Multiple Simultaneous Threat Detection in UNIX Environment

Size: px
Start display at page:

Download "Multiple Simultaneous Threat Detection in UNIX Environment"

Transcription

1 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February Multiple Simultaeous Threat Detectio i UNIX Eviromet Zafar Sulta School of Sciece ad Techology, Uiversity of New Eglad, Armidale, NS, Australia Summary Although UNIX is cosidered a very stable ad secure platform, the developmet of Itrusio Detectio Systems (IDS) is essetial as curret ad future geeratios of hackers are cotiuously attemptig to udermie its itegrity. The empirical experimet of multiple simultaeous threat detectio system proved that use of hybrid data fusio model of Bayesia, Dempster Shafer ad exteded Dempster Shafer icreased a average 0% threat detectio rate. The false positive rate also wet dow by 5%. The use of Exteded Dempster Shafer to combie probability mass of 4 itrusio detectio (Multisesor) systems icreased precisio of threat detectio by 6% whilst the iitial probability mass of the Dempster Shafer of Multisesor was oly 0.0. Set Cover as a middle tier data fusio tool produced icredible results, particularly i data groupig by reducig the populatio size from 7 to 49 that amazigly miimise the computatioal processig cpu ad memory overhead cost ad time. I order to improve the results of the precisio of the multiple simultaeous threat detectio system, as a ext step of my research is that is a extesio to the Bayesia ad Dempster Shafer theory. GEP presets a better evidetial combiatio ad separate propositios ad the decisios. Key words: Multiple Simultaeous Threat Detectio; Itrusio Detectio Systems; Bayesia Theory; Dempster Shafer, Multisesor Data Fusio; Exteded Dempster Shafer, Set Cover; Set Packig; GEP; UNIX.. Itroductio A large umber of Itrusio Detectio Systems have bee developed for computer security but more developmet is required as attackers are very shrewd these days ad have developed differet approaches ad programmes to peetrate ito computer systems ad have succeeded may times i breakig all security walls. Thus hackers, i fact, ot oly have stole valued ad critical busiess data but also forced computer idustry ad busiesses to develop advace software to moitor ad block their attacks. As a result the compaies have to sped billio dollars to develop prevetive codes for this purpose [4]. For example Microsoft spet $. billio to stop Sapphire/Slammer worm i 00 [7] []. Itegratio of UNIX with Firewall protectio ad CISCO techology were cosidered very secure systems but hackers have also broke such security measures. The way the security field is progressig, it looks like this is a cotiuous battle betwee security professioals ad hackers. Hackers are i reality people familiar with all types of computer systems like cyberspace, etworks, operatig systems ad their thousads of applicatios. Hackers kow the loopholes of iformatio techology systems, they exploit system weakesses ad misuse their expertise to perform illegal fuctios o busiess critical systems such as stealig importat iformatio, busiess secrets, damagig data or systems etc. etc. The hardest problem i trackig these types of attack, their origi ad quatity of damage depeds upo attacker s software ad techiques. Hackers may attack from multiple sites ad hide their idetity by cotiuously chagig their IP addresses. Sometimes they do physical damage to the systems or their applicatios, but if they just steal importat iformatio, the security experts may be uaware of it for may moths util they apply a ew security update or hackers does ay physical damage to ay process or data of that particular busiess [5] []. False positives ad false egatives are additioal issues i computer security ad also i UNIX systems. False alarm results because alarms are set at low levels of security. The preset moitorig ad IDS aalyse data take from system processes, memory, CPU, disk utilizatio ad log messages ad track or batch or log files. Attacks are checked based o patter matchig with existig situatios of the processes ad systems attributes [] [7]. The aim of this paper is the prelimiary experimetal evaluatio of the multiple threat detectio system usig Multisesor data fusio, its various approaches ad techiques. However, the mai emphasis of my research is to detect multiple simultaeous attacks i UNIX eviromets. My research will help i buildig multiple simultaeous threat detectio system for computer security i geeral ad for UNIX eviromets i particular.. Existig Threat Detectio Approaches. Data Fusio Approaches i UNIX Bayesia, Dempster Shafer, fuzzy rules, parametric / o parametric ad Kalma Filter are widely used data fusio techiques [5] [4] []. Chapma-Kalmogorov predictio model has also bee used as a itegral model with Mauscript received February 5, 009 Mauscript revised February 0, 009

2 66 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February 009 Bayesia ad Dempster Shafer [9] [4]. Ifereces regardig threats, locatio ad other attributes are made from these models. These models fuse data from the Multisesor systems o the same or differet etworks. Fusio model behave exactly the same way like huma brai process data ad take actios or decisios. UNIX system s IDS get their data from differet sesor created by systems commads ad etworks packets. Data may be siffer packets; sys log files, SNMP traces, system messages ad other similar activities of the etwork [6]. Data fusio model after processig this iformatio sed its outputs i form of alarms to security people ad system egieers ad war of ay expected threat o a particular subet. Though data fusio models work like cogitive approach but i fact they are ot really itelliget eough to cope with differet type of chages or attacks if their iformatio does ot already exist i the IDS database. The Lagley attack lost millio dollars ad they could ot fid bombs util their busiess server crashed. The curret Multiple Itrusio Detectio Models are uable to auto track, idetify, ad block all suspected threats. Advace IDS are required to deliver ehaced reliability ad precisio i threat detectio []. Thus additioal developmet is required i the field of multiple sesor data fusio models of IDS i UNIX [6] [9].. Other Data Fusio Approaches A large amout of research work ad literature is available o Multisesor data fusio of IDS i defese ad other related fields. However, there is a little work i the field of UNIX, oly few scietists worked o multiple simultaeous threat detectio i UNIX. It is, therefore, a relatively ew area to work o. Though a few yeas back UNIX was oe of the secure eviromets from outside hackers but itruders ow have broke may busiess applicatios ad databases i UNIX etwork whilst all critical busiess like credit cards, cliet profiles ad fiacial trasactios are olie ad eed more security ever tha before. Majority of the workers used Bayesia, Dempster Shafer, parametric / o parametric ad few others iferece egies for Multisesor data aalysis i their IDS. Dog ad Deborah [0] worked o DARPA IDS evaluatio data set show i their experimets that improved threat detectio rates from 75 to 94 % with their hybrid models. I aother study, Dog ad Deborah emphasized that hybrid model of Bayesia is the best techique to improve the itrusio detectio precisio for IDS. Christos ad Basil [] worked o multiple data fusio model ad cocluded that the use of Multisesor data aalysis icreases threat detectio accuracy. They used a Bayesia ad Dempster Shafer detectio egie. Huadog u, Mel Siegel ad Raier [] idetified relatioship betwee Bayesia ad Dempster Shafer theory ad compared with the probability method ad cocluded that combied mathematical iferece models will be a promisig area for Multisesor data aalysis i IDS. A. Habib, M Hefeeda [] ad Christos [] worked o DoS i a IDS ad foud a icrease i precisio by usig classical Bayesia methods for data aalysis. Diego Zamoi [8] used a patter matchig detectio model to detect ew attacks, however, he did ot metio ay particular fusio model i his experimet. V. Chatzigiaakis, A. Leis, C. Siaterlis, M. ad Grammatikou D [4] foud that their fusio model is more effective tha sigle metric aalysis. They used Pricipal Compoet Aalysis for Multisesor data fusio for itrusio detectio. Vladimir G, Oleg K, ad Vladimir S [5] suggested that combiig a decisio model is better i thereat detectio precisio tha a Meta model i IDS. Kapil K S [5] worked o IDS architecture ad foud that rule set kowledge, expert systems state models ad strig match are useful parameters i the developmet of a advace threat detectio model. Hugh Durrat-hyte ad Mike Steves [] described mathematical model for their fusio model. They aalysed data usig Kalma Filter ad theoretical methods derived from Bayesia theorem. S Terry Brugger, [0] worked o offlie data fusio model, used data miig approach i her IDS. However, she did ot produce ay particular model durig her experimet. I the view of all above literature reviews, it is obvious that there is eough material o Multisesor data fusio models of IDS. However, very little was reported i the UNIX. Ad almost egligible work was foud if we search material or study o multiple simultaeous threat detectio i the field of UNIX.. Research Directios I this research, I ll idetify a multiple simultaeous threat detectio model. This model will be a hybrid of Bayesia ad Dempster Shafer theory of ifereces with Set Cover theory. The ew model will icrease the precisio i threat detectio ad reduce the volume of false alarms i UNIX eviromet. The use of the model will assist i decreasig the data security expeses, particularly web based busiesses. Researchers will get also beefit for future IDS developmets i UNIX.

