Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Size: px
Start display at page:

Download "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation"

Transcription

1 Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur Uiversity Aubur, AL 36849, USA weishi@aubur.edu Zhou Su Waseda Uiversity Tokyo , Japa zhousu@asagi.waseda.jp Keywords: Wireless sesor etworks, etwork security, hierarchical topology, malicious ode detectio. Abstract Deployed i a hostile eviromet, idividual odes of a wireless sesor etwork (W) could be easily compromised by the adversary due to the costraits such as limited battery lifetime, memory space ad computig capability. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary through compromised odes. However, it is challegig to secure the flat topology etworks efficietly because of the poor scalability ad high commuicatio overhead. O top of a hierarchical W architecture, i this paper we proposed a ovel scheme based o weighted-trust evaluatio to detect malicious odes. The hierarchical etwork ca reduce the commuicatio overhead betwee sesor odes by utilizig clustered topology. Through itesive simulatio, we verified the correctess ad efficiecy of our detectio scheme. 1. INTRODUCTION Recet advacemets i micro-electro-mechaical systems (MEMS) ad low power ad highly itegrated electroic devices have led to the developmet ad wide applicatio of wireless sesor etworks [5], [14], [16]. Wireless sesor etworks cosist of very small devices, called sesor odes, that are battery powered ad are equipped with itegrated sesors, a data-processig uit, a small storage memory, ad short-rage radio commuicatio [17]. Typically, these sesors are radomly deployed i the field. They form a uatteded wireless etwork, collect data from the field, partially aggregate them, ad sed them to a sik that is resposible for data fusio. Sesor etworks have applicatios i emergecy-respose etworks, eergy maagemet, medical moitorig, logistics ad ivetory Mauscript submitted o Ja. 11, 28 to The Symposium o Simulatio of Systems Security (SSSS 8), Ottawa, Caada, April 14 17, 28. Correspodig author: Yu Che, Dept. of Electrical & Computer Egieerig, SUNY Bighamto, Bighamto, NY yche@bighamto.edu, Tel.: (67) maagemet, ad battlefield maagemet. I cotrast to traditioal wireless etworks, special security ad performace issues have to be carefully cosidered for sesor etworks [21]. For example, due to the uatteded ature of sesor etworks, a attacker could lauch various attacks ad eve compromise sesor devices without beig detected. Therefore, a sesor etwork should be robust agaist attacks, ad if a attack succeeds, its impact should be miimized. I other words, compromisig a sigle sesor ode or few sesor odes should ot crash the etire etwork. Aother cocer is about eergy efficiecy. I a W, each sesor ode may eed to support multiple commuicatio models icludig uicast, multicast, ad broadcast. Therefore, due to the limited battery lifetime, security mechaisms for sesor etworks must be eergy efficiet [19]. Especially, the umber of message trasmissios ad the amout of expesive computatio should be as few as possible. I fact, there are a umbers of attacks a attacker ca lauch agaist a wireless sesor etwork oce a certai umber of sesor odes have bee compromised. I literature, for istace, HELLO floodig attacks [9], sik hole attacks [9], Sybil attack [12], black hole attack [15], worm hole attacks [6], or DDoS attacks [4] are optios for a attacker. These attacks lead to aomalies i etwork behaviors that are detectable i geeral. There are some reported solutios to detect these attacks by moitorig the aomalies [9]. I this work, we addressed a eve trickier sceario. Whe a adversary has gaied cotrol over certai sesor ode(s), he/she does ot lauch direct attacks agaist the etwork. Sice oce the misbehavior is detected, the operator may forsake these compromised odes ad tur to other data sources. Istead, the attacker let those compromised odes behave ormally but report false data to the data collector. The purpose of the adversary is to mislead the operator with falsified data. This may lead to more serious cosequeces; for istace, i the battlefield a false report regardig the operatios of the eemy may lead to extra casualties SprigSim

