Globally Periodic Behavior of Switched Single Server Flow Networks

Author(s):  
Alexey S. Matveev ◽  
Andrey V. Savkin
1999 ◽  
Vol 38 (3) ◽  
pp. 151-155 ◽  
Author(s):  
Andrey V. Savkin ◽  
Alexey S. Matveev

2002 ◽  
Vol 15 (2) ◽  
pp. 251-256 ◽  
Author(s):  
A.S. Matveev ◽  
A.V. Savkin

1979 ◽  
Vol 7 (1) ◽  
pp. 3-13
Author(s):  
F. C. Brenner ◽  
A. Kondo

Abstract Tread wear data are frequently fitted by a straight line having average groove depth as the ordinate and mileage as the abscissa. The authors have observed that the data points are not randomly scattered about the line but exist in runs of six or seven points above the line followed by the same number below the line. Attempts to correlate these cyclic deviations with climatic data failed. Harmonic content analysis of the data for each individual groove showed strong periodic behavior. Groove 1, a shoulder groove, had two important frequencies at 40 960 and 20 480 km (25 600 and 12 800 miles); Grooves 2 and 3, the inside grooves, had important frequencies at 10 240, 13 760, and 20 480 km (6400, 8600, and 12 800 miles), with Groove 4 being similar. A hypothesis is offered as a possible explanation for the phenomenon.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


2019 ◽  
Author(s):  
Sina Ansari ◽  
Laurens Debo ◽  
Seyed Iravani

Sign in / Sign up

Export Citation Format

Share Document