arxiv: v1 [cs.gt] 21 Jul 2017

Size: px
Start display at page:

Download "arxiv: v1 [cs.gt] 21 Jul 2017"

Transcription

1 RSU II ommuniation Cyber attaks Otimal Seure Multi-Layer IoT Network Design Juntao Chen, Corinne Touati, and Quanyan Zhu arxiv: v1 [s.gt] 1 Jul 017 Abstrat With the remarkable growth of the Internet and ommuniation tehnologies over the ast few deades, Internet of Things (IoTs) is enabling the ubiquitous onnetivity of heterogeneous hysial devies with software, sensors, and atuators. IoT networks are naturally multi-layer with the loud and ellular networks oexisting with the underlaid devie-todevie (DD) ommuniations. The onnetivity of IoTs lays an imortant role in information dissemination for missionritial and ivilian aliations. However, IoT ommuniation networks are vulnerable to yber attaks inluding the denialof-servie (DoS) and jamming attaks, resulting in link removals in IoT network. Therefore, it is imortant to maintain the onnetivity of IoT networks and make them seure and resistant to maliious attaks. In this work, we resent a heterogeneous IoT network design roblem in whih a network designer an add links to rovide additional ommuniation aths between two nodes or seure links against failures by investing resoures. We haraterize the otimal strategy of the seure network design roblem by first roviding a lower bound on the number of links a seure network requires for a given budget of roteted links, and then develoing a method to onstrut networks that satisfy the heterogeneous network design seifiations. Case studies on the Internet of Battlefield Things (IoBT) are used to orroborate our results. I. INTRODUCTION Driven by the advanes in sensing, roessing, storage and loud tehnologies, Internet of Things (IoT) have witnessed a tremendous develoment with a variety of aliations, suh as virtual reality [1], intelligent suly hain [] and smart home [3]. In this Internet world, IoT devies are massively deloyed and onneted to ellular or loud networks. For examle, in smart grids, wireless sensors are adoted to ollet the data of buses and ower transmission lines. The olleted data an then be sent to a suervisory ontrol and data aquisition (SCADA) enter through ellular networks for grid monitoring and deision lanning uroses. Smart home is another examle of IoT aliation. Various devies and alianes in a smart home inluding air onditioner, lights, TV, tablets, refrigerator and smart meter are interonneted through the loud, imroving the quality of the living. IoT networks an be viewed as multi-layer networks with the existing infrastruture networks (e.g., loud and ellular networks) and the underlaid devie networks. The onnetions between different objets in the IoT network an be divided into two tyes. Seifially, the ommuniations between devies themselves are alled interlinks, while the J. Chen and Q. Zhu are with the Deartment of Eletrial and Comuter Engineering, Tandon Shool of Engineering, New York University, Brooklyn, NY 1101, USA. {j641,qz494}@nyu.edu C. Touati is with INRIA, F38330 Montbonnot Saint-Martin, Frane. orinne.touati@inria.fr Fig. 1: In IoBT networks, a team of UAVs and a grou of soldiers and ground vehiles exeute missions ooeratively. The agents in the battlefield share ritial information through devie-to-devie ommuniations. The and the ground network form a two-layer network whih faes yber threats, e.g., jamming attaks whih an ause link removals. devies ommuniate with the infrastruture through intralinks. The onnetivity of IoT networks lays an imortant role in information dissemination. On one hand, devies an ommuniate diretly with other devies in the underlaid network for loal information. On the other hand, devies an also ommuniate with the infrastruture networks to maintain a global situational awareness. In addition, for some IoT devies whih are sare of on-board omutational resoures suh as wearables and drones, they an outsoure heavy omutations to the data enters through loud networks, and hene extend the use of battery [4]. Vehiular networks is an illustrative examle for understanding the multi-tier feature of IoT networks. In an intelligent transortation network, vehile-to-vehile (VV) ommuniations enable two vehiles to ommuniate and exhange information, e.g., aidents, seed alerts, notifiations. In addition, vehiles an also ommuniate with roadside infrastrutures or units (RSU) that belong to one or several servie roviders for exhanging various tyes of data related to different aliations inluding GPS navigation, arking and highway tolls inquiry. In this ase, the vehiles form one network while the infrastruture nodes form another network. Due to the interonnetions between two networks, vehiles an share information through infrastruture nodes or by diret VV ommuniations. IoT ommuniation networks are vulnerable to yber attaks inluding the denial-of-servie (DoS) and jamming attaks. These adversarial behaviors disrut the ommuniations between different devies whih lead to link removals in IoT network. Therefore, to maintain the onnetivity of devies, IoT networks need to be made seure and resistant

2 to maliious attaks. For examle, VV ommuniation links of a ar an be jammed, and hene the ar loses the real-time traffi information of the road whih may further ause traffi delays and aidents eseially in the futuristi self-driving aliations. Hene, IoT networks should be onstruted in a tati way by antiiating the yber attaks. Internet of Battlefield Things (IoBT) is another examle of missionritial IoT systems [5]. As deited in Fig. 1, in IoBT networks, a team of unmanned ground vehiles (UAVs) serves as one layer of wireless relay nodes for a team of soldiers equied with wearable devies to ommuniate between themselves or exhange ritial information with the ommand-and-ontrol nodes. The and the soldier network naturally form a two-layer network in a battlefield whih an be susetible to jamming attaks. It is essential to design ommuniation networks that an allow the IoBT networks robust to natural failures and seure to yber attaks in order to kee a high-level situational awareness of agents in a battlefield. Due to heterogeneous and multi-tier features of the IoT networks, the required seurity levels an vary for different networks. For examle, in IoBT networks, the onnetivity of s requires a higher seurity level when they are more likely to be targeted by the adversary. Similarly, in vehiular networks, the ommuniation links between RSUs need a high-level rotetion when they antiiate more attaks than the vehiles do. Therefore, it is imerative to design seure IoT networks robust to link attaks and maintain the multi-layer network onnetivity with heterogeneous seurity requirements. To this end, we resent a heterogeneous IoT network design roblem in whih network links are vulnerable to maliious attaks or random failures. To enhane the seurity and the robustness of the network, an IoT network designer an add extra links to rovide additional ommuniation aths between two nodes or seure links against failures by investing resoures to rotet the links. The goal of the multi-tier network design is to make the network onnetivity resistant to link removal attaks by antiiating the worst attak behaviors. Different from revious works [7], [8] whih have foused on the seure design of single-layer networks, in our work, the network designer needs to take into aount the heterogeneous features of the IoT networks by imosing different seurity requirements on eah layer whih resents a new set of hallenges for network design. In this aer, we fous on a two-layer IoT network and aim to design eah network resistant to different number of link failures with minimum resoures. We haraterize the otimal strategy of the seure network design roblem by first develoing a lower bound on the number of links a seure network requires for a given budget of roteted links. Then, we rovide neessary and suffiient onditions under whih the bounds are ahieved and resent a method to onstrut an otimal network that satisfies the heterogeneous network design seifiations with minimum ost. Finally, we use IoBT as a ase study to illustrate the analytial results and obtain insights in designing seure battlefield networks. We onsider a ommon battlefield senario in whih the antiiates higher yber threats than the soldier network, and the number of UAVs is less than the number of soldiers. We observe that as the ost of forming a roteted ommuniation link beomes smaller, more seure onnetions are formed in the otimal IoBT. In addition, the designed network is resilient to the hange of agents in the battlefield. For examle, when a grou of soldiers joining in the battle, they only need to onnet to a set of neighboring omanions whih is onvenient to imlement. For the senario in whih soldiers leave the battlefield, the otimal network an be designed in a similar fashion, i.e., those who lose some degree of ommuniations should build u new onnetions with other neighbors to stay resistant to attaks. We also study in Setion IV the reonfiguration of the as nodes leave and join the network. Related works: A number of works have foused on the emerging ritial issue on IoT seurity [4], [5], [9], [10]. Our work addresses the seure design of IoT networks by onsidering the onnetivity measure through the lens of grah theory [7], [8]. Seifially, we model the IoT as a multi-layer network [11], [1] and design eah layer of network with heterogeneous seurity requirements. Organization of the aer: Setion II formulates the heterogeneous two-layer IoT network design roblem. Analytial results inluding the otimal network design strategies are resented in Setion III. Case studies of IoBT networks are rovided in Setion IV, and Setion V onludes the aer. II. HETEROGENEOUS TWO-LAYER NETWORK DESIGN PROBLEM Consider a two-layer IoT network with two sets of devies or nodes S 1 and S. Eah set of nodes is of a different tye. Let n 1 = S 1 and n = S be the number of nodes of tye 1 and resetively. We identify them to n = n 1 + n verties that are numbered from 1 to n. Thus, a node labeled i is of tye 1 if and only if i n 1. Eah set of nodes forms a subnetwork. Together with the interonnetion between the two set of nodes, the subnetworks form a two-layer network. In standard grah theory, an edge (or link) is an unordered air of verties: (i, j) 1, n. We reall that two verties (nodes) i 0 and i L are said onneted in a grah of nodes S 1 S and set of edges E if there exists a ath between them, i.e., a finite alternating sequene of nodes and distint links: i 0, i 0 i 1, i 1, i 1 i, i,..., i L 1 i L, i L, where i l S 1 S and i l 1 i l E for all 1 l L. We onsider in our framework that edges are vulnerable, either to maliious attaks or to random failures. To kee its network robust, a designer an thus invest (i) in redundany in the ath, i.e., using extra links so that two nodes an ommuniate through different aths, or (ii) in seuring its links against failures. We refer to these seial edges as roteted links, or (iii) in any ombination of (i) and (ii). More reisely, we onsider that for the designer the ost er link reated is and the ost er roteted link reated is

