Size: px
Start display at page:

Download ""

Transcription

1 Deaki Research Olie Deaki Uiversiy s isiuioal research reosiory DDeaki Research Olie Research Olie This is he ublished versio (versio of record) of: We, Sheg, Jia, Weijia, Zhou, Wei, Zhou, Walei ad Xu, Chua, CALD : survivig various alicaio-layer DDoS aacks ha mimic flash crowd, i NSS : Proceedigs of he 4h Ieraioal Coferece o Nework ad Sysem Securiy, IEEE, Piscaaway, N.J., h://hdl.hadle.e/536/dro/du: [] IEEE. Persoal use of his maerial is ermied. However, ermissio o reri/reublish his maerial for adverisig or romoioal uroses or for creaig ew collecive works for resale or redisribuio o servers or liss, or o reuse ay coyrighed comoe of his work i oher works mus be obaied from he IEEE. Coyrigh :, by The Isiue of Elecrical ad Elecroics Egieers, Ic. All righs reserved

2 Fourh Ieraioal Coferece o Nework ad Sysem Securiy CALD: Survivig Various Alicaio-Layer DDoS Aacks Tha Mimic Flash Crowd Sheg We, Weijia Jia, Wei Zhou Ceral Souh Uiversiy Chagsha, Hua, Chia, 483 swe@deaki.edu.au Walei Zhou Deaki Uiversiy Melboure, Ausralia, 35 walei@deaki.edu.au Chua Xu Chogqig Uiversiy Chogqig, Sichua, Chia, 444 chuaxu@gmail.com Absrac Disribued deial of service (DDoS) aack is a coiuous criical hrea o he Iere. Derived from he low layers, ew alicaio-layer-based DDoS aacks uilizig legiimae HTTP requess o overwhelm vicim resources are more udeecable. The case may be more serious whe such aacks mimic or occur durig he flash crowd eve of a oular Websie. I his aer, we rese he desig ad imlemeaio of CALD, a archiecural exesio o roec Web servers agais various DDoS aacks ha masquerade as flash crowds. CALD rovides real-ime deecio usig mess ess bu is differe from oher sysems ha use resemblig mehods. Firs, CALD uses a fro-ed sesor o moior he raffic ha may coai various DDoS aacks or flash crowds. Iese ulse i he raffic meas ossible exisece of aomalies because his is he basic roery of DDoS aacks ad flash crowds. Oce abormal raffic is ideified, he sesor seds ATTENTION sigal o acivae he aack deecio module. Secod, CALD dyamically records he average frequecy of each source IP ad check he oal mess exe. Theoreically, he mess exe of DDoS aacks is larger ha he oe of flash crowds. Thus, wih some arameers from he aack deecio module, he filer is caable of leig he legiimae requess hrough bu he aack raffic soed. Third, CALD may divide he securiy modules away from he Web servers. As a resul, i kees maximum erformace o he kerel web services, regardless of he harassme from DDoS. I he exerimes, he records from ad have roved he value of CALD. Keywords-DDoS; Alicaio-layer; Kalma Filer; Iformaio Theory. INTRODUCTION (HEADING ) For may years, disribued deial of service (DDoS) aack has caused severe damage o vicims ad sill cosiues oe of he major hreas i curre iere. A oular form of DDoS oday is he alicaio-layer floods ha overwhelm he Web server wih a large umber of GET requess. To circumve deecio, he aackers icreasigly move away from ure badwidh floods o sealhy DDoS aacks ha masquerade as flash crowds. The successful cases i he early hisory icluded MyDoom [], Code Red [] ad FBI case ivolvig DDoS-for-hire [3]. I rece years, we frequely heard he ews ad comlai abou alicaio-layer DDoS harassme [4-7]. I fac, he siuaio is much worse ha we ca exec because he boe is boomig. The Chia CCTV rogram Ecoomy Half Hour broadcas ha he boe has formed a idusry chai ad he caial cocered we beyod billio Chiese Yua i 9 [8]. Alhough i is o jus DDoS aacks ha are associaed wih boe, curre DDoS aacks are maily lauched by i. For a ivesigaio io DDoS crime, he BBC rogram Click brough a medium sized Websie ad demosraed oly 6 broadbad coecios were eough o make his Websie uusable [9]. The exers i he TV show also said ha he high-raffic sies were oeial vicims for alicaio-layer DDoS aacks. The crimials go io coac wih he Websies ad hreaeed hem i DDoS aacks. All kids of high-raffic Websies ha geerae los of reveue relied o he Websies o be olie, so a lo of he Websies aid u o avoid he DDoS aacks. Couerig alicaio-layer DDoS aack becomes a grea challege because hey ca be moued wih legiimae requess from legiimae coeced machies. The requess origiaig from he comromised comuer are idisiguishable from he requess geeraed by legiimae users. I fac, hey differ from he legiimae oes oly i ie bu o i coe. The malicious requess arrive from a large umber of geograhically disribued machies; hus hey cao be filered o he IP refix. Also, may Websies do o use asswords or logi iformaio, ad eve whe hey do, asswords could be easily sole from he hard disk of a comromised machie. Furher, checkig he siesecific assword requires esablishig a coecio ad allowig uauheicaed clies o access socke buffers ad worker rocesses, makig i easy o mou a aack o he auheicaio mechaism iself. Moreover, he mehod of usig comuaioal uzzles, which requires he clies o recogize a figure ad submi he resul, is o suiable someimes because is demad of arificial egageme aoys eole. Fially, i coras o badwidh aacks [], i is difficul o deec big resources cosumers whe he aack arges higher-layer boleecks such as CPU, daabase ad disk because commodiy oeraig sysems do o suor fie-graied resource moiorig. Furher, a aacker ca resor o muaig aacks which cycle bewee differe boleecks. This aer rooses CALD, a archiecural exesio o roec Web servers agais alicaio-layer DDoS aacks ha masquerade as flash crowds. I is argeed owards largescale olie busiesses as well as o-commercial oral Websie. CALD combies hree fucios: abormal raffic deecio, DDoS aack deecio, filer. a) Abormal raffic deecio: The abormal raffic deecio is a real-ime ime series aalyser. This fucio is deloyed i he fro-ed sesor. Accordig o our idea, he uderlyig assumio is ha regular raffic behaviour is relaed o ormal sysem use, or a leas ha oly chages i ay regular behaviour are ieresig. Thus we aim o deec ay abru chage i he HTTP Ge reques raffic. The basic idea of his fucio is ha oce he modellig is doe, he ouu of he model corresods o ormal sysem / $6. IEEE DOI.9/NSS

3 ATTENTION Or DISMISS DDoS or Flash Crowds? yes PARAMETER yes Ge requess Aomaly Traffic? o Ge requess Aomalous IP? o Ge requess Websie yes Dro Figure : CALD Overview. Noe ha DDoS Aack Deecio comoe is oly acivaed whe fro-ed sesor reors ATTENTION sigal. behaviour, ad he differece bewee observed behaviour ad model ouu gives us he aomalous sigaure. We reor his sigaure as a sigal o DDoS aack deecio comoe ad diversify wheher flash crowd or DDoS really haes. We have see los of successful alicaio of such idea o ework raffic aalysis [, 3]. I his aer, we drew AR model o describe ad redic he Ge reques rae, ad iroduce he dyamical Kalma filer o calibrae he redicio resul because of iesely flucuaio. I curre saus of our research, we oly cosidered saioary AR model which could be exeded o o-saioary rocess i.e. he eve usig Kalma filer for esimaig ime-deede AR coefficies. b) DDoS aack deecio: whe receives ATTENTION sigal from fro-ed sesor, he DDoS aack deecio comoe is acivaed. I races each icomig source IP address as well as each visiig Webage, ad records he average frequecies i a vecor. I a iese raffic, he average frequecy ca be cosidered as he ossibiliy of each source IP address. Based o he vecor, his comoe calculaes he eroy. The eroy called mess exe describes he disribuio of icomig sources ad arge WebPages. We defie he mess exe of source IP addresses as A, he mess exe of arge WebPages as B ad he rae bewee A ad B as R. Theoreically, he varia R i flash crowd is smaller ha he oe i he alicaio-layer DDoS aack. Thus, we are able o se several hresholds ad ick ou he aomalous source IP addresses. c) Filer: whe he abormal raffic is jusified as coaiig DDoS aack, he DDoS aack deecio comoe seds he aomalous source IP addresses o filer so ha i ca release he floodig. Curre alicaio-layer DDoS aack is geerally lauched by more ha, comromised comuers [4]. Imlemeig such a large lis of IP addresses for block is o very easy. Simly searchig mehod will defiiely decrease he efficiecy of he whole sysem. I his aer, we adoed Bloom Filer [5], where we imlemeed wo hash fucios iside ad was caable of limiig he collisio below sixee ehousadh. Fig. summarizes CALD. I has a few imora characerisics. Firsly, CALD addresses various alicaiolayer DDoS aack. Prior work usually has a bias agais he Ge reques floodig he homeage. As will be described i secio, CALD is cocered wih hree yes of DDoS aacks; he laer is sealhier ha he former. They are all easily achieved i he Iere ad CALD ca be caable of dealig wih hem. Nex, he desig of CALD draws esseial roeries agais he alicaio-layer DDoS aack. I he fro-ed sesor, he esseial roery is he large quaiy of Ge reques from he aackers. I he DDoS deecio model, he esseial roery is he differece i he rae of mess exes. No maer which ye of DDoS is lauched by he aackers, CALD is able o race he aack. A las, CALD is simle. The simliciy i he algorihm icreases he efficiecy which is aricular imora i famous Websie. CALD also divides he securiy modules away from he Web servers. As a resul, i kees maximum erformace o he kerel web services, regardless of he harassme from DDoS. Eve he udae ad deloyme become more coveie. The res of he aer is orgaized as follows. We sar by describig he hree yes of hrea models i Secio. Secio 3 describes he deails of CALD. More secially, here we aalyse he esseial roeries of he alicaiolayer DDoS aacks ad flash crowds. Secio 4 elaboraes he exerimes. The las wo secios are cocered wih some discussio ad relaed work abou couerig alicaio-layer DDoS aacks.. THREAT MODEL This aer maily cocers wih hree yes of alicaio-layer DDoS, of which each oe is sealhier ha he former. () The aackers orgaize los of comromised comuer bombig he homeage of he Websie, which we call as reeaed reques DDoS. MyDoom [] ad Code Red [] all belog o he DDoS aack of his kid. () The aackers ick several remium ages ou io a lis ad sochasically choose oe as he arge for each sedig of he HTTP Ge requess. Eve his ye of aack ca erform like Websie Sider [], which i a auomaed maer ad orderly fashio browses he ages of he arge Websie. We have o see ay ews or reors alkig abou such case haeed i he wild as a alicaio-layer DDoS aack. However, i is quie easy o be achieved ad defiiely hard o be racked because he abormal raffic is leveraged io a grou of arges ad acs more like a legiimae 48

