Detection of Denial of Service attacks using AGURI
|
|
- Merryl Manning
- 6 years ago
- Views:
Transcription
1 Detetion of Denil of Servie ttks using AGURI Ryo Kizki Keio Univ. Kenjiro Cho SonyCSL Osmu Nkmur Keio Univ. Astrt Denil of Servie ttks is divided into two types, one is logi ttk nd the nother one is flooding ttk. Logi ttk exploits seurity holl of the softwre suh s operting system nd we server ugs, then uses system rsh or degrde in the performne. Logi ttk n e defended y upgrding softwre nd/or filtering prtiulr pket sequenes. Compring eh pkets of the flooding ttk nd the other norml ommunition trffis, the only differene is the numer of the pkets. Flooding ttk retes enormous mount of pkets. Therefore, to protet systems from flooding ttks, the sme method for logi ttks n not e used. During the network opertions, flooding ttk is usully deteted y using trffi monitoring tools suh s MRTG. However those tools will not detet the ttk utomtilly. In this pper, the method for utomti detetion of the flooding ttks is desried. For the monitoring tools, AGURI, tht we hve developed, is used. Using the trffi pttern ggregtion method, AGURI n monitor the trffis in long term nd detet flooding ttks. 1 Introdution Internet is the pket swithing network, shring the every resoures suh s the ndwidth of the links nd router s proessing unit. Resoure mngement should e done y every end node. For exmple, ongestion ontrols n e done only y end nodes. Denil of Servie ttks, espeilly flooding ttk, is ill ehvior on the end node. However urrent Internet does not hve ny mehnisms to ontrol this ill ehvior. During the network opertions, it is very importnt to detet the flooding ttks s soon s possile. After deteting the flooding ttks, opertors n tke severl tions suh s filtering the pkets from ill ehving hosts nd disovering the ttker. Denil of Servie ttks is divided into two types[1], one is logi ttk nd the nother one is flooding ttk. Logi ttk exploits seurity holl of the softwre suh s operting system nd we server ugs, then uses system rsh or degrde in the performne. Logi ttk n e defended y upgrding softwre nd/or filtering prtiulr pket sequenes. Compring eh pkets of the flooding ttk nd the other norml ommunition trffis, the only differene is the numer of the pkets. Flooding ttk retes enormous mount of pkets. Therefore, to protet systems from flooding ttks, the sme method for logik ttks n not e used. During the network opertions, flooding ttk is usully deteted y using trffi monitoring tools suh s MRTG[2]. However those tools will not detet the ttk utomtilly. In this pper, the method for utomtilly deteting the flooding ttks is desried. AGURI[3], tht we hve developed, is used s monitoring tool. Using the trffi pttern ggregtion method, AGURI n monitor the trffis in long term nd detets flooding ttks. 2 Trffi monitoring for flooding ttks There re severl types of flooding ttks. 1. the lrge numer of the ytes 2. the lrge numer of the pkets 3. pkets with ill ehvior protools suh s syn ttk The trffi with the lrge numer of the ytes for the single destintion degrdes the performne of the end system nd the routers tht swithing this trffi. And reent routers inur more dmges y reieving the lrge numer of pkets rther thn ytes. Tht trffi n e monitored y using SNMP[4]. MRTG is good grphi interfe for the deteting the unusul trffi. But it is not suffiient for deteting the flooding ttks. There is limittion of gthering the informtion using SNMP. The numer of the ytes nd the pkets for the eh interfe on the routers n e olleted. However the numer of the yte nd the pkets to the single hosts n not e olleted. If the ndwidth of the link ws oupied in generl ondition, prtiulr 1
2 ttks ould not e detet y using SNMP/MRTG monitoring, euse totl ndwidth of the link is not hnged. For deteting the flooding ttks, we should know the norml onditions of the networks. It needs for lrge numer of the trffi dt. SNMP is simple mehnisms for olleting the dt from the routers nd swithes. It is needed for ggregtion mehnisms for storing the dt. NeTrMet nd FlowSn whih re flow sed monitoring tools n monitor speifi type of the trffi, suh s numer of ytes nd pkets in long term on HTTP, FTP, IPv6 et. However these tools require the fixed rule sets. So those tools n not detet unexpeted trffi pttern. 3 AGURI AGURI is n ggregtion sed trffi profiler trgeted for long term mesuring. AGURI dpts itself to sptil trffi distriution y ggregting smll volume flows into its root. AGURI does not need pre-defined rule set nd is ple of deteting n unexpeted inrese of unknown pket ptterns or flooding ttks. Figure 1 shows the onept of ggregtion: smll entries re ggregted into its root. It is the si lgorithm of AGURI s ggregtion tht monitoring every pkets nd, t the end, ggregting entries whose ounter vlue is less thn n ggregtion threshold / / / / vlue is less thn n ggregtion threshold. For exmple, the filled dot /21 shows set of ggregted entries whose ounter vlue is less thn n ggregtion threshold nd whose IP ddress is inluded in ddress lok /21. Figure 2 shows n exmple of guri s summry output. A summry onsists of heder prt nd ody prt. The heder prt desries version, strt-time of profiling, end-time of profiling nd verge-rte of ll trffi. The heder prt strts with %. The ody prt ontins 4 profile types: 1. soure ip ddress 2. destintion ip ddress 3. soure protool 4. destintion