3 n 1(k 1+1)+n (k +1) n 1(k 1+1)+(k +1) (n 1+1)(k 1+1) Lower bound on number of non-roteted links A Sloe k+1 B Sloe (k+1)+(k k1) C Sloe k1+1 k n n 1 D Sloe k E n 1 + n n 1 + n 1 Fig. : Lower bound on the number of non roteted links as a funtion on the number of roteted links in the network. P. It is natural to have P. Let E NP E be the set of non-roteted links and E P E be the set of roteted links. In this work, we assume the rotetion is erfet, i.e., links will not fail under attaks if they are roteted. Therefore, an adversary does not have an inentive to attak roteted links. Hene it is suffiient to onsider attaks on a set of links E A E NP. Consider that the nodes have different ritiality levels (resetively k 1 and k for nodes of tye 1 and with k 1, k 0, E NP ). It means that the nodes should remain onneted or attainable through the failure of k 1 and k links resetively. More reisely, onsider a network of verties S 1 S and edges E P E NP. The designer needs to guarantee that: (a) if E A k 1, then all nodes remain attainable, that is: i, j S 1 S, there exists a ath in the grah ((S 1 S ), (E P E NP \E A )) between i and j. (b) if E A k, nodes of tye remain attainable, that is: i, j S, there exists a ath in the grah ((S 1 S ), (E P E NP \E A )) between i and j. We all suh networks (k 1, k )-resistant (with k 1 < k ). Then, given the system s arameters S 1, S, k 1, k, an otimal strategy for the designer is the hoie of a set of links E P E NP and roteted links E P : s D = (S 1 S, E P E NP ), s.t. E P 1, n, E NP 1, n, E P E NP =. suh that: (i) s D is (k 1, k )-resistant. (ii) s D is of minimal ost E P + E NP. Without loss of generality, we make the following assumtions: (A1) k 1 k. (A) n 1 1, n 1. III. OPTIMAL STRATEGIES In this setion, we rovide an analytial study of the designer s otimal strategy, that is to say to the otimal network design. To that end, we first develo, for given system s arameters S 1, S, k 1, k, P and, and for eah ossible number of roteted links a lower bound on the number of links that have any (k 1, k )-resistant network with roteted links (Setion III-A). Then, we study 3 imortant ases, namely when takes values 0, n 1 and n 1 +n 1, and give for eah of them suffiient onditions under whih the bounds are attained as well as a onstrution for an otimal network (Setion III-B). Based on this study, we an obtain the main theoretial result of this aer, whih is the otimal strategy for the designer, i.e. a (k 1, k )-resistant network with minimal ost (Setion III-C). We finally end this setion with an illustrative examle (Setion III-D). A. A Lower Bound on the Number of (Non-roteted) links Reall that the system arameters are S 1, S, k 1, k, P and (res. the set of nodes of ritiality level 1 and, the values of ritiality and the unitary ost of reating roteted and non-roteted links). We first address the question of a lower bound on the ost for the designer with an additional onstraint, whih is the number of roteted links of the network. Sine the ost is linear with the number of non-roteted links, it amounts to find a lower bound on the number of non roteted links that are required in any (k 1, k )-resistant network with roteted links. Proosition 1 (Lower bound on E NP ) Let s D be a (k 1, k )-resistant grah ontaining roteted links. Then, the number of non-roteted links of s D is at least of n 1(k 1 + 1) + (n )(k + 1) if n, (n )(k 1 + 1) if n 1 n 1 + n,

4 0 if = n 1 + n 1. This result is illustrated in Figure. Proof: Using the similar methodology of [8], we introdue the notion of ontration of network as follows. Let g = (S 1 S, E P E NP ) be a network. Given a link (i, j) E P, the network denoted by g (i, j) refers to the one obtained by ontrating the link (i, j); that is, by merging the two nodes i and j into a single node {i, j} (sometimes alled suernode), and making any node a adjaent to the (new) node {i, j} in g (i, j) if and only if a is adjaent to i or j in the network g. In other words, all links, other than those inident to neither i nor j, are links of g (i, j) if and only if they are links of g. Then ĝ, the ontration of network g is the (uniquely defined) network obtained from g by sequenes of link ontrations for all links in E P. We illustrate the ontration of a network g in Figure 3. This examle onsists of 5 nodes and roteted links (reresented in bold lines between nodes 1 and and between nodes 3 and 4). The link 1, is ontrated and thus both nodes 1 and in g are merged into a single node denoted by {1, } in ĝ. Similarly the link 3, 4 is ontrated. The resulting network thus onsists of node 5 and suernodes {1, } and {3, 4}. Sine g ontains a link between nodes 5 and 1 in g then nodes 5 and {1, } are onneted through a link in network ĝ. Similarly, sine nodes 1 and 3 are adjaent in g then suernodes {1, } and {3, 4} are adjaent in network ĝ (a) Network g = (N, E P E NP ) 5 {1, } {3, 4} (b) Network ĝ E P Fig. 3: Illustration of network ontration: the links (1, ) and (3, 4) are ontrated. Consider a network g having roteted links, and ĝ its ontration. Let ν 1 be the set of nodes of tye 1 of ĝ (and suernodes ontaining only nodes of tye 1), ν be the set of nodes of tye of ĝ (and suernodes ontaining only nodes of tye ), ν 0 be the set of suernodes of ĝ that ontains nodes of both tye 1 and. Note that if ν 1 + ν + ν 0 = 1, (that is, if there is a unique suernode ontaining all nodes of the network), then no non-roteted link is needed to ensure any level of (k 1, k )- resistany. Otherwise, for the network to be (k 1, k )-resistant, eah element of ν 1, ν and ν 0 must have a degree of (at least) k Further, if there exist more than 1 element not in ν 1, that is if ν 0 + ν, then eah of them should have a degree of (at least) k + 1. Thus, a lower bound on the number of non-roteted links in s D is ν 1 (k 1 +1) + (ν 0 +ν )(k +1) if ν +ν 0 > 1 A = 0 if ν 1 + ν + ν 0 = 1 (ν 1 + 1)(k 1 + 1) if ν 1 1 and ν +ν 0 = 1. Let us finally omment on the values of ν 0, ν 1 and ν. If no roteted link is used (that is = 0), then ν 1 = n 1, ν = n and ν 0 = 0 and ν 0 + ν 1 + ν = n 1 + n = n. Adding any rotetion allows to derease the total number of elements ν 1 + ν + ν 0 by 1. (Or to remain onstant if the link indue a loo in a roteted omonent of g). Thus ν 0 + ν 1 + ν n. Further, the number of elements of ν 1 is uer bounded by n 1 the number of nodes of tye 1. Similarly, ν n. Finally, sine n 1 1 then ν 1 + ν 0 1 and sine n 1 then ν + ν 0 1. Thus, for any, a lower bound on the number of nonroteted links in s D is given by min ν 1,ν,ν 0, A. (LP) ν 0+ν 1+ν n ν 1 n 1, ν n, ν 1+ν 0 1, ν +ν 0 1 To solve this otimization roblem, we onsider 3 ases. Case 1: First, assume that < n 1. From ν 0 +ν 1 +ν n, we get that ν 0 + ν > 1. Thus, (LP) redues to min ν 1,ν,ν 0, ν 0+ν 1+ν n ν 1 n 1,ν n ν 1+ν 0 1, ν +ν 0 1 ν 1 (k 1 + 1) + (ν 0 + ν )(k + 1). Sine k k 1 then the minimum is obtained when ν 0 +ν is minimized, that is when all rotetions involve nodes of tye. Thus, the lower bound is n1(k1+1)+(n )(k+1). This observation is illustrated by the blue line in Figure joining oints A and B. Case : Now, assume that n 1 n 1 + n. Then n n Therefore, for a given that is for a given minimal value of ν 0 + ν 1 + ν we an have either ν 0 + ν > 1 or ν 0 + ν = 1. Again, sine k k 1, the lower bound is (n )(k1+1). It is illustrated by the brown line in Figure joining oints C and D. Case 3: Finally, when = n 1, ν 0 + ν 1 + ν = 1, and thus no non-roteted link is needed, whih is reresented by oint E in Figure. B. Seial Values of We have studied in the revious subsetion for eah otential number of roteted links a lower bound on m() the minimum number of non roteted links for a network with sets S 1 and S to be (k 1, k )-resistant. The ost assoiated with suh network is P + m(). Sine the goal of the designer is to minimize its ost, we need to investigate the value of minimizing suh funtion. Looking at Figure, we note that the lot of a grah of equal ost (iso-ost) K is a line of equation K P. It is thus a line