4 visiig. We call i recursive reques DDoS. (3) There may exis some large files like image or dowload resources i he Websie. There may also coai some oeraios ha are cocered wih heavy workload like daabase search. The aacker seds Ge reques o aim a hese resources. This reeaed workload DDoS ca be ivoked a a lower reques rae, hereby requirig less work from he aacker ad makig deecio icreasigly difficul. 3. THE DESIGN OF CALD Accordig o our idea, a fro-ed sesor is used o deec he abru chage i he raffic. If abormal raffic exiss, he DDoS aack deecio comoe will be acivaed ad make advaced isecio for a decisio. The DDoS raffic from he malicious IP addresses will be ulimaely blocked ad flash crowded coiues. I his secio, we will describe how he modelig is doe for abormal raffic deecio, how he aomalies are diversified as DDoS or flash crowd, ad how he DDoS raffic is filered. 3. Abormal Traffic Deecio The raffic we will arge is a sream of successive HTTP Ge requess. Traffic iesiy measureme ake a fixed, discree ime iervals from a ime series {y }. The iese chage i he value of measureme meas ossible exisece of alicaio-layer DDoS aacks or flash crowds. Therefore, a isa, he differece bewee measured value y ad model ouu y rereses he abormal cosiue of he raffic. The abormal cosiue is called also he residual series or he model error, ad is defied as d = y -y. As a early sage of our work, we use he saioary AP () model for abormal raffic deecio. The model is defied as: y " a x e () k k k Here y is he redicio. x is he observaio a isa. a k are he saioary model arameer, ad e is observaio error. I oher words, he model uses a weighed sum of revious values o esimae he curre observaio value, he weighs beig he AR coefficies a k, k=... The saioariy meas ha he weighs a k are ime ideede. The idea is ha ormal sysem usage causes sufficiely regular ad smooh raffic, ha he curre value ca be rediced as a liear combiaio of as values. The ar of he raffic behaviour ha cao be rediced i his fashio is sufficiely aomalous o be reored o he ex comoe. I curre sage of desig, we use saioary AR model, which meas he arameers will o ada o chages of he moiored raffic. We simly assig a k o be -k ad he sum of he a k is equal o. I he fuure research, we will exed his comoe. The model degree eeds o be defied. However, is value deeds srogly o he ye of Websies. We will discuss i i he Secio 4. wih he exerimeal seig. The ierval is secod ad he sesor cous he HTTP Ge requess durig he ierval. Based o he revious records, he AR model calculaes he redicio y for he ex se. We eed o calibrae he y because of iese flucuaio i he ework raffic. We fech he deviaio d bewee calibraed value y ad realisic measured value o make decisios. Fig. describes a eisode of he HTTP Ge requess o Aril h. We cosidered he cases i boh Fig. A ad Fig. B as ormal raffic. However, if we se he hreshold of abormal raffic decisio o be a lile small for more sesiiviy, he flucuaio will grealy oise he redicio as we see i Fig. C ad Fig. D. Therefore, we eed o calibrae he value afer redicio. Kalma filer is a adaive ad recursive daa rocessig algorihm ha is suied for o-lie esimaio. Is essece is o comue he covariace ad make a calibraio bewee he measured value ad observed value. Filerig ca be see as a rocess whe a ew observaio arrives. The redicio ad measureme equaios ca be u i vecor form: y " AX e () y MX w (3) Wih he coefficies as A ( a... a ) (,..., ) (4) (5) M ( m... m ) (,...) For rereseig he Kalma filer equaios, we use X - o deoe he esimaed value a ime usig observaios accumulaed a isa -. I addiio, we use C o deoe he covariace a ime. Now he Kalma filer equaios for calibraig he redicio are: x y " AX A( y' (6) C ) C x (7) x x Kg( y x ) (8) Kg( ) C C (9) ( y ) ( Kg( )) C C () Amog he equaios, we fech revious values of x ad iiial he covariace C as: T () C X avg( y ))( X avg( y )) ( Ad he oe-se calibraio resul will be (). As a examle, Fig. E ad Fig. F deic a -ses calibraio. ' () y x Fig. (E) ad Fig. (F) deic a examle of -ses calibraio. Moreover, Kalma filer is a recursive algorihm ha may brig a lile delay. This is because of he N-ses recursio. Thus he oal comlexiy for abormal raffic deecio is N*. I fac, we have o use observaios x -x +N o esimae a imroved redicio. The delay icreases whe N is elarged ad he accuracy iversely decreases. Therefore i should be chose for a desired balace bewee redicio accuracy ad suiable delay. We will discuss his value i Secio 4. ad

5 Requess / s Deviaio Deviaio :3 5: 7:3 : :3 5: 7:3 : :3 (A) 5 Sia Traffic - May 4h, - From :3 To :3 :3 5: 7:3 : :3 5: 7:3 : :3 (C) 5 Sia Deviaio - Wihou Calibraio Sia Deviaio - Kalma Ses Calibraio :3 5: 7:3 : :3 5: 7:3 : :3 (E) Requess / s Deviaio Deviaio :3 5: 7:3 : :3 5: 7:3 : :3 (B) 5 Taobao - May 4h, - From :3 To :3 :3 5: 7:3 : :3 5: 7:3 : :3 (D) 5 Taobao Deviaio - Wihou Calibraio Sia Deviaio - Kalma Ses Calibraio :3 5: 7:3 : :3 5: 7:3 : :3 (F) Figure. Normal Traffic Examle ad Abormal Traffic Deecio. Noe ha his aer uses Kalma Filer o calibrae he deviaio so ha he flucuaio i he ormal raffic will o oise he abormal raffic deecio. 3. Aack Isecio 3.. Acivae & So DDoS Deecio Comoe Whe he abormal raffic is deeced, he fro-ed sesor will sed ATTENTION sigal o he DDoS aack deecio comoe ad acivae his comoe. This meas he DDoS aack deecio does o work for he whole raffic. I oly rus whe abormal raffic arrives. I corresodece, whe he fro-ed sesor fids he raffic has chaged back o ormal series, i will sed DISMISS sigal o he DDoS aack deecio comoe ad so is work. To achieve above fucios, we aggressively choose he hreshold for abormal raffic as: d k (3) d ( ( d avg( d )) ) (4) d / i Afer Kalma filer smoohes he deviaios, he value k i (3) becomes he oly arameer o adjus he sesiiviy for acivaig he DDoS aack deecio. This is aoher balace value because smaller value k will brig more sesiiviy. We will discuss his value i Secio Proeries of DDoS Aacks ad Flash Crowds I his subsecio, we will aalyse he basic roeries of alicaio-layer DDoS aacks ad flash crowds so ha o maer wha sealh mechaisms he aackers ado, he deecio cao be circumveed. As is meioed i he Secio, our work is cocered wih hree yes of aacks. Durig he aalysis o real daase of ad we oiced ha: Reeaed Reques DDoS: his ye of aack maily focuses o he homeage or a ho Webage, so he arges of he raffic coverge o oe or wo oi. We also suose he aack is lauched by a cerai quaiy of bos. Thus he sources of he raffic coverge o a grou of ois. Recursive Reques DDoS: his ye of aack has a characer ha he raffic is scaered io differe WebPages. As a resul, he sources of he raffic coverge o a grou of ois bu he arges of he raffic become disersed i some exe. Reeaed Workload DDoS: his ye of aack is able o use less bos bu eve larger damage o he Websie. However, he raffic will be similar o he case of reeaed reques DDoS. A grou of bos coiually seds requess for a large image or daabase searchig oeraios. Flash Crowd: a uexeced surge i visiors o a Web sie, which is yically because of some ewsworhy eve ha jus ook lace. I may also be due o he aouceme of a ew service or free sofware dowload. The sources of flash crowds are defiiely scaered because hey are legiimae HTTP Ge requess ad from legiimae users. Coversely, he arges of flash crowds coverge o oe or wo ois because he visiors are maily ieresed i oe Webage or resource, which comly wih he defiiio of flash crowd Disiguish DDoS Aacks ad Flash Crowds Because he disersio exe of he alicaio-layer DDoS aacks ad flash crowds are differe i heir arges ad sources, we are able o use his basic roery o disiguish hem. However, such a saisical resemblig mehod souds iracable i real-ime rocess as he saisical algorihms geerally have grea comlexiy i boh sace ad ime. I CALD, we firsly iroduce a recursive mehod o calculae he ossibiliies for each sources ad arges: favg favg (... ) T T T3 T T T ( favg ) /( ) T T (5) / (6) 5