2 I this paper, we proposed a weighted-trust evaluatio (WTE) based scheme to detect the compromised odes by moitorig its reported data. It is a light-weighted algorithm that would icur little overhead. Cosiderig the scalability ad flexibility, hierarchical etwork architecture is adopted. Through itesive simulatio, we verified that our WTE scheme detects misbehaved odes accurately with very short delay. The rest of the paper is structured as follows. I sectio 2, we briefly review the related malicious W ode detectio approaches. Sectio 3 describes our hierarchical etwork structure ad the priciple of our WTE based malicious ode detectio algorithm. The experimet setup ad simulatio results are preseted i Sectio 4. Sectio 5 wraps up this paper with a discussio about efficiecy ad implemetatio issues of our solutio. 2. RELATED WORK Wireless sesor etworks are ofte deployed i a hostile eviromet ad work without huma supervisio, idividual ode could be easily compromised by the adversary due to the costraits such as battery lifetime, smaller memory space ad limited computig capability. Security i W has bee oe of the most importat topics i the W research commuity [1], [8], [22]. Here we oly briefly review the reported works closely related to malicious ode detectio due to the limited space. It is critical to detect ad isolate the compromised odes i order to avoid beig misled by the falsified iformatio ijected by the adversary. Luo et al. [11] have poited out that ifrastructureless ad hoc etworks rarely have a real defese mechaism agaist most of the attacks, icludig both outsider ad isider attacks such as compromised ode attacks. They suggested a system desig like this if oe ode is amed trusted by certai umber of its eighborig odes, that particular ode is trusted both locally ad globally. However, sice the system uses a miimum umber of trusted odes it is ot so applicable to sesor etworks where the odes are radomly spread out. I other words, it is possible that uder certai coditios odes caot fid the miimum umber of eighborig odes i order to be amed trusted. Oe solutio for locatioized aomaly detectio i a group of odes is suggested i [4]. Every ode gets the localizatio iformatio from the eighborig odes ad also computes the localizatio iformatio itself ad compares these two values. If the differece is small eough, that ode decides there is o adversary aroud causig the localizatio problem i its locatio. Researchers also suggested detectig malicious ode usig sigal stregth [7]. The idea here is to deped o eighborhood moitorig of the odes. Every sesor ode moitors its surroudig ad wheever a trasmissio sigal is detected by a sesor ode, it would check if the sigal stregth of the trasmittig ode is compatible with the origiator ode's geographical positio. Eve though this approach is applicable, it is ot efficiet i may ways. The large overhead eeded for trasmittig data is a problem both for sedig ad processig. Also it is ot eergyefficiet sice all odes are moitorig ad processig data all the time. The work reported i [3] is the most close to our approach. They proposed to detect malicious ode by comparig its output with a aggregatio value. Ispired by the Byzatie problem, our approach is more straightforward ad icurs much less overhead sice there is o expesive calculatio ivolved. Karlof ad Wager [9] suggested to costruct efficiet radom samplig mechaisms ad iteractive proofs, the a user ca verify that the aswer give by the aggregator is a good approximatio of the true value eve whe a fractio of the sesor odes are compromised. Furthermore, i other fields Byzatie program is cosidered as a importat issue. For example, i cogitive radio etwork, Byzatie problem i spectrum sesig is also ivestigated [2]. 3. WEIGHTED TRUST EVALUATION TECHNOLOGY 3.1 Network Architecture Figure 1 demostrates the etwork architecture i which our weighted-trust evaluatio scheme is implemeted. It is a three-layer hierarchical etwork architecture, which cosists of three types of sesor odes similar to the architecture utilized i [2]: Low-power Sesor Nodes ()" with limited fuctioality; Higher-power Forwardig Nodes (FN)" that forward the data obtaied form sesor odes to upper layer; Access Poits (AP)", or called Base Statios (BS) that route data betwee wireless etworks ad the wired ifrastructure. I cotrast to sesor odes i flat ad hoc sesor etworks, sesor odes i the lowest layer of this hierarchical etwork do ot offer multi-hop routig capability to its eighbors. A umber of Sesor Nodes (s) are orgaized as a group ad cotrolled by a higher layer ode, the Forwardig Node (FN). Therefore, each sesor ode oly commuicates with its FN ad provides iformatio such as sesor readig to its FN. FNs are located o the secod layer atop the sesor ode layer ad offers multi-hop routig capability to s or other FNs. We assume the FNs are trustful ad wo t be compromised. We also assume the APs are trustful, otherwise the adversary ca iject ay data without bee detected. 28 SprigSim