5 of (negative) sloe P / that rosses the y-axis at oint K/. Reall also that the grah that shows m() as a funtion of is on the uer-right quadrant of its lower bound. Thus the otimal value of orresonds to the oint where an iso-ost line meets the grah m() for the minimal value K. From the shae of the lower bound drawn in Figure, the oints A, C and E are good andidates. We thus investigate in this subsetion the ondition under whih the lower bounds are reahed in these oints and what are some orresonding otimal grahs. Proosition For any value of, denote by s D a (k 1, k )- network with roteted links and the minimum number of non-roteted links. Eah s D n 1 ontains exatly 0 non-roteted link Eah s D n 1 ontains exatly (n1+1)(k+1) nonroteted links if and only if k n 1. If we have the following asumtions: (i) k 1 mod = 1, k (ii) n > k k 1 and that (iii) n 1+1 n 1, then eah s D n1 (k 1 + 1) + n (k + 1) 0 ontains exatly. Proof: We suessively show the 3 items of the roosition: (i) s D n 1 ontain exatly n 1 roteted links. It is thus ossible to onstrut a tree network among the nodes of S 1 S that onsists only of roteted nodes. Thus no non-roteted node is required and the lower bound an be reahed. (ii) Now, suose that = n 1. If k n 1, onstrut any tree roteted network on the nodes of S. Further, onstrut a (k 1 + 1)-Harary network (the definition of suh networks as well as a onstrutive method is given in [6]) on the nodes of S 1 {n 1 +1}, that is the nodes of the first tye and one node of the seond tye. Suh onstrution is ossible sine k 1 + n The total number of non roteted links is then exatly (n1+1)(k+1). Now if k 1 +1 > n 1 then suose that a network g ahieves the lower bound. Consider its assoiated ontrated network ĝ. Sine g ontains n 1 roteted links, then ĝ is suh that ν 0 + ν 1 + ν n From the shae of the lower bound funtion A, then neessarily ν 0 + ν = 1 and ν 1 = n 1. Thus all nodes of S needs to be onneted together by roteted links. Sine there are n suh nodes, then this requires at least n 1 roteted links, whih equals. Thus, there annot be any roteted link involving nodes of set S 1. In addition, eah of the n 1 nodes of S 1 needs to be onneted to at least k other nodes. Sine k > n 1, then (k 1 + 1) (n 1 1) reresents the number of nodes of S that needs to be onneted to any node of S 1. (Indeed, reall that in a omlete grah of m nodes, eah node has a degree of m 1). Thus the network admits at least n1(n1 1) + n 1 ((k 1 + 1) (n 1 1)) = n 1 (k 1 + 1) n1(n1 1). Thus the extra number of links (omared to the lower bound) required is: n 1 (k 1 + 1) n 1(n 1 1) = n 1 1 (k n) > 0 (iii) Finally, suose that = 0. Renumber the nodes aording to the following sequene: 1,,..., k 1 + 1, n, k ,..., k 1 + 1, n + 1, k 1 +,..., 3 k 1 + 1, n +,... Then, we build a (k 1 + 1)-Harary network. Note that sine k n +1 k n 1, then the last 1+1 indies of the sequene only ontain nodes of tye 1. Thus, by onstrution, note that there are no links between any two nodes of S. Then, onstrut a k k 1 -Harary network on the nodes of S. This is ossible sine n > k k 1. C. Otimal Strategy Based on the following roosition, we an assess the otimal strategy for the designer, deending on the arameters values in a wide range of situations. Let us briefly review and omment on the senarios they reresent: The number of nodes is relately large omared to the link failure risks (n k k 1 + 1, and n 1 k 1 + 1). Indeed, they reresent the fat that the nodes ould satisfy, alone, the neessary number of links to rotet the network without rotetions. Indeed, even a full grah with m nodes an rotet against (at most) m 1 link failures. The nodes of tye, i.e. the set of ritial nodes, requiring extra rotetion measures reresent a relatively k small subset of the network (n 1+1 n 1 ). Finally, the onstraints k 1 mod = 1 and n (k + 1) mod = 0 are resent only to simlify the roofs and the resentation of the resent aer. They do not, however, affet signifiantly the result. The different ases orresonding to k 1 mod = 0 or n (k + 1) mod = 1 an be studied in a similar fashion as in the revious study, the only differene being for ertain values of the arameters s D n may be an otimal strategy in a similar analysis as in [8]. Proosition 3 Suose that n 1 k 1 + 1, n k k 1 + 1, k n 1+1 n 1, k 1 mod = 1 and n (k + 1) mod = 0. Then: If P k k k1 n, then 1 SD 0 are otimal strategies. If k k1+1 n 1 P k +1+ k k1 n, then 1 SD n 1 are otimal strategies P k k1+1, then Sn 1 D are otimal strategies. n 1 Proof: From Proosition, under the roosition s assumtions, S0 D, Sn D 1 and Sn 1 D ahieve the lower bounds of Proosition. Consider Figure (. Note that the ) sloe of the line between A and C is 1 k k k1 n 1 and between C and E is ( 1 k k1+1 n 1 ).

