A Modified Measure of Covert Network Performance

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "A Modified Measure of Covert Network Performance"

Transcription

1 A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES Abstract: In a covert network the need for secrecy is at odds with the desire for easy transmission of information Lindelauf et al [7] have defined several measures that can be used to evaluate the total erformance of a covert social network by using a roduct of individual measures of secrecy and of information transmission As one of their simlest measures of secrecy, Lindelauf et al use a modified version of the idea of neighbor connectivity Using this measure, the otimal network structure is a star grah In this aer we modify the Lindelauf measure of secrecy to include information about the connectedness (not just the order of the survival subgrah using a measure based on ideas related to Chvátal s toughness arameter We determine an uer bound on erformance of trees and conjecture that a secific class of sider grahs achieves maximum erformance We also describe several oortunities for further research Key Words: covert networks, neighbor connectivity, sider grahs, toughness Introduction In a covert network the need for secrecy is at odds with the desire for easy transmission of information A hallmark of any covert network is the idea that the discovery of one erson (one vertex in the network renders that erson and all members of the network known to him useless to the network This means the closed neighborhood of the vertex is removed from the grah roducing what has been called the survival subgrah Gunther, Hartnell, and Novakowski studied survival subgrahs from the standoint of their ability to remain connected using neighbor connectivity Lindelauf et al [7], [8] have defined several measures that can be used to evaluate the total erformance of a covert social network by using a roduct of individual measures of secrecy and of information transmission They use a standard social network notion (total distance to measure ease of information transmission As one of their simlest measures of secrecy, Lindelauf et al use a modified version of the idea of neighbor connectivity To measure a network s secrecy they calculate for each vertex the ratio of the order of the survival subgrah when this vertex is discovered (subverted to the order of the original grah, and then sum these ratios over all vertices of the grah Using this measure, the otimal network structure is a star grah The discovery of any vertex in the star, however, results in a grah that is totally disconnected or emty The urose of this aer is to modify the Lindelauf measure of secrecy to include information about the connectedness (not just the order of the survival subgrah Using this modified measure, cycles erform better than aths or stars, as seems more intuitively aealing We determine an uer bound for this new erformance measure for trees We conjecture that the otimal tree is a double star a secial tye of sider grah and we give some evidence and analysis to suort the conjecture Hartnell and Gunther [6] have identified these double star grahs as best ossible using different covert network measures thereby roviding some validation for the usefulness of the new measure introduced in this aer Definitions and Examles In order to exlain these ideas more recisely, we introduce some definitions All standard notation and terminology can be found in [0] Suose G is a grah with vertex set V For any vertex u of V, N[u] = {u} {v V v is adjacent to u} is called the closed neighborhood of u The next two definitions essentially follow Gunther and Hartnell [], [] and Gunther, Hartnell, Nowakowski [4] To subvert a vertex v of G means to remove all elements of N[v] from G The resulting induced subgrah, called the survival subgrah, is exactly the subgrah of G induced by V \ N[v] Lindelauf et al use the term discover instead of subvert, but the concet is the same The secrecy of a grah G is defined as a sum of se- E-ISSN: Issue 9, Volume, Setember 0

2 crecy values for each vertex in the grah In the scenario where we assume each vertex is equally likely to be discovered or subverted, and whenever a vertex is discovered all its neighbors are detected and therefore must be removed from the grah, the secrecy measure of Lindelauf et al is defined as follows For any grah G with vertices {v, v,, v }, TS(G = ( N[vi ] = ( N[v i ] ( This secrecy measure is combined with a standard measure for ease of information sharing, the normalized recirocal of total distance For any grah G with vertices {v, v,, v }, we use d G (v i, v j to denote the distance in G between v i and v j, suressing the subscrit whenever the grah being referred to is clear from context The total distance of G, TD(G, is defined by TD(G = d(v i, v j v i v j The information erformance, IP(G, is defined by IP(G = ( TD(G Note that information erformance is normalized with resect to K and 0 IP(G with a higher value indicating better erformance Finally, the Lindelauf measure of network erformance of grah G is simly the roduct TS(G IP(G To define a secrecy measure that includes information about the order and number of comonents of the survival subgrah, we use a modified version of toughness of a grah, an idea first defined by Chvátal [] For each vertex v i of grah G, we use c i to denote the number of comonents in the survival subgrah G N[v i ] For the rest of the aer we use the following total secrecy measure of a grah G Definition Let G be a grah with vertices {v, v,, v } The total secrecy of grah G, TS(G, is defined by TS(G = ( N[vi ] c i = ( N[vi ] c i ( This secrecy measure modifies each term of the sum in equation ( For the subversion of each vertex, the order of the survival subgrah is relaced by the average order of each comonent of the survival subgrah Using this measure we have the following definition of erformance of a grah G, Definition Let G be a grah with vertices {v, v,, v } The erformance of grah G, PERF(G, is defined by PERF(G = IP(G TS(G ( = TD(G ( N[vi ] c i ( ( N[vi ] c i = TD(G ( Note that larger values of erformance occur when the exected average order of comonents in the survival subgrah is larger and when the total distance of the original grah is smaller This is the measure of erformance that will be used for the remainder of the aer Examle To illustrate these definitions we comute the secrecy, information, and erformance for three basic grahs on vertices: cycle, ath, and star For the cycle, C, TS(C = For the ath, P, TS(P = ( N[vi ] = c i ( N[vi ] c i = = [ ( + ( + ( 4 ] = + 8 For the star, K,, TS(K, = ( N[vi ] c i = [ 0 + ( ] = E-ISSN: Issue 9, Volume, Setember 0

