LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS

Size: px
Start display at page:

Download "LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS"

Transcription

1 Proceedngs of the Postgraduate Annual Research Semnar LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS Cahyo Crysdan and Abdul Hanan Abdullah The Faculty of Computer Scence and Informaton System Unverst Teknolog Malaysa Skuda Johor Darul Ta zm Malaysa Tel: Fax: Abstract: Ths paper deals wth an effort to provde safety Internet access by mnmzng the condtons causng threats. A model vsualzng the nteracton between network users and Internet objects was developed to dsclose the sources of Internet threats. Strategy for securng Internet access was drawn from ths approach. Implementaton to brng ths strategy nto real-lfe Internet protecton was conducted by developng a network frewall employng lattce-based method to organze the nteracton between the protected nternal users and Internet objects. Experments to check the constructed frewall proved that the developed strategy s effectve n restrctng the access of unprotected users to un-trusted Internet objects. Keywords Frewall, Lattce-Based, Internet Securty, Network, Threat Model 1. INTRODUCTION Nowadays Internet becomes more and more mportant to many organzaton nformaton systems. In facts, many actvtes requre the exstence of Internet connecton. They span from smple Internet access such as updatng ant vrus tools or readng newspaper artcles to a complex and crtcal task such as conductng e-commerce transacton or holdng onlne surveys by many publc meda. Snce Internet has also been known become the sources of many securty ncdents, protectons for the users accessng Internet are requred. Popular method for provdng users protecton appled by many organzatons s to put frewall between nternal network and the Internet. However some reports [1][2][3] dsclose unsatsfed frewall performance due to vary Internet contents and rapd changng of Internet technology besdes changng on the methods of launchng attacks. A number of research efforts such as [4][5][6][7] have been attemptng to deal wth ths condton by mprovng frewall mechansm. Mostly they afford to create a mechansm capable to response automatcally on the changng attack. The term dynamc, adaptve and actve securtes were born from these research communtes. These efforts besdes offerng some degree of flexblty also create other problems such as the ncrease of algorthm complexty [6] and the possblty of DOS attack [8]. Therefore the outcomes of the enhancement of frewall technology are ndfferent to the tradtonal frewall. Ths paper addresses ths ssue and affords to redefne a soluton to mprove the performance of frewall to provde protecton for organzaton network and nternal users accessng Internet. 2. INTERNET THREAT Internet has been known as the sources of many securty ncdents. Threats of Internet can be classfed nto two groups.e. human acton and malcous code. The frst group ncludes the acton of hackng, spoofng, snffng and eavesdroppng, whle the second group ncludes vrus, worm, Trojan horse, trapdoor. Buffer overflow and nformaton theft commtted by a malcous program can be classfed nto the second group as well. Whle frewalls are very effectve to deter the frst group of attack, they lack performance to stop the acton of malcous code [1][2][9]. The reasons of ths condton are twofold. Frst, current frewall technology have no capablty to sense the envronment where they have to guard. The way frewall work s to flter and nspect the traffc flowng through t. Second, malcous code behaves as normal traffc content when t s travellng through the frewall. Therefore malcous code capable to reach the protected nternal network undetected. Survey of Whtman [10] found that the attack of malcous code become the top threat endangerng many organzaton nformaton systems. Ths condton s worsen by the wdely use of web scrpt njecton to explot the vulnerablty of Internet connecton as reported by Huang et al. [9].