6 From the roosition s assumtions and sine k k 1, the line between A and C has higher sloe than that between C and E. Thus, if the lines of iso-osts have a sloe higher than the sloe of the line (AC) then the minimum ost is obtained at A. Similarly, if the sloe is less than that of (CE) then the minimum ost is obtained at E. Otherwise, the minimum is obtained at C. Noting that the sloe of the lines of iso-osts is P / leads to the result. D. Examle We develo in this setion some otimal networks s D for all values of between 0 and n 1 + n 1 in the ase where: k 1 = 3, k = 5, n 1 = 7, n = 3. Figure 4 shows some onstrutions of networks. Nodes of tye 1 are reresented in white while nodes of tye are reresented with blak dots. Non-roteted links are drawn in normal lines while roteted links are reresented in thik lines. The subfigures 4((a)-(j)) reresent ossible onfigurations for growing from 0 to n 1 = 9 resetively. For eah subfigure, the ation gives the number of nonroteted links needed and omares it to the lower bound omuted in Proosition 1. Note that the bounds are reahed in the examle exet for the ases where the number of nodes is too low to onstrut roer Harary network, that is: When n 1 and n k k 1. (ase b, ν = k k 1 = ) When > n and 1 < n k 1 (ases g, h and i where ν 1 values 4, 3 and resetively). From Proosition 3, network deited in Figure 4a is otimal iff P 3.5, network deited in Figure 4 is otimal iff 16/7 P 3.5, network deited in Figure 4j is otimal iff P 16/7. Figure 4 also gives insight on the evolution of the grah in a otential dynami senario when evolves (due to the sytem onstraints or hange of osts). Indeed any time when a roteted network needs to be removed, the otimal strategy is to remove by order of referene: (i) (any) roteted link joining two nodes of tye 1, or if no suh link exists (ii) a link between a node of tye 1 and one of tye, and if no suh link exists (iii) one link between two nodes of tye. Then, the roteted link that has been removed is relaed by the roer number of non-roteted links. IV. CASE STUDIES In this setion, we use ase studies of IoBT to illustrate the otimal design rinials of seure networks with heterogeneous omonents. In a battlefield senario, the soldiers, unmanned ground vehiles (UGV) and unmanned aerial vehiles (UAV) exeute missions together. The realtime information sharing and ollaboration between different agents enabled by devie-to-devie (DD) ommuniations are ritial. To enhane the information transmission quality and situational awareness of eah agent in the battlefield, a seure and reliable ommuniation network resistant to maliious attaks is inevitable. The IoBT network designer determines the otimal strategy on reating links with/without rotetion between agents in the battlefield. The ground layer and aerial layer in IoBT generally fae different levels of yber threats, e.g., DoS and jamming attaks, whih aim to disrut the network ommuniations. In the following ase studies, we investigate the senario that the IoBT network designer antiiates more yber attaks on the than the soldier and UGV networks. To reate roteted DD ommuniation links, one method is to use moving target defense (MTD) [13]. Seifially, instead of using a single ommuniation hannel between agents whih is easy for attakers to omromise (unroteted link), the designer an reate multile hannels and use swithing strategies when one is down. Hene, the onnetion of two agents through multi-hannel tehnology an be seen as a roteted link. The ost ratio between forming a roteted link and a unroteted link is ritial in designing the otimal IoBT network. This ratio deends on the number of hannels used in reating a safe link though MTD. We will analyze various ases in the following studies. A. Otimal IoBT Network Design Consider an IoBT network onsisting of n 1 = 0 soldiers and n = 5 UAVs. The designer aims to design the ground network and the resistant to k 1 = 5 and k = 9 attaks, resetively. Hene the global IoBT network is (5, 9)-resistant. Based on Proosition 3, we have two ritial oints T 1 := (k k1+1 n 1 )/ = 3.15 and T := (k k k1 n 1 )/ = 5.5, at whih the toology of otimal IoBT network enounters a swithing. For examle, when a roteted link adots 3 hannels to revent from attaks, i.e., = 3, the otimal IoBT network is an s D 4 grah as shown in Fig. 5a. When a roteted link requires 5 hannels to be erfetly seure, i.e., = 5, then the otimal IoBT network is of s D 4 onfiguration whih is deited in Fig. 5b. In addition, if the yber attaks are diffiult to defend against (e.g., require 7 hannels to kee a link safe, i.e., = 7), the otimal IoBT network beomes an s D 0 grah as shown in Fig. 5. The above three tyes of otimal networks indiate that the smaller the ost of a roteted link is, the more seure onnetions are formed starting from the to ground network. B. Resiliene of the IoBT Network The numbers of UAVs, UGVs and soldiers an be dynamially hanging. To study the resiliene of the designed network, we first investigate the senario that a number of UGVs/soldiers join the battlefield whih an be seen as army bakus. As n 1 inreases, the threshold T 1 dereases slightly while T remains unhanged. Therefore, the otimal IoBT network kees with a similar toology exet that the newly joined UGVs/soldiers onnet to a set of their neighbors. To illustrate this senario, we resent the otimal network

7 (a) = 0 (oint A): = 3 links (b) = 1: 1 links (instead of 0) (bound NOT reahed) () = (oint C): reahed) 4 8 = 16 links (bound (d) = 3: 4 7 = 14 links (bound reahed) (e) = 4: 4 6 = 1 links (bound reahed) (f) = 5: 4 5 = 10 links (bound reahed) (g) = 6: 9 links (bound NOT reahed) (h) = 7: 3 4/ = 6 links (bound NOT reahed) (i) = 8: 4 links (bound NOT reahed) Fig. 4: Possible otimal networks for all values of. (j) = 9: 0 links (bound reahed) with n 1 = and = 5 in Fig. 6a, and all the other arameters stay the same as those in Setion IV-A. When n 1 dereases, the network remains almost unhanged exet those UGVs/soldiers losing ommuniation links build u new onnetions with neighbors. An illustrative examle with n 1 = 17 is deited in Fig. 6b. Another interesting senario is that when the number of UAVs n hanges due to baku aerial vehiles joining in and urrent vehiles leaving the battlefield for maintenane. When n inreases, then the threshold T 1 remains the same while T dereases. If the ost ratio lies in the same regime with reset to T 1 and T even though T dereases, then under T, the newly joined UAV will onnet with another UAV with a roteted link whih either reates an Sn 1 D or s D n 1 grah. Otherwise, if > T, the UAV first onnets to other UAVs and then onnets to a set of UGVs/soldiers both with unroteted links whih yields an s D 0 grah. When a number of UAVs leaving the battlefield, i.e., n, dereases, then T 1 stays the same and T will inrease under whih the ost ratio revious belonging to regime I ( T ) may hange to regime II ((T 1 T )). Note that regime swithing an also haen when n inreases. Therefore, the otimal IoBT network swithes from s D 0 to s D n 1 (for the inrease of n ase, the swithing is in a bakward diretion). For examle, when the network ontains n = 6 UAVs and = 5.4,

8 Two soldiers joining in Proteted link Unroteted link Proteted link Rewired links Zoom-in toology Benhmark (a) Two soldiers joining in (a) sd 4 IoBT networkbenhmark 1 Unroteted link Proteted link Unroteted link (b) Benhmark 3 (b) sd 4 IoBT network Benhmark (3,4,5,9,10,11) (15,16,17,18, 19,0) (6,7,8,1,13,14) (1,,5,6,7,8) The numbers refer to the UGVs/soldiers that UAV onnets to. (1,13,14,17,0) 9 Fig. 6: (a) and (b) show the otimal IoBT network reonfiguration 3 soldiers leavingresewhen two UGVs/soldiers join in and leave the battlefield, tively () sd 0 IoBT network 15 Benhmark 3 Fig. 5: (a) When N P = 3 < T1, the otimal IoBT network is an sd 4 grah with all roteted links. (b) When T1 < N P = 5 < T, D the otimal network is an s4 grah, where the is onneted with roteted links and the ground network with all unroteted links. () When NP = 7 > T3, the otimal IoBT D network adots an s0 onfiguration with all unroteted links. the ost of using roteted and unroteted links. We have shown a lower bound on the number of non-roteted links of the otimal network and develoed a method to onstrut networks that satisfy the heterogeneous network design seifiations. We have demonstrated the design methodology in the IoBT networks with a team of UAVs and a team of soldiers. It has been shown that the otimal network an reonfigure itself adatively as nodes enter or leave the system. In addition, the otimal IoBT network onfiguration may enounter a toologial swithing when the number of UAVs hanges to an extent. As art of the future work, we would investigate the method of network onstrution under different arameter regimes and extend the two-layer network roblem to a multi-layer one. R EFERENCES and the other arameters are the same as those in Setion IV-A, from Proosition 3, the otimal IoBT network is an sd 0 grah. However, Fig. 5b shows that the otimal network adots an sd 4 toology when n = 5. Therefore, by adding a UAV to the aerial layer, the otimal IoBT network swithes D from sd 4 to s0 in this senario. The interretation is that a smaller number of UAVs is easier for the aerial network to defend against attaks, and hene roteted links are used between UAVs instead of redundant unroteted links. V. C ONCLUSION In this work, we have studied a multi-layer seure network formation roblem for IoT networks in whih the network designer aims to form a two-layer ommuniation network with heterogeneous seurity requirements while minimizing [1] Ciso. [Online]. Available: htt:// internet-of-things/virtual-reality-demonstration.html. [] Z. Pang, et al. Value-entri design of the internet-of-things solution for food suly hain: value reation, sensor ortfolio and information fusion. Information Systems Frontiers 17. (015): [3] M. Wang, et al. An IoT-based aliane ontrol system for smart homes. in Proeedings of the Fourth International Conferene on Intelligent Control and Information Proessing (ICICIP). IEEE, 013. [4] Z. Xu, and Q. Zhu. Seure and resilient ontrol design for loud enabled networked ontrol systems. in Proeedings of the First ACM Worksho on Cyber-Physial Systems-Seurity and/or Privay. ACM, 015. [5] M. J. Farooq, and Q. Zhu, Seure and Reonfigurable Network Design for Critial Information Dissemination in the Internet of Battlefield Things (IoBT), in Proeedings of 15th International Symosium on Modeling and Otimization in Mobile, Ad Ho, and Wireless Networks (WiOt), Teleom ParisTeh, Paris, Frane, 017. [6] F. Harary. The maximum onnetivity of a grah. Proeedings of the National Aademy of Sienes of the United States of Ameria, 48(7):114, 196.