3 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February The ew multiple simultaeous threat detectio model will be able to detect more tha oe threat simultaeously. Aother advatage is that the results of this research ca be applied i high speed etworks like cyberspace. There are also some additioal situatioal parameters that will be geerated as a result of this work such as high level architecture of multiple threat detectio model, idetificatio of proper Multisesor eviromet based o hybrid model, ad idetificatio of middle tiers of the research. Origial Cotributios I order to detect multiple threat detectio, researchers are makig efforts i order to develop suitable data fusio model based o advaced mathematical ad statistical techiques. However, most of the models detect sigle threats, few models are advaced but the work i multiple threat detectio is rare i UNIX eviromet [].. Novelties of multiple simultaeous threat detectio This research, i fact, is a step forward that addresses the additioal precisio i multiple threat detectio process as compared to the existig threat detectio approaches i UNIX ad it is differet i may ways from other s work i Multisesor data fusio i IDS developmet. ) I used hybrid model of Multisesor data fusio comprised of basic Bayesia, Dempster Shafer, ad Exteded Dempster Shafer theory of iferece i multiple simultaeous threat detectio of UNIX eviromet. ) Set Cover as a middle tier data fusio tool i hybrid Bayesia ad Dempster model is a ovel approach as o oe has used it before. ) Geeralized Evidetial processig (GEP) presets a better evidetial combiatio ad separate propositios ad the decisios. GEP will be implemeted very first time i a distributed Multisesor etwork of a UNIX eviromet.. Set Cover Set Cover is a brach of mathematics ad i this research I deal with sets, subsets ad their iteractio sets. Set Cover is the basic system of mathematics. Simple facts of set uio ad its subsets are used i cover sets of multiple simultaeous threat detectio system that is a basic brach of mathematics []. I multiple simultaeous threat detectio system the total umbers of elemets were 74 deoted by:- ui = U () ui here U is the uiversal set ad i = elemets i the uiversal set is sum of all the I the experimet, the types of threats represeted by subsets S, S, S,..., S U Ad the cost of each set is C, C, C,..., C. I our case threat(s) are preset i differet data substrigs from ay of the 4 differet itrusio detectio systems of a distributed Uix Network. The target is to fid the sets P = {,,, } that must cotai miimum umber of strigs havig threats so that each set have all the relevat strigs of data ad summatio of sets will have all the strigs of the iputs. Cover set usig greedy algorithm also provides miimum cost represeted by Q. Q = i = Ci Ci here is the sum of the costs i selectig a ew i = ode of the experimet The cost effectiveess to select computer ode is deoted by β C( Q) β = () Q P here CQ ( ) is the iitial cost for selectig the odes for each itrusio detectio system ad P is the set with miimum elemets ad Q is the miimum cost i selectig the ew ode. 4 Approaches ad Methodology I a large umber of Multisesor data fusio model, Bayesia ad Dempster Shafer have bee used for data aalysis. Most of the existig work was i sigle threat detectio []. Oly couple of researchers tried to focus o multiple threat detectio without usig Set Cover theory. Set Cover has bee idetified as a ew area which ca be used to prioritize ad schedule rule set o certai criteria i the fusio process. O this topic there are oly a few papers available i the UNIX eviromet, therefore, it is difficult to compare literature o Multisesor threat detectio i UNIX [5] [8]. Statistical /mathematical models such as Parametric / No Parametric, Bayesia, Dempster are the most commoly used theory of estimatio i data fusio i UNIX eviromet. These experimetal models were used i detectio of DoS, bombs ad buffer overflow attacks with may limitatios. This research is about idetificatio of multiple simultaeous threat detectio models. Data fusio will be doe usig hybrid model of Bayesia ad Dempster. Set Cover will be used to idetify data groups ad schedulig []. The hybrid model will provide a icrease i precisio of threats detected ad additioal theoretical ad techical ()

4 68 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February 009 kowledge about multiple threat detectio for computer security, especially for UNIX [9]. As the multiple simultaeous threat detectio system is a future prospect for IDS developmet i the UNIX eviromet. I order to make it a useful work, I ll idetify the followig parameters i my research;-.idetify ad implemet multiple simultaeous threat detectio model targetig future Itrusio Detectio systems.idetify high-level model/architecture that ca address Multiple Simultaeous attacks i UNIX.Idetify proper Multisesor data eviromet to use i the fusio model.idetify ad Implemet ad ru testig eviromet for the data fusio algorithms i multiple simultaeous threat detectio systems.idetify if my ew research o multiple simultaeous threat detectio model works well or ot? Ad provide all possible reasos i ay case.i ll provide a excellet compariso of models based o differet mathematical ifereces 4..Multiple simultaeous threat detectio system The mai target of this research is to idetify the exact threat(s) with a high degree of precisio by usig hybrid data fusio model comprised of Set cover, Bayesia theory of estimatio, Dempster ad Exteded Dempster Shafer theory. The origi ad directios of the threats are exclusive of this research as that icludes complicated, extesive ad separate research. I this distributed test eviromet which is coceptually the same as server cliet eviromet, a multiple simultaeous threat detectio system has bee set up o differet odes across the distributed subets. Computer odes are comprised of multiple operatig systems ad located at differet etworks, predomiatly UNIX though iclude itel machies as well. Each computer ode has differet itrusio detectio system that filters all the etwork data ad collects threat related iformatio ad trasfers them to the computer ode hostig multiple simultaeous threat detectio system for further accuracy ad precisio of the threat detectio results. The computer odes across differet subets receive differet threats. As this is a cotrolled experimet, 4 types of threats maily deial of service, ma-i-the-middle, buffer overflow ad Troja will be iitiated from oe of the experimetal computer ode. 4. Architecture of Multiple simultaeous threat detectio system Fig showig the architecture of the multiple simultaeous threat detectio system I this experimetal test eviromet, 4 idepedet itrusio detectio systems work as a separate Multisesor observers o differet subets. I order to moitor all data packets i the test eviromet, I used a switch o test etwork ad cofigured a moitorig port to replicate all packets of the data traffic passig through the switch. Network data of layer ad was also gathered. Data collectig software the decodes ad aalyse the data. I used followig software for data collectio:- MARS, Siffers, Soop ad ireshark. Four types of threats:- DoS, Deial of Service, Mom- ma-i-the-middle attack or bucket-brigade attack or Jaus attack, Buffer overflow or buffer overru ad Troja Horses Each itrusio detectio system collects etwork data ad filters it usig Cover set theory. Data may cotai a sigle, two, three, four or ay combiatios of the above 4 x threats or false alarms ad the move the data to ext level of the data fusio withi the multiple simultaeous threat detectio system. The Multiple simultaeous threat detectio system processes the data through differet statistical ad mathematical techiques ad makes decisio about the threats. The multiple simultaeous threat detectio system s cliet odes that exist o each computer uses the Set Cover Model as a middle tier data fusio tool which refies the data ito small group of sets ad schedules these groups of data for oward statistical ad