3 AP AP AP Layer FN FN FN FN Layer FN FN FN Layer Figure 1. Architecture of the hierarchical W. 3.2 Malicious Nodes Detectio As metioed earlier, sesor odes i sesor etworks are usually deployed i hostile eviromets such as battlefields. Cosequetly a sesor ode may be compromised or out of fuctio ad the provides wrog iformatio that may mislead the whole etwork. This problem is called as the Byzatie problem. For example, a compromised sesor ode (malicious ode) ca costatly report icorrect iformatio to higher layers. The aggregator (FN or AP) i higher layer may make a wrog aggregatio result due to the effect of the malicious ode. It is therefore a importat issue i sesor etworks to detect malicious odes i spite of such Byzatie problem. Each FN has two wireless iterfaces, oe commuicates with lower layer odes (s), which belog to its maagemet, ad the other coects to higher layer odes Access Poits (APs). APs are located o the highest layer i a wireless etwork, ad have both wireless ad wired iterfaces. APs provide multi-hop routig for packets from s ad FNs withi radio rage, i additio to routig data to wired etworks. APs also have the fuctioality of forwardig cotrol iformatio from wired etworks to FNs ad s. This hierarchical etwork ca also be cosidered as a distributed iformatio aggregatio system. s gather iformatio ad report to its FN. Based o the iformatio collected from s, FNs compute the aggregatio result ad commit the iformatio to APs. However, sice s may be compromised ad report fake iformatio, it is importat for FNs to verify the correctess of the iformatio collected from s. Similarly, it is also desired that APs possess the ability of verifyig the committed iformatio. Table 1 summarizes the symbolic otatio used throughout this paper. Figure 2. A weight based etwork for hierarchical sesor etwork. As the first step toward the solutio to the problem, we model it ito a weight-based etwork as show i Figure 2. The etwork is adapted i the architecture betwee a group of sesor odes ad their forwardig ode. As show i the figure, a weight W is assiged to each sesor ode. The FN collects all iformatio provided by s ad calculates a aggregatio result usig the weight assiged to each : E = N = W U 1 (1) Symbol FN AP BS W E U θ r Table 1. Symbolic otatios Meaig Sesor Node Forwardig ode Access poit Base statio Weight rage Aggregatio result A sesor ode s output Weight pealty ratio The ratio of sesor odes i a cluster sedig differet report to the FN Where E is the aggregatio result ad W is the weight ragig from to 1. A essetial cocer is about the defiitio of sesor ode s output U. I practice, the output iformatio U may be false or true iformatio or cotiues umbers such as temperature readig. Thus the defiitio of output U is usually depedig o the applicatio where the sesor etwork is used. The followig issue is to update the weight of each sesor ode based o the correctess of iformatio reported. Updatig the weight of each sesor ode has two purposes. First, if a sesor ode is compromised (becomes a malicious ode) ad frequetly seds its report icosistet with the fial decisio, its weight is likely to be decreased. The if a sesor ode s weight is lower tha a specific SprigSim

4 threshold, we ca idetify it as a malicious ode. Secod, the weight also decides how much a report may cotribute to the fial decisio. This is reasoable sice if the report from a sesor ode teds to be icorrect, it should be couted less i the fial decisio. This logic is reflected i the followig equatio. W W = W θ r if ( U elsewise E) Where θ is a weighted pealty ratio. Whe the output of a sesor ode s is ot cosistet with the fial result, its weight is reduced by the weight pealty θ multiplyig r. The umber r is defied as: (2) r = m s (3) Where m is the umber of odes i the cluster sedig differet report to the FN, ad s is the total umber of odes i the cluster uder the same FN. A optimal θ value is essetial i our WTE mechaism sice it affects the detectio time ad the accuracy of the algorithm. I additio, due to various defiitios of output iformatio (U ) as metioed above, the cosistece determiatio, which decides whether a ode s output is cosistet with the fial result, is also applicatiodepedet. For example, it is easy to determie the cosistece for a false or true output. However, for a cotiuous umber of U like temperature readig, the probability distributio fuctio could be used to determie the cosistecy of the output iformatio from all sesor odes. Furthermore, a ormalizatio operatio as described i the followig equatio is used to guaratee the weight kept i the rage from to 1. W = W / max( W, LW 1 N Based o updated weights, the forwardig ode is able to detect a ode as a malicious ode if its weight is lower tha a specific threshold. This detectio algorithm ca be widely used i differet types of sesor etworks. For example, the umber of sesor odes ca vary i the algorithm, which makes it suitable for very large ad very small etworks. However, the descriptio of sesor ode output ad updatig scalig factor which are depedet o the applied applicatio eed to be determied carefully i order to achieve efficiet ad high accuracy detectio. 4. SIMULATION EXPERIMENTAL RESULTS 4.1 Simulatio Setups ) (4) Itesive simulatio experimets usig MatLab were coducted to evaluate the effectiveess of our WTE based malicious odes detectio algorithm. I the simulatio, the detectio algorithm is deployed at a forwardig ode to moitor all sesor odes uder the cotrol of the forwardig ode, ad the detectio is performed every cycle, which is a basic time uit of the simulatio. For coveiece, the output of sesor ode are either as 1 (alarm) or (o alarm). All simulatio results were recorded after the system model reached steady state. We assume that a sesor ode is compromised radomly by the attacker at a specific probability every cycle, referred to as the attack probability, ad the this malicious ode keeps reportig the opposite iformatio after compromised. For example, a malicious ode always seds alarm while the aggregatio result computed from other sesor odes is o alarm. Meawhile, a ormal sesor ode may also sed alarm whe real alarm occurs. This case also occurs radomly at a differet alarm probability : Normal Node : Detected Node : Malicious Node : Misdetected Node : Normal Node sedig Figure 3. A example of sesor odes deploymet i the simulatio. Uder the assumptio that sesor odes are desely deployed to moitor certai target. I cotrast to malicious odes, if a ormal ode started sedig alarm, its eighbor odes would also start to sed alarm after a short delay time. Furthermore, ormal alarmig odes will stop sedig alarms after a certai cycles. The ode, which is detected or misdetected as a malicious ode, is iactivated from the whole processig. The detectio is termiated after 2 cycles or more tha 25% of all odes are detected as malicious odes. Each result is calculated form a average over 1 idepedet simulatios. Figure 3 shows a example of sesor odes deploymet i the simulatio eviromet. Sesor odes are uiformly deployed i a square plae. A sesor ode may be a malicious ode, a ormal ode, or a ormal ode that 28 SprigSim