9 [7] M. Dziubiski, and S. Goyal. Network design and defene. Games and Eonomi Behavior 79 (013): [8] C. Bravard, L. Charroin, and C. Touati. Otimal design and defense of networks under link attaks. Journal of Mathematial Eonomis 68 (017): [9] L. Zhou, and H. C. Chao. Multimedia traffi seurity arhiteture for the internet of things. IEEE Network 5, no. 3 (011). [10] R. H. Weber. Internet of ThingsNew seurity and rivay hallenges. Comuter law & seurity review 6, no. 1 (010): [11] J. Chen, and Q. Zhu. Resilient and deentralized ontrol of multilevel ooerative mobile networks to maintain onnetivity under adversarial environment. in Proeedings of the 55th Conferene on Deision and Control (CDC), IEEE, 016. [1] J. Chen, and Q. Zhu. Interdeendent network formation games with an aliation to ritial infrastrutures. in Proeedings of the Amerian Control Conferene (ACC), IEEE, 016. [13] Q. Zhu, and T. Basar. Game-theoreti aroah to feedbak-driven multi-stage moving target defense. in Proeedings of International Conferene on Deision and Game Theory for Seurity, Sringer International Publishing, 013.

Risk Analysis in Water Quality Problems. Souza, Raimundo 1 Chagas, Patrícia 2 1,2 Departamento de Engenharia Hidráulica e Ambiental

Risk Analysis in Water Quality Problems. Souza, Raimundo 1 Chagas, Patrícia 2 1,2 Departamento de Engenharia Hidráulica e Ambiental Risk Analysis in Water Quality Problems. Downloaded from aselibrary.org by Uf - Universidade Federal Do Ceara on 1/29/14. Coyright ASCE. For ersonal use only; all rights reserved. Souza, Raimundo 1 Chagas,

More information

Panos Kouvelis Olin School of Business Washington University

Panos Kouvelis Olin School of Business Washington University Quality-Based Cometition, Profitability, and Variable Costs Chester Chambers Co Shool of Business Dallas, TX 7575 hamber@mailosmuedu -768-35 Panos Kouvelis Olin Shool of Business Washington University

More information

2.2 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES

2.2 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES Essential Miroeonomis -- 22 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES Continuity of demand 2 Inome effets 6 Quasi-linear, Cobb-Douglas and CES referenes 9 Eenditure funtion 4 Substitution effets and

More information

CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)

CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL) Global J. of Arts & Mgmt., 0: () Researh Paer: Samath kumar et al., 0: P.07- CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)

More information

NONLINEAR MODEL: CELL FORMATION

NONLINEAR MODEL: CELL FORMATION ational Institute of Tehnology Caliut Deartment of Mehanial Engineering OLIEAR MODEL: CELL FORMATIO System Requirements and Symbols 0-Integer Programming Formulation α i - umber of interell transfers due

More information

EconS 503 Homework #8. Answer Key

EconS 503 Homework #8. Answer Key EonS 503 Homework #8 Answer Key Exerise #1 Damaged good strategy (Menu riing) 1. It is immediate that otimal rie is = 3 whih yields rofits of ππ = 3/ (the alternative being a rie of = 1, yielding ππ =

More information

The Spread of Internet Worms and the Optimal Patch Release Strategies

The Spread of Internet Worms and the Optimal Patch Release Strategies Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 5 Proeedings Amerias Conferene on Information Systems (AMCIS) 5 The Sread of Internet Worms and the Otimal Path Release Strategies

More information

Proportional-Integral-Derivative PID Controls

Proportional-Integral-Derivative PID Controls Proortional-Integral-Derivative PID Controls Dr M.J. Willis Det. of Chemial and Proess Engineering University of Newastle e-mail: mark.willis@nl.a.uk Written: 7 th November, 998 Udated: 6 th Otober, 999

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

Subject: Modeling of Thermal Rocket Engines; Nozzle flow; Control of mass flow. p c. Thrust Chamber mixing and combustion

Subject: Modeling of Thermal Rocket Engines; Nozzle flow; Control of mass flow. p c. Thrust Chamber mixing and combustion 16.50 Leture 6 Subjet: Modeling of Thermal Roket Engines; Nozzle flow; Control of mass flow Though onetually simle, a roket engine is in fat hysially a very omlex devie and diffiult to reresent quantitatively

More information

On Some Coefficient Estimates For Certain Subclass of Analytic And Multivalent Functions

On Some Coefficient Estimates For Certain Subclass of Analytic And Multivalent Functions IOSR Journal of Mathematis (IOSR-JM) e-issn: 78-578, -ISSN: 9-765X. Volume, Issue 6 Ver. I (Nov. - De.06), PP 58-65 www.iosrournals.org On Some Coeffiient Estimates For Certain Sublass of nalyti nd Multivalent

More information

Research on Components Characteristics of Single Container Friction Hoist

Research on Components Characteristics of Single Container Friction Hoist 6 3 rd International Conferene on Mehanial, Industrial, and Manufaturing Engineering (MIME 6) ISB: 978--6595-33-7 Researh on Comonents Charateristis of Single Container Frition oist irong Xie, Jing Cheng,

More information

Emergence of Superpeer Networks: A New Perspective

Emergence of Superpeer Networks: A New Perspective Emergene o Suereer Networs: A New Persetive Bivas Mitra Deartment o Comuter Siene & Engineering Indian Institute o Tehnology, Kharagur, India Peer to Peer arhiteture Node Node Node Internet Node Node All

More information

INFORMATION TRANSFER THROUGH CLASSIFIERS AND ITS RELATION TO PROBABILITY OF ERROR

INFORMATION TRANSFER THROUGH CLASSIFIERS AND ITS RELATION TO PROBABILITY OF ERROR IFORMATIO TRAFER TROUG CLAIFIER AD IT RELATIO TO PROBABILITY OF ERROR Deniz Erdogmus, Jose C. Prini Comutational euroengineering Lab (CEL, University of Florida, Gainesville, FL 6 [deniz,rini]@nel.ufl.edu

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS

USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS Journal of Engineering Studies and Researh Volume 19 (2013) No. 1 47 USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS DUSAN PETKOVIC 1, MIROSLAV RADOVANOVIC 1 1 University of Nis,

More information

TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS

TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS Jean-Charles Antonioli ONERA Air Base 70 366 Salon de Provene Frane Armin

More information

INTUITIONISTIC FUZZY SOFT MATRIX THEORY IN MEDICAL DIAGNOSIS USING MAX-MIN AVERAGE COMPOSITION METHOD

INTUITIONISTIC FUZZY SOFT MATRIX THEORY IN MEDICAL DIAGNOSIS USING MAX-MIN AVERAGE COMPOSITION METHOD Journal of Theoretial and lied Information Tehnology 10 th Setember 014. Vol. 67 No.1 005-014 JTIT & LLS. ll rights reserved. ISSN: 199-8645 www.atit.org E-ISSN: 1817-3195 INTUITIONISTI FUZZY SOFT MTRIX