6 Accordig o equaios (5) ad (6), wo dyamic vecors should be imlemeed i DDoS deecio comoe. Whe a ew HTTP Ge reques arrives, CALD will comue he ime differece bewee he wo arrival imes ad udae he average frequecies i he source ad arge vecors. Paricularly, we ideify each arge Webage ad source wih secial serial umber so ha searchig he osiio for udaig or iserig will o cos oo much CPU ime. The comlexiy exe of he whole algorihm kees i O(3), which is acceable for he efficiecy of CALD. I a iese raffic, we simly cosider average frequecy as he ossibiliy. To describe he disersio exe of he alicaio-layer DDoS aacks ad flash crowds, here we iroduce he cocree measureme: Defiiio (Mess Exe): suose here is a se {}, if he elemes i se {} are osiioed disersedly, he he Mess Exe is higher. Oherwise, if he elemes i se {} are coverged i some ois by ay orgaized form, he Mess Exe is lower ad close o. I CALD, he differe mess exes of he sources or arges ossibiliies are caable of describig he righ disribuio of aackers ad arges. I fac, he mess exe deoes he disribuio of coaied iformaio. This is esseially equivale o he relaed coce i iformaio heory. More cocreely, CALD eriodically calculaes he mess exe of a vecor usig Shao formula: ) H (, i,..., ) favg i favg i ) i ( x )log( x ) log( (7) Accordig o he aalysis i Secio 3.., we ca use he rae of mess exes bewee sources ad arges o disiguish various alicaio-layer DDoS aacks ad flash crowds. We deduce he followig coclusio (S is source vecor; T is arge vecor; reeaed reques DDoS as ; recursive reques DDoS as ; reeaed workload DDoS as 3 ad flash crowd as 4): S) T ) S) S) 3 4 (8) T ) T ) 3 T ) 4 i S) I CALD, he DDoS deecio comoe imlemes wo hresholds, oe for mess exe calculaio eriod ad aoher for he boudary bewee DDoS aack ad flash crowd. We u he deails of he former i Secio 4.3 ad he laer i Secio 4.. Whe he DDoS deecio comoe fids a real-ime rae falle i he rage DDoS aack, i will os he source IPs, which has a higher frequecy, o he filer comoe. 3.3 Filers Whe he DDoS deecio comoe has made a decisio ha curre raffic coais alicaio-layer DDoS aack, he DDoS deecio comoe will se he i arameers of he filer for blockig he HTTP Ge requess from hose malicious IP addresses. I fac, curre alicaio-layer DDoS aacks are maily lauched from boe, here is a edecy ha he quaiy of bos cocered i he DDoS aack becomes larger ad larger [4] ha he umber may reach more ha,. As described i Secio 3.(c), we simly choose he source IP addresses ha emerges more ha Q imes (we se Q = i CALD) i secod ierval. However, i is o a easy ask o imleme such a lis which more ha, malicious IP addresses. We are able o fid some relaed work i he echologies of ework rouers for ackes relayig [6, 7]. However, rouers oly eed o look u he refix of a IP address based o mask code. Whe he cases come o he filer comoe of CALD, he looks-u should cover he whole IP address. To avoid he filer becomig a boleeck of he whole sysem, CALD similarly adoed Bloom Filer [5] as he basic IP looks-u ad udae echology. A emy Bloom Filer is a bi array of m bis, all se o. There mus also be k differe hash fucios defied, each of which mas or hashes some se eleme o oe of he m array osiios wih a uiform radom disribuio. Here CALD imlemes wo hash fucios iside (k = ) ad he legh of he bi array m is se o be. Suose he IP address is i doed decimal oaio A.B.C.D, ad he he hash fucios are: Hash fucio : ( A B C D ) mod (9) Hash fucio : ( A * B* C * D) mod () To add a eleme, feed he IP address o each of he wo hash fucios o ge wo array osiios. Se he bis a all hese osiios o. To query for a eleme (es he IP address is i he se), feed i o each of he wo hash fucios o ge wo array osiios. If ay of he bis a hese osiios are, he IP address is o i he se. The reaso is if i were, he all he bis would have bee se o whe i was isered. If all are, he eiher he IP address is i he se, or he bis have bee se o durig he iserig of oher IP addresses. The laer siuaio is called collisio. Because we se he filer wih wo hash fucios, he legh of hash able is ad esimaed quaiy of malicious IP addresses is,, he collisio ossibiliy CP becomes: k k k m k CP lim [ ( ) ] ( e ) m m lim m 4 k k 6 ( ) ( ) 6 4 m () For CALD, he CP of sixee e-housadh is o very big ad he umber of bis meas 8KB memory is eeded for hash able. 4. PERFORMANCE EVALUATION 4. Exerime Evirome Fig. 3 illusraes he key comoe of CALD. Our desig allows differe comoes assembled i differe 5

7 Ge requess / s 5 Sia - Aril h -From 6: To :3 DDoS flash crowds 6: 7: 8: 9: : : : 3: 4: 5: 6: 7: 8: 9: : : : Time Figure 4: The Quaiy of HTTP Ge Requess er Secod. 8 Predicio wihou Calibraio Whe = 5 Deviaio 6 4 6: 7: 8: 9: : : : 3: 4: 5: 6: 7: 8: 9: : : : Time Figure 5: The Deviaio whe = 5. comuers so ha he fucios of CALD will o affec he rocess of Websie. However, i our exerime, we simly iegraed various comoes ogeher wih he Web server. The comuer for exerime was a sadard 3GHz double kerels Peium IV machie wih 4GB memory ad ruig widow visa. We also imlemeed a discree ime series roducer which relayed each HTTP Ge reques of i Aril h. These HTTP Ge requess were colleced from he backboe of Chia Souhwes. The oulaio cocered was more ha 3 millio. The badwidh of he backboe was 4GB. Uder curre codiio of echologies, we were able o collec he requess i GB wherei GB for maageme. Therefore he rae for collecio was oe fifh. As CALD ever cares abou he sequece of HTTP Ge requess, such rough daa is eough for he aalysis. We believe his characer is righ a advaage agais he work of [-3, 6], because someimes we ca hardly gaher he exac HTTP Ge reques series. 4. Sesiiviy ad Modular Delay There are wo asecs ha may ifluece he erformace of CALD: sysem sesiiviy ad modular delay. Sysem sesiiviy decides he abiliy o deec he alicaio-layer DDoS aacks ad modular delay decides he ime for CALD o deec he aacks. There are hree arameers which may affec hese wo kids of erformaces. The firs oe is he arameer of AR model. The radiioal assigme o arameer should is direced by arameer esimaio [7], which is o suiable o be dyamically used i CALD. As will be discussed i Secio 6, CALD does o eed accurae model for racig he raffic. I fac, i curre versio, we se he arameer a k as { -k }, so whe k becomes larger, he effec becomes less, eve early o effec o AR model. Fig. 4 shows a eisode of alicaio-layer DDoS aack from i Aril h. Fig. 4 also describes a flash crowd which haeed i he same day. Fig. 5 shows he corresodig redicio whe we se as 5. The secod oe is he lag of Kalma filer. Larger lag brigs more sesiiviy as log as larger delay for DDoS aacks deecio. Fig. 6 shows -se o 3-ses calibraios which will brig secod o 3 secods delay resecively. I he figures, we oiced a srage heomeo ha -ses calibraio erformace beer amog he hree. The 3-ses calibraio rebouded o be more serraed i he amliude of deviaios. We will fid he reaso i he fuure work. The hird oe is he boudary for disiguishig he aacks ad flash crowds. Seig his hreshold will also affec boh he sesiiviy ad modular delay. I curre work, we have o foud ay reasoable mehods o decide he mos suiable value for his boudary. We simly assiged i as.7 ad successfully deeced he DDoS aack of i he seveh secod afer five secods for AR model reor abormal raffic ad secods for calculaio eriod of mess exe. CALD ever riggered he block of source IPs agais flash crowds. 5. RELATED WORK Jaeyeo Jug ad his collaboraors [8] sudied he roeries of boh alicaio-layer DDoS aack ad flash crowd wih a secial aeio o characerisics ha migh disiguish he wo. Ideifyig hese characerisics allowed a formulaio of a sraegy for Websies o quickly discard malicious requess. However, as we ca say, some of he declared characerisics are a series of heomeo, o he esseial roeries. The aackers were caable of avoidig his aearace by simly adjusig aack scheme. CAPTCHA [9] ad laer aoher imroved versio by Scriah Kadula, ec [], almos erfecly solved he alicaio-layer DDoS, eve he flash crowds, bu his mehod basically required he egageme of clies o recogize a uzzle figure ad iu he resul for a auheicaio. Suraamaya Raja e al. [] roosed a couer-mechaism ha cosiss of a susicio assigme mechaism ad a DDoS-resilie scheduler. The former assiged a susicio measure o a sessio i roorio o is deviaio from legiimae behaviour ad used he laer o decide wheher ad whe he sessio is serviced. Accordig o heir exerimes, he vicims erformace could be imroved from 4 secods o.5 secods. However, we 5