3 By comaring these formulas, one can see that for all 4, TS(C TS(P TS(K, The following total distance formulas for the cycle, ath, and star are easily calculated: TD(C = { 4, if is even 4, if is odd TD(P = ( and TD(K, = ( Combining these formulas and recalling that PERF(G = IP(G TS(G = ( TD(G TS(G leads to the following erformance measures for the cycle, ath, and star PERF(C = { 4( 4( PERF(P = = 4( (, if is even = 4( (, if is odd; ( ( ( + 8 = ( + 8 ( +, PERF(K, = ( ( = With a bit more algebra it can be shown that for all 5, PERF(C PERF(P PERF(K,, a result that seems to align well with other measures of network survivability Main Result The main result of this aer is the determination of a bound for erformance of trees with vertices As we analyze the erformance of trees, the following notation and definitions will be useful We denote the degree of vertex v in grah G by deg G (v We also use ts G (u to abbreviate ( N[vi ] and td G (u to abbreviate v V d(u, v In all these abbreviations we suress the subscrit whenever the grah being referred to is clear from context A u-v twig in a tree is a u v ath in which v has degree at least three, u has degree one and all other vertices on the ath have degree two We call the vertex v the base of the srig A k-twig is a twig of length k For any vertex v with deg G (v and which is adjacent to deg G (v leaves, we define a v-srig to be the subgrah induced by v and its adjacent leaves, and we call the vertex v the base of the srig Observation The basic leverage for establishing the bound is the observation that for M, whenever a M, it follows that a + c b + d M b M and c d For a given tree T, we look at the terms contributing to ts(v and to td(v for an individual vertex, or for a grou of vertices, V, and we show v V ts(v M td(v v V Then for the entire vertex set, V, of T v V ts(v M td(v v V Another imortant observation is that for any vertex u in a tree of order with c u 6, we immediately know = N[u] More- c u 6 over, for vertex u in any tree excet K,, we know td(u Hence for all vertices with c u 6, td(u /6 to show that 6 For c u, it is straightforward td(u 6, and when c u =, to show ( + 5 When c u =, however, the td(u 6 roofs are more comlex, and so are resented searately Lemma Let T be a tree of order 0 that is not K, and u be a vertex of T If c u, then td(u 6 If c u = and d T (u, then td(u 6 If c u = and deg T (u =, then td(u 6 ( + 5 Proof: Let u be a vertex of tree T, not K,, of order 0 Let c u For ease of notation we use du as an abbreviation for deg T (u Since all vertices of T \ N[u] are at least distance from u, td(u du + ( du = du Combining this with the fact that = du and recalling that c u, we have td(u du c u ( du = du c u du ( 6 c u Now let c u = If du, then there are exactly vertices that are exactly distance from u, and at least c u E-ISSN: Issue 9, Volume, Setember 0