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

Fast, Approximately Optimal Solutions for Single and Dynamic MRFs

Fast, Approximately Optimal Solutions for Single and Dynamic MRFs Fast, Aroximately Otimal Solutions for Single and Dynami MRFs Nikos Komodakis, Georgios Tziritas University of Crete, Comuter Siene Deartment {komod,tziritas}@sd.uo.gr Nikos Paragios MAS, Eole Centrale

More information

Investigating the Performance of a Hydraulic Power Take-Off

Investigating the Performance of a Hydraulic Power Take-Off Investigating the Performane of a Hydrauli Power Take-Off A.R. Plummer and M. Shlotter Centre for Power Transmission and Control, University of Bath, Bath, BA 7AY, UK E-mail: A.R.Plummer@bath.a.uk E-mail:

More information

INCOME AND SUBSTITUTION EFFECTS

INCOME AND SUBSTITUTION EFFECTS 3076-C5.df 3/12/04 10:56 AM Page 121 121 Chater 5 INCOME AND SUBSTITUTION EFFECTS In this hater we will use the utility-maimization model to study how the quantity of a good that an individual hooses is

More information

Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption

Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption Message Partitioning and Liited Auxiliary Randoness: Alternatives to Honey Enrytion AirEad Ghassai, Daniel Cullina, and Negar Kiyavash Deartent of ECE and Deartent of ISE, Coordinated Siene Laboratory

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

A General Approach for Analysis of Actuator Delay Compensation Methods for Real-Time Testing

A General Approach for Analysis of Actuator Delay Compensation Methods for Real-Time Testing The th World Conferene on Earthquake Engineering Otober -7, 8, Beijing, China A General Aroah for Analysis of Atuator Delay Comensation Methods for Real-Time Testing Cheng Chen and James M. Riles Post-dotoral

More information

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

Simple Cyclic loading model based on Modified Cam Clay

Simple Cyclic loading model based on Modified Cam Clay Simle li loading model based on Modified am la Imlemented in RISP main rogram version 00. and higher B Amir Rahim, The RISP onsortium Ltd Introdution This reort resents a simle soil model whih rovides

More information

EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL

EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL MATHEMATICS OF OPERATIONS RESEARCH Vol. 28, No. 3, August 2003,. 497 523 Printed in U.S.A. EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL AHARON BEN-TAL, ARKADI NEMIROVSKI, and CORNELIS

More information

3. THE SOLUTION OF TRANSFORMATION PARAMETERS

3. THE SOLUTION OF TRANSFORMATION PARAMETERS Deartment of Geosatial Siene. HE SOLUION OF RANSFORMAION PARAMEERS Coordinate transformations, as used in ratie, are models desribing the assumed mathematial relationshis between oints in two retangular

More information

silicon wafers p b θ b IR heater θ h p h solution bath cleaning filter bellows pump

silicon wafers p b θ b IR heater θ h p h solution bath cleaning filter bellows pump An Analysis of Cometitive Assoiative Net for Temerature Control of RCA Cleaning Solutions S Kurogi y, H Nobutomo y, T Nishida y, H Sakamoto y, Y Fuhikawa y, M Mimata z and K Itoh z ykyushu Institute of

More information

EE451/551: Digital Control. Relationship Between s and z Planes. The Relationship Between s and z Planes 11/10/2011

EE451/551: Digital Control. Relationship Between s and z Planes. The Relationship Between s and z Planes 11/10/2011 /0/0 EE45/55: Digital Control Chater 6: Digital Control System Design he Relationshi Between s and Planes As noted reviously: s j e e e e r s j where r e and If an analog system has oles at: s n jn a jd

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

State Diagrams. Margaret M. Fleck. 14 November 2011

State Diagrams. Margaret M. Fleck. 14 November 2011 State Diagrams Margaret M. Flek 14 November 2011 These notes over state diagrams. 1 Introdution State diagrams are a type of direted graph, in whih the graph nodes represent states and labels on the graph

More information

The Procedure of Finding the Stress-Energy. Tensor and Equations of Vector Field of Any Form

The Procedure of Finding the Stress-Energy. Tensor and Equations of Vector Field of Any Form Advaned Studies in Theoretial Phsis Vol. 8, 14, no. 18, 771-779 HIKARI Ltd, www.m-hikari.om htt://d.doi.org/1.1988/ast.14.4711 The Proedure of Finding the Stress-Energ Tensor and Equations of Vetor Field

More information

Properties of Space Set Topological Spaces

Properties of Space Set Topological Spaces Filomat :9 (), 75 87 DOI.98/FIL975H Published by Faulty of Sienes and Mathematis, University of Niš, Serbia Available at: htt://www.mf.ni.a.rs/filomat Proerties of Sae Set Toologial Saes Sang-Eon Han a

More information

Physical Laws, Absolutes, Relative Absolutes and Relativistic Time Phenomena

Physical Laws, Absolutes, Relative Absolutes and Relativistic Time Phenomena Page 1 of 10 Physial Laws, Absolutes, Relative Absolutes and Relativisti Time Phenomena Antonio Ruggeri modexp@iafria.om Sine in the field of knowledge we deal with absolutes, there are absolute laws that

More information

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles Daniel Gross, Lakshmi Iswara, L. William Kazmierzak, Kristi Luttrell, John T. Saoman, Charles Suffel On Component Order Edge Reliability and the Existene of Uniformly Most Reliable Uniyles DANIEL GROSS

More information

Solutions of burnt-bridge models for molecular motor transport

Solutions of burnt-bridge models for molecular motor transport PHYSICAL REVIEW E 75, 0390 2007 Solutions of burnt-bridge models for moleular motor transort Alexander Yu. Morozov, Ekaterina Pronina, and Anatoly B. Kolomeisky Deartment of Chemistry, Rie University,

More information

Application of Drucker-Prager Plasticity Model for Stress- Strain Modeling of FRP Confined Concrete Columns

Application of Drucker-Prager Plasticity Model for Stress- Strain Modeling of FRP Confined Concrete Columns Available online at www.sienediret.om Proedia Engineering 14 (211) 687 694 The Twelfth East Asia-Paifi Conferene on Strutural Engineering and Constrution Aliation of Druker-Prager Plastiity Model for Stress-

More information

SYNTHESIS AND OPTIMIZATION OF EPICYCLIC-TYPE AUTOMATIC TRANSMISSIONS BASED ON NOMOGRAPHS

SYNTHESIS AND OPTIMIZATION OF EPICYCLIC-TYPE AUTOMATIC TRANSMISSIONS BASED ON NOMOGRAPHS Al-Qadisiya Journal For Engineering Sienes Vol. 4 o. 3 Year 0 SYTHESIS AD OPTIMIZATIO OF EPICYCLIC-TYPE AUTOMATIC TASMISSIOS BASED O OMOGAPHS E. L. Esmail K. H. Salih Leturer Assistant Leturer Deartment

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

A. A. Salama 1 and Florentin Smarandache 2

A. A. Salama 1 and Florentin Smarandache 2 eutrosohi Sets Systems Vol 5 04 7 eutrosohi Cris Set They Salama Flentin Smarahe Deartment of Mathematis Comuter Sien Faulty of Sienes Pt Said University Deember Street Pt Said 45 Egyt Email:drsalama44@gmailom

More information

Capturing Register and Control Dependence in Memory Consistency Models with Applications to the Itanium Architecture

Capturing Register and Control Dependence in Memory Consistency Models with Applications to the Itanium Architecture Caturing Register and Control Deendene in Memory Consisteny Models with Aliations to the Itanium Arhiteture Lisa Higham (1) LillAnne Jakson (1)(2) Jalal Kawash (1)(3) higham@s.ualgary.a jakson@s.ualgary.a

More information

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach Measuring & Induing Neural Ativity Using Extraellular Fields I: Inverse systems approah Keith Dillon Department of Eletrial and Computer Engineering University of California San Diego 9500 Gilman Dr. La