8 Deviaio Deviaio Deviaio 5 Calibreaio se = 6: 7: 8: 9: : : : 3: 4: 5: 6: 7: 8: 9: : : : (A) Calibreaio se = 5 6: 7: 8: 9: : : : 3: 4: 5: 6: 7: 8: 9: : : : (B) Calibreaio se = 3 5 6: 7: 8: 9: : : : 3: 4: 5: 6: 7: 8: 9: : : : (C) Figure 6. The Deviaios whe lag k is se o -3. hik DDoS Shield iroduced i his aer had a drawback ha heir mehod could o acively block he malicious raffic. I oly released he symom of beig aacked vicims. I rece wo years, Dr. Yi Xie adoed Hidde Semi- Markov model for he deecio of alicaio-layer DDoS aack. His mehod recorded he curre user visiig sequeces ad calculaed he diversiies i ossibiliies of he sequeces. The bigges roblem of Hidde Semi-Markov mehod was he algorihm comlexiy. Alhough Dr. Yi Xie imroved his drawback based o M-algorihm i [] ad ideede comoe aalysis i [3], we sill foud ha rackig each user s visiig sequece was o a racical ask. Georgios Oikoomou ad Jelea Mirkovic [4] roosed defeces agais alicaio-layer DDoS aacks via huma behaviour modellig which differeiae DDoS bos from huma users. Their mehod was achieved hrough hree asecs: reques dyamics, reques semaics ad abiliy o rocess visual cues. We foud heir work had several limiaios. For isace, hey ried o build a ossibiliy grah for a Websie, bu as we ca say, for mos large Websies such as wih oo may dyamical Webages iside, hey ca hardly fiish he cosrucio. There are sill oher relaed works abou deecig alicaio-layer DDoS aacks. Simo Byers e.al [4] discussed he dagers ha scalable Iere fucioaliy may rese o he real world. Their work focused uo a aack ha is simle, ye could have grea imac, which hey believed migh occur quie soo. This aer is a early ublished rosecive work abou alicaio-layer DDoS aacks. Paul Barford e.al [5] used wavele o disiguish he flash crowds ad DDoS aacks. However, he mehod of usig wavele was oly a os-morem echology. Takeshi Yaagai e.al [6] roosed HTTP Ge floodig deecio echiques based o aalysis of age access behaviour. They roosed wo deecio algorihms, oe is focusig o a browsig order of ages ad he oher is focusig o a correlaio wih browsig ime o age iformaio size. We hik he drawback of heir work was somewha he same wih Dr. Yi Xie s ad Jaeyeo Jug s, because he roeries for deecio could easily be circumveed by simly modifyig he aack schemes. 6. DISCUSSION I could be argued ha AR model is oo limied for modellig he ye of HTTP Ge raffic. For examle, errors o raid chages i observaios are oe maifesaio of he AR model s limiaios ad o-liear models, for examle, could rovide beer reaciviy o raid chages. We have hree reasos o say wih liear models for fro-ed abormal raffic deecio: () give our uderlyig idea we do o eve wa o model he raffic exacly, esecially he raid chages should be lef ou of he model. We oly ay aeio o he amliude of he chages. () Through he smoohig fucio by N-ses Kalma filer, he oise of raid chages will be miigaed ad he calibraed redicio is able o imrove he accuracy. (3)Simle models mea simler algorihms ad his raslaes o faser ad ligher imlemeaios, which is a imora cosideraio for deloyig he mehod. There is aoher mehodological oi which easily icurs argume. I also derives from he AR liear model. Whe he aackers slowly icrease he abormal raffic, hey are able o circumve he abormal raffic deecio. This is he key weakess of liear redicio model resemblig machie learig echologies. I curre versio of CALD, i fac, we se a hreshold iside. Whe he real-ime raffic rises beyod ha hreshold, o maer wheher abormal raffic deecio fucio is aware of he aomalies, he froed will reor he ATTENTION ad acivae he ex DDoS deecio comoe as well. However, if we iduce he raffic of imor as well as exor, CALD will become caable of defedig such slowly icreasig DDoS aack. We will imrove he CALD i he ex sage of our work. Third, CALD has a few arameers ha we have assiged values based o exeriece. For examle, we se he AR model arameer o be 5 i he exerimes. There is ohig secial abou 5, we oly eed a value ha is eiher oo big or oo small. I fac, he redicio could become 53

9 more log-effecig if we se a bi larger. Similarly, we se he mess exe of flash crowds o be uder. There is also ohig secial abou his hreshold, we jus ge i accordig o our exeriece by aalysig he as records of alicaio-layer DDoS aacks. Fourh, he filer comoe eeds o be flushed eveually sice comromised zombies may ur io legiimae clies. The filer ca be cleaed eiher by reseig all eries simulaeously or by decremeig he various eries a a aricular rae. I he ex sage of our work, we will imleme such fucios i CALD. 7. CONCLUSION I his aer we have reseed a aroach for couerig alicaio-layer DDoS aack ha mimics he ormal users behaviours. The basic assumios are: () abru chages i he raffic mea a ossible exisece of abormal raffic; () he mess exe of various DDoS aacks is larger ha he oe of flash crowds. Based o he firs oi, we iroduce a fro-ed sesor o deec he abormal raffic ad reor is exisece whe abormal raffic arrives. The secod comoe which is used for disiguish DDoS aack ad flash crowd is acivaed or soed by he sigal ATTENTION or DISMISS from he fro-ed sesor. Wih arameers of malicious IP addresses, he filer blocks he abormal raffic ad leaves he Websie o be safe. The aalysis ad exerimes show ha CALD erform well i couerig various alicaio-layer DDoS aacks ad he delay for deecio is ke i a rage of N secods. This aer reses a early sage of our work. I he fuure, we will exed he work i he followig asecs: () imrove he saioary AR o be ime-varyig model where he arameers will deoe he chages of he sysem saus; () as is discussed i Secio 6, CALD is o sesiive o he slowly icreasig DDoS aack. Thus we may cosider boh he ouu ad iu raffic o deal wih his siuaio. ACKNOWLEDGEMENTS We hak Chogqi Uiversiy for suorig he real raffic races o he Iere backboe of Chia. We also hak Professor Guofeg Zhao for givig us los of cosrucive commes o CALD. REFERENCES [] CERT. Icide Noe IN-4- W3/Novarg.A Virus, 4. [] CERT. Icide Noe IN-- Code Red Worm Crashes IIS 4. Servers wih URL Redirecio Eables,. [3] Kevi Poulse. FBI buss alleged DDoS Mafia, h:// 4. [4] J.Leyde. Eas Euroea Gags i Olie Proecio Racke, h:// s_i_olie/, 3. [5] Mary Williams ad Jeremy Kirk. Udaed MyDoom resosible for DDOS aacks, h:// udaed-mydoom-resosible-for-ddos.hml?a=rcb, 9. [6] Chuck Miller. Russia Cofirms ivolveme wih Esoia DDoS Aacks, h:// [7] Dacho Dachev. The DDoS Aack agais CNN.com, h://ddachev.blogso.com/8/4/ddos-aackagais-ccom.hml, 8. [8] SOHU News. Boe has formed idusry chai, h://ews.sohu.com/96/ shml, 9. [9] BBC News. How cyber crimials aack Websies. h://ews.bbc.co.uk//hi/rogrammes/click_olie/ sm, 9. [] B.Krishamurhy ad J.Wag. O Nework-Aware Cluserig of Web Clies, i Proceedigs of he ACM SIGCOMM, Sockholm, Swede,. [] Raul Mahaja e al. Corollig High badwidh Aggregaes i he Nework, ACM Comuer Commuicaio Review,. [] Joui Viiikka, Herve Debar, Ludovic Me e al. Processig Irusio Deecio Alers Aggregaes wih Time Series Modelig, Iformaio Fusio, Elsevier, 9. [3] Wei Lu ad Ali A. Ghorbai. Nework Aomaly Deecio Based o Wavele Aalysis, EURASIP Joural o Advaces i Sigal Processig, Hidawi Publishig Cororaio, 9. [4] Georgios Oikoomou ad Jelea Mirkovic, Modelig Huma Behaviour for Defese agais Flash-Crowd Aacks, IEEE Ieraioal Coferece o Commuicaios, 9. [5] A.Broder ad M.Mizemacher, Nework Alicaios of Bloom Filers: A Survey. Iere Mah, Volume, Number 4, 3. [6] Ioais Ioaidis, Aah Grama ad Mikhail Aallah, Adaive Daa Srucures for IP Lookis. I Proceedigs of he IEEE Comuer ad Commuicaios Socieies (Ifocom), 3. [7] Adrei Broder ad Michael Mizemacher, Usig Mulile Hash Fucios o Imrove IP Lookus. I Proceedigs of he IEEE Comuer ad Commuicaios Socieies (Ifocom),. [8] Jaeyeo Jug, Balachader Krishamurhy ad Michael Rabiovich, Flash Crowds ad Deial of Service Aacks: Characerizaio ad Imlicaios for CDNs ad Web Sies. I Proceedigs of he h Ieraioal World Wide Web Coferece (WWW), Hoolulu, Hawaii, USA,. [9] L.vo Ah, Mauel Blu, Nicholas J.Hoer ad Joh Laford, CAPTCHA: Usig Hard AI Problems for Securiy. I Proceedigs of EUROCRYPT,.94-3, 3. [] Srikah Kadula, Dia Kaabi, Mahias Jacob ad Arhur Berger, Boz-4-Sale: Survivig Orgaized DDoS Aacks Tha Mimic Flash Crowds. I Proceedigs of he d Symosium o Neworked Sysems Desig & Imlemeaio (USENIX NSDI), 5. [] Suraamaya Raja, Ram Swamiaha, Musafa Uysal ad Edward Kighly. DDoS-Resilie Schedulig o Couer Alicaio Layer Aacks uder Imerfec Deecio. I Proceedigs of he IEEE Comuer ad Commuicaios Socieies (Ifocom), 6. [] Yi Xie ad Shu-Zheg Yu, A Large-Sclae hidde Semi-Markov Model for Aomay Deecio o User Browsig Behaviours. IEEE/ACM Trasacios o Neworkig, vol.7, 9. [3] Yi Xie ad Shu-Zheg Yu, Moiorig he Alicaio-Layer DDoS Aacks for Poular Websies. IEEE/ACM Trasacios o Neworkig, vol.7, 9. [4] Simo Byers, Aviel D.Rubi ad David Korma, Defedig Agais a Iere-Based Aack o he Physical World. ACM Trasacios o Iere Techology, vol.4, age.39-54, 4. [5] Paul barford, Jeffery Klie, David Ploka ad Amos Ro, A Sigal Aalysis of Nework Traffic Aomalies. I Proceedigs of ACM SIGCOMM Iere Measureme Worksho,. [6] Takeshi Yaagai, Takamasa Isohara ad Iwao Sasase, Deecio of HTTP-GET Flood Aack Based o Aalysis of Page Access Behaviour. I Proceedigs of IEEE Pacific Rim Coferece o Commuicaios Comuers ad Sigal Processig, 7. [7] George Box, Gwilym M.Jekis ad Gregory C.Reisel, Time Series Aalysis: Forecasig ad Corol, Third Ediio, Preice Hall, 99 54