5 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February mathematical data fusio. Aother beefit of the Set cover model is to choose computer odes that cover all the aticipated threats at a miimum cost. 5. Results of the Test Experimet Set Cover Fusio Model The iitial cost for selectig the odes for each itrusio detectio system is:- C ( A) = 8 = cost of the st Node C ( B) = 5 = cost of the d Node C ( C) = = cost of the rd Node C ( D) = 8 = cost of the 4 th Node The sets with miimum umber of elemets deoted by P ad set with miimum cost Q for each ode were determied durig the experimet. The total umber of sets whose cost was lowest ad set with miimum umber of elemets covered by ode A, B, C ad D of the experimet are give as:- P ( A) = 0, P ( B) =, P ( C) =, P ( D) =4 Q ( A) =8, Q ( B) =4, Q ( C) =7, Q ( D) =8 Here I like to make it clear that the above values are the umber of the sets ot the elemets of the sets, therefore, it should ot cause ay problem or mix up whilst readig Table. The cost effectiveess to select computer ode A, B, C ad D are calculated usig equatio () C( A) 8 Selectig A: β A = = = (4) QA ( ) PA ( ) 8-0 Selectig B: β B = Selectig C: β C = Selectig D: β D = CB ( ) QB ( ) PB ( ) CC ( ) QC ( ) PC ( ) CD ( ) QD ( ) PD ( ) = = = = 5 (5) = (6) = (7) As per above equatios, the cost effectiveess of the ode are A, D, C ad B respectively. Iitial total cost of selectig these odes was = that is ot optimal. The optimal cost as per cost effectiveess of the odes would be A+D+C=8+8+=8. 5. Set Cover s set geeratio I order to collect 4 types of threats, 4 itrusio detectio systems collected 74 malicious substrigs of 5 ad above bytes from the experimetal etwork. Set coverig is a complex problem i iformatio techology because of the complexity of NP-complete problems. However, it was ot very hard i my research as I already had used well kow itrusio detectio systems to collect threat data ad each of them gathered data cotaiig all of the threats. The threat data was a mixture of all 4 types of geerated threats. The secod issue was cost effectiveess i choosig the computer ode. Here are the big beefits that I achieved were miimizig the size of the sets ad cost effectiveess by usig Set Packig ad Greedy algorithm respectively. Set Packig provided me the ability to select the K = 4 umber of subsets out of the uio set N of 74 such that each subset is a pair wise disjoit to other subsets. Thus each subset ow has similar strigs of the threat data whose uio is N. I order to fid out pair wise disjoit subsets, I aalysed N=74 threat data usig a small pearl script. The script separated pair wise disjoit strigs of the threat data ito 4 subsets of total 49 substrigs. The umber of elemets or substrig i each subset is give as:- Table showig the set cover subsets reduced the sizes of the sets The cliet ode seds all the above filtered data to ext level of the data fusio system of the multiple simultaeous threat detectio system. The multiple simultaeous threat detectio system combies all the multisesor threat data that has already bee filtered ito differet sets of miimum size usig Set Cover model. I order to detect the real threats, improve the accuracy ad precisio i threat detectio; the multiple simultaeous threat detectio system fuses the multisesor data with Bayesia theory of estimatio, Dempster ad Exteded Dempster Shafer theory. 5. Dempster Shafer Theory to fuse Data I this experimet, frame of discermet θ will be a set of elemetal propositios or combiatios of the hypothesis statemets. Threats deoted by T may be overlappig or differet to each other. I the set of mutually exclusive ad exhaustive set of hypotheses about threat(s) T..T. Θ = {T, T T } (8) If θ have set of hypotheses, Boolea combiatio of the set will be θ hypotheses. Dempster Shafer theory does ot calculate the probability of a hypothesis but helps i fidig out the probability of the evidetial support for a hypothesis.

6 70 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February 009 Ulike Bayesia ad classical theory of iferece, Dempster Shafer theory of iferece helps i developig probability mass m (θ) by assigig evidece to each propositios or geeral propositios. Each itrusio detectio system ca assig evidece via probability mass to each of the 4 threats, e.g. M (T), M (T), M (T) ad M4 (T4). The total probability masses of all the propositios icludig geeral propositios will be equal to. The probability mass is represeted as:- m (θ) (9) m (θ) = (0) m (θ) is the probability mass of ay possible hypotheses. I this experimet that may be a sigle threat or combiatios of the 4 threats. 5. Propositios / Hypothesis A hypothesis may be a propositio whilst a propositio ca be a hypothesis or combiatios of hypotheses. I this experimet, I ve 4 sesors (itrusio detectio systems) ad 4 differet types of threats. Sesors ca receive a sigle threat or ay possible combiatios of the 4 geerated threats. The total possible base propositios usig mathematical theory of combiatorics with ad without repetitios are 40 ad 5 respectively. As repeated threats are of o sigificace durig hypothesis testig ad will also uecessary icrease processig cost ad time. Therefore, I ll oly cocetrate o the propositios without repetitios. Oly 645 (5 x 49) o repetitive propositios will be processed ad tested by MTDS egie as compared to 7760 (40 x 74) with repetitive propositios. The geeral Combiatios ad Permutatios formula is:! P(,r) = () r! ( r)! here is the umber of sesors (Itrusio Detectio System), r is the umber of threats to be selected (0 r ), where =4 i this experimet, if r =, P(, r) =! Case : whe sigle threat detected by each sesor, total # of hypothesis / propositios with ad without repetitios would be 4 ad 4 Case : whe two threats detected by each sesor, total # of hypothesis / propositios with ad without repetitios would be 6 ad 6 Case : whe three threats detected by each sesor, total # of hypothesis / propositios with ad without repetitios would be 4 ad 64 Case 4: whe four threats detected by each sesor, total # of hypothesis / propositios with ad without repetitios would be ad 56 Limitatio Due to high complexity of the probability mass ad weights calculatios, it is ot possible for me to cover all the 5 o repetitive hypotheses durig my research. Therefore, I ll test oly four elemetary hypotheses as metioed i sectio Fusio without usig the eights of the itrusio detectio systems This experimet has 4 types of itrusio detectio systems ad each has its ow way of threat detectio. This meas each itrusio detectio system has differet perceptio ad reliability that it provides to multiple simultaeous threat detectio system. The Dempster Shafer model to combie the probability masses of the threats from more tha two idepedet itrusio detectio systems:- p({ Ti}) Mi( Ti) = () p({ Ti}) + p({ Ti}) 0 0 here Mi( Ti ) is probability mass fuctio, T is the threat(s) ad i }) is the probability of a ith threat of the jth Itrusio Detectio System for a particular type of the threat? The calculatio of the combied probability mass fuctios will be followed as:- }) = = = 0.05 () 0 }) is the probability assiged to the st threat by st Itrusio detectio system. 0 }) = = = (4) 4 }) is the probability assiged to the d threat by d Itrusio detectio system. 9 }) = = = (5) 95 }) is the probability assiged to the rd threat by rd Itrusio detectio system. 7 4}) = = = (6) 0

