{"title":"Performance of a queueing model with self-similar input traffic","authors":"C. Aduba, M. Sadiku","doi":"10.1109/SECON.2001.923084","DOIUrl":"https://doi.org/10.1109/SECON.2001.923084","url":null,"abstract":"Studies have shown that self-similar (fractal) processes are an accurate representation for the data traffic in today's high-speed networks. Network arrivals modeled as a Poisson process or a compound Poisson process, though presenting analytical simplicity, do not capture the scale-invariant property of data traffic. The packet inter-arrival distribution clearly differs from the exponential form being assumed and this affects buffer sizing. This paper shows through simulation studies of how the buffer overflow probability can be estimated when the arrivals are generated using a heavy-tailed distribution. A G/D/1/B queue, with a general distribution type input process, deterministic service process, single server system and buffer size B, is assumed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed security schemes for networks","authors":"S. Wunnava, E. Lule","doi":"10.1109/SECON.2001.923099","DOIUrl":"https://doi.org/10.1109/SECON.2001.923099","url":null,"abstract":"This paper presents the design of a hardware based security processor module, for network-connected systems. The security processor is implemented based on data encryption standard (DES) using very high speed integrated circuit hardware description language (VHDL), the code is then targeted to a programmable logic device (PLD). The design techniques presented in this paper, present a product that can be developed and deployed rapidly. The product is then evaluated for both performance and reliability, this compared to a software implementation of the security processor.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123905666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy","authors":"D.C. Bauer, J. Cannady, R.C. Garcia","doi":"10.1109/SECON.2001.923083","DOIUrl":"https://doi.org/10.1109/SECON.2001.923083","url":null,"abstract":"Detecting intrusions falls into two categories: anomaly detection and misuse detection. The former refers to the detection of abnormal behavior in the use of network services and computing resources. Misuse detection, on the other hand, relies on the identification of \"well defined patterns of attack that exploit\" vulnerabilities in network and computer software. Most of the commercially available intrusion detection products fall into this category. They work by \"mechanically... matching known patterns of attack against monitored activity\" within the packet payload only. On the other hand, some intrusion detection techniques focus on \"packet header information only\". Throughout academia and industry, there appears to be a lack of research in identifying probable attacks by combining the use of payload characteristics and packet header information, that is, by analyzing the entire packet. This paper addresses this void. This work poses the selection of packet information as an optimization problem for the purposes of anomaly detection. Specifically, using the characteristics of network attacks, we designed an evolution strategy (ES) that is able to detect anomalous network behavior and identify the source of the attack through the analysis of packet header and payload information. We demonstrate that evolution strategies are appropriate for those problems that require simultaneous optimization of multiple parameters in the context of network security. Preliminary results are very encouraging suggesting that network traffic can be parameterized, and, through the optimization of these parameters, evolution strategies can detect anomalous behavior in network traffic.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet enterprise engineering. A \"zero-time\" framework based on \"T-strategy\"","authors":"U. Tanik, M. Tanik, L. Jololian","doi":"10.1109/SECON.2001.923127","DOIUrl":"https://doi.org/10.1109/SECON.2001.923127","url":null,"abstract":"The Electronic Enterprise Engineering (EEE) is the collective best practices for the technology-driven architecting of enterprises to directly achieve enterprise objectives (M. Tanik; P. Ng; R. T. Yeh, 1998). Two important aspects of engineering enterprises are the time-to-market and the positioning of the enterprise in the market based on its core competency (R. T. Yeh; K. Pearlson; G. Kozmetsky, 2000). In addition, agile organizations should utilize a service-based process model (C.V. Ramamoorthy, 2000), which allows them to adapt in a timely manner to changing market conditions. This can be achieved by using a component-based enterprise application integration approach (L. Jololian, 2000). In this paper, the authors present a framework for the development of a particular application of the EEE concepts to the Engineering of Internet enterprises, referred to as Internet Enterprise Engineering (IEE). They believe that enterprises in the 21st Century will have to adopt such a model in order to be competitive in the market place.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126959777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient division in the binary representation of complex numbers","authors":"D. Blest, T. Jamil","doi":"10.1109/SECON.2001.923114","DOIUrl":"https://doi.org/10.1109/SECON.2001.923114","url":null,"abstract":"Computer operations involving complex numbers, essential in such applications as digital signal processing and image processing, are usually performed in a \"divide-and-conquer\" approach dealing separately with the real and imaginary parts and then accumulating the results. There have been several proposals to treat complex numbers as a single unit but all seem to have floundered on the basic problem of the division process without which, of course, it is impossible to carry out all but the most basic arithmetic. This paper resurrects an early proposal to express complex numbers in a single \"binary\" representation and provides a fail-safe procedure for obtaining the quotient of two complex numbers expressed in this representation.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116211005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measurement of thermocouple time constants using LabVIEW as part of an engineering recruiting weekend for high school seniors","authors":"E. M. O’Brien, A. S. Collins, W. Moses","doi":"10.1109/SECON.2001.923123","DOIUrl":"https://doi.org/10.1109/SECON.2001.923123","url":null,"abstract":"Sixty-three highly qualified high school seniors with and interest in engineering were invited to the Mercer Campus to compete for scholarships. To help them gain an appreciation for engineering, the students were given a pre-laboratory exercise to complete at home and an on campus laboratory experience. Temperature measuring systems using thermocouples and LabVIEW software were used to introduce them to first-order system responses. They were all able to determine the time constants of two systems from the temperature versus time recording as captured with LabVIEW. Results from an exiting student exam showed that they left with an increase awareness of what engineering is and what engineers do. They also seemed to enjoy the experience.