protool %%!AGURI-1.0 %%StrtTime: Thu Mr 01 00:00: (2001/03/01 00:00:00) %%EndTime: Sun Apr 01 00:00: (2001/04/01 00:00:00) %AvgRte: 14.91Mps [sr ddress] (100.00%) / (1.76%/100.00%) / (4.14%/14.78%) / (4.12%/7.12%) / (1.96%/3.00%) / (1.04%/1.04%) / (2.02%/3.51%) / (1.49%/1.49%) / (2.85%/13.33%) / (3.95%/10.48%) / (4.06%/5.45%) / (1.38%/1.38%) (1.08%) / (4.26%/38.41%) / (1.78%/1.78%) / (4.72%/14.70%) / (2.35%/6.77%) (3.21%) / (1.21%/1.21%) (1.88%) / (4.59%/17.68%) / (2.51%/7.58%) (1.74%) (3.32%) / (3.29%/5.51%) / (1.07%/1.07%) / (1.15%/1.15%) / (5.66%/31.72%) / (2.32%/22.20%) / (2.82%/11.78%) (4.77%) (4.19%) / (3.08%/3.08%) / (3.86%/3.86%) %LRU hits: 86.82% (1021/1176) 10.0/ /16 Figure 2: Exmple of AGURI summry output / / Figure 1: ggregtion onept In figure 1, eh irle shows enteries nd its ounter volue is indited y its size. Eh filled dot shows sets of ggregted entries whose ounter In the ddress profile, eh row shows n ddress entry nd is indented y the prefix length.the first olumn shows the ddress nd the prefix length of the entries. The seond olumn shows the ulmultive yte ounts. The third olumn shows the perentges of the entry nd its sutrees. Using AGURI s sript, we n rhive summries with minimum disk spe. This enles long term mesurements. Thus, AGURI hieves long term trffi monitoring nd deteting hrteristi flows without pre 2
3 defined rule set. 4 Design For detetion of flooding ttks, this pper defines originl prmeter Devition(D) etween hrteristi of pket-ptten in long-term nd urrent hrteristi. If the prmeter D is high, we n guess urrent pket-pttern is unusul. Bsed on the ide, following 2 shemes re needed. long-term trffi rhiving nd urrent trffi monitoring method of lulting Devition(D) 4.1 long-term trffi monitoring We use AGURI to rhive hrteristi of trffi in long term. AGURI uses trffi profiling tehnique in whih reords re mintined in prefix sed tree ompt summry whih is produed y erntries. Figure3 shows tree struture of rhiving summries. In figure3, AGURI generte hourly summry A y ggregting minutes summries We n see vrious summries of time sle grnulrity. distne T1 Figure 4: Bsi model +(T 1[] T 2[]) 2 + (T 1[] T 2[]) 2 In this luls, T1[] is n expression of n verge throughput rte of node in T1. Defining node,,,...i,...,this luls led us to strt following luls. D = Σ(T 1[i] T 2[i]) 2 However, on rel trffi pttern using AGURI, few nodes re loted s sme position. We hve to onsider smeness of nodes in whih ggregted different depth. Figure 5 shows exmple whih nodes ggregted in tree struture with different depth. distne T2 yer month dy hour A T1 T2 Figure 5: Tree-struture of rel trffi minute Figure 3: rhiving struture of AGURI 4.2 Clultion of Devition This pper defines originl prmeter Devition(D) etween hrteristi of pket pttern in long term nd urrent hrteristi. Figure 4 shows si exmple to lultion of Devition. In Figure 4, T1 is trffi summry tree in long term nd T2 is urrent trffi summry tree. Distne is different node depth in tree struture., nd re expressions of node in the tree struure. In this si model: ll nodes re loted s sme position nd hve different vlue, Devition(D) n e lulted y the following luls. D = (T 1[] T 2[]) 2 If we hd fored to djust si model to this tree struture, there hd hd no reltions etween T1[] nd T2[], T1[] nd T2[]. However, it is nturlly expeted tht T1[] ontins T2[] nd T1[] is element of T2[]. Thus, we hve to onsider reltions etween T1[] nd T2[], T1[] nd T2[]. Figure 6 shows virtul rekdown ide to ompre different ggregted nodes in depth. T1 T2 Figure 6: Virul rekdown of ggregted node 3
4 Bsed on the virtul rekdown method, it hppen to reursive rekdown, using this method oth T1 to T2 nd T2 to T1 t the sme time. Therefore, we go through 2 phses. In first phse, reking down T2 sed on T1 tree struture.[d1] Seond phse is the other.[d2] Devition(D) n e lulted y following luls. D = Σ(T 1[i] T 2 [i]) 2 + Σ(T 1 [i] T 2[i]) 2 2 With the use of virtul rekdown ggregted node lgorithm, we n lulte Devition(D) from different ggregted nodes in tree struture.! # $ $ $ $ $ $ $ $ $! # $ $ $ $ $ $ Figure 8: Chrteristi of smple trffi t 14th Ot. 5 Evlution 5.1 Infomtion of smple dt We hve done smple evlution using 1 month long trffi dt from the WIDE Internet[5] kone. This trffi dt is tken from trns pifi link, whih ontins flooding ttks. Figure 7 shows monthly trffi pttern. This monthly smple dt ontins some flooding ttks. Espeily, in this evlution we hd foused t 14th Otoer.! #! # $ $ $ $ $ $ %! $ $ $ $ $ $ Figure 9: Chrteristi of smple trffi t 13:00-15:00 in 14th Ot. # # # # # # Figure 7: month # # # # # # # # # # # # # # # Chrteristi of smple trffi in Figure 8 shows 24 hours trffi pttern t 14th Otoer. This figure shows tht there ws flooding ttk ginst router1 nd router2. Figure 9 shows 2 hours trffi pttern t 13:00-15:00 14th Otoer. In Figure 9, router1 nd router2 re expression of eh routers interfe. These figures show detiled informtion whih is sed y flooding ttks. We n see tht flooding ttks strts t 13:16 nd ends t 14:36 towrd router1 nd router2. 1) Devition ompred with urrent 30 dys 2) Devition ompred with urrent 24 hours 3) Devition ompred with urrent 1 hours 4) Devition ompred with urrent 5 minutes Evluting flooding ttk detetion with Devition, we hd prepred 4 types of prmeters. In following 4 figures, Devitions re lulted sed on etween urrent 2 minutes trffi dte nd eh length of term. 1) Time series plot of Devition etween urrent 2 minutes nd urrent 30 dys (Figure 10) 5.2 Time grnultion We hve lulted the Devition of the urrent 2 minutes with 4 types of prmeters. Figure 10: Compred with 30 dys dt 4
