Defending against Internet worms using a phase space method from chaos theory
|
|
- Ezra Carr
- 5 years ago
- Views:
Transcription
1 Defending against Internet worms using a phase space method from chaos theory Jing Hu and Jianbo Gao Department of Electrical & Computer Engineering University of Florida Nageswara S. Rao Computer Science and Mathematics Division Oak Ridge National Laboratory 1
2 Outline Motivations Theoretical background: phase space reconstruction by time delay embedding Detecting network intrusions and worms by phase space based method Concluding discussions 2
3 Motivations Enterprise networks are facing ever-increasing security threats from worms, viruses, intrusions, etc., causing billions of dollars of loss Existing monitoring methods can not detect worms effectively in real-time Purpose: to develop effective methods to defend against Internet worms in a real-time manner 3
4 Worm detection: state-of-the-art and challenges Internet worm: a self-propagating program that automatically replicates itself to vulnerable systems and spreads across the Internet. Basic strategies: Monitor network traffic data Look for specific byte sequences (attack signatures) that are known to appear in the attack traffic Challenges: How to find a good attack signature fast enough for real-time use? A good attack signature should be general enough to capture all attack traffic of certain type specific enough to avoid overlapping with normal traffic to reduce false alarms Existing methods (e.g., expectation maximization and hidden Markov models) need extensive training, thus can not be applied in real-time 4
5 Phase space reconstruction Phase space: enables one to study dynamics of a complicated system geometrically X 1 (t) X 2 (t) X 2 t 2 t 1 t o t 1 t 2 t t o t 1 t 2 a) (b) (c) t o t 2 t 1 t o t X 1 Phase space reconstruction (Takens 1981; Sauer et al. 1991) V i = [x(i),x(i + L),...,x(i + (m 1)L)] x(i): given time series, m: embedding dimension, L: delay time 5
6 Optimal embedding The dynamics of the harmonic oscillator can be described by Equivalently, dx dt = y, dy dt = ωx d 2 x dt 2 = ωx The general solution is: x(t) = Acos(ωt + φ ), y(t) = Asin(ωt + φ ) If we embed x(t) to a 2-D space, then V t = [x(t),x(t + τ)] 6
7 Optimal embedding (Cont) Time-Dependent Exponent (TDE) curves (Gao & Zheng 1993, 1994) ( ) Vi+k V j+k Λ(m,L,k) = ln V i V j (1) Introduce a sequence of shells ε i V i V j ε i + ε i, i = 1,2,3, (2) where ε i and ε i are arbitrarily chosen small distances The angle brackets denote the ensemble average within a shell It is suggested that for a fixed small k, an optimal m is such that Λ(m,L,k) no longer decreases much when further increasing m. After m is chosen, L can be selected by minimizing Λ(m,L,k) 7
8 Normal and worm traffic trace 3 datasets are collected from a double-honeypot system deployed in a local network for automatic detection of worm attacks from the Internet. Courtesy of Dr. Chen at the Univ. of Florida 3 Package Sequence 2 Normal Worm
9 $ ' Phase diagrams for normal and worm traffic Left: worm traffic; Right: normal traffic Region x(n+1) x(n+1) Region x(n) Region 1 & 1 15 x(n) 2 25 Region 4 % 9
10 Accuracy of the phase space based method index based on percentage of number of points in region 1 35 index based on percentage of number of points in region Normal Worm 3 Normal Worm Frequency Frequency Percentage of points (%) Percentage of points (%) 1
11 Accuracy of the phase space based method (Cont) 7 6 index based on percentage of number of points in regions 3 and 4 Normal Worm 5 Frequency Percentage of points (%) 11
12 Comparison with other methods The separation between normal and worm traffic data is much smaller than that of our method! Adapted from Tang & Chen 25 12
13 Concluding discussions Proposed a phase space based method for detecting Internet intrusions and worms The method is simple, computationally fast and very effective The method can automatically indicate the attack signature of a specific worm (a) it identifies a subspace that contains the signature sequence of the worm in the phase space (b) it depends only on the rules (or dynamics) that the worm signature sequence is generated (a) & (b) together define an invariant subspace of the specific worm 13
14 Q & A Collaborations are highly welcomed! Thank you! 14
Characterizing chaotic time series
Characterizing chaotic time series Jianbo Gao PMB InTelliGence, LLC, West Lafayette, IN 47906 Mechanical and Materials Engineering, Wright State University jbgao.pmb@gmail.com http://www.gao.ece.ufl.edu/
More informationComplex system approach to geospace and climate studies. Tatjana Živković
Complex system approach to geospace and climate studies Tatjana Živković 30.11.2011 Outline of a talk Importance of complex system approach Phase space reconstruction Recurrence plot analysis Test for
More informationRoberto Perdisci^+, Guofei Gu^, Wenke Lee^ presented by Roberto Perdisci. ^Georgia Institute of Technology, Atlanta, GA, USA
U s i n g a n E n s e m b l e o f O n e - C l a s s S V M C l a s s i f i e r s t o H a r d e n P a y l o a d - B a s e d A n o m a l y D e t e c t i o n S y s t e m s Roberto Perdisci^+, Guofei Gu^, Wenke
More informationIV. Covariance Analysis
IV. Covariance Analysis Autocovariance Remember that when a stochastic process has time values that are interdependent, then we can characterize that interdependency by computing the autocovariance function.