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic multiobjective optimization of war resource allocation using adaptive genetic algorithms","authors":"S. Palaniappan, S. Zein-Sabatto, A. Sekmen","doi":"10.1109/SECON.2001.923107","DOIUrl":"https://doi.org/10.1109/SECON.2001.923107","url":null,"abstract":"Genetic algorithms (GA) are often well suited for multiobjective optimization problems. The major objective of this research is to optimize the war resource allocations of sorties, for a given war scenario, using genetic algorithms. The war is simulated using THUNDER software. THUNDER software is a stochastic, two-sided, analytical simulation of campaign-level military operations. The simulation is subject to internal unknown noises similar to real war cases. Due to these noises and discreteness in the simulation, as well as in real wars, an adaptive GA approach has been applied to solve this multiobjective optimization problem. Transforming this multiobjective optimization problem to a form suitable for direct implementation of GA was a major accomplishment of this research. A suitable fitness function was chosen after careful research and testing on the GA. Furthermore, the GA parameters were adaptively set to yield smoother and faster fitness convergence. Two fuzzy logic mechanisms were used to adapt the GA parameters. In the first mechanism, the mutation and crossover rates were changed adaptively. In the second mechanism, the fitness function coefficients are changed dynamically in each run. Testing results showed that the adaptive GA outperforms the conventional GA search in this multiobjective optimization problem and was effectively able to allocate forces for war scenarios.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Carnal, R. Kisner, J. Hylton, W. B. Snyder, S. S. Stevens
{"title":"Speech annunciation from highway surface grooves","authors":"C. Carnal, R. Kisner, J. Hylton, W. B. Snyder, S. S. Stevens","doi":"10.1109/SECON.2001.923122","DOIUrl":"https://doi.org/10.1109/SECON.2001.923122","url":null,"abstract":"Grooves are embedded in the pavement along the shoulders of many interstate highways in the United States to alert straying drivers with a rumbling sound. Using specially encoded grooves, speech can be annunciated instead. A groove pattern was devised that resembles a recorded phrase of human speech. The original recording was filtered to remove high frequency noise and then dynamically compressed into an equal amplitude square wave with variable pulse width. Before committing significant funding to build and test the encoded strip, the phenomenon was empirically modeled using system identification on the sound of an automobile being driven over existing rumble strips. The input was a simple periodic square wave pattern. Then, several phrases from different speakers were encoded into strip signals and used as inputs for the model. A subjective evaluation was performed to determine the most intelligible case. The selected strip was constructed by milling the groove pattern into sheets of aluminum. Tests with a truck found the fidelity of the sound was intelligible and resembled the simulated sound. An U.S. patent application has been filed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114160399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of a current-dependent arc model to arcing at a main distribution panel, a sub-panel and a branch circuit","authors":"T. Gammon, J. Matthews","doi":"10.1109/SECON.2001.923090","DOIUrl":"https://doi.org/10.1109/SECON.2001.923090","url":null,"abstract":"An arcing fault is a dangerous and unpredictable form of short circuit. Higher arcing-fault current magnitudes are often associated with greater levels of danger. Higher arc currents certainly correlate with greater potential arc-flash hazards and explosions. Within a building system, the largest arcing-fault current is available at the main distribution panel. Since an arcing fault at a sub-panel or in a branch circuit is lower in magnitude and presents less flash-hazard danger, the insidious danger is often overlooked. The magnitude of the arcing-fault current at these locations is often insufficient to immediately trip overcurrent devices, resulting in the escalation of the arcing fault. Despite modern advances in system protection, people are injured or killed each year as a result of arcing faults, initiated through either accidental physical contact or a glow-to-arc transition. The initial phases of this research involved reviewing the arc physics and re-examining the early arc models developed for low-voltage systems and developing better arc models to predict arc current magnitudes in building systems. This paper evaluates the dangers associated with arcing faults at a main distribution panel, a sub-panel, and a branch circuit of a typical building system. Factors determining arc tenacity are addressed.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of the Reliable All-informed Voice Networking (RAVEN) system in dynamic network topologies","authors":"A.C. Pease, H. Russell","doi":"10.1109/SECON.2001.923086","DOIUrl":"https://doi.org/10.1109/SECON.2001.923086","url":null,"abstract":"The RAVEN system comprises several networking algorithms designed to provide improved quality of service (QoS) for multiple voice, video, and data sessions in a direct-sequence (DS) mobile packet-radio network. The focus in this paper is on the interaction between the adaptive-transmission protocol (ATP) and least-resistance routing (LRR), two of the algorithms the RAVEN system uses for efficient network throughput. The end-to-end (ETE) efficiency of the RAVEN system is dependent on the cooperation of these protocols, and we examine their performance under multiple mobility models. Each radio generates packet radio organization packets (PROPs) to update the routing tables. We examine the sensitivity of the network performance in terms of throughput and energy efficiency at the rate that PROPs are generated.","PeriodicalId":368157,"journal":{"name":"Proceedings. IEEE SoutheastCon 2001 (Cat. No.01CH37208)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}