5 geeratig alarms. Three metrics are defied to evaluate the performace of the detectio algorithm. The respose time, which is the average detectio cycles of correctly detected malicious odes shows how fast malicious odes ca be detected. The Detectio rate, which is the ratio of the umber of detected malicious odes ad the umber of total malicious odes, idicates the effectiveess of our scheme. The third measure is misdetectio ratio, which is the ratio of misdetected odes to all detected odes icludig correctly detected ad misdetected odes. Actually these misdetected odes cosist of two parts: the umber of ormal odes beig treated as malicious oes ad the umber of malicious ode beig treated as ormal odes. For such a malicious ode detectio scheme, short respose time, high detectio rates are desired as well as a low misdetectio ratio. We studied the three metrics through simulatio usig differet parameters. probability are both.4. The umber of cycles that ormal odes sed alarms ad wait to stop alarms is 1 cycles. A threshold (.4) is also set for detectio determiatio as metioed earlier. Figure 4 illustrates the results with weight pealties varyig from.2 to 1. the umber of sesor odes are chage from 1 odes to 4 odes. The icreasig weight pealty reaches a shorter respose time, ad improves the detectio ratio. Ituitively the pealty value reveals the sesitivity of our detectio results agaist the variatio i reported data. However, the misdetectio ratio also icreases as weight pealty icreasig, especially after the pealty ratio becomes.8 ad greater. Cosiderig the tradeoffs amog respose time, detectio rate ad misdetectio rate comprehesively, it is reasoable to set the weight pealties values i the rage of (.4-.1). 4.3 Scalability 4.2 Weight Pealty Respose (1) Respose (4) Usig weight pealties.1 ad.5, we further evaluated the algorithm with various umbers of odes as show i Figure 5. The parameters for this experimet are the same as the first experimet Cycles Cycles Weight Pealty Respose (θ=.1) Respose (θ=.5) Ratio (a) Respose Time vs. Pealty Weights 1 Detect (1) Detect (4) Misdetect (1) Misdetect (4) Weight Pealty Ratio Number of Nodes (a) Respose Time vs. Number of Nodes Detect (θ=.1) Detect (θ=.5) Misdetect (θ=.1) Misdet (θ=.5) (b) Detectio Accuracy vs. Pealty Weights Figure 4. Impact of various Pealty Weights o system performace. The first simulatio is to fid a optimal weight pealty for the detectio algorithm. The attack probability ad alarm Number of Nodes (b) Detectio Accuracy vs. Number of Nodes Figure 5. Illustratio of the system scalability SprigSim