2 Proceedngs of the Postgraduate Annual Research Semnar MODEL DEVELOPMENT Developng a model to fgure out the nteracton between nternal network users and Internet objects, n whch set theory s employed, s an effectve approach to provde a protecton strategy for organzaton nternal network. Three condtons are rased from ths model.e. safe, controlled and threat. Descrpton of the model follows. Let U becomes a doman of nternal network users that conssts of two safety regons.e. protected p and unprotected up, then each user u U can be defned as a tuple < p, up > wth p and up pont to the area allocated for each user n the protected and unprotected regon respectvely. Illustraton of ths model s depcted n Fgure 1. Assumng that a user s an entty, therefore p + up = 1 must be fulflled for each u =< p, up >. Total users exst n the network can be computed by the followng equaton u = p + (1) Equaton 1 can also be used to compute the protected value up u network. Full-protected p u T and unprotected value that represent the safety factor of a Protected users (p) User 1 p = 1 up = 0 User 2 p = 0.75 up = 0.25 User 3 p = 0.5 up = 0.5 Unprotected users (up) User 4 p = 0.25 up = 0.75 Half-protected User 5 p = 0 up = 1 ( up ) u Un-protected Fgure 1. Model of nternal network users Model of Internet objects s smlarly defned as network users. A doman of Internet objects O s dvded nto two safety regons.e. trusted t and un-trusted ut. An object o O s defned as a tuple < t, ut > n whch for each u o =< t, ut > the followng equaton must be fulflled t + ut = 1 (2) consderng that an object s also an entty. Illustraton of Internet object model s depcted n Fgure 2. Full-Trusted Trusted objects (t) Object 1 t = 1 ut = 0 Object 2 t = 0.75 ut = 0.25 Object 3 t = 0.5 ut = 0.5 Un-trusted objects (ut) Object 4 t = 0.25 ut = 0.75 Half-Trusted Object 5 t = 0 ut = 1 Un-Trusted Fgure 2. Model of Internet objects Model of Internet access s bult by ntersectng the defned model of network users and Internet objects. Integraton of both models produces a new Internet access model as llustrated n Fgure 3. Ths model creates some ntersected regons as the product of nteracton between protected and unprotected users wth trusted and un-trusted Internet objects. Those regons correspond to several safety condtons as lsted below: Safe Up Ot (protected users and trusted Internet objects) Controlled1 Up Out (protected users and un-trusted Internet objects) Controlled2 Uup Ot (unprotected users and trusted Internet objects) Threat Uup Out (unprotected users and un-trusted Internet objects)

3 Proceedngs of the Postgraduate Annual Research Semnar Network Users Unprotected users (U up ) Protected users (U p ) Controlled Threat (U up O ut ) Safe (U p O t ) Internet Objects Un-trusted objects (O ut ) Controlled Trusted objects (O t ) Fgure 3. Model of Internet access Referrng to the model of Internet access as shown n Fgure 3, t s clear that the condton causng threats s produced by the nteracton between unprotected users and un-trusted objects. Therefore mnmzng the regon of nteracton between unprotected users and untrusted object s requred. From ths pont, ths regon s always referred to threat regon. 4. MINIMIZING THREAT Effort to mnmze threat regon s requred to have secure Internet access. Based on the result of Internet access model developed n the last secton, three strateges can be executed to reduce threat regon as follows: To mnmze (unprotected user U up regon) Ths strategy s held by nstallng more protecton tools such as ant vrus, personal frewall and ntruson detecton n users machne. However too many protecton tools nstalled n the user machne can reduce the performance of the machne. To mnmze (un-trusted object O ut regon) It s done by flterng Internet traffc n the frewall to prevent malcous content from enterng nternal network. Ths strategy however leads to reduce network flexblty, as all network traffc wll be scrutnzed. To mnmze U (threat regon) up O ut Applyng securty prorty to control the nteracton between unprotected users and un-trusted objects can be held to restrct the access to threat regon. Compared to other strateges, ths approach delvers several added advantages such as havng better mechansm to mantan network flexblty, and t does not reduce the performance of user machne as well. Therefore ths strategy s carred on the mplementaton as dscussed more detal n next secton. 5. LATTICE-BASED NETWORK FIREWALL A network frewall s developed to mplement the strategy for mnmzng threat condton as explaned n the prevous secton. A strategy for mnmzng U s carred up O ut out due to ts drect mpact to reduce threat regon. To carry on ths approach, lattce-based method as proposed by Dennng [11] and represented by Sandhu [12] s used as the foundaton for developng frewall mechansm. Implementaton s explaned as follow. Let u m U becomes an m th user wth protecton level of an nternal network, and let o j n O becomes an n th Internet object wth predetermned safety level j. Access request of u m j o n user to object s granted by the frewall f only f j. Ths polcy can be represented by the followng equaton: Access: j u o j (3) Equaton 3 states that protecton level of a network user must be greater or at least equal to safety level of an Internet object for the requrement of frewall for grantng access of a user to an Internet object. It becomes the basc mechansm of the developed lattce-based frewall. Implementaton s held by desgnng three protecton levels of users.e. protected, half-protected and unprotected, and three safety level of Internet objects.e. trusted, half-trusted and un-trusted. Interactons of each protecton level of users and safety level of objects are presented n Fgure 4. m n