7 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February }) is the probability assiged to the 4th threat by 4th Itrusio detectio system. Puttig the above values i the combied probability mass formulas! }) M, ( T, ) = }) + P({ T }) P({ T }) (7) M ( T ) is the combied probability mass of the,, itrusio detectio system ad assiged to threat ad. M ( T ) = (8),, }) M,, ( T,, ) = }) + P({ T }) P({ T }) P({ T }) (9) M ( T ) is the combied probability mass of the,,,, itrusio detectio system, ad assiged to threat, ad. M,, ( T,, ) = (0) Similarly the probability mass of the 4 itrusio detectio system would be:- M,,,4 (T,,,4 )= P({T })P({T })P({T })P({T }) 4 () P({T })P({T })P({T })P({T })+P({ 촖 })P({ 촖 })P({ 촖 })P({ 촖 }) 4 4 M (T ) is the combied probability mass of the,,,4,,,4 itrusio detectio system,, ad 4 assiged to threat,, ad 4. M,,,4 ( T,,,4 ) = () I this experimet oly 4 x threats ad 4 x itrusio detectio systems are participatig i data gatherig, therefore this combied probability mass formula for two, three ad four threats will be calculated. 5.5 Data Fusio usig eights of the itrusio detectio systems Bayesia decisio theory caot differetiate betwee ucertaity ad igorace, plus it eeds to assig evidece to a hypothesis. The Dempster Shafer theory of iferece that is a extesio of the Bayesia decisio theory overcomes this issue ad presets mathematical approach that ca assig evidece to a sigle or group of propositios i a experimet ad ca combie probability masses of the propositios emergig from more tha two sources but its self-evidet defiitio of evidece (probability mass) is ot very accurate. The Dempster Shafer theory of iferece also has some issues i reormalizatio of the probability mass durig probability masses combiatios. Thus it has become oe of the most challegig tasks to fid out the ways to perfect the evidetial or probability mass combiatio techiques to icrease the accuracy of the statistical decisios. I my research, I used two differet ways to improve decisio makig.. eights of the observatios. Geeralized Evidece Processig (ot doe yet) These methods miimised the effect of probability assigmets to the propositios ad reormalizatio of the rule of combiatios of the probability masses of the prepositio(s). The assumptio I made, i the above data fusio model is that all Itrusio Detectio Systems have same weights or degree of accuracy i detectig a type of threat. This is ot valid i this particular case because those 4 itrusio detectio systems are differet products ad obviously have differet level of accuracy i threat detectios. Thus each of these Itrusio Detectio Systems i detectig the same type of a threat may provide differet level of precisio. If a Itrusio Detectio System is better tha others i determiig a particular type of threat(s) so it will be ufair to give the same weights to all the Itrusio Detectio Systems i this particular case. Therefore, I eed to measure the weight of each Itrusio Detectio Systems that determies its level of precisio ad reliability for particular threat detectio. There are may methods to fid out the weights. I used Maximum Etropy method to calculate the weight of the Itrusio Detectio Systems i threat detectio. (Graham allies derivatio) eights of the four Itrusio Detectio Systems are calculated by usig Max Etropy (MaxEt) As each computer ode has differet itrusio detectio system, it is quite obvious that the reliability of each itrusio detectio system is differet. The Dempster- Shafer theory is cosidered to be a excellet mathematical model to measure ucertaity i threat detectio. Dempster-Shafer theory ad Exteded Dempster-Shafer models provide umerical methods for multiple threat aalyses of the data collected from differet itrusio detectio systems whilst each itrusio detectio system have differet reliability. The Probability formula for calculatig the probability mass ad weights of a Itrusio Detectio System for a particular threat is:-

8 [ 7 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February 009 Mi( Ti) i = 0 0 i}) i i}) i + P({ Ti}) i () here T is the threat ad is the weight of the itrusio detectio system ad P is the probability of the ith threat of jth Itrusio Detectio System. Ad i}) i = P ({ Ti}) i (4) i}) i is the probability assiged to the threat by Itrusio detectio system with weight. The Probability formula for calculatig the weights of a Itrusio Detectio System for a particular threat:- = P log P (5) i i here is the weight of the Itrusio Detectio Systems (sesors) ad P is the probability of a ith threat of jth Itrusio Detectio Systems. Calculatios of the Exteded Dempster Shafer will be as followed:- 9 }) = = = (6) }) is the weighted probability assiged to the st threat by st Itrusio detectio system. 8 }) = = = (7) 46 }) is the weighted probability assiged to the d threat by d Itrusio detectio system. 6 }) = = = (8) 98 }) is the weighted probability assiged to the rd threat by rd Itrusio detectio system }) = = = (9) }) is the weighted probability assiged to the 4th threat by 4th Itrusio detectio system. The weights of the itrusio detectio systems:- = Plog P = (0) is the weight of the st itrusio detectio system = Plog P = () is the weight of the d itrusio detectio system = Plog P = () i = is the weight of the rd itrusio detectio system 4 = P4 log P4 = () 4 is the weight of the 4th itrusio detectio system }) }) M ( T ) i = (4),, }) }) + P({ T}) P({ T }) M ( T ) i is the weighted combied probability mass,, of the probability assiged to st ad d threat by st ad d itrusio detectio system. = (5) Similarly the other weighted combied probability masses of the other itrusio detectio systems would be:- M ( T ) i = (6),,,, M ( T ) i = (7),,, 4,,, Threat Results based o Dempster Shafer Theory of Iferece After Set Cover data fusio we had a total of 49 threats (Table). This threat data is ow further processed by the ext part of the multiple simultaeous threat detectio system that is Dempster Shafer as show i Fig. I order to icrease the precisio of each threat was passed through multiple hypotheses testig as proposed i sec 5.. The itrusio detectio system classified the Dempster Shafer ifereces ito 4 types. Observed threats,, ad Real Alerts that helped i determiig

