Usage of LCG/CLCG numbers for electronic gambling applications

Size: px
Start display at page:

Download "Usage of LCG/CLCG numbers for electronic gambling applications"

Transcription

1 Usage of LCG/CLCG numbers for electronc gamblng applcatons Anders Knutsson Smovts Consultng, Wenner-Gren Center, Sveavägen 166, Stockholm, Sweden Abstract. Several attacks and weaknesses aganst the Lnear Congruental Generator (LCG) have been shown n lterature, but not descrptons how these attacks successfully can be used n practce aganst gamng applcatons that use LCG values. Ths paper presents results from mplementatons of dfferent attack methods aganst an nternet casno roulette game usng an LCG. It s shown that the casno cannot prevent attacks by decreasng the nterval of reseedng the generator wthn reasonable lmts. The attack methods dscussed are the attack by Freze et al, a brute force attack and an attack called the chosen gap method, the latter ntroduced n ths paper. 1. Introducton Pseudo random numbers are often used nstead of real random values when speed to create numbers s mportant as s the case for electronc gamblng applcatons. One popular pseudo random generator s the Lnear Congruental Generator (LCG). Ths generator s suggested to be used when mplementng casno games by the Swedsh lottery authorty [7]. The LCG has been shown to be unsafe by several publcatons. Boyar [1] and Krawczyk [4] showed that a generator value can be predcted gven a polynomal bounded number of earler values wthout the knowledge of the LCG constants a, b and m. Freze, Hastad, Kannan, Lagaras and Shamr [] showed that truncated values generated by an LCG, wth known a and m, may n many cases be restored when gven the most sgnfcant bts, the least sgnfcant bts or any other wndow of bts. The probablty of a successful reconstructon ncreases wth more knowledge, as more bts of each value or more values. Stern [8] showed that the knowledge of a and m could be omtted, as long as more knowledge n the form of bts of values and number of values can be had. Ths paper wll show the results of an mplementaton of the work of Freze et al. n a casno envronment and show that these attacks cannot be prevented by decreasng the nterval of reseedng, as long as the casno demands that many more bts n the form of pseudo randomness shall be produced than bts of real randomness s gven to the generator. Comparsons are made to a brute force attack and a method called the chosen gap attack.

2 Anders Knutsson. Prerequstes The lnear congruence generator, LCG produces a sequence X accordng to the mathematcal functon (1). Let X 0 be the seed,.e. the frst value n the sequence and a real random nteger value. The LCG has three postve ntegers a, b and m. X = ( ax 1 + b) mod m (1) The sequence X has values n the nterval [0, m-1] and the perod wll at a maxmum be m. The LCG passes the usual statstcal tests when ntalzed and used properly. How the ntegers a, b and m should be chosen s nvestgated by Knuth [3]. Roulette s used as an example of a gamblng applcaton n ths paper. A partcpant n the game chooses one or several numbers out of 37 or 38 (Amercan roulette). A wnnng gves a proft of 35 tmes the wager. Snce the chance of wnnng s 1 of 37 and the reward s just 36 to 1, the player wll on average lose.7% of the wagered money n each game. Roulette values s created by takng the sequence X wth values n the nterval [0, m-1] and produce the sequence Y wth values between 0 and 36 by: Y mod 37 () X Ths corresponds to usng the least sgnfcant bts of the pseudo random value. Another alternatve s to use the most sgnfcant bts: X Y 37 In ths paper the method () s used for the examples. If m s not dvsble by 37 the hghest values are dscarded to not make the dstrbuton dstorted. The value Y s output by the roulette and publcly known. It s assumed that a, b and m are known or correctly guessed by the attacker. To guess a, b and m s not too dffcult, snce there exsts lsts of known good constants and mplementatons are lkely to use one of these confguratons. Values for other games could be retreved n much the same way. A slot machne wth 0 dfferent symbols on each wheel could use () but wth mod 0 nstead of mod 37. Two LCGs can be combned to create a combned lnear congruence generator, CLCG. Wth good constants n the underlyng LCGs the generator has a perod that s the product of the perod of each LCG. The frst CLCG presented was the Wchmann and Hll generator [9]. The equvalence between ths generator and an LCG was shown by Zesel [10]. Later L Ecuyer [6] presented another CLCG defnton. Ths generator s not equvalent to, but can be approxmated by, an LCG. The Freze et. al. algorthm can be used to predct CLCGs of the Wchmann-Hll type, whle the added nose n the L Ecuyer CLCG prevents us from usng the algorthm, when the known bts of the values are the least sgnfcant bts. However f the known bts are the most sgnfcant bts, the L Ecuyer CLCG can be exposed, snce the nose s n the least sgnfcant bts and the L Ecuyer CLCG would gve the (3)