5 ! Figure10 shows tht Devition is strongly relted to trffi ptterns tht onsist of pkets towrd router1 nd router2. 2) Time series plot of Devition etween urrent 2 minutes nd urrent 24 hours (Figure 11)! Figure 13: Compred with 5minutes dt Figure 11: Compred with 24hours dt Figure11 shows tht Devition is relted to trffi ptterns tht onsist of pkets towrd router1 nd router2. However, the reltions re grdully going down y ontinuing flooding ttks. 3) Time series plot of Devition etween urrent 2 minutes nd urrent 1 hour (Figure 12) Figure 12: Compred with 1 hour dt Figure12 shows tht long term flooding ttks use Devition to e going down, euse flooding ttks trffi would e ontined 1 hour trffi. 4) Time series plot of Devition etween urrent 2 minutes nd urrent 5 minutes (Figure 13) Figure13 shows tht long term flooding ttks use Devition to e going down nd tht the levels of Devition re very low in long term flooding ttks. Moreover, when flooding ttks end, Devition inreses rpidly, euse trffi dt for urrent 5 minutes ws full of flooding-ttk pkets. In figure 10, 11, 12 nd 13, when hrteristi of urrent 2 minutes dt ppers similr to hrteristi of long term dt,the levels of Devition is low. At the sme time, while hrteristi of urrent 2 minutes dt does not hve similr to hrteristi of long term dt, the levels of Devition is high. As ove, the method of Devition n oviously detet strt point of flooding ttks in ny time sle. However, in se of flooding ttks whih ontinue for long time, levels of Devition depend on length of time to whih ompres trffi dt. 6 Conlusion The utomti deteting method of the flooding ttks without fixed rules is proposed. The si onept is how to detet unusul trffi ptterns with devition etween usul ptterns nd reent. The trffi monitoring tool AGURI tht hs een developed y our projet, is very useful to relize the hrteristis of the trffi pttern, euse AGURI n ggregte the trffi dt without disrding the trffi hrteristis. Algorithm of virtul rekdown ggregted node in the tree is very powerful to lulte devition of the trffis. In this pper, we provided the simple evlution of our method, using rel trffi dt whih tken form WIDE Internet kone. The flooding ttks n e deteted with ig devition vlue. More detiled evlution suh s proility on wrong detetion should e done in future reserh. Referenes [1] R.Needhm, Denil of Servie: An Exmple, Communitions of the ACM volume 37, Novemer 1994 [2] Oethker, Tois, MRTG - The Multi Router Trffi Grpher, USENIX System Administrtion Conferene, Deemer 1998 [3] Kenjiro Cho, Ryo Kizki, Akir Kto, AGURI: An Aggregtion-Bsed Trffi Profiler, QofIS2001, Septemer 2001 [4] J.Cse, M.Fedor, M.Shoffstll, K.Dvin, A Simple Network Mngemet Protool(SNMP), RFC1157, My 1990 [5] WIDE Projet,, 5
COMPUTER NETWORK DESIGN Network layer protocols
OMPUTER NETWORK ESIGN Network lyer protools Network lyer (lyer 3) Gruppo Reti TL nome.ognome@polito.it http://www.telemti.polito.it/ OMPUTER NETWORK ESIGN Review of network lyer protools - opyright This
More informationMacroscopic and Microscopic Springs Procedure
Mrosopi nd Mirosopi Springs Proedure OBJECTIVE Purpose In this l you will: investigte the spring-like properties of stright wire, disover the strethiness of mteril, independent of the size nd shpe of n
More informationProbability and Statistics P(A) Mathletics Instant Workbooks. Copyright
Proility nd Sttistis Student Book - Series K- P(A) Mthletis Instnt Workooks Copyright Student Book - Series K Contents Topis Topi - Review of simple proility Topi - Tree digrms Topi - Proility trees Topi
More informationResistors, Current and Voltage measurements, Ohm s law, Kirchhoff s first and second law. Kirchhoff s first Objectives:
EE -050 Ciruit L Experiment # esistors, Current nd Voltge mesurements, Ohm s lw, Kirhhoff s first nd seond lw. Kirhhoff s first Ojetives: Slmn in Adul Aziz University Eletril Engineering Deprtment. Fmiliriztion
More information(1) Primary Trigonometric Ratios (SOH CAH TOA): Given a right triangle OPQ with acute angle, we have the following trig ratios: ADJ
Tringles nd Trigonometry Prepred y: S diyy Hendrikson Nme: Dte: Suppose we were sked to solve the following tringles: Notie tht eh tringle hs missing informtion, whih inludes side lengths nd ngles. When
More informationPatterns and Algebra
Student Book Series D Mthletis Instnt Workooks Copyright Series D Contents Topi Ptterns nd funtions identifying nd reting ptterns skip ounting ompleting nd desriing ptterns numer ptterns in tles growing
More informationSimulation of a zero-sequence relay for a distribution network with EMTP-RV Discrimination between fault current and magnetizing inrush current
imultion of zero-sequene rely for distriution network with MTP-RV Disrimintion etween fult urrent nd mgnetizing inrush urrent M. Petit, P. Bstrd Astrt-- The zero-sequene relys re widely used to protet
More informationISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL
MN-ISM-PRO-E www.insize.om ISM-PRO SOFTWARE DIGITAL MICROSCOPE OPERATION MANUAL Desription Clik Next. As the following piture: ISM-PRO softwre is for ISM-PM00SA, ISM-PM600SA, ISM- PM60L digitl mirosopes.