9 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February the real threat detectio ad false positive rates. The fial results of this part of the fusio have bee give i Table. False Positive rates are determied usig the formula:- Real Alerts False Positive Rates = *00 (8) Observerd Alerts Ad Threat Detectio rate is calculated usig the equatio:- Threat Detectio Rate = *00 Observerd Threats (9) Threat observatios by the multiple simultaeous threat detectio system usig Dempster Shafer IDS OT OA DA RA ireshark 0 Siffers Soop MARS Total where OT stads for Observed threats, OA for, DA for Detected Attacks ad RA for Real Alerts Table Threat Results based o Dempster Shafer Theory of Iferece 5.7 Threat Results based o Exteded Dempster Shafer Theory of Iferece Just like the Dempster Shafer iferece, 49 threats data aalysed by the Exteded Dempster Shafer iferece ad Itrusio Detectio System the grouped as give i Table. It is obvious that real alerts have goe up from 4 to that is a sigificat idicatio that False Positive Rates have reduced as compared to Dempster Shafer. Likewise there is a obvious improvemet i threat detectio rate as well. Threat observatios by the multiple simultaeous threat detectio system usig Exteded Dempster Shafer IDS OT OA DA RA ireshark 9 Siffers 46 8 Soop 98 6 MARS Total where OT stads for Observed threats,oa for DA for Detected Attacks ad RA for Real Alerts 5.8 Performace of the multiple simultaeous threat detectio system The multiple simultaeous threat detectio system is a multisesor data fusio system. Its major compoets statistical ad mathematical set covers, Dempster Shafer ad extesio Dempster Shafer are the mai data processig cores ad heart of the data processig uit for the system. The larger the umber of sesors the greater should be the accuracy ad precisio i the results. Although Bayesia ad Dempster Shafer provide best processig model i multisesor data fusio but ivolve too much complex iteratio of the data fusio process i terms of its probability mass ad weight calculatios. Therefore, i real life, it would be a very hard task to use Bayesia ad DS model for combiig probability masses of a experimet havig a more tha four sesors, particularly i case of overlappig ad coflictig propositios. The greater the umber of sesors, larger would be precisio i threat detectio, that s why I m lookig ito possibility of usig more tha 4 sesors i my ext step ad will use Geeralized Evidece Processig (GEP) theory. I my experimet, I performed experimet i three steps usig evideces of d, rd ad the 4th sesors (itrusio detectio systems) to the 4 type of threats. The sesors were 4 itrusio detectio systems. I compared their results ad have proved the obvious fact that the combied results of the 4 sesors have improved threat detectio sigificatly. Bayesia ad Dempster Shafer theory of ifereces provided me tools to combie evideces of these sesors ad measure the ucertaity of a hypothesis or to gai better cofidece i the combied probability measuremets to the evideces or propositios. The followig are the graphs draw i Microsoft Excel to display the results of multiple simultaeous threat detectio system. Comparig efficiecy of the Demspter Shafer ad Exteded Demspter Shafer data fusio techiques, figure ad are showig a sigificat icrease i the combied probability masses i case of Exteded Demspter Shafer Theory. That is a good idicatio of ehaced precisio, accuracy ad better performace of Exteded Demspter Shafer data fusio i threat detectio over the Dempster Shafer Data fusio techiques. Table Threat Results based o Exteded Dempster Shafer Theory of Iferece

10 74 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February 009 Combied probability Mass Performace of Multiple Simultaeous Threat Detectio system DS Prob mass Expo Prob mass Liear (DS Prob Sesors Set-Itrusio Detectio System Fig Performace of the multiple simultaeous threat detectio system Effectiveess of Multiple Simultaeous Threat detectio System Improvemet % Sesors Sets- Itrusio detectio System Fig Effectiveess of the multiple simultaeous threat detectio System 6. Coclusios The empirical experimet of multiple simultaeous threat detectio system proved that the hybrid model had sigificat icrease i precisio i threat detectio. Dempster Shafer iferece produced 9% detectio rate whilst exteded Dempster Shafer had 59% detectio rate. So o a average, four Itrusio Detectio Systems icreased 0% detectio rate. The false positive rate also wet dow from 6 % to %. (Detectio rate is calculated by dividig detected alerts by observed alerts ad false positive rate is derived by dividig real alerts by observed alerts.) Thus there was a et improvemet of 5 % i gettig rid of false positive alarms ad that is highly sigificat achievemet. Aother achievemet of the multiple simultaeous threat detectio system was its better performace to joi probability masses from 4 differet Itrusio Detectio. The combied probability mass of the Dempster Shafer was 0.06 whilst Exteded Dempster Shafer had combied probability mass 0.4, so there was 6 % icrease i determiig the combied probability masses. The Multiple simultaeous threat detectio system also proved that icrease i umber of sesors cotiuously improvig the threat detectio. However there are calculatio complexities ivolved i determiig joied probability masses usig Bayesia ad Dempster Shafer that made impossible to have more tha 4 sesors (itrusio Detectio systems). Set Cover as a middle tier data fusio tool produced icredible results, particularly i data groupig that amazigly miimise the computatioal processig cpu ad memory overhead cost ad time. Set Cover reduce data populatio (from 74 to 49) to the level that it became possible to detect more tha simultaeous threats with less computatioal efforts whist that was almost impossible with the existig threat detectio approaches ad others that used Bayesia ad Dempster Shafer. Set Cover also determied the cost effectiveess of choosig a computer ode for the multiple simultaeous threat detectio system. Thus the Set cover played a vital role to assist Multiple simultaeous threat detectio system to improve its ability to icrease precisio of threat detectio results. Lookig ito the results, it is obvious that results of experimet has prove that my proposed threat detectio system multiple simultaeous threat detectio system remaied successful to achieve my research goals. I order to improve precisio of threat detectio, as a ext step of my research, the mai task I m plaig is to implemet Geeralised Evidetial Processig (GEP). GEP is a extesio of the Bayesia ad Dempster Shafer theory that presets a better evidetial combiatio ad separate propositios ad the decisios. Therefore each propositio or set of propositios ca be tested ad aalysed separately at differet levels of the data. I additio to that I ll focus to improve the quality of the test experimet ad write the fial thesis. 8. Ackowledgmets I would like to thak Dr. Paul Kwa (my pricipal supervisor) for his suggestio o the iitial research directio ad his valuable commets o how to structure this paper. I also thak to Thomas Keri, IBM, Capacity Plaer, Melboure, Victoria, Australia for his suggestios. 9. Refereces [] A. Bedjebbour, Y. Deligo, et al., Multisesor Image Segmetatio Usig Dempster-Shafer Fusio i Markov Fields Cotext, IEEE Trasactio o GeoSciece ad Remote Sesig, Volume 9 Issue 8, August 00; pp. -0 [] A. Habib, M. Hefeeda, ad B. Bhargava. Detectig service violatios ad DoS attacks. I NDSS Coferece Proceedigs. Iteret Society, 00; pp