6 The respose time, detectio, ad misdetectio ratios are pretty stable while we icreased the umber of odes from 9 to 9, particularly whe the umber of odes is greater tha 64. This result implies that our WTE based detectio algorithm has very ice scalability as it works well uder variat etwork sizes without losig much performace. Especially if the size of etwork becomes large eough, for example, greater tha 64, the etwork size almost has o ifluece o the performace. Figure 5 also demostrates the impact of the selectio of pealty weight θ. Whe a larger value is chose (θ =.1), the system ca detect malicious ode faster ad more accurately comparig to usig smaller value (θ =.5) as show i Fig. 5(a) ad the upper two curves i Fig. 5(b). However, such a faster respose is achieved with the cost of higher misdetectio rate as show by the lower two curves i Fig. 5(b). This verifies the tradeoff amog detectio performace ad misdetectio ratio, ad shows that the system operator ca adjust the sesitivity of the pealty weight parameter θ accordig to the requiremets i differet applicatios. 4.4 Attack Probability Fially, the performace at various attack probabilities is evaluated with weight pealty.5 for 1 odes ad 4 odes cases. The attackig probability is defied as the ratio of malicious odes amog total umber of sesor odes i the etwork that is assumed could be compromised. It describes the itesity of false data that the adversary ijects ito the etwork. As idicated i the research of Byzatie Geeral Problem [1], whe the umber of malicious odes is larger tha the umber of legitimate odes, the loyalty geerals caot figure out who is the rebelled oe; Furthermore, whe there is ot ay autheticatio mechaism applied, the umber of rebel geerals has to be less tha 1/3 of the total umber of geerals if the loyal geerals wat to reach a agreemet o correct activity. I our problem, similarly, if the umber of compromised odes is larger tha 25% of the total odes, we may ot be able to detect the bad guys accurately. The upper bod of the amout of compromised odes i our simulatio is 3% of the total umber of odes. Therefore, the attack probability of 1 implies that there are 25% of the sesor odes have bee compromised. We evaluated the performace usig the respose time, detectio, ad misdetectio ratios as show i Figure 6. The icreasig attack probability meas that there are more odes beig compromised ad falsified data are iserted. As illustrated i Fig. 6(a), the respose time slightly icreases with attack probability icreasig. This makes sese that as more malicious odes appear, the aggregated data is affected more by the falsified data. While there are oly small chages observed i detectio ratios, the misdetectio ratio decreases largely as the growth of the attack probabilities, as show i Fig. 6(b). This is partially due to the icreasig umber of malicious odes that makes the false positive rate smaller. Based o the results reported above, the respose time, detectio, ad misdetectio ratios are stable i the cases large umber of odes ad high compromise probability. It demostrates that the proposed detectio algorithm is efficiet for both large etworks ad high attack probability coditios. The experimet results also show that the performace of the detectio algorithm is largely depedet o parameters studied above. Cycles Ratio Respose (1) 6.8 Respose (4) Attack Probability (a) Respose Time vs. Compromise Probability Detect (1) Detect (4) Misdetect (1) Misdetect (4) Attack Probability (b) Detectio Accuracy vs. Compromise Probability Figure 6. System performace uder differet compromise probabilities. 5. CONCLUSIONS I this paper, we proposed a ovel weighted-trust evaluatio based scheme to detect compromised or misbehaved odes i wireless sesor etworks. The basic idea is that FNs give trust values to each of the odes i the 28 SprigSim