4 du that are distance at least from u Hence td(u du ( du = du 5 When du, we have td(u du ( du 5 = 6 + du 6 When du =, the revious equation becomes td(u ( 7 = 6 + 6( 7 ( ( + 5 = ( + 5, 6 6 since we have We now begin the analysis of for a vertex td(u u with c u = Note that for any such vertex u in a tree, T, u is adjacent to deg T (u leaves and one vertex with degree Hence u is the base of a srig and is adjacent to exactly one other vertex of degree, or u is the leaf on a k-twig with k, or u is the vertex adjacent to the leaf of a k-twig for k These ossibilities are shown in Figure We begin by bounding the value of for the base of a srig td(u u z Figure : Vertex u with c u = Lemma 4 Let T be a tree of order 0 and u be a vertex of T that is the base of a srig and with c u = Let z be the vertex of T adjacent to u with deg(z = Define V = N[u] \ {z} Then V V td(u du du + (4 6du + { /6, if du 4; /5, if du = where du = deg(u Proof: Let u i, i du, be the leaves in N[u], so V = {u i i du } {u} Then = du and ts(u i = du Thus V = u ( du + (du = du For du the distance calculation, note that since c u =, there is exactly one vertex with distance from u (and from each u i So there are du vertices each of which is at least distance from u (and distance 4 from each u i Hence td(u ( du +du+ = du 4, and td(u i 4( du + (du ++ = 4 du 6 Combining these, we have V td(u = ( du 4 + (du (4 du 6 = du + (4 6du + Hence V V td(u du du + (4 6du + (4 To comlete the roof we analyze the quadratic in the denominator Since du <, the minimum value of this quadratic is realized at the min- imum value of du Substitution into the fraction in equation (4 gives the values listed in the lemma We next establish a bound for the remaining two cases when vertex u has c u =, namely when ( u is the leaf of a k-twig for k, and ( u is the vertex adjacent to the leaf of a k-twig for k u z u u* w z u u* z Case Case Case Figure : Lemma 5 Cases Lemma 5 Let T be a tree of order 0 and let u be a vertex of T with c u = that is not the base of a srig Then u is on a k-twig with base z For k =,, let V be the set of vertices on the twig, not including z For k 4, let V contain the leaf and the single vertex adjacent to the leaf of the k-twig Then V V td(u 4 Proof: For vertex u with c u = that is not the base of a srig, u is on a k-twig with base z We use cases deending on k The cases are illustrated in Figure Case : Assume vertex u is on a -twig Let z be the base of the -twig, and label the other vertex on the twig w Let V = {u, w} Again we use to abbreviate deg(z Then = and ts(w = Thus V ts(v = ( + For distance, note that there are vertices distance from u (distance from w, and there are vertices each of distance at least 4 from u (at least E-ISSN: Issue 9, Volume, Setember 0

5 from w So td(u 4( + ( + = 4 8, and td(w ( + ( + = 6 Combining we have V td(v = 7 4 Hence V ts(v V td(v Some straightforward algebra shows ( ( (5 The minimum value of the quadratic (for occurs at the maximum value of, and substituting into the quadratic yields 9+4 which is clearly nonnegative for all Hence the last inequality in equation (5 is true Case : Assume vertex u is on a -twig Then u may be the leaf or the vertex adjacent to the leaf Since we will grou these two vertices we let u be the leaf and u the vertex adjacent to it Let z be the base of the -twig, and label the other vertex on the twig w Let V = {u, u, w} In this case, =, ts(u =, and ts(w = Thus V ts(v = ( + ( + Analyzing distances as in Case, we have td(u 5( + 4( + 6 = 5, td(u 4( + ( + 4 = 4, and td(w ( +( +4 = 7 Combining we have V td(v = Hence V ts(v 5 + td(v V Some straightforward algebra shows ( (4 4 + (6 The minimum value of this quadratic occurs at the extreme values of, and Substituting each of these values into the quadratic it is easy to verify that the quadratic is nonnegative for all 0 Hence the last inequality in equation (6 is true Case : Assume vertex u is on a k-twig, k 4 As in the revious case, u may be the leaf or the vertex adjacent to the leaf Since we will grou these two vertices we let u be the leaf and u the vertex adjacent to it Let z be the base of the -twig Let V = {u, u } In this case, = and ts(u = Thus V ts(v = 5 For distances, note that there are k vertices each with distance at least k + from u Thus we have td(u (k+( k + k i = k + k+ Note that the distance between u and the other vertices is less than the distance between u and these other vertices So td(u k + k +, and we have V ts(v V td(v 5 k + ( k + Again straightforward algebra shows 5 k + ( k k + ( k (7 Note that k, and so the minimum value of the quadratic occurs at the minimum value of k We substitute k = 4 and verify that the quadratic is nonnegative for all 0 Hence the inequality in equation (7 is true We are now ready to rove the main result Main Theorem Let T be a tree of order 6 Then PERF(T 4 (8 Proof: Using the list of trees of order 0 or less in Aendix of [5], we have verified for all trees T with order, 6 9 that PERF(T 4 by direct calculation Now let T be a tree of order at least 0 We consider vertices, or grous of vertices, according to the value of c u For any vertex u with c u, we have td(u 6, by Lemma If c u = and u is the base of a srig, then by Lemma 4, V V td(u 5, where V is the set of srig vertices If c u = and u is not the base of a srig, then by Lemma 5, V V td(u 4, for the grou of vertices V described in the lemma Using Observation, it follows that ( PERF(T = V ts(v ( V td(v 4 E-ISSN: Issue 9, Volume, Setember 0