11 IJCSNS Iteratioal Joural of Computer Sciece ad Network Security, VOL.9 No., February [] Aickeli U (00): A Idirect Geetic Algorithm for Set Coverig Problems, Joural of the Operatioal Research Society, 5(0), pp [4] Be Grocholsky, Alexei Makareko, Hugh F. Durrat-hyte: Iformatio-theoretic coordiated cotrol of multiple sesor platforms. ICRA 00: pp [5] Brau, J. (000) Dempster-Shafer theory ad Bayesia reasoig i multisesor data fusio, Sesor Fusio: Architectures, Algorithms ad Applicatios IV; Proceedigs of SPIE 405, pp [6] COMPUTER SECURITY INSTITUTE. Cyber crime bleeds U.S. corporatios, survey shows, Apr. 00. accessed o.. Accessed 6 Jauary 00. [7] D. Hall. Mathematical Techiques i Multisesor Data Fusio. Artech House, Norwood, Massachusetts, 99;pp [8] Diego Zamboi. Doig itrusio detectio usig embedded sesors CERIAS Techical report 000-, CERIAS, Purdue Uiversity, est Lafayette, IN, Oct, 000;pp. -9 [9] Do Koks ad Subhash Challa, 005, A Itroductio to Bayesia ad Dempster-Shefer Data Fusio; pp. - 5 [0] Dog ad Deborah (ACM 005) Alert Cofidece Fusio i Itrusio Detectio Systems with Exteded Dempster-Shafer Theory; pp [] H. u, M. Siegel, R. Stiefelhage, ad J. Yag. Sesor fusio usig Dempster-Shafer theory. I Proceedigs of IEEE Istrumetatio ad Measuremet Techology Coferece, Achorage, AK, USA, 00;-6 [] Hugh F. Durrat-hyte: Data fusio i sesor etworks. IPSN 005, pp [] J. Burroughs, L. F. ilso ad George V. Aalysis of Distributed Itrusio Detectio Systems Usig Bayesia Methods, preseted at IPCCC 00, April 00; pp [4] J. R. Bosto, A Sigal Detectio System Based o Dempster-Shafer Theory ad Compariso to Fuzzy Detectio, IEEE Trasactios o Systems, Ma, ad Cyberetics, Part C: Applicatios ad Reviews, Volume 0, Issue, February 000;pp [5] Kapil Kumar S, 000 Itrusio Detectio ad Aalysis, Uiversity of British Columbia [6] Lawrece A. Klei, Sesor ad Data Fusio Cocepts ad Applicatios (secod editio), SPIE Optical Egieerig Press, 999, ISBN ; pp. -5 [7] Ma, Big 00 Parametric ad No Parametric Approaches for Multisesor Data Fusio PhD thesis, Uiversity Of Michiga;- [8] Nig P, Xu D, Healey C ad Amat R (004), Buildig Attack Scearios through Itegratio of Complemetary Alert Correlatio Methods, th Aual Network ad Distributed System Security Symposium, pp. 97- [9] Rehma R, (00) Itrusio Detectio System with SNORT, accessed o.. ; pp [0] S Terry Brugger, 004 Data Miig for Network Itrusio Detectio PP.8/55 accessed o.. df [] Siaterlis C ad Maglaris B (004), Towards Multisesor Data Fusio for DoS detectio, Proceedigs of the 004 ACM symposium o Applied Computig; pp.-8 [] SPAFFORD, E. H. The Iteret worm icidet. Tech. Rep. Purdue Techical Report CSD-TR-9, Departmet of Computer Sciece, Purdue Uiversity, est Lafayette, IN , 99. LEM OS, R. Coutig the cost of slammer, Ja. 00; pp. -9 [] Tim Bass ad Dave Gruber. a glimpse ito the future of id. Useix. 8 Aug 005. accessed o.. [4] V. Chatzigiaakis, A. Leis, C. Siaterlis, M. Grammatikou, D. Kalogeras, S. Papavassiliou & V. Maglaris 00, Distributed Network Moitorig ad aomaly Detectio as a Grid Applicatio ;pp. - [5] V.Gorodetski, O.Karsaev, I.Koteko, ad A.Khabalov. "Software Developmet Kit for Multi-aget Systems Desig ad Implemetatio". I B.Dui-Keplicz ad E.Nawareski (Eds.) "From Theory to Practice i Multi- aget Systems". Lecture Notes I Artificial Itelligece, vol. 96, -0, Spriger Verlag, 00;pp. -0

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria

AkinwaJe, A.T., IbharaJu, F.T. and Arogundade, 0.1'. Department of Computer Sciences University of Agriculture, Abeokuta, Nigeria COMPARATIVE ANALYSIS OF ARTIFICIAL NEURAL NETWORK'S BACK PROPAGATION ALGORITHM TO STATISTICAL LEAST SQURE METHOD IN SECURITY PREDICTION USING NIGERIAN STOCK EXCHANGE MARKET AkiwaJe, A.T., IbharaJu, F.T.

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment

Implementation of Fuzzy Multiple Objective Decision Making Algorithm in a Heterogeneous Mobile Environment Implemetatio of Fuzzy Multiple Objective Decisio Makig Algorithm i a Heterogeeous Mobile Eviromet P.M.L. ha, Y.F. Hu, R.E. Sheriff, Departmet of Electroics ad Telecommuicatios Departmet of yberetics, Iteret

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks

Data Mining of Bayesian Networks to Select Fusion Nodes from Wireless Sensor Networks www.ijcsi.org http://dx.doi.org/10.20943/01201604.1115 11 Data Miig of Bayesia Networks to Select Fusio Nodes from Wireless Networks Yee Mig Che 1 Chi-Shu Hsueh 2 Chu-Kai Wag 3 1,3 Departmet of Idustrial

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway

Smart Energy & Power Quality Solutions. ProData datalogger. Datalogger and Gateway Smart Eergy & Power Quality Solutios ProData datalogger Datalogger ad Gateway Smart ad compact: Our most uiversal datalogger ever saves power costs Etheret coectio Modbus-Etheret-Gateway 32 MB 32 MB memory

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

A Novel Small Signal Power Line Quality Measurement System

A Novel Small Signal Power Line Quality Measurement System IMTC 3 - Istrumetatio ad Measuremet Techology Coferece Vail, CO, USA, - May 3 A ovel Small Sigal Power Lie Quality Measuremet System Paul B. Crilly, Erik Leadro Boaldi, Levy Ely de Lacarda de Oliveira,

More information

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor

More information

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2

Lossless image compression Using Hashing (using collision resolution) Amritpal Singh 1 and Rachna rajpoot 2 Lossless image compressio Usig Hashig (usig collisio resolutio) Amritpal Sigh 1 ad Racha rajpoot 2 1 M.Tech.* CSE Departmet, 2 Departmet of iformatio techology Guru Kashi UiversityTalwadi Sabo, Bathida

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

Sources of Innovation

Sources of Innovation Sources of Iovatio Case: Give Imagig s Camera Pill v The Camera Pill: A capsule that is swallowed by patiet that broadcasts images of the small itestie v Iveted by Gavriel Idda & team of scietists Idda

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks

A New Energy Efficient Data Gathering Approach in Wireless Sensor Networks Commuicatios ad Network, 0, 4, 6-7 http://dx.doi.org/0.436/c.0.4009 Published Olie February 0 (http://www.scirp.org/joural/c) A New Eergy Efficiet Data Gatherig Approach i Wireless Sesor Networks Jafar

More information

Simulation and Analysis on Signal Acquisition of BDS Receiver with The Aid of INS

Simulation and Analysis on Signal Acquisition of BDS Receiver with The Aid of INS Modelig Simulatio ad Optimizatio Techologies ad Applicatios (MSOTA 2016 Simulatio ad Aalysis o Sigal Acquisitio of DS Receiver with The Aid of INS Shulei Che Xiaqig Tag Xuwei Cheg Juqiag Gao ad Zepeg Su

More information

Survey of Low Power Techniques for ROMs

Survey of Low Power Techniques for ROMs Survey of Low Power Techiques for ROMs Edwi de Agel Crystal Semicoductor Corporatio P.O Box 17847 Austi, TX 78744 Earl E. Swartzlader, Jr. Departmet of Electrical ad Computer Egieerig Uiversity of Texas