More informationPhase-Space Reconstruction. Gerrit Ansmann
Phase-Space Reconstruction Gerrit Ansmann Reprise: The Need for Non-Linear Methods. Lorenz oscillator x = 1(y x), y = x(28 z) y, z = xy 8z 3 Autoregressive process measured with non-linearity: y t =.8y
More informationDistinguishing chaos from noise
Distinguishing chaos from noise Jianbo Gao PMB InTelliGence, LLC, West Lafayette, IN 47906 Mechanical and Materials Engineering, Wright State University jbgao.pmb@gmail.com http://www.gao.ece.ufl.edu/
More informationNetwork Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic
INT J COMPUT COMMUN, ISSN 84-9836 9():-2, February, 24. Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic J. Yuan, R. Yuan, X. Chen Jing Yuan*, Ruixi Yuan, Xi Chen Department
More informationOn Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study
The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,
More informationNo. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a
Vol 12 No 6, June 2003 cfl 2003 Chin. Phys. Soc. 1009-1963/2003/12(06)/0594-05 Chinese Physics and IOP Publishing Ltd Determining the input dimension of a neural network for nonlinear time series prediction
More information( ) ( ). ( ) " d#. ( ) " cos (%) " d%
Math 22 Fall 2008 Solutions to Homework #6 Problems from Pages 404-407 (Section 76) 6 We will use the technique of Separation of Variables to solve the differential equation: dy d" = ey # sin 2 (") y #
More informationUnsupervised Anomaly Detection for High Dimensional Data
Unsupervised Anomaly Detection for High Dimensional Data Department of Mathematics, Rowan University. July 19th, 2013 International Workshop in Sequential Methodologies (IWSM-2013) Outline of Talk Motivation
More informationEstimating Lyapunov Exponents from Time Series. Gerrit Ansmann
Estimating Lyapunov Exponents from Time Series Gerrit Ansmann Example: Lorenz system. Two identical Lorenz systems with initial conditions; one is slightly perturbed (10 14 ) at t = 30: 20 x 2 1 0 20 20
More informationMultiple Integrals. Chapter 4. Section 7. Department of Mathematics, Kookmin Univerisity. Numerical Methods.
4.7.1 Multiple Integrals Chapter 4 Section 7 4.7.2 Double Integral R f ( x, y) da 4.7.3 Double Integral Apply Simpson s rule twice R [ a, b] [ c, d] a x, x,..., x b, c y, y,..., y d 0 1 n 0 1 h ( b a)
More informationMath 162: Calculus IIA
Math 62: Calculus IIA Final Exam ANSWERS December 9, 26 Part A. (5 points) Evaluate the integral x 4 x 2 dx Substitute x 2 cos θ: x 8 cos dx θ ( 2 sin θ) dθ 4 x 2 2 sin θ 8 cos θ dθ 8 cos 2 θ cos θ dθ
More informationThe analog data assimilation: method, applications and implementation
The analog data assimilation: method, applications and implementation Pierre Tandeo pierre.tandeo@imt-atlantique.fr IMT-Atlantique, Brest, France 16 th of February 2018 Before starting Works in collaboration
More informationChapter 1 Fundamental Concepts
Chapter 1 Fundamental Concepts 1 Signals A signal is a pattern of variation of a physical quantity, often as a function of time (but also space, distance, position, etc). These quantities are usually the
More informationThe Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory
The Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory Hua-Wen Wu Fu-Zhang Wang Institute of Computing Technology, China Academy of Railway Sciences Beijing 00044, China, P.R.
More informationDynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection
Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dr. Kaibo Liu Department of Industrial and Systems Engineering University of
More informationFig 1: Stationary and Non Stationary Time Series
Module 23 Independence and Stationarity Objective: To introduce the concepts of Statistical Independence, Stationarity and its types w.r.to random processes. This module also presents the concept of Ergodicity.
More informationTemporal Multi-View Inconsistency Detection for Network Traffic Analysis
WWW 15 Florence, Italy Temporal Multi-View Inconsistency Detection for Network Traffic Analysis Houping Xiao 1, Jing Gao 1, Deepak Turaga 2, Long Vu 2, and Alain Biem 2 1 Department of Computer Science
More informationChapter 3 Convolution Representation
Chapter 3 Convolution Representation DT Unit-Impulse Response Consider the DT SISO system: xn [ ] System yn [ ] xn [ ] = δ[ n] If the input signal is and the system has no energy at n = 0, the output yn
More informationPrompt Network Anomaly Detection using SSA-Based Change-Point Detection. Hao Chen 3/7/2014
Prompt Network Anomaly Detection using SSA-Based Change-Point Detection Hao Chen 3/7/2014 Network Anomaly Detection Network Intrusion Detection (NID) Signature-based detection Detect known attacks Use
More informationCollaborative Target Detection in Wireless Sensor Networks with Reactive Mobility
1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong
More informationStochastic Processes. M. Sami Fadali Professor of Electrical Engineering University of Nevada, Reno
Stochastic Processes M. Sami Fadali Professor of Electrical Engineering University of Nevada, Reno 1 Outline Stochastic (random) processes. Autocorrelation. Crosscorrelation. Spectral density function.
More informationDelay Coordinate Embedding
Chapter 7 Delay Coordinate Embedding Up to this point, we have known our state space explicitly. But what if we do not know it? How can we then study the dynamics is phase space? A typical case is when
More informationStabilization of Hyperbolic Chaos by the Pyragas Method
Journal of Mathematics and System Science 4 (014) 755-76 D DAVID PUBLISHING Stabilization of Hyperbolic Chaos by the Pyragas Method Sergey Belyakin, Arsen Dzanoev, Sergey Kuznetsov Physics Faculty, Moscow
More informationLong-Term Prediction, Chaos and Artificial Neural Networks. Where is the Meeting Point?
Engineering Letters, 5:, EL_5 Long-Term Prediction, Chaos and Artificial Neural Networks. Where is the Meeting Point? Pilar Gómez-Gil Abstract This paper presents the advances of a research using a combination
More informationSolutions to Homework 2
Solutions to Homewor Due Tuesday, July 6,. Chapter. Problem solution. If the series for ln+z and ln z both converge, +z then we can find the series for ln z by term-by-term subtraction of the two series:
More informationReconstruction Deconstruction:
Reconstruction Deconstruction: A Brief History of Building Models of Nonlinear Dynamical Systems Jim Crutchfield Center for Computational Science & Engineering Physics Department University of California,
More informationINTRODUCTION TO CHAOS THEORY T.R.RAMAMOHAN C-MMACS BANGALORE
INTRODUCTION TO CHAOS THEORY BY T.R.RAMAMOHAN C-MMACS BANGALORE -560037 SOME INTERESTING QUOTATIONS * PERHAPS THE NEXT GREAT ERA OF UNDERSTANDING WILL BE DETERMINING THE QUALITATIVE CONTENT OF EQUATIONS;
More informationLecture 1 From Continuous-Time to Discrete-Time
Lecture From Continuous-Time to Discrete-Time Outline. Continuous and Discrete-Time Signals and Systems................. What is a signal?................................2 What is a system?.............................
More informationBayesian Inference and the Symbolic Dynamics of Deterministic Chaos. Christopher C. Strelioff 1,2 Dr. James P. Crutchfield 2
How Random Bayesian Inference and the Symbolic Dynamics of Deterministic Chaos Christopher C. Strelioff 1,2 Dr. James P. Crutchfield 2 1 Center for Complex Systems Research and Department of Physics University
More informationAn Optimization Approach In Information Security Risk Management
Advances in Management & Applied Economics, vol.2, no.3, 2012, 1-12 ISSN: 1792-7544 (print version), 1792-7552 (online) Scienpress Ltd, 2012 An Optimization Approach In Information Security Risk Management
More informationThe peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.
Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical
More informationData assimilation with and without a model
Data assimilation with and without a model Tim Sauer George Mason University Parameter estimation and UQ U. Pittsburgh Mar. 5, 2017 Partially supported by NSF Most of this work is due to: Tyrus Berry,
More informationApplications of Information Geometry to Hypothesis Testing and Signal Detection
CMCAA 2016 Applications of Information Geometry to Hypothesis Testing and Signal Detection Yongqiang Cheng National University of Defense Technology July 2016 Outline 1. Principles of Information Geometry
More informationSpectral Graph Theory for. Dynamic Processes on Networks
Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,
More informationExperimental Characterization of Nonlinear Dynamics from Chua s Circuit
Experimental Characterization of Nonlinear Dynamics from Chua s Circuit John Parker*, 1 Majid Sodagar, 1 Patrick Chang, 1 and Edward Coyle 1 School of Physics, Georgia Institute of Technology, Atlanta,
More informationDyson series for the PDEs arising in Mathematical Finance I
for the PDEs arising in Mathematical Finance I 1 1 Penn State University Mathematical Finance and Probability Seminar, Rutgers, April 12, 2011 www.math.psu.edu/nistor/ This work was supported in part by
More informationRandomized Algorithms
Randomized Algorithms Saniv Kumar, Google Research, NY EECS-6898, Columbia University - Fall, 010 Saniv Kumar 9/13/010 EECS6898 Large Scale Machine Learning 1 Curse of Dimensionality Gaussian Mixture Models
More informationCopyright (c) 2006 Warren Weckesser
2.2. PLANAR LINEAR SYSTEMS 3 2.2. Planar Linear Systems We consider the linear system of two first order differential equations or equivalently, = ax + by (2.7) dy = cx + dy [ d x x = A x, where x =, and
More informationLinear Regression. CSL603 - Fall 2017 Narayanan C Krishnan
Linear Regression CSL603 - Fall 2017 Narayanan C Krishnan ckn@iitrpr.ac.in Outline Univariate regression Multivariate regression Probabilistic view of regression Loss functions Bias-Variance analysis Regularization
More informationLinear Regression. CSL465/603 - Fall 2016 Narayanan C Krishnan
Linear Regression CSL465/603 - Fall 2016 Narayanan C Krishnan ckn@iitrpr.ac.in Outline Univariate regression Multivariate regression Probabilistic view of regression Loss functions Bias-Variance analysis
More informationClassical Statistical Mechanics: Part 1
Classical Statistical Mechanics: Part 1 January 16, 2013 Classical Mechanics 1-Dimensional system with 1 particle of mass m Newton s equations of motion for position x(t) and momentum p(t): ẋ(t) dx p =
More informationUniversality. Why? (Bohigas, Giannoni, Schmit 84; see also Casati, Vals-Gris, Guarneri; Berry, Tabor)
Universality Many quantum properties of chaotic systems are universal and agree with predictions from random matrix theory, in particular the statistics of energy levels. (Bohigas, Giannoni, Schmit 84;
More informationENSC327 Communications Systems 2: Fourier Representations. Jie Liang School of Engineering Science Simon Fraser University
ENSC327 Communications Systems 2: Fourier Representations Jie Liang School of Engineering Science Simon Fraser University 1 Outline Chap 2.1 2.5: Signal Classifications Fourier Transform Dirac Delta Function
More informationWavelet Neural Networks for Nonlinear Time Series Analysis
Applied Mathematical Sciences, Vol. 4, 2010, no. 50, 2485-2495 Wavelet Neural Networks for Nonlinear Time Series Analysis K. K. Minu, M. C. Lineesh and C. Jessy John Department of Mathematics National
More informationDifferential equations
Differential equations Math 27 Spring 2008 In-term exam February 5th. Solutions This exam contains fourteen problems numbered through 4. Problems 3 are multiple choice problems, which each count 6% of
More informationPricing of Cyber Insurance Contracts in a Network Model
Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December
More informationSIS epidemics on Networks
SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,
More informationWHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD
15 th November 212. Vol. 45 No.1 25-212 JATIT & LLS. All rights reserved. WHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD 1,2 ZHAO ZHIHONG, 2 LIU YONGQIANG 1 School of Computing