Handout 10: Pulse-Code Modulation

Handout 10: Pulse-Code Modulation ENGG 31-B: Priciples of Commuicaio Sysems Hadou 1: Pulse-Code Modulaio 17 18 Firs Term Isrucor: Wig-Ki Ma November 1, 17 Suggesed Readig: Chaper 7 of Simo Hayki ad Michael Moher, Commuicaio Sysems (5h

More information

Introduction to Orthogonal Frequency Division Multiplexing (OFDM)

Introduction to Orthogonal Frequency Division Multiplexing (OFDM) Wireless Iformaio Trasmissio Sysem Lab. Iroducio o Orhogoal Frequecy Divisio Muliplexig OFDM Isiue of Commuicaios Egieerig aioal Su Ya-se Uiversiy OFDM Overview OFDM Sysem Model Orhogoaliy Oulie Muli-carrier

More information

Introduction to Orthogonal Frequency Division Multiplexing (OFDM) Technique

Introduction to Orthogonal Frequency Division Multiplexing (OFDM) Technique Wireless Iformaio Trasmissio Sysem Lab. Iroducio o Orhogoal Frequecy Divisio Muliplexig (OFDM Techique Isiue of Commuicaios Egieerig Naioal Su Ya-se Uiversiy OFDM Overview OFDM Sysem Model Orhogoaliy Oulie

More information

Walsh Function Based Reconstruction Method of. Command Waveform in PWM Inverter

Walsh Function Based Reconstruction Method of. Command Waveform in PWM Inverter Walsh Fucio Based Recosrucio Mehod of Commad Waveform i PWM Iverer Kri Choeisai ad Seiji Kodo Nagaoka Uiversiy of echology 63- Kamiomioka, Nagaoka 94-288, Japa Fa: +8-28-4-9, Phoe: +8-28-4-9 E-Mail: kri@s.agaokau.ac.jp

More information

Bézier curves with shape parameter *

Bézier curves with shape parameter * Wag e al. / J Zhejiag Uiv SCI 5 6A(6):497-5 497 Joural of Zhejiag Uiversiy SCIENCE ISSN 9-395 hp://www.zju.edu.c/jzus E-mail: jzus@zju.edu.c Bézier curves wih shape parameer * WANG We-ao ( 王文涛 ) WANG Guo-zhao

More information

Introduction to OFDM Systems

Introduction to OFDM Systems Wireless Iformaio Trasmissio Sysem Lab. Iroducio o OFDM Sysems Isiue of Commuicaios Egieerig Naioal Su Ya-se Uiversiy Oulie OFDM Overview OFDM Sysem Model Orhogoaliy Muli-carrier Equivale Implemeaio by

More information

Implementation of Variable Duty Cycle Ring Oscillator for Unique Identification

Implementation of Variable Duty Cycle Ring Oscillator for Unique Identification Imlemeaio of Variable Duy Cycle Rig Oscillaor for Uique Ideificaio N.Sivasakari (), B.Balambiga () ad P.Idumahi (3) () Assisa Professor, Dearme of Elecroics ad Commuicaio Egieerig Meco Schlek college of

More information

Comparison of Color Features for Image Retrieval

Comparison of Color Features for Image Retrieval Compariso of Color Feaures for Image Rerieval S.R. Kodiuwakku 1 Deparme of Saisics & Compuer Sciece, Uiversiy of Peradeiya salukak@pd.ac.lk S.Selvarajah Deparme of Physical Sciece, Vavuiya Campus, Uiversiy

More information

Detection of Pulsed Radar in a Time Division Duplexed System

Detection of Pulsed Radar in a Time Division Duplexed System Deecio of Pulsed Radar i a Time Divisio Duplexed Sysem Brad W. Zarikoff Hamilo Isiue Naioal Uiversiy of Irelad Mayooh Email: Brad.Zarikoff@uim.ie David Weldo Wireless R&D, Vecima Neworks, Ic. Vicoria,

More information

Experiment 2: Waveform Analysis

Experiment 2: Waveform Analysis Specrum aalyzer Experime : Waveform Aalysis 8/3/6 his experime is o familiarize you wih he aalysis of sigals ad eworks usig he HP 358A Specrum Aalyzer. he aalysis of sigals is achieved i he ope loop mode

More information

An optimization algorithm for the calculation of the electrostatic discharge current equations parameters

An optimization algorithm for the calculation of the electrostatic discharge current equations parameters WSEAS TRANSACTIONS o CIRCUITS ad SYSTEMS Vasiliki Via George P. Fois Lambros Ekoomou A opimizaio algorihm for he calculaio of he elecrosaic discharge curre equaios parameers VASILIKI VITA GEORGE P. FOTIS

More information

Field-Effect Transistors (FETs) 3.4 The p-channel MOSFET & COMS

Field-Effect Transistors (FETs) 3.4 The p-channel MOSFET & COMS Field-Effec Trasisors (FETs 3.4 The p-chael MOSFET & COMS A p-chael ehaceme-ype MOSFET is fabricaed o a -ype subsrae wih p+ regios for he drai ad source, ad has holes as charge carriers. The deice operaes

More information

ITERATIVE RECEIVER FOR SPACE-TIME CODED FLAT FADING CHANNELS. Noura Sellami yz, Mohamed Siala y, David Declercq z, Inbar Fijalkow z

ITERATIVE RECEIVER FOR SPACE-TIME CODED FLAT FADING CHANNELS. Noura Sellami yz, Mohamed Siala y, David Declercq z, Inbar Fijalkow z ITERATIVE RECEIVER FOR SPACE-TIME CODED FLAT FADING CHANNELS Noura Sellami yz, Mohamed Siala y, David Declercq z, Ibar Fijalkow z y Frace Telecom R&D, 38-40 rue du Gééral Leclerc 92794 Issy les Moulieaux,

More information

Analysis of Current Starved Voltage Controlled Oscillator using 45nm CMOS Technology

Analysis of Current Starved Voltage Controlled Oscillator using 45nm CMOS Technology SSN (Pri) : 30 3765 SSN (Olie): 78 8875 eraioal Joural of Advaced Research i Elecrical, Elecroics ad srumeaio Egieerig (A SO 397: 007 erified Orgaizaio) ol. 3, ssue 3, March 014 Aalysis of urre Sarved