More informationSLOVAK UNIVERSITY OF TECHNOLOGY Faculty of Material Science and Technology in Trnava. ELECTRICAL ENGINEERING AND ELECTRONICS Laboratory exercises
SLOVAK UNIVERSITY OF TECHNOLOGY Fulty of Mteril Siene nd Tehnology in Trnv ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory exerises Róbert Riedlmjer TRNAVA 00 ELECTRICAL ENGINEERING AND ELECTRONICS Lbortory
More informationAnalog Input Modules
7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,
More informationAGA56... Analog Input Modules. Siemens Building Technologies HVAC Products
7 922 nlog Input odules G56... nlog input modules for the ontrol of SQ5... ir dmper tutors y ontinuous nlog ontrol signls, suh s 4...20 m, nd ontinuous nlog position feedk signls. For supplementry Dt Sheets,
More informationA Development of Embedded System for Speed Control of Hydraulic Motor
AISTPME (2011) 4(4): 35-39 A Development of Embedded System for Speed Control of Hydruli Motor Pornjit P. Edutionl Mehtronis Reserh Group Deprtment of Teher Trining in Mehnil Engineering, KMUTN, ngkok,
More informationALONG with the maturity of mobile cloud computing,
An Optiml Offloding Prtitioning Algorithm in Moile Cloud Computing Huming Wu, Dniel Seidenstüker, Yi Sun, Crlos Mrtín Nieto, Willim Knottenelt, nd Ktink Wolter system, nd their min gol is to keep the whole
More informationChanging the routing protocol without transient loops
Chnging the routing protool without trnsient loops Nny Rhkiy, Alexnre Guitton To ite this version: Nny Rhkiy, Alexnre Guitton. Chnging the routing protool without trnsient loops. Computer Communitions,
More informationTRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION)
IJRET: Interntionl Journl of Reserh in Engineering nd Tehnology ISSN: 2319-1163 TRANSIENT VOLTAGE DISTRIBUTION IN TRANSFORMER WINDING (EXPERIMENTAL INVESTIGATION) Knhn Rni 1, R. S. Goryn 2 1 M.teh Student,
More informationMcAfee Network Security Platform
M-6030 Sensor Quik Strt Guide Revision B MAfee Network Seurity Pltform This Quik Strt Guide explins how to quikly set up nd tivte your MAfee Network Seurity Pltform [formerly MAfee IntruShield ] M-6030
More informationGLONASS PhaseRange biases in RTK processing
ASS PhseRnge ises in RTK proessing Gle Zyrynov Ashteh Workshop on GSS Bises 202 Bern Switzerlnd Jnury 8-9 202 Sope Simplified oservtion models for Simplified oservtion models for ASS FDMA speifi: lok nd
More informationBalancing Your Life. Ideas that might help you
Blning Your Life Ides tht might help you Pul Hoskin Summer 2007 Let s e honest if one lists off the responsiilities nd hoies tht eh of us hve nd ssigns weekly hourly time tht eh needs to e fulfilled, then
More informationMcAfee Network Security Platform
M-2750 Sensor Quik Strt Guide Revision B MAfee Network Seurity Pltform This Quik Strt Guide explins how to quikly set up nd tivte your MAfee Network Seurity Pltform M-2750 Sensor in in-line mode. Cling
More informationThe Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.
Remenyte-Presott, Rs nd Andrews, John (27) Prime implints for modulrised non-oherent fult trees using inry deision digrms. Interntionl Journl of Reliility nd Sfety, (4). pp. 446-464. ISSN 479-393 Aess
More informationDigital Simulation of an Interline Dynamic Voltage Restorer for Voltage Compensation
JOURNL OF ENGINEERING RESERH ND TEHNOLOGY, VOLUME 1, ISSUE 4, DEEMER 214 Digitl Simultion of n Interline Dynmi Voltge Restorer for Voltge ompenstion Dr.P.Ush Rni R.M.D.Engineering ollege, henni, pushrni71@yhoo.om
More informationMultivariable integration. Multivariable integration. Iterated integration
Multivrible integrtion Multivrible integrtion Integrtion is ment to nswer the question how muh, depending on the problem nd how we set up the integrl we n be finding how muh volume, how muh surfe re, how
More informationThe PWM switch model introduced by Vatché Vorpérian in 1986 describes a way to model a voltage-mode switching converter with the VM-PWM switch model.
The PWM swith model introdued by Vthé Vorpérin in 1986 desribes wy to model voltge-mode swithing onverter with the VM-PWM swith model. The lrge-signl model is equivlent to d trnsformer whose turns rtio
More informationMulti-beam antennas in a broadband wireless access system
Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,
More informationInstallation manual. Daikin Altherma LAN adapter BRP069A61 BRP069A62. Installation manual Daikin Altherma LAN adapter. English
Instlltion mnul Dikin Altherm LAN dpter BRP069A6 BRP069A6 Instlltion mnul Dikin Altherm LAN dpter English Tle of ontents Tle of ontents Aout the doumenttion. Aout this doument... Aout the produt. Comptiility....
