Int l Conference on Computatonal Intellgence for Measurement Systems and Applcatons (CIMSA), pp.-6, Sept. 9-2, 20. [3] K. Deb, A. Pratap, S. Agarwal and T. Meyarvan: A Fast and Eltst Mult-objectve Genetc Algorthm: SGA-II, IEEE Trans. on Evolutonary Computaton, vol 6(2), pp , [4] L. Coppolno, S. D Antono, L. Romano and G. Spagnuolo: An Intruson Detecton System for Crtcal Informaton Inffrastructures Usng Wreless Sensor etwork Technologes, th Int l Conference on Crtcal Infrastructure (CRIS), pp. -8, Sept 20-22, 200. [5] L. Gomez and C. Ulmer: Secure Sensor etworks for Crtcal Infrastructure Protecton, n th Int l Conference on Sensor Technologes and Applcatons (SESORCOMM), pp , July 8-25, 200. [6] J. Aubert, T. Schaberreter, C. Incoul, D. Khadraou, and B. Gateau. Rsk-Based Methodology for Real-Tme Securty Montorng of Interdependent Servces n Crtcal Infrastructures. In Int l Conference on Avalablty, Relablty and Securty, pages , February 200. [7] T. Schaberreter, C. Bonhomme, J. Aubert, C. Incoul, and D. Khadraou. Support Tool Development for Real-Tme Rsk Predcton n Interdependent Crtcal Infrastructures. In IEEE Int l Symposum on Sofware Relablty Engneerng [8] L. Jn, J. Ja and D. Sun: ode Dstrbuton Optmzaton n Moble Sensor etwork based on Mult-Objectve Dfferental Evoluton Algorth, n 4 th Int l Conference on Genetc and Evolutonary Computng (ICGEC), pp. 5-54, Dec 3-5, 200 [9] R. Msra and C. Mandal: Self-Healng for Self-Organzng Cluster Sensor etworks, n 2006 Annual IEEE Inda Conference, pp. -6, Sept 5-7, 2006 [0] G.Y. Keung, B. L and Q. Zhang: The Intruson Detecton n Moble Sensor etwork, IEEE/ACM Trans. on etworkng, vol 20(4), pp. 52-6, August 202. [] R. Falcon and R. Abelmona: A Response-Aware Rsk Management Framework for Search-and-Rescue Operatons, IEEE Congress on Evolutonary Computaton (CEC), pp , June 0-5, 202. [2] Mcrosoft: Mcrosoft Robotcs Developer Studo (Verson 4). Avalable from

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks

Fuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks , July 6-8, 2011, London, U.K. Fuzzy TOPSIS Method n the Selecton of Investment Boards by Incorporatng Operatonal Rsks Elssa Nada Mad, and Abu Osman Md Tap Abstract Mult Crtera Decson Makng (MCDM) nvolves

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm

Energy Efficient Coverage Optimization in Wireless Sensor Networks based on Genetic Algorithm Unversal Journal of Communcatons and Network 3(4): 82-88, 2015 DOI: 10.13189/ujcn.2015.030402 http://www.hrpub.org Energy Effcent Coverage Optmzaton n Wreless Sensor Networks based on Genetc Algorthm Al

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

ERP Software Selection Using The Rough Set And TPOSIS Methods

ERP Software Selection Using The Rough Set And TPOSIS Methods ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Mooring Pattern Optimization using Genetic Algorithms

Mooring Pattern Optimization using Genetic Algorithms 6th World Congresses of Structural and Multdscplnary Optmzaton Ro de Janero, 30 May - 03 June 005, Brazl Moorng Pattern Optmzaton usng Genetc Algorthms Alonso J. Juvnao Carbono, Ivan F. M. Menezes Luz

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

An Evolutionary Game Theoretic Approach to Adaptive and Stable Application Deployment in Clouds

An Evolutionary Game Theoretic Approach to Adaptive and Stable Application Deployment in Clouds An Evolutonary Game Theoretc Approach to Adaptve and Stable Applcaton Deployment n Clouds Chonho Lee Unversty of Massachusetts, Boston Boston, MA 5, USA chonho@csumbedu Yuj Yamano OGIS Internatonal, Inc

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

HP Mission-Critical Services

HP Mission-Critical Services HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2 Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43

More information

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications

Evaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Preventive Maintenance and Replacement Scheduling: Models and Algorithms

Preventive Maintenance and Replacement Scheduling: Models and Algorithms Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the

More information

Cost Minimization using Renewable Cooling and Thermal Energy Storage in CDNs

Cost Minimization using Renewable Cooling and Thermal Energy Storage in CDNs Cost Mnmzaton usng Renewable Coolng and Thermal Energy Storage n CDNs Stephen Lee College of Informaton and Computer Scences UMass, Amherst stephenlee@cs.umass.edu Rahul Urgaonkar IBM Research rurgaon@us.bm.com

More information

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and

More information

Adaptive Sampling for Energy Conservation in Wireless Sensor Networks for Snow Monitoring Applications

Adaptive Sampling for Energy Conservation in Wireless Sensor Networks for Snow Monitoring Applications Adaptve Samplng for Energy Conservaton n Wreless Sensor Networks for Snow Montorng Applcatons Cesare Alpp *, Guseppe Anastas, Crstan Galpert *, Francesca Mancn, Manuel Rover * * Dp. d Elettronca e Informazone

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information