More information

MULTI USER DETECTION FOR CDMA- OFDM/OQAM SYSTEM COMBINED WITH SPACE TIME CODING

MULTI USER DETECTION FOR CDMA- OFDM/OQAM SYSTEM COMBINED WITH SPACE TIME CODING Ieraioal Joural of Wireless & Mobile Neworks (IJWMN) Vol. 4, No. 4, Augus 212 MULTI USER DETECTION FOR CDMA- OFDM/OQAM SYSTEM COMBINED WITH SPACE TIME CODING Radhia GHARSALLAH 1 ad Ridha BOUALLEGUE 2 1

More information

Digital Communications (by B. Sklar)

Digital Communications (by B. Sklar) Digial Commuicaios by B. Sklar Sug Ho Cho Voice 2 222 39 Cellular 11 412 5178 E mail: drago@hayag.ac.kr Coes 1 Sigals ad Specra Formaig ad Basebad Trasmissio Badpass Modulaio ad Demodulaio Chael Codig

More information

Coupled CFD/Sonic Boom Adjoint Methodology and its Application to Aircraft Design

Coupled CFD/Sonic Boom Adjoint Methodology and its Application to Aircraft Design aioa eroauics ad Sace dmiisraio Coued CF/Soic oom djoi Mehodoogy ad is icaio o ircraf esig Sriram Raabhadi aioa Isiue of erosace CF Semiar Ouie. Iroducio ad moivaio. dvaced oom aysis 3. Soic boom adjoi

More information

Limb-Vector Paralleling: A General Approach to Translate Postures from Human to Humanoid Robots

Limb-Vector Paralleling: A General Approach to Translate Postures from Human to Humanoid Robots Limb-Vecor Parallelig: A Geeral Approach o Traslae Posures from Huma o Humaoid Robos Zhuo-Li Bao, Shih-Li Che, Chi-Chag Tug, Rayi Yau Tara, Hadziq Fabroyir ad Wei-Chug Teg Absrac evelopig iuiive ierface

More information

An Optimization of Gaussian UWB Pulses

An Optimization of Gaussian UWB Pulses 0 h Ieraioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS, Suceava, Romaia, May 7-9, 00 A Opimizaio of Gaussia UWB Pulses Adria POPA "Gheorghe Asachi" Techical Uiversiy of Iaşi Bd.Carol No., RO0.506

More information

Moment-Based Bound on Peak-to-Average Power Ratio and Reduction with Unitary Matrix

Moment-Based Bound on Peak-to-Average Power Ratio and Reduction with Unitary Matrix Mome-Based Boud o Peak-o-Average Power Raio ad Reducio wih Uiary Marix Hirofumi Tsuda Deparme of Applied Mahemaics ad Physics Graduae School of Iformaics Kyoo Uiversiy Kyoo Japa suda.hirofumi.38u@s.kyoo-u.ac.jp

More information

In Color We Live C IP E I. In Color We Live. t n. In Color We Live

In Color We Live C IP E I. In Color We Live. t n. In Color We Live I r We Live Eviro me I r We Live IP E I 0 12 I 2 T E vir ome 0 12 I 2 T IPEI Evirome IPEI 012 I 2 T I r We Live Iesiy Idepede RGB-o-XYZ ur amera alibraio Bria FUNT, ad Pouya BSTNI School of ompuig Sciece,

More information

Power-Efficient Radio Resource Allocation for Low- Medium-Altitude Aerial Platform Based TD-LTE Networks

Power-Efficient Radio Resource Allocation for Low- Medium-Altitude Aerial Platform Based TD-LTE Networks ower-efficie Radio Resource Allocaio for Low- Medium-Aliude Aerial laform Based TD-LTE eworks Liqiag Zhao, 2, Chi Zhag, Haili Zhag ad Xiaohui Li. Sae Key Laboraory of Iegraed Service eworks, Xidia Uiversiy,

More information

Transmit Power Efficiency of Multi-Hop Hybrid Selection/MRC Diversity for a DS-CDMA Virtual Cellular Network

Transmit Power Efficiency of Multi-Hop Hybrid Selection/MRC Diversity for a DS-CDMA Virtual Cellular Network Trasmi ower Efficiecy of Muli-Hop Hybri Selecio/ Diversiy for a DS-CDMA Virual Cellular ework Imae DAOU, Eisuke KUDOH a Fumiyuki ADACHI Dep. of Elecrical a Commuicaio Egieerig, Grauae School of Egieerig,

More information

Mean Waiting and Turnaround Time for Multiple Web Transaction

Mean Waiting and Turnaround Time for Multiple Web Transaction Mea Waiig ad uraroud ie for Muliple Web rasacio Yog-Ji Lee Dep. of Copuer Sciece Woosog Uiversiy aejo, 300-78, Korea yjlee@woosog.ac.kr M. Aiquzzaa School of Copuer Sciece Uiversiy of Oklahoa Nora, OK

More information

A New Power System Oscillation Type Identification Method Based on Empirical Mode Decomposition and Hilbert Transform

A New Power System Oscillation Type Identification Method Based on Empirical Mode Decomposition and Hilbert Transform Proceedigs of he World Cogress o Egieerig ad Compuer Sciece 4 Vol I WCECS 4, -4 Ocober, 4, Sa Fracisco, USA A New Power Sysem Oscillaio Type Ideificaio Mehod Based o Empirical Mode Decomposiio ad Hilber

More information

Research on Reliability for Wind Turbine Transmission System Based on Random Theory

Research on Reliability for Wind Turbine Transmission System Based on Random Theory Advaced ciece ad Techology Leers Vol8 (CT 5) pp3-9 hp://ddoiorg/457/asl58 Research o Reliabiliy or Wid Turbie Trasmissio ysem Based o Radom Theory Xi Gua Huadog Wag 3 Zhili u Da Zhao chool o Mechaical

More information

Keywords:. Consumer Acceptance, Purchasing Power, Root Mean Square Error, Theil U Statistics

Keywords:. Consumer Acceptance, Purchasing Power, Root Mean Square Error, Theil U Statistics Ieraioal Joural of Ecoomics, Busiess ad Maageme Research Vol., No. 05; 07 ISSN: 456-7760 APPLICATION OF THE LOTKA-VOLTERRA MODEL IN EXPLORING THE SALES VOLUMES INTERACTIONS OF SMARTPHONES BETWEEN ASIA

More information

Self-Interference Cancellation in Full-Duplex Radio Transceivers with Oscillator Phase Noise

Self-Interference Cancellation in Full-Duplex Radio Transceivers with Oscillator Phase Noise Self-Ierferece Cacellaio i Full-Duplex Radio Trasceivers wih Oscillaor Phase Noise Ville Syrjälä ad Koji Yamamoo Graduae School of Iformaics Kyoo Uiversiy Yoshida-homachi Sakyo-ku Kyoo-shi 606-8501 Kyoo

More information

THE AUTOMATED SYSTEM OF THE RHYTHM ANALYSIS IN THE EDUCATIONAL PROCESS OF A HIGHER EDUCATIONAL INSTITUTION ON THE BASIS OF APRIORISTIC DATA

THE AUTOMATED SYSTEM OF THE RHYTHM ANALYSIS IN THE EDUCATIONAL PROCESS OF A HIGHER EDUCATIONAL INSTITUTION ON THE BASIS OF APRIORISTIC DATA THE AUTOMATED SYSTEM OF THE RHYTHM ANALYSIS IN THE EDUCATIONAL PROCESS OF A HIGHER EDUCATIONAL INSTITUTION ON THE ASIS OF APRIORISTIC DATA Nicolae PELIN PhD, Associate Professor, Iformatio Techology Deartmet,

More information

Installing remote sites using TCP/IP

Installing remote sites using TCP/IP v dc Keypad from nework Whie/ 3 Whie/ 4 v dc Keypad from nework Whie/ 3 Whie/ 4 v dc Keypad from nework Whie/ 3 Whie/ 4 +v pu +v pu +v pu v dc Keypad from nework Whie/ 3 Whie/ 4 v dc Keypad from nework

More information

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.