More information3/8" Square Multi-Turn Cermet Trimmer
Vishy Sfernie 3/8" Squre Multi-Turn Cermet Trimmer FEATURES Industril grde W t 70 C The T93 is smll size trimmer - 3/8" x 3/8" x 3/16" - nswering PC ord mounting requirements. Five versions re ville whih
More informationEvaluating territories of Go positions with capturing races
Gmes of No Chne 4 MSRI Pulitions Volume 63, 2015 Evluting territories of Go positions with pturing res TEIGO NAKAMURA In nlysing pturing res, or semeis, we hve een fousing on the method to find whih plyer
More information8.1. The Sine Law. Investigate. Tools
8.1 Te Sine Lw Mimi 50 ermud Tringle ermud 1600 km Sn Jun 74 Puerto Rio Te ermud Tringle, in te nort tlnti Oen, is te lotion of severl unexplined plne nd sip disppernes. Vrious teories ve een suggested
More informationEBU KNOCKOUT COMPETITIONS
EBU KNOCKOUT COMPETITIONS GENERAL REGULATIONS 1 INTRODUCTION Vrious regultions pply to ll English Bridge Union ompetitions tht involve mthes plyed privtely. These ompetitions omprise: The knokout stges
More informationProgramming Guide. Neurostimulators for Chronic Pain. RestoreSensor, RestoreUltra, RestoreAdvanced, and PrimeAdvanced
Progrmming Guide Neurostimultors for Chroni Pin RestoreSensor, RestoreUltr, RestoreAdvned, nd PrimeAdvned For use with SureSn MRI nd erlier non-suresn Neurostimultion Systems. Overview This guide desries
More informationThe Effects of Interference Suppression by a Reconfigurable Structure at DSSS-DPSK Receiver
494 N. MIOŠEVIĆ, Z. NIKOIĆ, B. DIMITRIJEVIĆ, B. NIKOIĆ, THE EFFECTS OF INTERFERENCE SUPPRESSION The Effets of Interferene Suppression y Reonfigure Struture t DSSS-DPSK Reeiver Nend MIOŠEVIĆ, Zori NIKOIĆ,
More informationPearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world
Person Edution Limited Edinurgh Gte Hrlow Essex M20 2JE Englnd nd ssoited ompnies throughout the world Visit us on the World Wide We t: www.personed.o.uk Person Edution Limited 2014 ll rights reserved.
More informationNotes on Spherical Triangles
Notes on Spheril Tringles In order to undertke lultions on the elestil sphere, whether for the purposes of stronomy, nvigtion or designing sundils, some understnding of spheril tringles is essentil. The
More informationComparison of SVPWM and SPWM Techniques for Back to Back Converters in PSCAD
, 35 Otoer, 03, Sn Frniso, USA Comprison of SVPWM nd SPWM Tehniques for Bk to Bk Converters in PSCAD Agustin Hernndez, Ruen Tpi, Memer, IAENG, Omr Aguilr, nd Ael Gri Astrt This rtile presents the simultion
More informationJoanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office
. TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding
More informationURL: mber=
Wijnhoven, T.; Deonink, G., "Flexile fult urrent ontriution with inverter interfed distriuted genertion," in IEEE Power nd Energy Soiety Generl Meeting (PES), Vnouver, BC, Cnd, -5 July, 5 p. doi:.9/pesmg..66769
More informationPublished in: Wireless Communications and Networking Conference, IEEE WCNC 2009
Alorg Universitet Cross-Lyer Optimiztion of Multipoint Messge Brodst in MANETs Nielsen, Jimmy Jessen; Grønæk, Lrs Jesper; Renier, Thiult Julien; Shwefel, Hns- Peter; Toftegrd, Thoms Pulished in: Wireless
More informationDesign of Miniaturized 10 db Wideband Branch Line Coupler Using Dual Feed and T-Shape Transmission Lines
RADIOENGINEERING, VOL. 27, NO. 1, APRIL 2018 207 Design of Miniturized 10 db Widend Brnh Line Coupler Using Dul Feed nd T-Shpe Trnsmission Lines Mukesh KUMAR, SK. Nurul ISLAM, Goind SEN, Susnt Kumr PARUI,
More information3/8" Square Multi-Turn Cermet Trimmer
www.vishy.om 3/8" Squre Multi-Turn Cermet Trimmer Vishy Sfernie ermet element. FEATURES Industril grde The is smll size trimmer - 3/8" x 3/8" x 3/16" - nswering PC ord mounting requirements. Five versions
More informationMODELING OF SEPIC FED PMBLDC MOTOR FOR TORQUE RIPPLE MINIMIZATION
ODEING OF SEPIC FED PBDC OOR FOR ORQUE RIPPE INIIZAION N.kshmipriy.E.,Assistnt Professor Deprtment of EEE Jy Shrirm Group of Institution, irupur, Indi lkshmipriyme9@gmil.om S.nivel.E.,Assistnt Professor
More informationComparison of Geometry-Based Transformer Iron- Core Models for Inrush-Current and Residual-Flux Calculations
omprison of Geometry-Bsed Trnsformer Iron- ore Models for Inrush-urrent nd Residul-Flux lultions R. Yonezw, T. Nod Astrt--When trnsformer is energized, oltge drop is osered due to the inrush urrents. An
More informationSolutions to exercise 1 in ETS052 Computer Communication
Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then
More informationINSTALLATION & OPERATION INSTRUCTIONS LEVER HANDLE LOCKSETS.