7 cluster, if a ode seds meaigless/wrog iformatio which implies that a ode has bee compromised or out is of fuctio, the FN directly lowers that ode s trust level. It is much easier ad less complex to keep track of the odes ad it is harder to compromise most of the ode uless a attacker compromises the base statios. With a very good scalability, our approach is applicable to both small size Ws ad Ws with larger umber of odes. The oly differece to apply it to larger size Ws is to icrease the umber of FNs. Essetially, it could be treated as a ode-clusterig problem. Although there are couples of research works reported addressig the malicious ode detectio problem i Ws, it is difficult to compare the performace betwee each other. As itroduced i sectio 2, the desig assumptios ad the experimets eviromets are very differet. Particularly, lack of a comparable bechmark makes it meaigless to compare the results, i.e. detectio rate. Our approach is based o the assumptio that base statios are trusted. I fact, if the adversary ca gai cotrol over the base statios, he/she ca do ay possible attack agaist the W. This is a iterestig ope problem, however it is beyod the scope of this paper. Aother critical assumptio is that the majority of the sesor odes are workig properly. If the umber of compromised odes is more tha the umber of ormal odes, the legal odes will be reported as malicious oe ad beig isolated. Actually, i this paper we have reported merely some prelimiary results, which verified the correctess ad effectiveess of our solutio. More detailed aalysis regardig the performace of our scheme will be studied i the ogoig research ad more questios to be aswered. For istace, how is the impact of distributio of the 25% malicious odes agaist the performace of weighted-trust evaluatio? What is the behavior of our detectio scheme if the ratio of malicious odes beyod 1/3 of the sesor odes? I our progressive efforts, we are studyig the deploymet of FNs ad the ifluece of differet desities of FNs o the performace. I additio, we are settig up a testbed cosistig of more tha 64 sesor odes. That may allow us to ivestigate the differeces betwee the simulatio experimets ad what happes i real world whe real physical odes are i use. ACKNOWLEDGEMENT We d like to thak the aoymous reviewers for their valuable commets ad suggestios. REFERENCES [1] E. Ayday, F. Delgosha, ad F. Fekri, Locatio-Aware Security Services for Wireless Sesor Networks usig Network Codig, Ifocom, May 27. [2] R. Che, J. M. Park, ad K. Bia, Robust Distributed Spectrum Sesig i Cogitive Radio Networks, Techical Report TR-ECE-6-7, Dept. of Electrical ad Computer Egieerig, Virgiia Tech., July 26. [3] D.-I. Curiac, O. Baias, F. Draga, C. Volosecu, ad O. Draga, Malicious Node Detectio i Wireless Sesor Networks Usig a Autoregressio Techique, the 3 rd Iteratioal Coferece o Networkig ad Services (ICNS 7), Jue 19 25, 27, Athes, Greece. [4] W. Du, L. Fag, ad P. Nig, LAD: Localizatio Aomaly Detectio for Wireless Sesor Networks, the 19 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 5), April 3 8, 25, Dever, Colorado, USA. [5] D. Estri, R. Govida, J. Heidema, ad S. Kumar, Next Cetury Challeges: Scalable Coordiatio i Sesor Networks, MOBICOM, August 1999 [6] Y. Hu, A. Perrig, ad D. Johso, Packet Leashes: A Defese agaist Wormhole Attacks i Wireless Ad Hoc Networks, IEEE INFOCOM, 23 [7] W. Juior, T. Figueriredo, H.-C. Wog, ad A. Loureiro, Malicious Node Detectio i Wireless Sesor Networks, the 18 th Iteratioal Parallel ad Distributed Priocessig Symposium (IPDPS 4), April 26 3, 24, Sata Fe, Nex Mexico, USA. [8] C. Karlof, N. Sastry, ad D. Wager, TiySec: A Lik Layer Security Architecture for Wireless Sesor Networks, ACM Sesys, November 24. [9] C. Karlof ad D. Wager, Secure Routig i Wireless Sesor Networks: Attacks ad Coutermeasures, Joural of Ad Hoc Networks, Elsevier, 23 [1] L. Lamport, R. Shostak, ad M. Pease, The Byzatie Geerals Problem, ACM Trasactios o Programmig Laguages ad Systems, Vol. 4, No. 3, July [11] Haiyu Luo, Petros Zerfos, Jieju Kog, Sogwu Lu, Lixia Zhag, Self-securig Ad Hoc Wireless Networks, IEEE ISCC (IEEE Symposium o Computers ad Commuicatios) 22, Italy. [12] J. Newsome, E. Shi, D. Sog, ad A. Perrig, The Sybil Attack i Sesor Networks: Aalysis ad Defese, Iteratioal Symposium o Iformatio Processig i Sesor Networks, Vol. 1(24). [13] B. Przydatek, D. Sog, ad A. Perrig, SIA: Secure Iformatio Aggregatio i Sesor Networks, Proceedigs of the 1st iteratioal coferece o SprigSim