More information

Geo-Encryption Protocol For Mobile Networks

Geo-Encryption Protocol For Mobile Networks Geo-Ecrypio Proocol For Mobile Neworks Ala Al-Fuqaha, Omar Al-Ibrahim, Ammar Rayes * Deparme of Compuer Sciece Weser Michiga Uiversiy Kalamazoo, MI {alfuqaha, oalibrah } @cs.wmich.edu Absrac We propose

More information

Improving the energy efficiency for the WBSN bottleneck zone based on random linear network coding

Improving the energy efficiency for the WBSN bottleneck zone based on random linear network coding Improvig he eergy efficiecy for he WBSN boleeck zoe based o radom liear ework codig Al Shahee, H ad Takruri Rizk, H hp://dx.doi.org/10.1049/ie wss.2017.0056 Tile Auhors Type URL Improvig he eergy efficiecy

More information

MIMO-OFDM with Pilot-Aided Channel Estimation for WiMax Systems

MIMO-OFDM with Pilot-Aided Channel Estimation for WiMax Systems Fir Ieraioal Workhop o he Performace Ehaceme i MIMO-OFDM Syem MIMO-OFDM wih Pilo-Aided Chael Eimaio for WiMax Syem Fabie Delere ad Yichuag Su School of Egieerig ad echology Uiveriy of Herfordhire, Hafield,

More information

R. W. Erickson. Department of Electrical, Computer, and Energy Engineering University of Colorado, Boulder

R. W. Erickson. Department of Electrical, Computer, and Energy Engineering University of Colorado, Boulder R. W. Erickso Deparme of Elecrical, Compuer, ad Eergy Egieerig Uiversiy of Colorado, Boulder 4.2.2. The Power MOSFET Gae Source Gae leghs approachig oe micro p - p Cosiss of may small ehacememode parallelcoeced

More information

A Novel Filter for Terrain Mapping With Laser Rangefinders

A Novel Filter for Terrain Mapping With Laser Rangefinders Published i IEEE Trasacios o Roboics ad Auomaio, Vol., No. 5, Oc. 4, pp. 93-9 A Novel Filer for Terrai Mappig Wih Laser Ragefiders Cag Ye, Member, IEEE ad Joha Borese Member, IEEE Absrac This paper iroduces

More information

Research Article Improving the Performance of Modular Production in the Apparel Assembly: A Mathematical Programming Approach

Research Article Improving the Performance of Modular Production in the Apparel Assembly: A Mathematical Programming Approach Mahemaical Problems i Egieerig, Aricle ID 472781, 7 pages hp://dx.doi.org/1.1155/214/472781 Research Aricle Improvig he Performace of Modular Producio i he Apparel Assembly: A Mahemaical Programmig Approach

More information

CDS 270-2: Lecture 6-3 Optimum Receiver Design for Estimation over Wireless Links

CDS 270-2: Lecture 6-3 Optimum Receiver Design for Estimation over Wireless Links CDS 70-: Lecture 6-3 Otimum Receiver Desig for stimatio over Wireless Lis Goals: Yasami Mostofi May 5, 006 To uderstad imact of wireless commuicatio imairmets o estimatio over wireless To lear o-traditioal

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Aoucemes EE3 Digial Sigal Processig Lecure Miderm: Friday ex week Ope everyhig... bu chea shee recommeded isead Who ca o say ill pm? Opioal homework ex week Will give you miderm ad pracice quesios How

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

A Channel Estimation Method for MIMO-OFDM Mobile WiMax Systems

A Channel Estimation Method for MIMO-OFDM Mobile WiMax Systems A Chael Eimaio Mehod for MIMO-OFDM Mobile WiMax Syem Fabie Delere ad Yichuag Su School of Egieerig ad echology Uiveriy of Herfordhire, Hafield, Her, AL0 9AB, UK Abrac I hi paper, chael eimaio for Space-ime

More information

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and

More information

A new terrain mapping method for mobile robots obstacle negotiation

A new terrain mapping method for mobile robots obstacle negotiation A ew errai mappig mehod for mobile robos obsacle egoiaio Cag Ye ad Joha Boresei Advaced Techologies Lab The Uiversiy of Michiga 0 Beal Ave, A Arbor, MI, USA 4809-0 ABSTRACT This paper iroduces a ew errai

More information

10. The Series Resistor and Inductor Circuit

10. The Series Resistor and Inductor Circuit Elecronicsab.nb 1. he Series esisor and Inducor Circui Inroducion he las laboraory involved a resisor, and capacior, C in series wih a baery swich on or off. I was simpler, as a pracical maer, o replace

More information

4.5 Biasing in BJT Amplifier Circuits

4.5 Biasing in BJT Amplifier Circuits 4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can

More information

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI) ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114

More information

The most significant MOSFET parameters impact in CMOS inverter switching characteristics

The most significant MOSFET parameters impact in CMOS inverter switching characteristics INTERNATIONAL JOURNAL OF CIRCUITS, SYSTEMS AND SIGNAL PROCESSING Voume 1, 018 The mos sigifica MOSFET arameers imac i CMOS iverer swichig characerisics Miaim Zabei, Nebi Caka, Myzafere Limai, Qami Kabashi

More information

Lecture #7: Discrete-time Signals and Sampling

Lecture #7: Discrete-time Signals and Sampling EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined

More information

Memorandum on Impulse Winding Tester

Memorandum on Impulse Winding Tester Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER

EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER EXPERIMENT #4 AM MODULATOR AND POWER AMPLIFIER INTRODUCTION: Being able o ransmi a radio frequency carrier across space is of no use unless we can place informaion or inelligence upon i. This las ransmier

More information

Teacher Supplement to Operation Comics, Issue #5

Teacher Supplement to Operation Comics, Issue #5 eacher Supplemen o Operaion Comics, Issue #5 he purpose of his supplemen is o provide conen suppor for he mahemaics embedded ino he fifh issue of Operaion Comics, and o show how he mahemaics addresses

More information

ECE-517 Reinforcement Learning in Artificial Intelligence

ECE-517 Reinforcement Learning in Artificial Intelligence ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering

More information

Power Conversion and Signal Transmission Integration Method Based on Dual Modulation of DC-DC Converters

Power Conversion and Signal Transmission Integration Method Based on Dual Modulation of DC-DC Converters IEEE TRANSATIONS ON INDUSTRIAL ELETRONIS 1 Power oversio ad Sigal Trasmissio Iegraio Mehod Based o Dual Modulaio of D-D overers Jiade Wu, Member, IEEE, Ji Du, Sude Member, IEEE, Zhegyu Li, Seior Member,

More information

Delay Estimation for Global RC Interconnect Using Inverse Gamma Distribution Function

Delay Estimation for Global RC Interconnect Using Inverse Gamma Distribution Function Ieraioal Joural of Iforaio ad lecroics gieerig, Vol., No., March Delay siaio for Global RC Iercoec Usig Iverse Gaa Disribuio Fucio V. Maheshwari, Suia Gupa, V. Sayaaraya, R. Kar, D. Madal, ad A. K. Bhaacharjee

More information

Volume Author/Editor: Simon Kuznets, assisted by Elizabeth Jenks. Volume URL:

Volume Author/Editor: Simon Kuznets, assisted by Elizabeth Jenks. Volume URL: This PDF is a selecion from an ou-of-prin volume from he Naional Bureau of Economic Research Volume Tile: Shares of Upper Income Groups in Income and Savings Volume Auhor/Edior: Simon Kuznes, assised by

More information

2600 Capitol Avenue Suite 200 Sacramento, CA phone fax

2600 Capitol Avenue Suite 200 Sacramento, CA phone fax 26 Capiol Avenue Suie 2 Sacrameno, CA 9816 916.64.4 phone 916.64.41 fax www.esassoc.com memorandum dae Sepember 2, 216 o from subjec Richard Rich, Ciy of Sacrameno; Jeffrey Dorso, Pioneer Law Group Brian

More information

Multiuser Precoding for UWB Sensor Networks

Multiuser Precoding for UWB Sensor Networks Muliuser Precodig for UWB Sesor Neworks Heirich Luecke ad Armi Wiebe Commuicaio Techology Laboraory, ETH Zurich, 89 Zurich, Swizerlad {lueckeh, wiebe}@ari.ee.ehz.ch Absrac We cosider he dowlik of a UlraWidebad

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

ON THE QAM PARALLEL TURBO-TCM SCHEMES USING RECURSIVE CONVOLUTIONAL GF(2 N ) ENCODERS

ON THE QAM PARALLEL TURBO-TCM SCHEMES USING RECURSIVE CONVOLUTIONAL GF(2 N ) ENCODERS 8h Europea Sigal Processig Coferece (EUSIPCO-00) Aalborg, Demark, Augus 3-7, 00 O THE QAM PARAE TURBO-TCM SCHEMES USIG RECURSIVE COVOUTIOA GF( ) ECODERS Adria Flori Pău, Cǎli Vlǎdeau, Io Marghescu, Safwa

More information

Fast and Accurate Behavioral Simulation of Fractional-N Frequency Synthesizers and other PLL/DLL Circuits

Fast and Accurate Behavioral Simulation of Fractional-N Frequency Synthesizers and other PLL/DLL Circuits Fas ad Accurae Behavioral Simulaio of Fracioal-N Frequecy Syhesizers ad oher PLL/LL Circuis Michael H. Perro Microsysems Techology Laboraory, MIT perro@mi.edu, hp://www-ml.mi.edu/ perro ABSTRACT Techiques

More information

weight: amplitude of sine curve

weight: amplitude of sine curve Joseph Fourier s claim: all signals are sums of sinusoids of differen frequencies. weighed sine curves weigh: ampliude of sine curve all : no exacly bu doesn maer for us in pracice Example: 3 sin() + sin(*)

More information

Performance Analysis of an Ultra-Tightly Integrated GPS and Reduced IMU System

Performance Analysis of an Ultra-Tightly Integrated GPS and Reduced IMU System Performace Aalysis of a Ulra-Tighly Iegraed GPS ad Reduced IMU Sysem M.G. Peovello, D. Su, G. Lachapelle, M.E. Cao Posiio, Locaio ad Navigaio (PLAN) Group Deparme of Geomaics Egieerig Schulich School of