INSTALLATION & OPERATION INSTRUCTIONS FOR LEVER HANDLE LOCKSETS 999-00333E_EN FOR BRINKS HOME SECURITY INTERIOR LOCKING & NON-LOCKING LEVER HANDLE LOCKSETS. FITS DOORS 1-3/8" (35 mm) TO 1-3/4" (45 mm)
More informationSAMPLE. End of term: TEST A. Year 4. Name Class Date. Complete the missing numbers in the sequences below.
End of term: TEST A You will need penil nd ruler. Yer Nme Clss Dte 2 Complete the missing numers in the sequenes elow. 50 25 00 75 8 30 3 28 2 9 Put irle round two of the shpes elow whih hve 3 shded. 3
More information1/4" Multi-Turn Fully Sealed Container Cermet Trimmer
www.vishy.om Vishy Sfernie 1/4" Multi-Turn Fully Seled Continer Cermet Trimmer Due to their squre shpe nd smll size (6.8 mm x 6.8 mm x 5 mm), the multi-turn trimmers of the series re idelly suited for
More informationQUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE
Europen Journl of Mthemtis nd Computer Siene Vol. No., 7 ISSN 59-995 QUANTUM SECRET SHARING VIA FOUR PARTICLE ASYMMETRIC ENTANGLED STATE Pn-ru Zho, Yun-jing Zhou, Jin-wei Zho, Ling-shn Xu, Yun-hong To
More informationAutomatic Strategy Verification for Hex
utomti Strtegy Verifition for Hex Ryn B. Hywrd, Broderik rneson, nd Philip Henderson Deprtment of Computing Siene, University of lert, Edmonton, Cnd {hywrd,roderi,ph}@s.ulert. strt. We present onise nd/or-tree
More informationABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC
User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...
More informationECE 274 Digital Logic Spring Digital Design. Combinational Logic Design Process and Common Combinational Components Digital Design
ECE 27 Digitl Logi Spring 29 Comintionl Logi Design Proess n Common Comintionl Components Digitl Design 2.7 2. Digitl Design Chpter 2: Comintionl Logi Design Slies to ompn the tetook Digitl Design, irst
More informationPOWER TRIM. Table of Contents. Section 5C - Dual Power Trim System
SERVICE MANUAL NUMBER 28 Tle of Contents POWER TRIM Setion 5C - Dul Power Trim System DUAL POWER TRIM SYSTEM Lurints / Selnts / Adhesives..... 5C-2 Importnt Informtion................ 5C-2 Testing Dul
More informationSERVICE MANUAL 9940/20/10
9940/0/0 9/0/00 Tle of ontents REMOVING THE EXTERIOR PARTS... A. Light Cover... B. Bse... C. Top Cover (Flp)... 4 D. Hinge Cover... 4 E. Thred Tension Cover... 4 F. Side Enlosure... 5 G. Hndle nd Unit
More information1/4" Multi-Turn Fully Sealed Container Cermet Trimmer
1/4" Multi-Turn Fully Seled Continer Cermet Trimmer Due to their squre shpe nd smll size (6.8 mm x 6.8 mm x 5 mm), the multi-turn trimmers of the series re idelly suited for PCB use, enling high density
More informationCAL. NX15 DUO-DISPLAY QUARTZ
L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode
More informationMath Circles Finite Automata Question Sheet 3 (Solutions)
Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how
More informationIntegration Strategy for Fast-Chargers in Existing Power Grid
0 ETS M.S. Thesis Mster of Siene in Sustinle Energy - Eletril Energy Systems Integrtion Strtegy for Fst-hrgers in Existing Power Grid Frederik Willim indner Kongens Lyngy 2016 DTU Eletril Engineering Deprtment
More informationArtificial Neural Network Based Backup Differential Protection of Generator-Transformer Unit
Interntionl Journl of Eletronis nd Eletril Engineering Vol. 3, No. 6, Deemer 05 rtifiil Neurl Network sed kup Differentil Protetion of Genertor-Trnsformer Unit H. lg nd D. N. Vishwkrm Deprtment of Eletril
More informationThe Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center
Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition
More informationComputers and Mathematics with Applications. An evaluation study of clustering algorithms in the scope of user communities assessment
Computers nd Mthemtis with Applitions 58 (29) 198 1519 Contents lists ville t SieneDiret Computers nd Mthemtis with Applitions journl homepge: www.elsevier.om/lote/mw An evlution study of lustering lgorithms
More informationMixed CMOS PTL Adders
Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde
More informationInteraction Analysis in Islanded Power Systems with HVDC Interconnections
3rd Interntionl Hyrid Power Systems Workshop Tenerife, Spin 8 9 My 218 Intertion Anlysis in Islnded Power Systems with HVDC Interonnetions Crlos Colldos-Rodríguez, Edurdo Prieto-Arujo, Mr Cheh-Mne, Rird
More informationSection 6.1 Law of Sines. Notes. Oblique Triangles - triangles that have no right angles. A c. A is acute. A is obtuse
Setion 6.1 Lw of Sines Notes. Olique Tringles - tringles tht hve no right ngles h is ute h is otuse Lw of Sines - If is tringle with sides,, nd, then sin = sin = sin or sin = sin = sin The miguous se (SS)
More informationAbdominal Wound Closure Forceps
Inventor: Crlson, Mrk A. My 25, 2007 Adominl Wound Closure Foreps Astrt. The devie is modifition of stndrd tissue foreps for use during losure of dominl wounds mde for surgil proedure. The modifition onsists
More informationFubini for continuous functions over intervals
Fuini for ontinuous funtions over intervls We first prove the following theorem for ontinuous funtions. Theorem. Let f(x) e ontinuous on ompt intervl =[, [,. Then [, [, [ [ f(x, y)(x, y) = f(x, y)y x =
More informationU N I V E R S I T Y. Toward Gbps Cryptographic Architectures. Ramesh Karri, Piyush Mishra, Igor Minkin Kaiji Wu, Khary Alexander, Xuan Li
Polytehni U N I V E R S I T Y Towrd - Gps Cryptogrphi Arhitetures Rmesh Krri, Piyush Mishr, Igor Minkin Kiji Wu, Khry Alexnder, Xun Li Otoer 22 WICAT TR 2-5 Towrds - Gps Cryptogrphi Arhitetures Khry Alexnder!,