More information

High-Order CCII-Based Mixed-Mode Universal Filter

High-Order CCII-Based Mixed-Mode Universal Filter High-Order CCII-Based Mixed-Mode Uiversal Filter Che-Nog Lee Departmet of Computer ad Commuicatio Egieerig, Taipei Chegshih Uiversity of Sciece ad Techology, Taipei, Taiwa, R. O. C. Abstract This paper

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK Giovai Huiske ad Eric va Berkum Dept. of Civil Egieerig - Uiversity of Twete - 7500 AE Eschede - The Netherlads E-mail: g.huiske@ctw.utwete.l ad

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

Design and Construction of a Three-phase Digital Energy Meter

Design and Construction of a Three-phase Digital Energy Meter Desig ad Costructio of a Three-phase Digital Eergy Meter D.P.Chadima, V.G.R.G. Jayawardae, E.A.E.H. Hemachadra, I.N.Jayasekera, H.V.L.Hasaraga, D.C. Hapuarachchi (chadima@elect.mrt.ac.lk, geethagaj@gmail.com,era.hem@gmail.com,ishaivaka@gmail.com,lahiru_hasaraga@yahoo.com,diya_elect.uom@gmail.com)

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Methods to Reduce Arc-Flash Hazards

Methods to Reduce Arc-Flash Hazards Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

A study on traffic accident measures in municipal roads by using GIS

A study on traffic accident measures in municipal roads by using GIS icccbe 010 Nottigham Uiversity Press Proceedigs of the Iteratioal Coferece o Computig i Civil ad Buildig Egieerig W Tizai (Editor) A study o traffic accidet measures i muicipal roads by usig GIS Satoshi

More information

The Firing Dispersion of Bullet Test Sample Analysis

The Firing Dispersion of Bullet Test Sample Analysis Iteratioal Joural of Materials, Mechaics ad Maufacturig, Vol., No., Ma 5 The Firig Dispersio of Bullet Test Sample Aalsis Youliag Xu, Jubi Zhag, Li Ma, ad Yoghai Sha Udisputed, this approach does reduce

More information

Fault Diagnosis in Rolling Element Bearing Using Filtered Vibration and Acoustic Signal

Fault Diagnosis in Rolling Element Bearing Using Filtered Vibration and Acoustic Signal Volume 8 o. 8 208, 95-02 ISS: 3-8080 (prited versio); ISS: 34-3395 (o-lie versio) url: http://www.ijpam.eu ijpam.eu Fault Diagosis i Rollig Elemet Usig Filtered Vibratio ad Acoustic Sigal Sudarsa Sahoo,

More information

Calibrating Car-following Model with Trajectory Data by Cell Phone

Calibrating Car-following Model with Trajectory Data by Cell Phone Calibratig Car-followig Model with Trajectory Data by Cell Phoe Jiag Zeyu 1 jiagzy15@mails.tsighua.edu.c Wag Yog 3 13006373891@qq.com Wag Gagqiao 1 wag-gq15@mails.tsighua.edu.c Zhag Xiagpeg 3 364386058@qq.com

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Chapter 3 Digital Logic Structures

Chapter 3 Digital Logic Structures Copyright The McGraw-HillCompaies, Ic. Permissio required for reproductio or display. Computig Layers Chapter 3 Digital Logic Structures Problems Algorithms Laguage Istructio Set Architecture Microarchitecture

More information

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013 Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L.

Sensors & Transducers 2015 by IFSA Publishing, S. L. Sesors & Trasducers 215 by IFSA Publishig, S. L. http://www.sesorsportal.com Uiversal Sesors ad Trasducers Iterface for Mobile Devices: Metrological Characteristics * Sergey Y. YURISH ad Javier CAÑETE

More information

CAEN Tools for Discovery

CAEN Tools for Discovery Applicatio Note AN2506 Digital Gamma Neutro discrimiatio with Liquid Scitillators Viareggio 19 November 2012 Itroductio I recet years CAEN has developed a complete family of digitizers that cosists of

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

ECONOMIC LOT SCHEDULING

ECONOMIC LOT SCHEDULING ECONOMIC LOT SCHEDULING JS, FFS ad ELS Job Shop (JS) - Each ob ca be differet from others - Make to order, low volume - Each ob has its ow sequece Fleible Flow Shop (FFS) - Limited umber of product types

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

The Institute of Chartered Accountants of Sri Lanka

The Institute of Chartered Accountants of Sri Lanka The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display

More information

Design of FPGA Based SPWM Single Phase Inverter

Design of FPGA Based SPWM Single Phase Inverter Proceedigs of MUCEET2009 Malaysia Techical Uiversities Coferece o Egieerig ad Techology Jue 20-22, 2009, MS Garde,Kuata, Pahag, Malaysia MUCEET2009 Desig of FPGA Based SPWM Sigle Phase Iverter Afarulrazi

More information

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n

x 1 + x x n n = x 1 x 2 + x x n n = x 2 x 3 + x x n n = x 3 x 5 + x x n = x n Sectio 6 7A Samplig Distributio of the Sample Meas To Create a Samplig Distributio of the Sample Meas take every possible sample of size from the distributio of x values ad the fid the mea of each sample

More information

Indoor Localization by Pattern Matching Method Based On Extended Database

Indoor Localization by Pattern Matching Method Based On Extended Database Vol:8, No:, Idoor Localizatio by atter Matchig Method Based O Exteded Database Gyumi Hwag, Jihog Lee Iteratioal Sciece Idex, Mechaical ad Mechatroics Egieerig Vol:8, No:, waset.org/ublicatio/9997 Abstract

More information

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015)

International Power, Electronics and Materials Engineering Conference (IPEMEC 2015) Iteratioal Power, Electroics ad Materials Egieerig Coferece (IPEMEC 205) etwork Mode based o Multi-commuicatio Mechaism Fa Yibi, Liu Zhifeg, Zhag Sheg, Li Yig Departmet of Military Fiace, Military Ecoomy

More information

Identifying poor performers while the process is running

Identifying poor performers while the process is running Idetifyig poor performers while the process is ruig KEYWORDS Michel Ruel P.E. Presidet, TOP Cotrol Ic 4734 Soseeahray Drive 49, Bel-Air St, #103 Hubertus, WI 53033 Levis Qc G6W 6K9 USA Caada mruel@topcotrol.com

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection

WSN Node Localization Regularization Algorithm Based on Quasi Optimal Criterion Parameter Selection Sesors & rasducers Vol. 23 Special Issue July 203 pp. 94-98 Sesors & rasducers 203 by IFSA http://www.sesorsportal.com WSN Node Localizatio Regularizatio Algorithm Based o Quasi Optimal Criterio Parameter

More information

Adaptive Fuzzy Color Interpolation

Adaptive Fuzzy Color Interpolation Joural of Electroic Imagig Vol. (3), July 00. Adaptive Fuzzy Color Iterpolatio Pig-Sig Tsai, Tiku Acharya,, Ajay K. Ray 3 Itel Corporatio Desktop Architecture Lab 5000 West Chadler Boulevard Mail Stop:

More information

Making sure metrics are meaningful

Making sure metrics are meaningful Makig sure metrics are meaigful Some thigs are quatifiable, but ot very useful CPU performace: MHz is ot the same as performace Cameras: Mega-Pixels is ot the same as quality Cosistet ad quatifiable metrics