4 Proceedngs of the Postgraduate Annual Research Semnar Network Users Protected users (+1) Frewall Internet Objects Un-trusted objects (j=+1) the developed algorthm apply whch s not stated s prohbted approach to guarantee the deployment of securty polcy by lattce-based frewall. Half-protected users () Unprotected users (-1) Half-trusted objects (j=) Trusted objects (j=-1) Fgure 4. Mechansm of lattce-based frewall Assumng protected users are guarded by ant vrus, personal frewall and spy-sweeper, the developed protecton levels hold the followng crtera: Protecton level 1 (unprotected) s owned by a group of machnes havng IP address /24. No securty tool s nstalled n user machne. Protecton level 2 (half-protected) s owned by a group of machnes havng IP address /24. Only ant vrus s nstalled n user machne. Protecton level 3 (protected) s owned by a group of machnes havng IP address /24. All avalable securty tools are nstalled n user machne. Whle crtera for the developed trusted levels are lsted as follows: Trusted level 1 (trusted) s gven to a group of Internet objects havng characters as educaton-orented, popular and become the standard qualty for scentfc publcaton purposes. IEEE, ACM and Elsever are the members of ths group. Trusted level 2 (half-trusted) s for Internet objects havng characters as publc news orented and popular. Readers Dgest, CNN and Kompas are the members of ths group. Trusted level 3 (untrusted) s for Internet objects havng functon as search engne such as Google, Altavsta and Infoseek. 6. EXPERIMENT Lattce-based frewall that was developed usng Redhat Lnux 7.3 on Intel Pentum IV 1.8GHz machne wth 128 Kbytes RAM and 40 GB local dsk, was tested on a networkng envronment as depcted n Fgure /24 Elsever, ACM, IEEE Readers Dgest, CNN, Kompas Google, Altavsta, Infoseek Internal Network / /24 Fgure 5. Expermental set up Internet Lattce-based frewall Three user machnes holdng IP addresses , and are used to represent protecton levels 1, 2 and 3 respectvely. Meanwhle nne Internet objects are classfed and represent three trusted-levels as follows. Elsever, ACM and IEEE represent trusted level 1. Readers Dgest, CNN and Kompas represent trusted level 2, and Google, Altavsta and Infoseek represent trusted level 3. Experment was conducted by accessng each Internet object from each partcpated user machne. Expermental results measurng tme consumpton and the output of applyng access polcy by lattce-based frewall are recorded n Table 1. Any other types of Internet objects are not classfed n ths mplementaton due to lmted trusted level bult n the prototype. Therefore they cannot be reached by network users snce

5 Proceedngs of the Postgraduate Annual Research Semnar Table 1. Result of testng of lattce-based frewall Tme Consumpton Internet Objects Protecton Level 1 (seconds) Protecton Protecton Level 2 Level 3 (seconds) (seconds) No access No access No access No access No access No access No access access No access 37.4 Table 1 shows successful Internet access restrcton usng lattce-based frewall n whch relatvely small tme consumpton s obtaned from the experment. And Fgure 6 below presents the graph comparson of tme measurement of accessng Internet usng lattcebased frewall for each protecton level. Varaton of the measured tme consumpton here s due to shared network bandwdth used durng the experment. As has been known, peak network usage wll slow down the speed of Internet access. 01: : : : : : : :00.0 Prot ect on Level 1 Prot ect on Level 2 Prot ect on Level 3 Fgure 6. Tme consumpton of accessng Internet from each protecton level 7. RELATED WORKS There have been some lmted works on formulatng and developng ntellgent frewall. The effort of Eschelbeck [5] and Network Assocates [4] for proposng actve securty s motvated by dssatsfacton on statc confguraton of today s frewall technology that unable to follow the pace of dynamc e- commerce transacton. Actve frewall developed by Eschelbeck and Network Assocates s able communcate to other securty components such as ant-vrus tool, PKI server, vulnerablty scanner and ntruson detecton system. However as noted by Haxn et al. [3], t can rase performance decreasng and asymmetrc routng problem snce other supportng securty components are not specfcally assgned for supportng the operaton of actve frewall. Other work held by Hunt and Verwoerd [6] wth reactve frewall, apples the approach to change frewall confguraton based on network traffc utlzaton. However the functon of frewall to govern securty aspect especally from the attack of malcous code s not evaluated n the experment. Meanwhle the desgn of actve frewall developed by Lehtonen et al. [13] for wreless applcaton does not show any deployment of securty polcy. No experment has been reported from ths effort. In [7], desgn and performance evaluaton of embedded frewall concludes that network transmsson rate and the number of securty rules nfluence the performance of frewall. 8. CONCLUSION An effort to develop strategy to provde safety Internet access requres an effectve approach to localze the sources of threats. In ths paper, a model vsualzng the nteracton of network users and Internet objects s presented. Ths model provdes three strateges for mnmzng the condton causng Internet threats.e. reducng the number of unprotected users, flterng un-trusted Internet objects, and mnmzng the nteracton between unprotected users and un-trusted Internet objects. Ths research deals wth thrd strategy by buldng a lattce-based frewall to restrct the access of unprotected users to un-trusted objects. Ths way a threat regon can drectly be mnmzed, whle access to trusted objects or access done by protected users could stll be mantaned. 9. REFERENCES [1] W. Arbaugh, Frewalls: An Outdated Defense, IEEE Computer Socety Press, Vol. 36, No. 6, pp , [2] D.M. Kenzle and M.C. Elder, Recent Worms: A Survey and Trends. The Workshop on Rapd Malcode WORM 03, Washngton DC, USA, pp. 1-10, October [3] D. Haxn, W. Janpng, and L. Xng, Polcy-Based Access Control Framework for Large Networks. Proceedngs of IEEE Internatonal Conference on Networks ICON 2000, Sngapore, pp , 5-8 September 2000.