More information

2. The Energy Principle in Open Channel Flows

2. The Energy Principle in Open Channel Flows . The Energy Priniple in Open Channel Flows. Basi Energy Equation In the one-dimensional analysis of steady open-hannel flow, the energy equation in the form of Bernoulli equation is used. Aording to this

More information

On a Networked Automata Spacetime and its Application to the Dynamics of States in Uniform Translatory Motion

On a Networked Automata Spacetime and its Application to the Dynamics of States in Uniform Translatory Motion On a Networked Automata Saetime and its Aliation to the Dynamis of States in Uniform Translatory Motion Othon Mihail Deartment of Comuter Siene, University of Liverool, Liverool, UK Othon.Mihail@liverool.a.uk

More information

Structural Reconfiguration of Systems under Behavioral Adaptation

Structural Reconfiguration of Systems under Behavioral Adaptation Strutural Reonfiguration of Systems under Behavioral Adaptation Carlos Canal a, Javier Cámara b, Gwen Salaün a Department of Computer Siene, University of Málaga, Spain b Department of Informatis Engineering,

More information

On the Licensing of Innovations under Strategic Delegation

On the Licensing of Innovations under Strategic Delegation On the Liensing of Innovations under Strategi Delegation Judy Hsu Institute of Finanial Management Nanhua University Taiwan and X. Henry Wang Department of Eonomis University of Missouri USA Abstrat This

More information

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked Paper 0, INT 0 Suffiient Conditions for a Flexile Manufaturing System to e Deadloked Paul E Deering, PhD Department of Engineering Tehnology and Management Ohio University deering@ohioedu Astrat In reent

More information

Resource-Constrained and Decision Support Workflow Modeling

Resource-Constrained and Decision Support Workflow Modeling INTERNATIONAL JOURNAL OF INTELLIGENT CONTROL AND SYSTEMS VOL, NO, MARC 7, 5- Resoure-Constrained and Deision Suort Workflow Modeling William TEPFENART, Jiaun WANG, Daniela ROSCA and Anni TSAI Abstrat-In

More information

Battery Sizing for Grid Connected PV Systems with Fixed Minimum Charging/Discharging Time

Battery Sizing for Grid Connected PV Systems with Fixed Minimum Charging/Discharging Time Battery Sizing for Grid Conneted PV Systems with Fixed Minimum Charging/Disharging Time Yu Ru, Jan Kleissl, and Sonia Martinez Abstrat In this paper, we study a battery sizing problem for grid-onneted

More information

Developing Excel Macros for Solving Heat Diffusion Problems

Developing Excel Macros for Solving Heat Diffusion Problems Session 50 Developing Exel Maros for Solving Heat Diffusion Problems N. N. Sarker and M. A. Ketkar Department of Engineering Tehnology Prairie View A&M University Prairie View, TX 77446 Abstrat This paper

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

On the other hand, in the twodimensional ase, several very simle models of CAs having logial universality (in the sense that any logi iruit an e emedd

On the other hand, in the twodimensional ase, several very simle models of CAs having logial universality (in the sense that any logi iruit an e emedd MFCS'98 Satellite Worksho on Frontiers etween Deidaility and Undeidaility August 24{25, 1998, Brno, Czeh Reuli Universality of Reversile Hexagonal Cellular Automata Kenihi MORIA 1, Maurie MARGENSERN 2,

More information

VIBRATIONAL ENERGY SCAVENGING WITH SI TECHNOLOGY ELECTROMAGNETIC INERTIAL MICROGENERATORS

VIBRATIONAL ENERGY SCAVENGING WITH SI TECHNOLOGY ELECTROMAGNETIC INERTIAL MICROGENERATORS Stresa, Italy, 6-8 Aril 6 VIBRATIONAL ENERGY SCAVENGING WITH SI TECHNOLOGY ELECTROMAGNETIC INERTIAL MICROGENERATORS C. Serre 1, A. Pérez-Rodríguez 1, N. Fondevilla 1, J.R. Morante 1, J. Montserrat, and

More information

COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION

COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION 4 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION Jiri Nozika*, Josef Adame*, Daniel Hanus** *Department of Fluid Dynamis and

More information

Word of Mass: The Relationship between Mass Media and Word-of-Mouth

Word of Mass: The Relationship between Mass Media and Word-of-Mouth Word of Mass: The Relationship between Mass Media and Word-of-Mouth Roman Chuhay Preliminary version Marh 6, 015 Abstrat This paper studies the optimal priing and advertising strategies of a firm in the

More information

Designing Social Norm Based Incentive Schemes to Sustain Cooperation in a Large Community

Designing Social Norm Based Incentive Schemes to Sustain Cooperation in a Large Community Designing Soial Norm Based Inentive Shemes to Sustain Cooperation in a arge Community Yu Zhang, Jaeo Par, Mihaela van der Shaar Eletrial Engineering Department, University of California, os Angeles yuzhang@ula.edu,

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

The Hyperbolic Region for Restricted Isometry Constants in Compressed Sensing

The Hyperbolic Region for Restricted Isometry Constants in Compressed Sensing INTERNATIONAL JOURNAL OF CIRCUITS SYSTEMS AND SIGNAL PROCESSING Volume 8 Te Hyeroli Region for Restrited Isometry Constants in Comressed Sensing Siqing Wang Yan Si and Limin Su Astrat Te restrited isometry

More information

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum

More information

Does P=NP? Karlen G. Gharibyan. SPIRIT OF SOFT LLC, 4-th lane 5 Vratsakan 45, 0051, Yerevan, Armenia

Does P=NP? Karlen G. Gharibyan. SPIRIT OF SOFT LLC, 4-th lane 5 Vratsakan 45, 0051, Yerevan, Armenia 1 Does P=NP? Om tat sat Karlen G. Gharibyan SPIRIT OF SOFT LLC, 4-th lane 5 Vratsakan 45, 0051, Yerevan, Armenia E-mail: karlen.gharibyan@spiritofsoft.om Abstrat-The P=NP? problem was emerged in 1971.

More information

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

Complementarities in Spectrum Markets

Complementarities in Spectrum Markets Complementarities in Spetrum Markets Hang Zhou, Randall A. Berry, Mihael L. Honig and Rakesh Vohra EECS Department Northwestern University, Evanston, IL 6008 {hang.zhou, rberry, mh}@ees.northwestern.edu

More information

Average Rate Speed Scaling

Average Rate Speed Scaling Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.

More information

Experimental study with analytical validation of thermo-hydraulic performance of plate heat exchanger with different chevron angles

Experimental study with analytical validation of thermo-hydraulic performance of plate heat exchanger with different chevron angles Exerimental study with analytial validation of thermo-hydrauli erformane of late heat exhanger with different hevron angles Arunahala U C, Ajay R K and Sandee H M Abstrat The Plate heat exhanger is rominent

More information

Too Poor for School? Social Background E ects on School and University Opportunities

Too Poor for School? Social Background E ects on School and University Opportunities Too Poor for Shool? Soial Bakground E ets on Shool and University Oortunities Alessandro Tamieri y University of Leiester June 7, 2010 Abstrat This aer studies how students soial bakground a ets shool

More information

Planning with Uncertainty in Position: an Optimal Planner

Planning with Uncertainty in Position: an Optimal Planner Planning with Unertainty in Position: an Optimal Planner Juan Pablo Gonzalez Anthony (Tony) Stentz CMU-RI -TR-04-63 The Robotis Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213 Otober

More information

Tight bounds for selfish and greedy load balancing

Tight bounds for selfish and greedy load balancing Tight bounds for selfish and greedy load balaning Ioannis Caragiannis Mihele Flammini Christos Kaklamanis Panagiotis Kanellopoulos Lua Mosardelli Deember, 009 Abstrat We study the load balaning problem

More information

Fiber Optic Cable Transmission Losses with Perturbation Effects

Fiber Optic Cable Transmission Losses with Perturbation Effects Fiber Opti Cable Transmission Losses with Perturbation Effets Kampanat Namngam 1*, Preeha Yupapin 2 and Pakkinee Chitsakul 1 1 Department of Mathematis and Computer Siene, Faulty of Siene, King Mongkut

