Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal pro...
详细信息
Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal problem formulation for this optimization problem, and propose a decentralized, dynamic sensor activation protocol for meeting this goal. We analyze the behavior of the activation protocol using an epidemiology-based approach and derive analytical expressions for the system performance metrics, namely, operational cost, detection delay, probability of false alarms and probability of detection. We analyze the interdependency between the performance metrics.
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as ene...
详细信息
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as energy utilization, detection delay, and false alarm characteristics, have been studied in the literature, the effect of spatial correlation of sensor readings on the network performance has not hitherto been studied. Because chemical tracers dispersing in the turbulent atmosphere are inherently spatially correlated, understanding how such correlations impact on the network performance is vital for chemical sensor network optimization. In this paper we investigate the impact of spatial correlation on the performance of chemical sensor networks.
Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication,...
详细信息
Recent years have seen substantial development in computer and network security design. This has been manifested as an every increasing range of new protocols, new encryption algorithms, new methods of authentication, smarter firewalls and intrusion detection techniques, new anti-malware products and many more. During the same period of time increasing demands for more trustworthy network infrastructure have seen the development of sophisticated analysis tools necessary to meet the operational requirements of law enforcement agencies. These include tools for e-discovery, commercial intelligence and national security. Thus the industry has seen equally significant developments in computer forensic tools where methods of searching for and detection of, malicious activity for presentation as evidence and provision of trust have become ever more sophisticated. To a considerable degree the science of security and forensics have seen both rapid but separate developments. This paper proposes that there are areas in common between these two important fields of endeavour and sets out techniques and ideas which demonstrate how they can overlap and work together in order to provide improved security and trustworthiness in critical infrastructures. In particular this paper addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in a manner which supports real-time security and at the same time still meeting the requirements of sound evidence.
This paper describes how scrum method was customized for outsourced e-commerce software projects. While the waterfall process was used in the past, outsourced projects experienced more delays and failures than the one...
详细信息
This paper describes how scrum method was customized for outsourced e-commerce software projects. While the waterfall process was used in the past, outsourced projects experienced more delays and failures than the ones conducted in-house. To overcome such limitations, we decided to tailor the scrum method on three aspects: First, we produced a table that explains roles and responsibilities of project team members for every phase of the Scrum methodology. Second, we divided sprint planning into two phases, a master sprint plan and individual sprint plans. Finally, we monitored project progress based on the number of completed web pages. Application of the modified scrum method on two projects not only improved product quality but also reduced time necessary to complete the project. More than 80% of the software engineers also expressed satisfaction of the proposed approach.
This paper proposes a Friend-based security scheme for efficient routing in mobile networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real l...
详细信息
ISBN:
(纸本)9781565553415
This paper proposes a Friend-based security scheme for efficient routing in mobile networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real life scenarios. The algorithm provides authentication of nodes by sending challenges and creating friend lists of nodes that complete the challenge. Friends are rated on the basis of the amount of data they transfer through themselves and according to the rating of other friends, which is obtained during the friend list sharing process. The data is finally routed through the route with the greatest number of trusted friends. One of the greatest advantages of this technique is that the nodes do not need to work in the promiscuous mode. The information about the malicious nodes is gathered effectively by using challenges. This reduces the overhead on the network significantly. Through various simulation experiments it has been found that the proposed algorithm works very efficiently in terms of detecting the malicious nodes and also allowing lesser number of packets to be routed through these detected malicious nodes.
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decen...
详细信息
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decentralized dynamic sensor activation protocol that aims to maintain a majority of sensors in the inactive (passive) state in the absence of a chemical attack, and rapidly activate the sensors when an attack is detected. This paper proposes two analytical models to study the behavior of the sensor network under the proposed protocol. Our first analytical model employs the known analogy between the information spread in a sensor network and the propagation of epidemics across a population. The second model describes the protocol by using a framework of graph theory.
An essential performance and correctness factor in numerical simulation and optimization is access to exact derivative information. Adjoint derivative models are particularly useful if a function’s number of inputs f...
详细信息
An essential performance and correctness factor in numerical simulation and optimization is access to exact derivative information. Adjoint derivative models are particularly useful if a function’s number of inputs far exceeds the number of outputs. The propagation of adjoints requires the data flow to be reversed, implying the reversal of all communication in programs that use message-passing. This paper presents recent advances made in developing the adjoint MPI library AMPI. The described proof of concept aims to serve as the basis for coupling other overloading AD tools with AMPI. We illustrate its use in the context of a specific overloading tool for algorithmic differentiation (AD) for C++ programs. A simplified but representative application problem is discussed as a case study.
This special session aims to introduce to the hardware/software codesign community challenges and opportunities in designing high performance computing (HPC) systems. Though embedded system design and HPC system desig...
详细信息
ISBN:
(纸本)9781605589053
This special session aims to introduce to the hardware/software codesign community challenges and opportunities in designing high performance computing (HPC) systems. Though embedded system design and HPC system design have traditionally been considered as two separate areas of research, they in fact share quite some common features, especially as CMOS devices continue along their scaling trends and the HPC community hits hard power and energy limits. Understanding the similarities and differences between the design practices adopted in the two areas will help bridge the two communities and lead to design tool developments benefiting both communities.
The interconnection of mobile devices in urban environments such as shopping malls can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban enviro...
详细信息
The interconnection of mobile devices in urban environments such as shopping malls can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban environment which not only provides the necessary services to the user, but also ensures that the network is energy efficient. In this paper, we propose an energy efficient dynamic routing protocol for heterogeneous wireless sensor networks in urban environments. A decision is made by every node based on various parameters like longevity, distance and battery power that measure the link quality to decide the next hop node in the route. This ensures that the total load is distributed evenly while conserving the energy of the battery-constrained nodes and minimizing the number of dead nodes in the network and improving the network lifetime. The paper discusses the results obtained for the proposed protocol in comparison with an energy efficient protocol MMBCR and a widely accepted protocol DSR. The performance of the proposed protocol was analyzed using simulation analysis and observed to be better than these of both competing protocols.
暂无评论