More information

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang 2008, Multicore security defense system (MSDS), in ATNAC 2008 : Proceedings of the 2008 Australasian

Chonka, Ashley, Zhou, Wanlei and Xiang, Yang 2008, Multicore security defense system (MSDS), in ATNAC 2008 : Proceedings of the 2008 Australasian Chonka, Ashley, Zhou, Wanlei and Xiang, Yang 2008, Mulicore securiy defense sysem (MSDS), in ATNAC 2008 : Proceedings of he 2008 Ausralasian Telecommunicaion Neworks and Applicaions Conference, IEEE, Piscaaway,

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Speech Enhancement Based on Compressed Sensing Technology

Speech Enhancement Based on Compressed Sensing Technology Sesors & Trasducers, Vol. 8, Issue 0, Ocober 04, pp. 4-45 Sesors & Trasducers 04 by IFSA Publishig, S. L. hp://www.sesorsporal.co Speech Ehacee Based o Copressed Sesig Techology Huiya Xu School of Elecrical

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY 2014 1 Updae-Efficiecy ad Local Repairabiliy Limis for Capaciy Approachig Codes Arya Mazumdar Member, IEEE, Veka Chadar, ad Gregory

More information

Expanding the Twin Pulse Swing Free Profile

Expanding the Twin Pulse Swing Free Profile 8 IEEE Ieraioal Coferece o Roboics ad Auomaio Pasadea, CA, USA, May 19-3, 8 Expadig he Twi Swig Free Profile David Bowlig, Gregory Sarr, Joh Wood ad Ro Lumia Deparme of Mechaical Egieerig The Uiversiy

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Technology Trends & Issues in High-Speed Digital Systems

Technology Trends & Issues in High-Speed Digital Systems Deailed comparison of dynamic range beween a vecor nework analyzer and sampling oscilloscope based ime domain reflecomeer by normalizing measuremen ime Sho Okuyama Technology Trends & Issues in High-Speed

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Aocemes EE3 Digial Sigal Processig Office hors TA -m Miderm / All Maerial so far icldig waveles Office hors aedace weak Lecre How do yo kow his gy is isae? Las Time Freqecy Tilig (Heiseberg boxes) Shor-Time

More information

ECE 2201 PRELAB 4A MOSFET SWITCHING APPLICATIONS. Digital CMOS Logic Inverter

ECE 2201 PRELAB 4A MOSFET SWITCHING APPLICATIONS. Digital CMOS Logic Inverter ECE 2201 PRELAB 4A MOSFET SWITCHING APPLICATIONS Digital CMOS Logic Iverter Had Aalysis P1. I the circuit of Fig. P41, estimate the roagatio delays t PLH ad t PHL usig the resistive switch model for each

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ.

MEASUREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQUENCY RANGE 0,02-10KHZ. ELECTRONICS 00 September, Sozopol, BLGARIA MEASREMENT AND CONTORL OF TOTAL HARMONIC DISTORTION IN FREQENCY RANGE 0,0-0KHZ. Plame Agelov Agelov Faculty for Computer Sciece, Egieerig ad Natural Studies,

More information

ISSN (Print) Research Article. *Corresponding author Oleksandr V. Lemeshko

ISSN (Print) Research Article. *Corresponding author Oleksandr V. Lemeshko Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 06; 4(4):69-74 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.sasublisher.com

More information

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009 ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Communications II Lecture 7: Performance of digital modulation

Communications II Lecture 7: Performance of digital modulation Communicaions II Lecure 7: Performance of digial modulaion Professor Kin K. Leung EEE and Compuing Deparmens Imperial College London Copyrigh reserved Ouline Digial modulaion and demodulaion Error probabiliy

More information

Lecture September 6, 2011

Lecture September 6, 2011 cs294-p29 Seminar on Algorihmic Game heory Sepember 6, 2011 Lecure Sepember 6, 2011 Lecurer: Chrisos H. Papadimiriou Scribes: Aloni Cohen and James Andrews 1 Game Represenaion 1.1 abular Form and he Problem

More information

THE IMPLEMENTATION OF TOURISM DEMAND FORECASTING USING SEASONAL ARIMA FOR THE INVESTMENT ANALYSIS OF FLOATING AQUACULTURE

THE IMPLEMENTATION OF TOURISM DEMAND FORECASTING USING SEASONAL ARIMA FOR THE INVESTMENT ANALYSIS OF FLOATING AQUACULTURE Ieraioal Joural of Mechaical ad Producio Egieerig Research ad Developme (IJMPERD) ISSN (P): 2249-6890; ISSN (E): 2249-8001 Vol. 8, Issue 2, Apr 2018, 383-390 TJPRC Pv. Ld THE IMPLEMENTATION OF TOURISM

More information

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks Social-aware Dynamic Rouer Node Placemen in Wireless Mesh Neworks Chun-Cheng Lin Pei-Tsung Tseng Ting-Yu Wu Der-Jiunn Deng ** Absrac The problem of dynamic rouer node placemen (dynrnp) in wireless mesh

More information

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK INTRODUCTION: Much of daa communicaions is concerned wih sending digial informaion hrough sysems ha normally only pass analog signals. A elephone line is such

More information

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c

More information

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax 2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely

More information

LAB VII. TRANSIENT SIGNALS OF PN DIODES

LAB VII. TRANSIENT SIGNALS OF PN DIODES LAB VII. TRANSIENT SIGNALS OF PN DIODES 1. OBJECTIVE In his lab, you will sudy he ransien effecs in a -n juncion diode due o a sudden change in curren. Secifically, you will sudy he urn-on, urn-off, and

More information

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1

More information

Negative frequency communication

Negative frequency communication Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac

More information

Technical Explanation for Counters

Technical Explanation for Counters Techical Explaatio for ers CSM_er_TG_E Itroductio What Is a er? A er is a device that couts the umber of objects or the umber of operatios. It is called a er because it couts the umber of ON/OFF sigals

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

(This lesson plan assumes the students are using an air-powered rocket as described in the Materials section.)

(This lesson plan assumes the students are using an air-powered rocket as described in the Materials section.) The Mah Projecs Journal Page 1 PROJECT MISSION o MArs inroducion Many sae mah sandards and mos curricula involving quadraic equaions require sudens o solve "falling objec" or "projecile" problems, which

More information

Signals and the frequency domain ENGR 40M lecture notes July 31, 2017 Chuan-Zheng Lee, Stanford University

Signals and the frequency domain ENGR 40M lecture notes July 31, 2017 Chuan-Zheng Lee, Stanford University Signals and he requency domain ENGR 40M lecure noes July 3, 07 Chuan-Zheng Lee, Sanord Universiy signal is a uncion, in he mahemaical sense, normally a uncion o ime. We oen reer o uncions as signals o

More information

Noise properties in the ideal Kirchhoff-Law-Johnson-Noise. secure communication system

Noise properties in the ideal Kirchhoff-Law-Johnson-Noise. secure communication system Noise roeries in he ideal Kirchhoff-aw-Johnson-Noise secure communicaion sysem Zolan Gingl and ober Mingesz Dearmen of Technical Informaics, Universiy of Szeged, ungary bsrac In his aer we deermine he

More information

Examination Mobile & Wireless Networking ( ) April 12,

Examination Mobile & Wireless Networking ( ) April 12, Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary

More information

BELECTRIC: Enhanced Frequency Control Capability

BELECTRIC: Enhanced Frequency Control Capability BELECTRIC: Enhanced Frequency Conrol Capabiliy Tim Müller, CTO 28/03/2018 0 Company profile Yearly oal revenue of 550M EUR 84 MW / 95 MWh energy sorage sysems insalled or under consrucion Over 120 paens

More information

ECEN325: Electronics Spring 2017

ECEN325: Electronics Spring 2017 ECEN325: Elecronics Srg 207 Semiconducor n Juncion Diode Sam alermo Analog & Mixed-Signal Cener Texas A&M Universiy Announcemens & eadg HW5 due Mar. 9 azavi Ch2 (oional) Basic semiconducor device hysics,

More information

Revision: June 10, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 10, E Main Suite D Pullman, WA (509) Voice and Fax 1.8.0: Ideal Oeratioal Amlifiers Revisio: Jue 10, 2010 215 E Mai Suite D Pullma, WA 99163 (509) 334 6306 Voice ad Fax Overview Oeratioal amlifiers (commoly abbreviated as o-ams) are extremely useful electroic

More information

TECHNIQUE FOR TRACKING AND VISUALIZATION OF MOTION IN SEQUENCE OF IMAGES OF THE SOLAR CORONA

TECHNIQUE FOR TRACKING AND VISUALIZATION OF MOTION IN SEQUENCE OF IMAGES OF THE SOLAR CORONA Proc. VI Serbia-ulgaria Asroomical Coferece elgrade 7-11 Ma 2008 Eds. M. S. Dimirijevi M. Tsveov L.. Popovi V. Golev Publ. Asr. Soc. "Rudjer ošovi" No. 9 2009 207-216 TECHNIQUE FOR TRACKING AND VISUALIZATION

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information