8 Embedded etworked sesor systems, November 5-7, 23, Los Ageles, Califoria, USA. [14] S. D. Servetto, From small Sesor Networks to Sesor Networks, EmNets 26, May 26. [15] B. Su, K. Wu, ad U. Pooch, Secure Routig agaist Black-hole Attack i Mobile Ad Hoc Networks, i Proceedigs of Commuicatios ad Computer Networks, 22. [16] M. Tubaishat ad S. Madria., Sesor Networks: a Overview, IEEE Potetials, 22, 2, 2-23, April 23. [17] M.A.M. Vieira, D.C. da Silva Jr., C.N. Coelho Jr., ad J.M. da Mata., Survey o Wireless Sesor Network Devices, Emergig Techologies ad Factory Automatio (ETFA3), September 23. [18] W. Ye, F. Silva, ad J. Heidema, Ultra-Low Duty Cycle MAC with Scheduled Chael Pollig, i Proceedigs of the 4th ACM Coferece o Embedded Networked Sesor Systems (SeSys), Boulder, Colorado, USA, November, 26. [19] Y. Yu, B. Krishamachari, ad V.K. Prasaa, Eergy-Latecy Tradeoffs for Data Gatherig i Wireless Sesor Networks, IEEE Ifocom'4 [2] S. Zhao, K. Tepe, I. Seskar ad D. Raychaudhuri, Routig Protocols for Self-Orgaizig Hierarchical Ad-Hoc Wireless Networks, Proceedigs of the IEEE Saroff Symposium, Treto, NJ, March 23. [21] L. Zhou ad Z. Haas, Securig Ad Hoc Networks, IEEE Network Special Issue o Network Security, 13, 6, 24-3, November [22] S. Zhu, S. Setia, ad S. Jajodia, LEAP: Efficiet Security Mechaisms for Large-Scale Distributed Sesor Networks, CCS'3, October 23. BIOGRAPHY Idris M. Atakli received his M.S. degree i Electrical Egieerig from the State Uiversity of New York (SUNY), Bighamto i 27. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at SUNY - Bighamto. His research iterests iclude iformatio security, digital watermark applicatios, ad computer etwork systems. Mr. Atakli could be reached at iatakli1@bighamto.edu. Hogbig Hu received his B.E. i computer sciece from Jili Uiversity, Chagchu, Chia, ad B.E. i iformatio ad etwork sciece from Chiba Istitute of Techology, Narashio, Japa both i 21. He received his M.S. degree i iformatio sciece from Tohoku Uiversity, Sedai, Japa i 23. He is curretly pursuig his Ph.D. degree i the Departmet of Electrical ad Computer Egieerig at the SUNY - Bighamto. His research iterests iclude speech aalysis, patter recogitio, speech codig, ad etwork systems. Mr. Hu could be reached at hhu1@bighamto.edu. Yu Che received the MS ad PhD degree i Electrical Egieerig from the Uiversity of Souther Califoria (USC) i 22 ad 26, respectively. He is a assistat professor of electrical ad computer egieerig at SUNY - Bighamto. His research iterest icludes etwork security, Security ad privacy i distributed systems ad pervasive computig eviromets, Iteret ifrastructure security, ad recofigurable hardware based security solutios. He is a member of the ACM, the IEEE ad the SPIE. Dr. Che could be reached at yche@bighamto.edu. Wei-Shi Ku received the Ph.D. degree i computer sciece from the Uiversity of Souther Califoria (USC) i 27. He also obtaied both the M.S. degree i computer sciece ad the M.S. degree i Electrical Egieerig from USC i 23 ad 26 respectively. He is a assistat professor with the Departmet of computer sciece ad software egieerig at Aubur Uiversity. His research iterests iclude spatial ad temporal data maagemet, mobile data maagemet, geographic iformatio systems, ad security & privacy. He has published more tha 3 research papers i refereed iteratioal jourals ad coferece proceedigs. He is a member of the ACM ad the IEEE. Dr. Ku could be reached at weishi@aubur.edu. Zhou Su received Ph.D from Waseda Uiversity, Japa i 23. He also received the B.S ad M.S from Xi'a Jiaotog Uiversity, Chia, i 1997 ad 2 respectively. He is a Assistat Professor with Departmet of Computer Sciece at Waseda Uiversity. His research iterests iclude Network Traffic aalysis, Iteret Architecture, Cotets Delivery, Mobile Multimedia, P2P, Overlay Networks, ad ew applicatios o WWW. Dr. Su could be reached at zhousu@asagi.waseda.jp. 28 SprigSim

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks , pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Performance Evaluation of a Volcano Monitoring System Using Wireless Sensor Networks

Performance Evaluation of a Volcano Monitoring System Using Wireless Sensor Networks Performace Evaluatio of a Volcao Moitorig System Usig Wireless Sesor Networks Romá Lara-Cueva, Member, IEEE, Diego Beítez, Seior Member, IEEE. Atoio Caamaño, Member, IEEE, Marco Zearo, Member, IEEE, ad