More information

MULTIPLE SOLUTIONS FOR A CLASS OF DIRICHLET QUASILINEAR ELLIPTIC SYSTEMS DRIVEN BY A (P, Q)-LAPLACIAN OPERATOR

MULTIPLE SOLUTIONS FOR A CLASS OF DIRICHLET QUASILINEAR ELLIPTIC SYSTEMS DRIVEN BY A (P, Q)-LAPLACIAN OPERATOR Dynami Systems Aliations 20 (2011) 89-100 MULTIPLE SOLUTIONS FOR A CLASS OF DIRICHLET QUASILINEAR ELLIPTIC SYSTEMS DRIVEN BY A (P, Q)-LAPLACIAN OPERATOR GABRIELE BONANNO a, SHAPOUR HEIDARKHANI b, AND DONAL

More information

Robust Flight Control Design for a Turn Coordination System with Parameter Uncertainties

Robust Flight Control Design for a Turn Coordination System with Parameter Uncertainties Amerian Journal of Applied Sienes 4 (7): 496-501, 007 ISSN 1546-939 007 Siene Publiations Robust Flight ontrol Design for a urn oordination System with Parameter Unertainties 1 Ari Legowo and Hiroshi Okubo

More information

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,

More information

Some Properties on Nano Topology Induced by Graphs

Some Properties on Nano Topology Induced by Graphs AASCIT Journal of anosiene 2017; 3(4): 19-23 http://wwwaasitorg/journal/nanosiene ISS: 2381-1234 (Print); ISS: 2381-1242 (Online) Some Properties on ano Topology Indued by Graphs Arafa asef 1 Abd El Fattah

More information

Aircraft CAS Design with Input Saturation Using Dynamic Model Inversion

Aircraft CAS Design with Input Saturation Using Dynamic Model Inversion International Journal of Control, Automation, and Systems Vol., No. 3, September 003 35 Airraft CAS Design with Input Saturation sing Dynami Model Inversion Sangsoo Lim and Byoung Soo Kim Abstrat: This

More information

Evaluation of effect of blade internal modes on sensitivity of Advanced LIGO

Evaluation of effect of blade internal modes on sensitivity of Advanced LIGO Evaluation of effet of blade internal modes on sensitivity of Advaned LIGO T0074-00-R Norna A Robertson 5 th Otober 00. Introdution The urrent model used to estimate the isolation ahieved by the quadruple

More information

Periodic Bifurcations in Descendant Trees of Finite p-groups

Periodic Bifurcations in Descendant Trees of Finite p-groups Advanes in Pure Mathematis, 05, 5, 6-95 Published Online Marh 05 in SiRes. htt://www.sir.org/ournal/am htt://dx.doi.org/0.46/am.05.5400 Periodi Bifurations in Desendant Trees of Finite -Grous Daniel C.

More information

3 Tidal systems modelling: ASMITA model

3 Tidal systems modelling: ASMITA model 3 Tidal systems modelling: ASMITA model 3.1 Introdution For many pratial appliations, simulation and predition of oastal behaviour (morphologial development of shorefae, beahes and dunes) at a ertain level

More information

Any AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer

Any AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer Any AND-OR formula of size N an be evaluated in time N /2+o( on a quantum omuter Andris Ambainis, ambainis@math.uwaterloo.a Robert Šalek salek@ees.berkeley.edu Andrew M. Childs, amhilds@uwaterloo.a Shengyu

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

DESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL

DESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL DESIG FOR DIGITAL COMMUICATIO SYSTEMS VIA SAMPLED-DATA H COTROL M agahara 1 Y Yamamoto 2 Department of Applied Analysis and Complex Dynamial Systems Graduate Shool of Informatis Kyoto University Kyoto

More information

Active Magnetic Bearings for Frictionless Rotating Machineries

Active Magnetic Bearings for Frictionless Rotating Machineries Ative Magneti Bearings for Fritionless Rotating Mahineries Joga Dharma Setiawan Abstrat Ative magneti bearing (AMB systems an support a rotor without physial ontat and enable users to preisely ontrol rotor

More information

Passivity and Stability of Switched Systems Under Quantization

Passivity and Stability of Switched Systems Under Quantization Passivity and Stability of Swithed Systems Under Quantization Feng Zhu Department of Eletrial Engineering University of Notre Dame Notre Dame, IN, 46556 fzhu1@nd.edu Han Yu Department of Eletrial Engineering

More information

Can Learning Cause Shorter Delays in Reaching Agreements?

Can Learning Cause Shorter Delays in Reaching Agreements? Can Learning Cause Shorter Delays in Reahing Agreements? Xi Weng 1 Room 34, Bldg 2, Guanghua Shool of Management, Peking University, Beijing 1871, China, 86-162767267 Abstrat This paper uses a ontinuous-time

More information

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION 09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE

More information

A Distributed Algorithm for Distribution Network Reconfiguration

A Distributed Algorithm for Distribution Network Reconfiguration 018 China International Conferene on Eletriity Distribution (CICED 018) Tianjin, 17-19 Sep. 018 A Distributed Algorithm for Distribution Network Reonfiguration Yuanqi Gao, Student Member, IEEE, Peng Wang,

More information

Lecture 3 - Lorentz Transformations

Lecture 3 - Lorentz Transformations Leture - Lorentz Transformations A Puzzle... Example A ruler is positioned perpendiular to a wall. A stik of length L flies by at speed v. It travels in front of the ruler, so that it obsures part of the

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

General Closed-form Analytical Expressions of Air-gap Inductances for Surfacemounted Permanent Magnet and Induction Machines

General Closed-form Analytical Expressions of Air-gap Inductances for Surfacemounted Permanent Magnet and Induction Machines General Closed-form Analytial Expressions of Air-gap Indutanes for Surfaemounted Permanent Magnet and Indution Mahines Ronghai Qu, Member, IEEE Eletroni & Photoni Systems Tehnologies General Eletri Company

More information

Normative and descriptive approaches to multiattribute decision making

Normative and descriptive approaches to multiattribute decision making De. 009, Volume 8, No. (Serial No.78) China-USA Business Review, ISSN 57-54, USA Normative and desriptive approahes to multiattribute deision making Milan Terek (Department of Statistis, University of

More information

Orchestrating Massively Distributed CDNs

Orchestrating Massively Distributed CDNs Orhestrating Massively Distributed CDNs Joe Wenjie Jiang Prineton University Prineton, NJ wenjiej@s. prineton.edu Stratis Ioannidis Tehniolor Palo Alto, CA stratis.ioannidis@ tehniolor.om Laurent Massoulié

More information

Optimal control of inverted pendulum system using PID controller, LQR and MPC

Optimal control of inverted pendulum system using PID controller, LQR and MPC IOP Conferene Series: aterials Siene and Engineering PAPER OPEN ACCESS Otimal ontrol of inverted endulum system using PID ontroller, LQR and PC To ite this artile: Elisa Sara Varghese et al 7 IOP Conf.

More information

Probabilistic and nondeterministic aspects of Anonymity 1

Probabilistic and nondeterministic aspects of Anonymity 1 MFPS XX1 Preliminary Version Probabilisti and nondeterministi aspets of Anonymity 1 Catusia Palamidessi 2 INRIA and LIX Éole Polytehnique, Rue de Salay, 91128 Palaiseau Cedex, FRANCE Abstrat Anonymity

More information

arxiv: v2 [math.pr] 9 Dec 2016

arxiv: v2 [math.pr] 9 Dec 2016 Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First

More information

A special reference frame is the center of mass or zero momentum system frame. It is very useful when discussing high energy particle reactions.

A special reference frame is the center of mass or zero momentum system frame. It is very useful when discussing high energy particle reactions. High nergy Partile Physis A seial referene frame is the enter of mass or zero momentum system frame. It is very useful when disussing high energy artile reations. We onsider a ollision between two artiles

More information

23.1 Tuning controllers, in the large view Quoting from Section 16.7:

23.1 Tuning controllers, in the large view Quoting from Section 16.7: Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output

More information