6 4 A Family of Almost Otimal Trees The trees that we conjecture have best erformance are sider grahs in which all legs, excet ossibly one, have length two Secifically, for all 7 we define the double star as follows Definition 6 The double star with 7 vertices, denoted DS, is the grah with vertex set V = {v 0, v,, v } and edge set E where the recise nature{ of E deends on the arity of If } is odd, E = {v 0, v i }, {v i, v i+ } i If is { even, E = {{v, v }} {v 0, v i }, {v i, v i+ } i } Thus the double star grah DS has one vertex, v 0, with degree together with aths of length two (-twigs if is odd, or aths of length two (-twigs and one ath of length three (- twig if is even See Figure = u V w = u V w d G (u, v + d G (v, w d G w (u, v + d G (v, w = td G w (v + d G (v, w Using this information we have TD(G = v V = = ( v V w ( = v V w v V w td G (v td G (v + td G (w (td G w (v + d G (v, w td G w (v + v V w = TD(G w + td G (w, + td G (w d G (v, w + td G (w as desired Now we calculate the erformance measures for the double stars and give a lower bound for the measures that is indeendent of arity of Theorem 8 Let DS be the double star with 7 Figure : Double stars for = 9, 0 Hartnell and Gunther [6] have shown, in informal terms, that these double stars rovide the best defense against otimal subversion strategies when one considers order of the remaining covert network and the order of the remaining comonents Thus our conjecture can be seen as being an extension of their work in the sense that we are measuring the information erformance of the network as well as its survivability as measured by secrecy erformance Before calculating the erformance of this grah, we establish useful fact for calculating total distance of any grah Lemma 7 Let G be a grah If w is a leaf of G, then TD(G w = T D(G td G (w Proof: Let G be a grah with leaf w, and use V and V w to denote the vertex sets of G and G w, resectively First we note that since w is a leaf, d G (v, u = d G w (v, u, for all u, v V w Thus td G (v = u V d G (u, v (a If is odd, PERF(DS = + ( 5 (b If is even, PERF(DS = ( ( ( + ( 8 (c For all, PERF(DS ( ( Proof: For art (a, we assume is odd Note that ts(v 0 = since DS N[v 0 ] is ( isolated vertices Next observe that for i, ts(v i = since each comonent of DS N[v i ] has exactly two vertices Finally, for each leaf ( i (, ts(v i = since the survival subgrah is connected Hence ts(v i = ts(v 0 + ts(v i + ( = + ( = + + i= ( ts(v i = + ( E-ISSN: Issue 9, Volume, Setember 0

7 So for odd, TS (DS = + (9 To calculate TD (DS we artition the vertices in the same way that we did to calculate secrecy TD (DS = td(v i = td(v 0 + Hence IP(DS = td(v i + i= td(v i = ( + ( ( ( ( + 7 = ( (8 + 6( = ( ( 5 ( TD(DS =, and so 5 PERF(DS = IP(DS TS(DS = + ( 5 when is odd For art (b, assume even, then the double star has one -twig So for all calculations we grou the vertices on each -twig For secrecy we have ts(v i = ts(v ( ts(v i + ts(v i+ ts(v + ts(v + ts(v ( ( 4 = ( + ( + ( = ( ( = 6 ( ( 4 + ( + + ( 5 = So for even, + TS (DS = ( (0 To calculate TD (DS when is even, we note that DS = DS v Since v is a leaf we use the revious lemma together with the formula for total distance of the double star with an odd number of ( vertices First we note that td DS (v = = ( 8 From the revious lemma we have TD(DS = TD(DS + ts(v So we have and IP(DS = = (( (( 5 + ( 8 = ( + ( 8 ( TD(DS = ( ( + ( 8 PERF(DS = IP(DS TS(DS = ( ( ( + ( 8 when is even For art (c, straightforward algebra verifies that the bound in art (c is less than or equal to each of the bounds in arts (a and (b It is reasonable to conjecture that a best erforming tree has only one large degree ( vertex More large degree vertices would increase the distance between eriheral vertices At the same time, if such vertices are not the bases of srigs, they would contribute smaller (comared to degree and degree vertices terms to the total secrecy sum Within this restriction, we can see that the double star has a large number of vertices that contribute the maximum ossible term to total secrecy, namely This tree however does not have the best secrecy even among sider grahs A sider grah with legs of length (-twigs has aroximately of its vertices that contribute either or Note that once the length of the leg (or twig increases beyond, each additional vertex on the leg contributes only So it would seem that legs of length or would rovide the best secrecy erformance The tradeoff comes, however, when total distance (used to measure information is considered Although, as the following roosition establishes, a sider grah with all legs of length has better secrecy than the double star of the same order, the larger total distance (worse information erformance offsets, just barely, the better secrecy erformance The total erformance is quite close, and so if secrecy were of higher imortance, one could make the case that the sider grahs with legs of length could be a better choice in certain covert network oerations E-ISSN: Issue 9, Volume, Setember 0