More informationApplications of a New Property of Conics to Architecture: An Alternative Design Project for Rio de Janeiro Metropolitan Cathedral
Jun V. Mrtín Zorrquino Frneso Grnero odrígue José uis Cno Mrtín Applitions of New Property of Conis to Arhiteture: An Alterntive Design Projet for io de Jneiro Metropolitn Cthedrl This pper desries the
More information10.4 AREAS AND LENGTHS IN POLAR COORDINATES
65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the
More informationQuestion Paper Wednesday 13 Thursday 14 January 2010
KEY SKILLS INFORMATION AND COMMUNICATION TECHNOLOGY Level 3 ArtComp [KSI31] Question Pper Wenesy 13 Thursy 14 Jnury 2010 Do NOT open this Question Pper until you re tol to y the invigiltor THERE ARE THREE
More informationAvailable online at ScienceDirect. Procedia Engineering 89 (2014 )
Aville online t www.sciencedirect.com ScienceDirect Procedi Engineering 89 (2014 ) 411 417 16th Conference on Wter Distriution System Anlysis, WDSA 2014 A New Indictor for Rel-Time Lek Detection in Wter
More informationStudy of WiMAX Based Communication Channel Effects on the Ciphered Image Using MAES Algorithm
Stuy of WiMAX Bse Communition Chnnel Effets on the Ciphere Imge Using MAES Algorithm Ahme G. Wy, Slim M. Wi, Hyer J. Mohmme Ali A. Aullh Communitions Tehs. Engineering Deprtment, Al-Furt Alwst Tehnil University,
More informationMAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES
MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion
More informationGeometric quantities for polar curves
Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions
More information7 8 9 0 OFFIE ROOF,000 SF /.7 RES VLLO TOWN ENTER OWNER - VLLO PROPERTY OWNER LL. 9 PGE MILL ROD, PLO LTO, 90 T. 0--00 RHITETURE - RFEL VINOLY RHITETS 0 VNDM STREET, NEW YORK, NY 00 T. -9-00 LOK 0 - PRIVTE
More informationA Low Power Parallel Sequential Decoder for Convolutional Codes
Int. J. Com. Dig. Sys. 2, No. 2, 95-(23) 95 Interntionl Journl of Computing n Digitl Systems http://x.oi.org/.2785/ijs/226 @ 23 UOB SPC, University of Bhrin A Low Power Prllel Sequentil Deoer for Convolutionl
More informationA New Control for Series Compensation of UPQC to Improve Voltage Sag/Swell
AUT Journl of Modeling nd Simultion AUT J. Model. Simul., 49()(7)7584 DOI:.6/misj.6.843 A New Control for Series Compenstion of to Improve oltge Sg/Swell M. Torin Esfhni, nd B. hidi Dept. of Eletril Engineering,
More informationDynamic analysis of inverter dominated unbalanced LV micro-grids
Dynmi nlysis of inverter dominted unlned LV miro-grids N. L. Soultnis, A. I. Tsouhniks, N. D. Htzirgyriou, J. Mhseredjin Astrt This pper presents simultion of the dynmi ehvior of low voltge miro-grids
More informationMinCounter: An Efficient Cuckoo Hashing Scheme for Cloud Storage Systems
MinCounter: An Effiient Cukoo Hshing Sheme for Cloud Storge Systems Yunyun Sun Yu Hu Dn Feng Ling Yng Pengfei Zuo Shunde Co Wuhn Ntionl L for Optoeletronis, Shool of Computer Huzhong University of Siene
More informationIMPROVING THE RELIABILITY OF THREE PHASE INVERTER BASE ON CUK CONVERTER FOR PV APPLICATION
MPRONG TE RELABLTY OF TREE PASE NERTER BASE ON CUK CONERTER FOR P APPLCATON inyk Bhgwn Kshid M. Teh (Eletril Power System) Rjrmpu nstitute of Tehnology Mhrshtr, ndi Prof..T.Jdhv Deprtment of Eletril Engineering
More informationImproved sensorless control of a permanent magnet machine using fundamental pulse width modulation excitation
Pulished in IET Eletri Power Applitions Reeived on 19th April 2010 Revised on 27th July 2010 doi: 10.1049/iet-ep.2010.0108 Improved sensorless ontrol of permnent mgnet mhine using fundmentl pulse wih modultion
More informationMultilevel Inverter with Less Number of Isolated dc Bus Voltages
Interntionl Journl of Engineering & ehnology IJE-IJENS ol: No: 8 Multileel Inerter with Less Numer of Isolted Bus oltges Mhrous E. Ahmed, Htim Ghzi M. Zini Fulty of Engineering, if Uniersity, KSA mehmed7@ieee.org
More informationLecture 16. Double integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Leture 16 Double integrls Dn Nihols nihols@mth.umss.edu MATH 233, Spring 218 University of Msshusetts Mrh 27, 218 (2) iemnn sums for funtions of one vrible Let f(x) on [, b]. We n estimte the re under
More informationarxiv: v1 [cs.it] 16 Nov 2017
Sptio-Temporl Motifs for Optimize Vehile-to-Vehile (V2V) Communitions Tenghn Zeng, Omi Semiri, n Wli S Wireless@VT, Brley Deprtment of Eletril n Computer Engineering, Virgini Teh, Blksurg, VA, USA Emils:{tenghn,
More information(1) Non-linear system
Liner vs. non-liner systems in impednce mesurements I INTRODUCTION Electrochemicl Impednce Spectroscopy (EIS) is n interesting tool devoted to the study of liner systems. However, electrochemicl systems
More informationSeamless Integration of SER in Rewiring-Based Design Space Exploration
Semless Integrtion of SER in Rewiring-Bsed Design Spe Explortion Soeeh Almukhizim* & Yiorgos Mkris Eletril Engineering Dept. Yle University New Hven, CT 62, USA Astrt Rewiring hs een used extensively for
More informationThe Discussion of this exercise covers the following points:
Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI
More informationTHe overall performance and the cost of the heating
Journl of Eletril Engineering Spe etor Modultion For Three Phse ndution Dieletri Heting Y B Shukl nd S K Joshi Deprtment of Eletril Engineering The M.S.University of Brod dodr, ndi, e-mil : yshukl@yhoo.om,
More informationCHAPTER 3 AMPLIFIER DESIGN TECHNIQUES
CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.
More informationDataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)
The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:
More information& Y Connected resistors, Light emitting diode.
& Y Connected resistors, Light emitting diode. Experiment # 02 Ojectives: To get some hndson experience with the physicl instruments. To investigte the equivlent resistors, nd Y connected resistors, nd
More informationPERFORMANCE PREDICTION OF A NEW CONNECTION FOR DUAL VOLTAGE OPERATION OF SINGLE PHASE CAPACITOR RUN MOTOR
Journl o letril ngineering PRFORMANC PRDCTON OF A NW CONNCTON FOR DUAL VOLTAG OPRATON OF SNGL PHAS CAPACTOR RUN MOTOR H. H. Hny letril power nd hines Dept., Fulty o ngineering, Ciro University, Giz-gypt.
More informationRECENT progress in fabrication makes the practical application. Logic Synthesis for Quantum Computing. arxiv: v1 [quant-ph] 8 Jun 2017
Logi Synthesis for Quntum Computing Mthis Soeken, Mrtin Roetteler, Nthn Wiee, nd Giovnni De Miheli rxiv:76.7v [qunt-ph] 8 Jun 7 Astrt Tody s rpid dvnes in the physil implementtion of quntum omputers ll
More information3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 9, SEPTEMBER Optimal Algorithms for Near-Hitless Network Restoration via Diversity Coding
3878 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO. 9, SEPTEMBER 23 Optiml Algorithms for Ner-Hitless Network Restortion vi Diversity Coing Serht Nzim Avi, Stuent Memer, IEEE, n Ener Aynoglu, Fellow,
More informationITEC2620 Introduction to Data Structures
/5/20 ITEC220 Introdution to Dt Strutures Leture 0 Gme Trees Two-Plyer Gmes Rules for gme define the sttespe Nodes re gme sttes Links re possile moves Build serh tree y rute fore Exmple I Exmple II A Our
More informationECE 274 Digital Logic Fall Digital Design. RTL Design RTL Design Method: Preview Example. RTL Design RTL Design Method
ECE 274 igitl ogi Fll 2 ntroution to igitl eign 5. 5.2 igitl eign Chpter 5: lie to ompny the textbook igitl eign, Firt Eition, by Frnk Vhi, John Wiley n on Publiher, 27. http://www.vhi.om Copyright 27
More informationKirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):
SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween
More informationVOLTAGE SAG IMPROVEMENT BY PARTICLE SWARM OPTIMIZATION OF FUZZY LOGIC RULE BASE
VOL., NO. 7, PRIL 206 ISSN 89-6608 RPN Journl of Engineering nd pplied Sienes 2006-206 sin Reserh Pulishing Network (RPN). ll rights reserved. VOLTGE SG IMPROVEMENT Y PRTILE SWRM OPTIMIZTION OF FUZZY LOGI
More informationA Secure Localization Method in Wireless Sensor Network
Vol. 1(3), Ot. 2015, pp. 212-219 A Seure Loliztion Metho in Wireless Sensor Network Mrym Mirzei, Mohmm Rotmili n Mehi Khlili Dept. of Computer n Informtis Engineering, Pym Noor University, Tehrn, Irn *Corresponing
More informationAsynchronous Circuits
Asynhronous Ciruits Mithm Shms Deprtment of Eletril nd Computer Engineering University ofwterloo, Wterloo, Ont, CANADA Jo C. Eergen Sun Mirosystems Lortories Mountin View, CA, USA Mohmed I. Elmsry Deprtment
More informationUnderstanding Three-Phase Transformers
PDH ourse E450 (4 PDH) Understnding Three-Phse Trnsformers Rlph Fehr, Ph.D., P.E. 2014 PDH Online PDH enter 5272 Medow Esttes Drive Firfx, V 22030-6658 Phone & Fx: 703-988-0088 www.pdhonline.org www.pdhenter.om
More informationComparison of Minimising Total Harmonic Distortion with PI Controller, Fuzzy Logic Controller, BFO- fuzzy Logic Controlled Dynamic Voltage Restorer
Interntionl Journl of Eletroni nd Eletril Engineering. ISSN 974-274, Volume 7, Numer 3 (24), pp. 299-36 Interntionl Reserh Pulition House http://www.irphouse.om omprison of Minimising Totl Hrmoni Distortion
More information