More informationSolutions of Chapter 3 Part 1/2
Page 1 of 7 Solutions of Chapter 3 Part 1/ Problem 3.1-1 Find the energy of the signals depicted in Figs.P3.1-1. Figure 1: Fig3.1-1 (a) E x n x[n] 1 + + 3 + + 1 19 (b) E x n x[n] 1 + + 3 + + 1 19 (c) E
More informationFormal Design of Composite Physically Unclonable Function
Formal Design of Composite Physically Unclonable Function Durga Prasad Sahoo Debdeep Mukhopadhyay Rajat Subhra Chakraborty Computer Science and Engineering Indian Institute of Technology, Kharagpur, India
More informationComputational Methods in Plasma Physics
Computational Methods in Plasma Physics Richard Fitzpatrick Institute for Fusion Studies University of Texas at Austin Purpose of Talk Describe use of numerical methods to solve simple problem in plasma
More informationRicci Dark Energy Chao-Jun Feng SUCA, SHNU
Ricci Dark Energy 21 2011.3.18-19 Chao-Jun Feng SUCA, SHNU Outline n Introduction to Ricci Dark Energy (RDE) n Stability and the constraint on the parameter n Age problem alleviated in viscous version
More information5.6 Nonparametric Logistic Regression
5.6 onparametric Logistic Regression Dmitri Dranishnikov University of Florida Statistical Learning onparametric Logistic Regression onparametric? Doesnt mean that there are no parameters. Just means that
More informationUNIVERSITY OF CAMBRIDGE LOCAL EXAMINATIONS SYNDICATE General Certificate of Education Advanced Level FURTHER MATHEMATICS 9221/1 PAPER 1
,--, ~"\, \ "~. "',,~ \ ~ 1.f8P;)1!,'" ;i *.~ UNIVERSITY OF CAMBRIDGE LOCAL EXAMINATIONS SYNDICATE General Certificate of Education Advanced Level FURTHER MATHEMATICS 9221/1 PAPER 1 MAY/JUNE SESSION 2001
More informationPractice Problems For Test 3
Practice Problems For Test 3 Power Series Preliminary Material. Find the interval of convergence of the following. Be sure to determine the convergence at the endpoints. (a) ( ) k (x ) k (x 3) k= k (b)
More informationCMPT 889: Lecture 2 Sinusoids, Complex Exponentials, Spectrum Representation
CMPT 889: Lecture 2 Sinusoids, Complex Exponentials, Spectrum Representation Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 26, 2005 1 Sinusoids Sinusoids
More informationDiscussion Section #2, 31 Jan 2014
Discussion Section #2, 31 Jan 2014 Lillian Ratliff 1 Unit Impulse The unit impulse (Dirac delta) has the following properties: { 0, t 0 δ(t) =, t = 0 ε ε δ(t) = 1 Remark 1. Important!: An ordinary function
More informationBoundary Conflicts and Cluster Coarsening: Waves of Life and Death in the Cyclic Competition of Four Species
Boundary Conflicts and Cluster Coarsening: Waves of Life and Death in the Cyclic Competition of Four Species Ahmed Roman, Michel Pleimling Virginia Tech, Blacksburg Friday, October 21 Roman A., Pleimling
More informationSjoerd Verduyn Lunel (Utrecht University)
Universiteit Utrecht, February 9, 016 Wasserstein distances in the analysis of time series and dynamical systems Sjoerd Verduyn Lunel (Utrecht University) S.M.VerduynLunel@uu.nl Abstract A new approach
More informationResearch Article An Impulse Model for Computer Viruses
Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu
More informationHow to do backpropagation in a brain
How to do backpropagation in a brain Geoffrey Hinton Canadian Institute for Advanced Research & University of Toronto & Google Inc. Prelude I will start with three slides explaining a popular type of deep
More informationIntelligent Systems (AI-2)
Intelligent Systems (AI-2) Computer Science cpsc422, Lecture 19 Oct, 23, 2015 Slide Sources Raymond J. Mooney University of Texas at Austin D. Koller, Stanford CS - Probabilistic Graphical Models D. Page,
More informationChristian Mohr
Christian Mohr 20.12.2011 Recurrent Networks Networks in which units may have connections to units in the same or preceding layers Also connections to the unit itself possible Already covered: Hopfield
More informationPATTERN RECOGNITION AND MACHINE LEARNING
PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory
More informationPractice Problems For Test 3
Practice Problems For Test 3 Power Series Preliminary Material. Find the interval of convergence of the following. Be sure to determine the convergence at the endpoints. (a) ( ) k (x ) k (x 3) k= k (b)
More informationNonlinear Dynamics. Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna.