8 Proosition 9 Let S be the sider grah with order If S has = k + and k legs of length, then TS (S = ( + and IP(S = 4( 7 Further, for k, TS (S > TS (DS, but PERF(DS > PERF(S Proof: Let G be the sider grah with order = k + and v 0 be the one large degree vertex Label the vertices on each leg of the sider, in order, as v i+, v i+, v i+ with v i+ adjacent to v 0, and v i+ as the leaf, 0 i k To calculate TS (S, note first that ts(v 0 = since each comonent of S N[v 0 ] has exactly two vertices Next ts(v i+ = k and ts(v i+ = Hence k ts(v i = ts(v 0 + (ts(v i+ + ts(v i+ ( = + k + k( 5 k ( = + ( + ( 5 = 4 + So TS (S = ( + ( To calculate TD (S we artition the vertices in the same way that we did to calculate secrecy Note first that td(v 0 = 6k, recalling that there are 4k = legs on the sider Next td(v i+ = 4+9(k, td(v i+ = 4+(k, and td(v i+ = 6+5(k Thus TD (S = td(v i k = 6k + (4 + 6(k = k( (k = k(6k 6 = (( 6 4( ( 7 = Hence IP(S = ( TD(S =, and so 4( 7 PERF(S = IP(S TS(S = + ( 7 ( when is divisible by To see that TS (S > TS (DS when divides, we comare TS(S (see Equation with TS(DS (see Equations 9 and 0 Simle algebra shows ( + > +, for all 9, and ( + >, for all 8 Finally, to verify that DS has better overall erformance that S, we comare Theorem 8(c with Equation and note that it is easy to verify 6 ( ( + 5 > + ( 7, ( for all Direct calculation shows that PERF (DS 0 > PERF (S 0 It is interesting to note that the advantage in secrecy of these sider grahs over the double stars, TS(S TS(DS, asymtotically increases to 6, while the erformance advantage of the double stars over these sider grahs, PERF(DS PERF(S < 4, goes to 0 as increases Note that the formula for PERF(DS (from Theorem 8(c in equation drastically underestimates the actual erformance of DS for small values of Hence the erformance advantage is also underestimated Table shows secrecy and erformance measures for DS and S for selected small values of in order to give a more comlete understanding of the true relationshis TS PERF S DS S DS Table : Secrecy & Performance for DS and S E-ISSN: Issue 9, Volume, Setember 0

9 5 Further Research Since the family of double star grahs does not achieve the bound established in the main result and we have not been able to discover any trees of order at least 7 (the smallest order for which the double star is not simly a ath that erform better than the double stars, we conjecture that the bound can be imroved to the erformance of the double star of any articular order A quick review of Lemma and the lower bound for double star erformance shows that the any vertex u with c u tends to kee the erformance of a tree less than that of the double star As noted in the discussion receding Proosition 9, the vertices that can hel a tree achieve erformance larger than 6 are those with c u =, and so any attemt to lower the bound to around 6 should focus on showing that the existence of such vertices forces the existence of other vertices with larger values of In articular, the td(u bound on the contribution from vertices on srigs and twigs are rime candidates for further analysis Another aroach to showing double stars are otimal could focus on showing that under certain conditions trees with exactly one vertex of degree greater than erform better than trees with more such large degree vertices Once the tree conjecture is settled one could attemt to find high erformance grahs by focusing, erhas, on grahs that have neighbor connectivity at least For these grahs the total secrecy will be high simly because c u = for all vertices u Moreover, whenever c u = for all vertices in G, TS(G has a articularly simle form that should make analysis of overall erformance easier Secifically, TS(G = ( N[v i ] = ( N[v i] = [] G Gunther and B Hartnell, On minimizing the effects of betrayals in a resistance movement, Proc 8th Manitoba Conf on Numerical Mathematics and Comuting, Winnieg, Manitoba, Canada, 978, [] G Gunther and B Hartnell, Otimal k-secure grahs, Discrete Al Math, 980, 5 [4] G Gunther, B Hartnell, and R Nowakowski, Neighbor-connected grahs and rojective lanes, Networks 7, 987, 4 47 [5] F Harary, Grah Theory, Addison-Wesley, Reading, MA 969 [6] B Hartnell and G Gunther, Security of underground resistance movements, in Mathematical Methods in Counterterrorism, N Memon, JD Farley, DL Hicks and T Rosenorn, eds, Sringer Verlag, Wien 009, [7] R Lindelauf, P Borm, and H Hamers, The influence of secrecy on the communication structure of covert networks, Social Networks, 009, 0 7 [8] R Lindelauf, P Borm, and H Hamers, On heterogeneous covert networks, in Mathematical Methods in Counterterrorism, N Memon, JD Farley, DL Hicks and T Rosenorn, eds, Sringer Verlag, Wien 009, 5 8 [9] N Memon, J D Farley, D L Hicks and T Rosenorn, eds, Mathematical Methods in Counterterrorism, N Memon, JD Farley, DL Hicks and T Rosenorn, eds, Sringer Verlag, Wien 009, [0] D B West, Introduction to Grah Theory, second ed Prentice Hall, Providence, RI 00 ( deg(v i = ( q, where q is the number of edges This form also suggests that work on characterizing networks with fixed number of vertices and bounds on the number of edges could be fruitful Memon et al [9] contains several articles focusing on the descrition of grah models that have been alied successfully to study covert networks These articles rovide a good introduction to alications of grah theory in the study of covert networks References: [] V Chvátal, Tough grahs and hamiltonian circuits, Discrete Math 5, 97, 5 8 E-ISSN: Issue 9, Volume, Setember 0

