Abstract:
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

Abstract:
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard. We analyze a SYN flood attack and a buffer overflow attack to cause the Denial of Service (DoS) attack described in NSM. After mounting the attack in our attack testbed, we collect a data set, which is based on attributes for the attack. We then run several data mining methods with the data set using the Waikato Environment for Knowledge Analysis (WEKA). In the results, we select the decision tree algorithms with high detection rates, and choose key attributes in high level components of the trees. When we run several data mining methods again with the data set of chosen key attributes, the detection rates of most data mining methods are higher than before. We prove that our selected attack attributes, and the proposed detection process, are efficient and suitable for intrusion detection in the smart grid environment.

Abstract:
Existing imaging modalities for breast cancer screening, diagnosis and therapy monitoring, namely X-ray mammography and magnetic resonance imaging, have been proven to have limitations. Diffuse optical imaging is a set of non-invasive imaging modalities that use near-infrared light, which can be an alternative, if not replacement, to those existing modalities. This review covers the background knowledge, recent clinical outcome, and future outlook of this newly emerging medical imaging modality.

Abstract:
In this short note we announce some recent developements on the topological multi-vortex solutions of the self-dual Maxwell-Chern-Simons Higgs system. We find that all the topological solutions are admissible. We also discover that the convergence of the topological solution to the solutions of the self-dual Chern-Simons equations can be improved to be strong.

Abstract:
In this paper we rule out the possibility of asymptotically self-similar singularities for both of the 3D Euler and the 3D Navier-Stokes equations. The notion means that the local in time classical solutions of the equations develop self-similar profiles as $t$ goes to the possible time of singularity $T$. For the Euler equations we consider the case where the vorticity converges to the corresponding self-similar voriticity profile in the sense of the critical Besov space norm, $\dot{B}^0_{1, \infty}(\Bbb R^3)$. For the Navier-Stokes equations the convergence of the velocity to the self-similar singularity is in $L^q(B(z,r))$ for some $q\in [2, \infty)$, where the ball of radius $r$ is shrinking toward a possible singularity point $z$ at the order of $\sqrt{T-t}$ as $t$ approaches to $T$. In the $L^q (\Bbb R^3)$ convergence case with $q\in [3, \infty)$ we present a simple alternative proof of the similar result in \cite{hou}.

Abstract:
Let $v$ and $\o$ be the velocity and the vorticity of the a suitable weak solution of the 3D Navier-Stokes equations in a space-time domain containing $z_0 =(x_0, t_0)$, and $Q_{z_0, r} =B_{x_0, r}\times (t_0-r^2, t_0)$ be a parabolic cylinder in the domain. We show that if $v\times \frac{\o}{|\o|}\in L^{\gamma, \alpha}_{x,t} (Q_{z_0, r})$ or ${\o}\times \frac{v}{|v|}\in L^{\gamma, \alpha}_{x,t} (Q_{z_0, r})$, where $L^{\gamma, \alpha}_{x,t}$ denotes the Serrin type of class, then $z_0$ is a regular point for $v$. This refines previous local regularity criteria for the suitable weak solutions.

Abstract:
We consider possible generation of singularities of a vector field transported by diffeomorphisms with derivatives of uniformly bounded determinants. A particular case of volume preserving diffeomrphism is the most important, since it has direct applications to the incompressible, inviscid hydrodynamics. We find relations between the directions of the vector field and the eigenvectors of the derivative of the back-to-label map near the singularity. We also find an invariant when we follow the motion of the integral curves of the vector field. For the 3D Euler equations these results have immediate implications about the directions of the vortex stretching and the material stretching near the possible singularities. We also have similar applications to the other inviscid, incompressible fluid equations such as the 2D quasi-geostrophic equation and the 3D magnetohydrodynamics equations.

Abstract:
We study blow-up rates and the blow-up profiles of possible asymptotically self-similar singularities of the 3D Euler equations, where the sense of convergence and self-similarity are considered in various sense. We extend much further, in particular, the previous nonexistence results of self-similar/asymptotically self-similar singularities obtained in \cite{cha1,cha2}. Some implications the notions for the 3D Navier-Stokes equations are also deduced. Generalization of the self-similar transforms is also considered, and by appropriate choice of the transform we obtain new \textit{a priori} estimates for the 3D Euler and the Navier-Stokes equations.