Nonlinear Dynamics Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna http://www.moreno.marzolla.name/ 2 Introduction: Dynamics of Simple Maps 3 Dynamical systems A dynamical
More informationA Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid
More informationECE 301 Division 1 Exam 1 Solutions, 10/6/2011, 8-9:45pm in ME 1061.
ECE 301 Division 1 Exam 1 Solutions, 10/6/011, 8-9:45pm in ME 1061. Your ID will be checked during the exam. Please bring a No. pencil to fill out the answer sheet. This is a closed-book exam. No calculators
More informationData-driven methods in application to flood defence systems monitoring and analysis Pyayt, A.
UvA-DARE (Digital Academic Repository) Data-driven methods in application to flood defence systems monitoring and analysis Pyayt, A. Link to publication Citation for published version (APA): Pyayt, A.
More informationA Chaotic Encryption System Using PCA Neural Networks
A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science
More informationA posteriori analysis of a discontinuous Galerkin scheme for a diffuse interface model
A posteriori analysis of a discontinuous Galerkin scheme for a diffuse interface model Jan Giesselmann joint work with Ch. Makridakis (Univ. of Sussex), T. Pryer (Univ. of Reading) 9th DFG-CNRS WORKSHOP
More informationOutput Analysis for a Single Model
Output Analysis for a Single Model Output Analysis for a Single Model Output analysis is the examination of data generated by a simulation. Its purpose is to predict the performance of a system or to compare
More informationTime-Series Based Prediction of Dynamical Systems and Complex. Networks
Time-Series Based Prediction of Dynamical Systems and Complex Collaborators Networks Ying-Cheng Lai ECEE Arizona State University Dr. Wenxu Wang, ECEE, ASU Mr. Ryan Yang, ECEE, ASU Mr. Riqi Su, ECEE, ASU
More informationGrades will be determined by the correctness of your answers (explanations are not required).
6.00 (Fall 2011) Final Examination December 19, 2011 Name: Kerberos Username: Please circle your section number: Section Time 2 11 am 1 pm 4 2 pm Grades will be determined by the correctness of your answers
More informationNONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE
NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE José María Amigó Centro de Investigación Operativa, Universidad Miguel Hernández, Elche (Spain) J.M. Amigó (CIO) Nonlinear time series analysis
More informationEvolutionary Games on Networks. Wen-Xu Wang and G Ron Chen Center for Chaos and Complex Networks
Evolutionary Games on Networks Wen-Xu Wang and G Ron Chen Center for Chaos and Complex Networks Email: wenxuw@gmail.com; wxwang@cityu.edu.hk Cooperative behavior among selfish individuals Evolutionary
More informationEntropy Gradient Maximization for Systems with Discoupled Time
Entropy Gradient Maximization for Systems with Discoupled Time I. V. Drozdov Abstract The conventional definition of time based on the period of oscillations or fluctuations around equilibrium states is
More informationReview (11.1) 1. A sequence is an infinite list of numbers {a n } n=1 = a 1, a 2, a 3, The sequence is said to converge if lim
Announcements: Note that we have taking the sections of Chapter, out of order, doing section. first, and then the rest. Section. is motivation for the rest of the chapter. Do the homework questions from
More informationInvariant Lagrangian Systems on Lie Groups
Invariant Lagrangian Systems on Lie Groups Dennis Barrett Geometry and Geometric Control (GGC) Research Group Department of Mathematics (Pure and Applied) Rhodes University, Grahamstown 6140 Eastern Cape
More informationI have read and understood the instructions regarding academic dishonesty:
Name Final Exam MATH 6600 SPRING 08 MARK TEST 0 ON YOUR SCANTRON! Student ID Section Number (see list below 03 UNIV 03 0:30am TR Alper, Onur 04 REC 3:30pm MWF Luo, Tao 05 UNIV 03 :30pm TR Hora, Raphael
More informationA Bayesian Perspective on Residential Demand Response Using Smart Meter Data
A Bayesian Perspective on Residential Demand Response Using Smart Meter Data Datong-Paul Zhou, Maximilian Balandat, and Claire Tomlin University of California, Berkeley [datong.zhou, balandat, tomlin]@eecs.berkeley.edu