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

As we have seen, there is a close connection between Legendre symbols of the form

As we have seen, there is a close connection between Legendre symbols of the form Gauss Sums As we have seen, there is a close connection between Legendre symbols of the form 3 and cube roots of unity. Secifically, if is a rimitive cube root of unity, then 2 ± i 3 and hence 2 2 3 In

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

2.1 Simple & Compound Propositions

2.1 Simple & Compound Propositions 2.1 Simle & Comound Proositions 1 2.1 Simle & Comound Proositions Proositional Logic can be used to analyse, simlify and establish the equivalence of statements. A knowledge of logic is essential to the

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Approximate Guarding of Monotone and Rectilinear Polygons

Approximate Guarding of Monotone and Rectilinear Polygons Aroximate Guarding of Monotone and Rectilinear Polygons Erik Krohn Bengt J. Nilsson Abstract We show that vertex guarding a monotone olygon is NP-hard and construct a constant factor aroximation algorithm

More information

United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane

United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane United Arab Emirates University College of Sciences Deartment of Mathematical Sciences HOMEWORK 1 SOLUTION Section 10.1 Vectors in the Plane Calculus II for Engineering MATH 110 SECTION 0 CRN 510 :00 :00

More information

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks 6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In

More information

PRIME NUMBERS AND THE RIEMANN HYPOTHESIS

PRIME NUMBERS AND THE RIEMANN HYPOTHESIS PRIME NUMBERS AND THE RIEMANN HYPOTHESIS CARL ERICKSON This minicourse has two main goals. The first is to carefully define the Riemann zeta function and exlain how it is connected with the rime numbers.

More information

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions

SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Lecture Notes: Discrete Mathematics

Lecture Notes: Discrete Mathematics Lecture Notes: Discrete Mathematics GMU Math 125-001 Sring 2007 Alexei V Samsonovich Any theoretical consideration, no matter how fundamental it is, inevitably relies on key rimary notions that are acceted

More information

Solutions to Exercises 8

Solutions to Exercises 8 Discrete Mathematics Lent 2009 MA210 Solutions to Exercises 8 (1) Suppose that G is a graph in which every vertex has degree at least k, where k 1, and in which every cycle contains at least 4 vertices.

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Universiteit-Utrecht. Department. of Mathematics. Optimal a priori error bounds for the. Rayleigh-Ritz method

Universiteit-Utrecht. Department. of Mathematics. Optimal a priori error bounds for the. Rayleigh-Ritz method Universiteit-Utrecht * Deartment of Mathematics Otimal a riori error bounds for the Rayleigh-Ritz method by Gerard L.G. Sleijen, Jaser van den Eshof, and Paul Smit Prerint nr. 1160 Setember, 2000 OPTIMAL

More information

Math 5330 Spring Notes Prime Numbers

Math 5330 Spring Notes Prime Numbers Math 5330 Sring 206 Notes Prime Numbers The study of rime numbers is as old as mathematics itself. This set of notes has a bunch of facts about rimes, or related to rimes. Much of this stuff is old dating

More information

Computational Finance The Martingale Measure and Pricing of Derivatives

Computational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet

More information

Fourier Analysis of Stochastic Processes

Fourier Analysis of Stochastic Processes Fourier Analysis of Stochastic Processes. Time series Given a discrete time rocess ( n ) nz, with n :! R or n :! C 8n Z, we de ne time series a realization of the rocess, that is to say a series (x n )

More information

Algorithms for Constructing Zero-Divisor Graphs of Commutative Rings Joan Krone

Algorithms for Constructing Zero-Divisor Graphs of Commutative Rings Joan Krone Algorithms for Constructing Zero-Divisor Grahs of Commutative Rings Joan Krone Abstract The idea of associating a grah with the zero-divisors of a commutative ring was introduced in [3], where the author

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Lectures on the Dirichlet Class Number Formula for Imaginary Quadratic Fields. Tom Weston

Lectures on the Dirichlet Class Number Formula for Imaginary Quadratic Fields. Tom Weston Lectures on the Dirichlet Class Number Formula for Imaginary Quadratic Fields Tom Weston Contents Introduction 4 Chater 1. Comlex lattices and infinite sums of Legendre symbols 5 1. Comlex lattices 5

More information

SECTION 6: FIBER BUNDLES

SECTION 6: FIBER BUNDLES SECTION 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann

More information

D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu

D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu Predictive Modeling of Customers in Personalization Alications with Context D.Sailaja, K.Nasaramma, M.Sumender Roy, Venkateswarlu Bondu Nasaramma.K is currently ursuing her M.Tech in Godavari Institute

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWO-DIMENSIONAL GRID

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes Chater 2 POISSON PROCESSES 2.1 Introduction A Poisson rocess is a simle and widely used stochastic rocess for modeling the times at which arrivals enter a system. It is in many ways the continuous-time

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES

FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES AVNER ASH, LAURA BELTIS, ROBERT GROSS, AND WARREN SINNOTT Abstract. We consider statistical roerties of the sequence of ordered airs obtained by taking

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

A Brief Introduction to Design of Experiments

A Brief Introduction to Design of Experiments J. K. TELFORD D A Brief Introduction to Design of Exeriments Jacqueline K. Telford esign of exeriments is a series of tests in which uroseful changes are made to the inut variables of a system or rocess

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

Precalculus Prerequisites a.k.a. Chapter 0. August 16, 2013

Precalculus Prerequisites a.k.a. Chapter 0. August 16, 2013 Precalculus Prerequisites a.k.a. Chater 0 by Carl Stitz, Ph.D. Lakeland Community College Jeff Zeager, Ph.D. Lorain County Community College August 6, 0 Table of Contents 0 Prerequisites 0. Basic Set

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit (Please, rovide the manuscrit number!) Authors are encouraged to submit new aers to INFORMS journals by means of a style file temlate, which includes the journal

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

Confidence Intervals for Capture-Recapture Data With Matching

Confidence Intervals for Capture-Recapture Data With Matching Confidence Intervals for Cature-Recature Data With Matching Executive summary Cature-recature data is often used to estimate oulations The classical alication for animal oulations is to take two samles

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

The Cubic Equation. Urs Oswald. 11th January 2009

The Cubic Equation. Urs Oswald. 11th January 2009 The Cubic Equation Urs Oswald th January 009 As is well known, equations of degree u to 4 can be solved in radicals. The solutions can be obtained, aart from the usual arithmetic oerations, by the extraction

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

TRANSCENDENTAL NUMBERS

TRANSCENDENTAL NUMBERS TRANSCENDENTAL NUMBERS JEREMY BOOHER. Introduction The Greeks tried unsuccessfully to square the circle with a comass and straightedge. In the 9th century, Lindemann showed that this is imossible by demonstrating

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Logic and Proof. George E. Hrabovsky MAST Corrections by Lawrence J. Winkler. Introduction

Logic and Proof. George E. Hrabovsky MAST Corrections by Lawrence J. Winkler. Introduction Logic and Proof George E. Hrabovsky MAST Corrections by Lawrence J. Winkler Introduction In what follows, I will begin by giving an overview of logic. Then I will resent a large number of arguments by

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly Lecture 0: Monooly. c 009 Je rey A. Miron Outline. Introduction. Maximizing Pro ts. Examles: Linear Demand Curves and Monooly. The Ine ciency of Monooly. The Deadweight Loss of Monooly. Price Discrimination.

More information

Synchronizing Time Servers. Leslie Lamport June 1, 1987

Synchronizing Time Servers. Leslie Lamport June 1, 1987 Synchronizing Time Servers Leslie Lamort June 1, 1987 c Digital Equiment Cororation 1987 This work may not be coied or reroduced in whole or in art for any commercial urose. Permission to coy in whole

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Flying Things. Preparation and Materials. Planning chart. Using This Activity. 174 Activity 20 Flying Things The Math Explorer.

Flying Things. Preparation and Materials. Planning chart. Using This Activity. 174 Activity 20 Flying Things The Math Explorer. Leader Overview ACTIVITY 20 Flying Things Making and testing aer airlanes is great fun and will burn off some energy on a rainy day. In this activity, math is used to make a aer airlane contest fair and

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

lecture 25: Gaussian quadrature: nodes, weights; examples; extensions

lecture 25: Gaussian quadrature: nodes, weights; examples; extensions 38 lecture 25: Gaussian quadrature: nodes, weights; examles; extensions 3.5 Comuting Gaussian quadrature nodes and weights When first aroaching Gaussian quadrature, the comlicated characterization of the

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree The Priority R-Tree: A Practically Efficient and Worst-Case Otimal R-Tree Lars Arge Deartment of Comuter Science Duke University, ox 90129 Durham, NC 27708-0129 USA large@cs.duke.edu Mark de erg Deartment

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

BOUNDARY EDGE DOMINATION IN GRAPHS

BOUNDARY EDGE DOMINATION IN GRAPHS BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 0-4874, ISSN (o) 0-4955 www.imvibl.org /JOURNALS / BULLETIN Vol. 5(015), 197-04 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA

More information

The Optimal Sequenced Route Query

The Optimal Sequenced Route Query The Otimal Sequenced Route Query Mehdi Sharifzadeh, Mohammad Kolahdouzan, Cyrus Shahabi Comuter Science Deartment University of Southern California Los Angeles, CA 90089-0781 [sharifza, kolahdoz, shahabi]@usc.edu

More information

ABSOLUTELY ABNORMAL NUMBERS GREG MARTIN

ABSOLUTELY ABNORMAL NUMBERS GREG MARTIN ABSOLUTELY ABNORMAL NUMBERS GREG MARTIN arxiv:math/0006089v2 [math.nt] 7 Nov 2000. Introduction A normal number is one whose decimal exansion or exansion to some base other than 0 contains all ossible

More information

The Graphical Method. Lecture 1

The Graphical Method. Lecture 1 References: Anderson, Sweeney, Williams: An Introduction to Management Science - quantitative aroaches to decision maing 7 th ed Hamdy A Taha: Oerations Research, An Introduction 5 th ed Daellenbach, George,

More information

8.7 Mathematical Induction

8.7 Mathematical Induction 8.7. MATHEMATICAL INDUCTION 8-135 8.7 Mathematical Induction Objective Prove a statement by mathematical induction Many mathematical facts are established by first observing a pattern, then making a conjecture

More information

PARAMETER CHOICE IN BANACH SPACE REGULARIZATION UNDER VARIATIONAL INEQUALITIES

PARAMETER CHOICE IN BANACH SPACE REGULARIZATION UNDER VARIATIONAL INEQUALITIES PARAMETER CHOICE IN BANACH SPACE REGULARIZATION UNDER VARIATIONAL INEQUALITIES BERND HOFMANN AND PETER MATHÉ Abstract. The authors study arameter choice strategies for Tikhonov regularization of nonlinear

More information

Discrete Stochastic Approximation with Application to Resource Allocation

Discrete Stochastic Approximation with Application to Resource Allocation Discrete Stochastic Aroximation with Alication to Resource Allocation Stacy D. Hill An otimization roblem involves fi nding the best value of an obective function or fi gure of merit the value that otimizes

More information

HYPOTHESIS TESTING FOR THE PROCESS CAPABILITY RATIO. A thesis presented to. the faculty of

HYPOTHESIS TESTING FOR THE PROCESS CAPABILITY RATIO. A thesis presented to. the faculty of HYPOTHESIS TESTING FOR THE PROESS APABILITY RATIO A thesis resented to the faculty of the Russ ollege of Engineering and Technology of Ohio University In artial fulfillment of the requirement for the degree

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

where a, b, c, and d are constants with a 0, and x is measured in radians. (π radians =

where a, b, c, and d are constants with a 0, and x is measured in radians. (π radians = Introduction to Modeling 3.6-1 3.6 Sine and Cosine Functions The general form of a sine or cosine function is given by: f (x) = asin (bx + c) + d and f(x) = acos(bx + c) + d where a, b, c, and d are constants

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Maximizing the Area under the ROC Curve using Incremental Reduced Error Pruning

Maximizing the Area under the ROC Curve using Incremental Reduced Error Pruning Maximizing the Area under the ROC Curve using Incremental Reduced Error Pruning Henrik Boström Det. of Comuter and Systems Sciences Stockholm University and Royal Institute of Technology Forum 100, 164

More information

5 Elliptic Curves in Cryptography

5 Elliptic Curves in Cryptography Crytograhy (art 5): Ellitic Curves in Crytograhy (by Evan Dummit, 2016, v. 1.00) Contents 5 Ellitic Curves in Crytograhy 1 5.1 Ellitic Curves and the Addition Law................................... 1 5.1.1

More information

Stat 134 Fall 2011: Gambler s ruin

Stat 134 Fall 2011: Gambler s ruin Stat 134 Fall 2011: Gambler s ruin Michael Lugo Setember 12, 2011 In class today I talked about the roblem of gambler s ruin but there wasn t enough time to do it roerly. I fear I may have confused some

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

A Note on Integer Factorization Using Lattices

A Note on Integer Factorization Using Lattices A Note on Integer Factorization Using Lattices Antonio Vera To cite this version: Antonio Vera A Note on Integer Factorization Using Lattices [Research Reort] 2010, 12 HAL Id: inria-00467590

More information

Software Cognitive Complexity Measure Based on Scope of Variables

Software Cognitive Complexity Measure Based on Scope of Variables Software Cognitive Comlexity Measure Based on Scoe of Variables Kwangmyong Rim and Yonghua Choe Faculty of Mathematics, Kim Il Sung University, D.P.R.K mathchoeyh@yahoo.com Abstract In this aer, we define

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

Theoretical comparisons of average normalized gain calculations

Theoretical comparisons of average normalized gain calculations PHYSICS EDUCATIO RESEARCH All submissions to PERS should be sent referably electronically to the Editorial Office of AJP, and then they will be forwarded to the PERS editor for consideration. Theoretical

More information