6 Proceedngs of the Postgraduate Annual Research Semnar [4] Network Assocates, The Actve Frewall: The End of the Passve Frewall Era, Network Assocates Inc.: A Network Assocates Executve Whte Paper, [5] G. Eschelbeck, Actve Securty A Proactve Approach For Computer Securty System, Journal of Network and Computer Applcatons, Vol. 23, pp , [6] Hunt, R. and Verwoerd, T. (2003), Reactve Frewall: A New Technque, Elsever Computer Communcatons Journal, Volume 26, Issue 12, 21 July 2003, pp [7] Y. Guo and R. L, Desgn and Performance of Frewall System Based on Embedded Computng, GCC 2003 Lecturer Notes on Computer Scence 3032, pp , [8] S. Kamara, S. Fahmy, E. Schultz, F. Kerschbaum and M. Frantzen, Analyss of Vulnarbltes n Internet Frewalls, Elsever Computers and Securty Journal, Volume 22, No. 3, pp , [9] Y.W. Huang, F. Yu, C. Hang, C.H. Tsa, D.T. Lee and S.Y. Kuo, Securng Web Applcaton Code by Statc Analyss and Runtme Protecton, The Thrteenth Internatonal World Wde Web Conference, New York, USA, pp , May [10] M.E. Whtman, Enemy at the Gate: Threats to Informaton Securty, ACM Communcatons, Vol. 46, No. 8, pp , August [11] D.E. Dennng, A Lattce Model of Secure Informaton Flow, Communcatons of ACM, Vol. 19, No. 5, pp , May [12] R.S. Sandhu, Lattce-Based Access Control Models, IEEE Computer, Vol. 26, No. 11, pp. 9-19, [13] Lehtonen, S., Ahola, K., Kosknen, T. Lyjynen, M. and Pesola, J. (2003). Roamng Actve Flterng Frewall. Proceedngs of Smart Objects Conference SOC 2003, Grenoble France, May 2003.

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Selecting Best Employee of the Year Using Analytical Hierarchy Process

Selecting Best Employee of the Year Using Analytical Hierarchy Process J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

Managing Resource and Servent Reputation in P2P Networks

Managing Resource and Servent Reputation in P2P Networks Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores [email protected] Masayuk Terada NTT DoCoMo Multmeda Laboratores [email protected]

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

A Fast Incremental Spectral Clustering for Large Data Sets

A Fast Incremental Spectral Clustering for Large Data Sets 2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A Potent Model for Unwanted Traffic Detection in QoS Network Domain

A Potent Model for Unwanted Traffic Detection in QoS Network Domain A Potent Model for Unwanted Traffc Detecton n QoS Network Doman Abdulghan Al Ahmed, Aman Jantan, Ghassan Ahmed Al A Potent Model for Unwanted Traffc Detecton n QoS Network Doman Abdulghan Al Ahmed, Aman

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

SMART: Scalable, Bandwidth-Aware Monitoring of Continuous Aggregation Queries

SMART: Scalable, Bandwidth-Aware Monitoring of Continuous Aggregation Queries : Scalable, Bandwdth-Aware Montorng of Contnuous Aggregaton Queres Navendu Jan, Praveen Yalagandula, Mke Dahln, and Yn Zhang Unversty of Texas at Austn HP Labs ABSTRACT We present, a scalable, bandwdth-aware

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

[email protected]@cityu.edu.hk [email protected], [email protected]

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna [email protected]@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Figure 1. Time-based operation of AIDP.

Figure 1. Time-based operation of AIDP. Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK [email protected] ABSTRACT Moble ad-hoc networs (MANETs)

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information