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing World Applied Scieces Joural 23 (11): 1418-1424, 2013 ISSN 1818-4952 IDOSI Publicatios, 2013 DOI: 10.5829/idosi.wasj.2013.23.11.950 DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig

More information

Page 1. Real Options for Engineering Systems. What are we up to? Today s agenda. J1: Real Options for Engineering Systems. Richard de Neufville

Page 1. Real Options for Engineering Systems. What are we up to? Today s agenda. J1: Real Options for Engineering Systems. Richard de Neufville Real Optios for Egieerig Systems J: Real Optios for Egieerig Systems By (MIT) Stefa Scholtes (CU) Course website: http://msl.mit.edu/cmi/ardet_2002 Stefa Scholtes Judge Istitute of Maagemet, CU Slide What

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

LOCATIONAL MARGINAL PRICING FRAMEWORK IN SECURED DISPATCH SCHEDULING UNDER CONTINGENCY CONDITION

LOCATIONAL MARGINAL PRICING FRAMEWORK IN SECURED DISPATCH SCHEDULING UNDER CONTINGENCY CONDITION IJRET: Iteratioal Joural of Research i Egieerig ad Techology eissn: 2319-1163 pissn: 2321-7308 LOCATIONAL MARGINAL PRICING FRAMEWORK IN SECURED DISPATCH SCHEDULING UNDER CONTINGENCY CONDITION R.Maiamda

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

Valuing Firms in Distress

Valuing Firms in Distress Valuig Firms i Distress Aswath Damodara http://www.damodara.com Aswath Damodara 1 The Goig Cocer Assumptio Traditioal valuatio techiques are built o the assumptio of a goig cocer, I.e., a firm that has

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

UM USER SATISFACTION SURVEY 2011. Final Report. September 2, 2011. Prepared by. ers e-research & Solutions (Macau)

UM USER SATISFACTION SURVEY 2011. Final Report. September 2, 2011. Prepared by. ers e-research & Solutions (Macau) UM USER SATISFACTION SURVEY 2011 Fial Report September 2, 2011 Prepared by ers e-research & Solutios (Macau) 1 UM User Satisfactio Survey 2011 A Collaboratio Work by Project Cosultat Dr. Agus Cheog ers

More information

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous

More information

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524

76 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 9 - NUMBER 1 - YEAR 2011 ISSN: 1690-4524 The Fuzzy ad Compartmet System Cocept for the Commuicatio System takig accout of the Hadicapped situatio M asahiroaruga DepartmetofHuma ad Iformatio Sciece,School ofiformatio Sciecead Techology,TokaiUiversity

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Information for Programs Seeking Initial Accreditation

Information for Programs Seeking Initial Accreditation Iformatio for Programs Seekig Iitial Accreditatio Aswers to Frequetly- Asked-Questios (from www.abet.org/ew-to-accreditatio/) Assurig Quality l Stimulatig Iovatio This documet iteds to aswer may of the

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method Accurate ad Efficiet Traffic Moitorig Usig Adaptive No-liear Samplig Method Chegche Hu, Sheg Wag, Jia Tia, Bi Liu Tsighua Uiversity Beijig, Chia, {hucc,wags,tiaj}@mails.tsighua.edu.c liub@tsighua.edu.c

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 7 Capacity ad Delay of Hybrid ireless Broadbad Access Networks Pa Li, Chi Zhag, Studet Member, IEEE, ad Yuguag Fag, Fellow,

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

The Canadian Council of Professional Engineers

The Canadian Council of Professional Engineers The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals

Overview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of

More information

Assessment of the Board

Assessment of the Board Audit Committee Istitute Sposored by KPMG Assessmet of the Board Whe usig a facilitator, care eeds to be take if the idividual is i some way coflicted due to the closeess of their relatioship with the

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

International Journal on Emerging Technologies 1(2): 48-56(2010) ISSN : 0975-8364

International Journal on Emerging Technologies 1(2): 48-56(2010) ISSN : 0975-8364 e t Iteratioal Joural o Emergig Techologies (): 48-56(00) ISSN : 0975-864 Dyamic load balacig i distributed ad high performace parallel eterprise computig by embeddig MPI ad ope MP Sadip S. Chauha, Sadip

More information

Patentability of Computer Software and Business Methods

Patentability of Computer Software and Business Methods WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information