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

CONTRIBUTION TO ADAPTIVE SAMPLING OF QoS PARAMETERS IN COMPUTER NETWORKS 1

CONTRIBUTION TO ADAPTIVE SAMPLING OF QoS PARAMETERS IN COMPUTER NETWORKS 1 Acta Electrotechica et Iformatica No., Vol. 6, 6 CONTRIBUTION TO ADAPTIVE SAMPLING OF QoS PARAMETERS IN COMPUTER NETWORKS * Jura GIERTL, * Fratišek JAKAB, * Já BAČA, ** Rudolf ANDOGA, *** Michal MIRILOVIČ

More information

Horizon 2020 Policy Support Facility

Horizon 2020 Policy Support Facility Horizo 2020 Policy Support Facility MLE o Evaluatio of Busiess R&D Grat Schemes: Behavioural chage i RD&I schemes Paul Cuigham Machester Istitute of Iovatio Research Pim de Hertog DIALOGIC Defiig behavioural

More information

BANDWIDTH AND GAIN ENHANCEMENT OF MULTIBAND FRACTAL ANTENNA BASED ON THE SIERPINSKI CARPET GEOMETRY

BANDWIDTH AND GAIN ENHANCEMENT OF MULTIBAND FRACTAL ANTENNA BASED ON THE SIERPINSKI CARPET GEOMETRY ISSN: 2229-6948(ONLINE) DOI: 10.21917/ijct.2013.0095 ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH 2013, VOLUME: 04, ISSUE: 01 BANDWIDTH AND GAIN ENHANCEMENT OF MULTIBAND FRACTAL ANTENNA BASED ON THE

More information

By: Pinank Shah. Date : 03/22/2006

By: Pinank Shah. Date : 03/22/2006 By: Piak Shah Date : 03/22/2006 What is Strai? What is Strai Gauge? Operatio of Strai Gauge Grid Patters Strai Gauge Istallatio Wheatstoe bridge Istrumetatio Amplifier Embedded system ad Strai Gauge Strai

More information

Application of Self-Organizing Map for analyzing robotic arm s action with Consciousness-Based Architecture module

Application of Self-Organizing Map for analyzing robotic arm s action with Consciousness-Based Architecture module Joural of Robotics, Networkig ad Artificial Life, Vol. 1, No. 2 (September 2014), 135-139 Applicatio of Self-Orgaizig Map for aalyzig robotic arm s actio with Cosciousess-Based Architecture module Wisau

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors

EMU-Synchronization Enhanced Mobile Underwater Networks for Assisting Time Synchronization Scheme in Sensors www.ijecs.i Iteratioal Joural Of Egieerig Ad Computer Sciece ISSN:319-74 Volume 4 Issue 3 March 015, Page No. 760-763 EMU-Sychroizatio Ehaced Mobile Uderwater Networks for Assistig ime Sychroizatio Scheme

More information

Voice Command Recognition System Based on MFCC and VQ Algorithms

Voice Command Recognition System Based on MFCC and VQ Algorithms Voice Commad Recogitio System Based o MFCC ad VQ Algorithms Mahdi Shaeh, ad Azizollah Taheri Abstract The goal of this project is to desig a system to recogitio voice commads. Most of voice recogitio systems

More information

Fast Sensor Deployment for Fusion-based Target Detection

Fast Sensor Deployment for Fusion-based Target Detection Fast Sesor Deploymet for Fusio-based Target Detectio Zhaohui Yua*, Rui Ta*, Guoliag Xig*, Cheyag Lu, Yixi Che *Departmet of Computer Sciece, City Uiversity of Hog Kog Departmet of Computer Sciece ad Egieerig,

More information

Novel Steganography System using Lucas Sequence

Novel Steganography System using Lucas Sequence Novel Stegaography System usig ucas Sequece Fahd Alharbi Faculty of Egieerig Kig Abdulaziz Uiversity Rabigh, KSA Abstract Stegaography is the process of embeddig data ito a media form such as image, voice,

More information

A Bipolar Cockcroft-Walton Voltage Multiplier for Gas Lasers

A Bipolar Cockcroft-Walton Voltage Multiplier for Gas Lasers America Joural of Applied cieces 4 (10): 79-799, 007 N 1546-99 007 ciece Publicatios orrespodig Author: A Bipolar ockcroft-walto Voltage Multiplier for Gas Lasers hahid qbal ad Rosli Besar Faculty of Egieerig

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

Technical Explanation for Counters

Technical Explanation for Counters Techical Explaatio for ers CSM_er_TG_E Itroductio What Is a er? A er is a device that couts the umber of objects or the umber of operatios. It is called a er because it couts the umber of ON/OFF sigals

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING

HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING HOW BAD RECEIVER COORDINATES CAN AFFECT GPS TIMING H. Chadsey U.S. Naval Observatory Washigto, D.C. 2392 Abstract May sources of error are possible whe GPS is used for time comparisos. Some of these mo

More information

Propositional Proofs in Frege and Extended Frege Systems (Abstract)

Propositional Proofs in Frege and Extended Frege Systems (Abstract) Propositioal Proofs i Frege ad Exteded Frege Systems (Abstract) Sam Buss Departmet of Mathematics Uiversity of Califoria, Sa Diego La Jolla, Califoria 92130-0112, USA sbuss@math.ucsd.edu http://math.ucsd.edu/~sbuss

More information

Preventive Maintenance and Breakdown Reduction of Critical Machines

Preventive Maintenance and Breakdown Reduction of Critical Machines Iteratioal Research Joural of Egieerig ad Techology (IRJET) e-issn: 2395-0056 Volume: 03 Issue: 06 Jue-2016 www.irjet.et p-issn: 2395-0072 Prevetive Maiteace ad Breakdow Reductio of Critical Machies Sathish

More information

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels

Comparison of Frequency Offset Estimation Methods for OFDM Burst Transmission in the Selective Fading Channels Compariso of Frequecy Offset Estimatio Methods for OFDM Burst Trasmissio i the Selective Fadig Chaels Zbigiew Długaszewski Istitute of Electroics ad Telecommuicatios Pozań Uiversity of Techology 60-965

More information

Intelligent location of two simultaneously active acoustic emission sources: Part II

Intelligent location of two simultaneously active acoustic emission sources: Part II 1 Itelliget locatio of two simultaeously active acoustic emissio sources: Part II Tadej Kosel ad Igor Grabec Faculty of Mechaical Egieerig, Uiversity of Ljubljaa, Aškerčeva 6, POB 394, SI-11 Ljubljaa,

More information

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches

A New Basic Unit for Cascaded Multilevel Inverters with the Capability of Reducing the Number of Switches Joural of Power Electroics, ol, o, pp 67-677, July 67 JPE --6 http://dxdoiorg/6/jpe67 I(Prit: 98-9 / I(Olie: 9-78 A ew Basic Uit for Cascaded Multi Iverters with the Capability of Reducig the umber of

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

Multisensor transducer based on a parallel fiber optic digital-to-analog converter

Multisensor transducer based on a parallel fiber optic digital-to-analog converter V Iteratioal Forum for Youg cietists "pace Egieerig" Multisesor trasducer based o a parallel fiber optic digital-to-aalog coverter Vladimir Grechishikov 1, Olga Teryaeva 1,*, ad Vyacheslav Aiev 1 1 amara

More information