More informationPentahedral Volume, Chaos, and Quantum Gravity
Pentahedral Volume, Chaos, and Quantum Gravity Hal Haggard May 30, 2012 Volume Polyhedral Volume (Bianchi, Doná and Speziale): ˆV Pol = The volume of a quantum polyhedron Outline 1 Pentahedral Volume 2
More informationONR Mine Warfare Autonomy Virtual Program Review September 7, 2017
ONR Mine Warfare Autonomy Virtual Program Review September 7, 2017 Information-driven Guidance and Control for Adaptive Target Detection and Classification Silvia Ferrari Pingping Zhu and Bo Fu Mechanical
More informationShortest Paths & Link Weight Structure in Networks
Shortest Paths & Link Weight Structure in etworks Piet Van Mieghem CAIDA WIT (May 2006) P. Van Mieghem 1 Outline Introduction The Art of Modeling Conclusions P. Van Mieghem 2 Telecommunication: e2e A ETWORK
More informationENGIN 211, Engineering Math. Laplace Transforms
ENGIN 211, Engineering Math Laplace Transforms 1 Why Laplace Transform? Laplace transform converts a function in the time domain to its frequency domain. It is a powerful, systematic method in solving
More informationNonlinear Dimensionality Reduction. Jose A. Costa
Nonlinear Dimensionality Reduction Jose A. Costa Mathematics of Information Seminar, Dec. Motivation Many useful of signals such as: Image databases; Gene expression microarrays; Internet traffic time
More informationResearch Article Propagation of Computer Virus under Human Intervention: A Dynamical Model
Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan
More informationCyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach
Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach Nageswara S V Rao Steve W Poole Chris Y T Ma Fei He Jun Zhuang David K Y Yau Oak Ridge National Laboratory
More informationGrades will be determined by the correctness of your answers (explanations are not required).
6.00 (Fall 20) Final Examination December 9, 20 Name: Kerberos Username: Please circle your section number: Section Time 2 am pm 4 2 pm Grades will be determined by the correctness of your answers (explanations
More informationENSC327 Communications Systems 2: Fourier Representations. School of Engineering Science Simon Fraser University
ENSC37 Communications Systems : Fourier Representations School o Engineering Science Simon Fraser University Outline Chap..5: Signal Classiications Fourier Transorm Dirac Delta Function Unit Impulse Fourier
More informationIntroduction to Differential Equations
Chapter 1 Introduction to Differential Equations 1.1 Basic Terminology Most of the phenomena studied in the sciences and engineering involve processes that change with time. For example, it is well known
More informationPatrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies
Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University,
More informationAP Calculus 2004 AB FRQ Solutions
AP Calculus 4 AB FRQ Solutions Louis A. Talman, Ph. D. Emeritus Professor of Mathematics Metropolitan State University of Denver July, 7 Problem. Part a The function F (t) = 8 + 4 sin(t/) gives the rate,
More informationLesson 4: Non-fading Memory Nonlinearities
Lesson 4: Non-fading Memory Nonlinearities Nonlinear Signal Processing SS 2017 Christian Knoll Signal Processing and Speech Communication Laboratory Graz University of Technology June 22, 2017 NLSP SS
More informationTopic 3: Fourier Series (FS)
ELEC264: Signals And Systems Topic 3: Fourier Series (FS) o o o o Introduction to frequency analysis of signals CT FS Fourier series of CT periodic signals Signal Symmetry and CT Fourier Series Properties
More informationAnomaly Detection. Jing Gao. SUNY Buffalo
Anomaly Detection Jing Gao SUNY Buffalo 1 Anomaly Detection Anomalies the set of objects are considerably dissimilar from the remainder of the data occur relatively infrequently when they do occur, their
More informationRough paths methods 1: Introduction
Rough paths methods 1: Introduction Samy Tindel Purdue University University of Aarhus 216 Samy T. (Purdue) Rough Paths 1 Aarhus 216 1 / 16 Outline 1 Motivations for rough paths techniques 2 Summary of
More information