3 Usage of LCG/CLCG numbers for electronc gamblng applcatons 3 same truncated sequence as a correspondng LCG. Ths s also true f a wndow of bts s used, and no part of the wndow ncludes any of the nosy bts. Also other forms of congruental generators can be predcted by the Freze et al. attack, such as a multvarate lnear congruence. Whle polynomal congruental generators cannot be predcted, snce the attack method demands lnear congruences. A brute force attack may stll be used dependng on the sze of the perod. 3. Results of mplementatons Ths secton presents results about how many seen values n a roulette game that wll suffce to do a correct predcton by the method by Freze et al [] and a brute force attack. What we are nterested n s to compare the number of bts that have been presented by the roulette when ths happens to the number of bts needed to seed the generator and calculate a quotent of these values n the followng manner: btsobserved Quotent = bts n seed If ths quotent s no more than 1 no more bts could be extracted from the generator before a reseedng s needed, than the number of bts of real randomness gven to the generator as seed. The nterval between reseedngs s then so small that t would be better to use the real randomness drectly to create roulette values. (4) 3.1. Freze et al. attack method The Freze et al. method requres the knowledge of a and m, whle b may stay unknown. The reason why b may be unknown s that the sequence of dfferences between consecutve values can be predcted as well as the sequence of values. The sequence s defned as: X X (5) X +1 Snce the actual values of X are not known but Y, only a part of X wll be known. Ths part s here denoted Y. The sequence Y s created by subtractng consecutve values n the sequence Y wth each other. Usng values n the Y sequence to reconstruct the values n the X sequence accordng to the attack method, a predcton for the value Y +1 can be done: Y + 1 Y + X mod 37 or Y+ 1 Y + X m mod 37 (6) The left alternatve s true f X + X m (7) < Otherwse the rght alternatve s true. Snce t s always true that

4 4 Anders Knutsson X + X < m (8) there are only two optons. We cannot know whch of these optons s true, snce we cannot calculate X, lackng the knowledge of b. Therefore we bet on both numbers. Equaton (9) below shows the Rpley LCG generator, recommended as a good generator for casno mplementatons [7]. 3 = ( X 1 + 1) mod X (9) The Rpley generator s ntalzed wth the seed and the method () s used to create roulette values. The twelve frst output values are 15, 1, 3, 3, 5, 1, 5, 19, 9, 7, 4 and 4. The attacker tres to make predctons after havng seen sx values and the attempts are shown n table 1. It s unlkely to fnd a unque reconstructon before ths snce t takes at least sx values to be lkely to have a unque followng value. Ths can be shown by nvestgatng how many values between 0 tll 36 that can be represented by 3 bts: 1 n (10) 3 = 1 n = log37 3 n The formula above also shows how many roulette values that could be created by the seed of 3 bts that the Rpley generator uses. Table 1. Predcton of roulette values created from a Rpley LCG and transformed usng (). Predctng Predcton Real Value Result 7 16 or 3 5 Faled 8 or 9 19 Faled 9 or 9 9 Succeeded 10 0 or 7 7 Succeeded 11 4 or 31 4 Succeeded 1 4 or 31 4 Succeeded Fgure 1 shows how often the predctons succeed. The 6 th consecutve value s predcted after seeng the fve earler, the 7 th after seeng the sx earler values and so on. Ths s done three tmes wth 1000 sequences n each test batch. The 3000 seeds are chosen pseudo randomly. If the sequence were truly random we ought to wn around of % of the games. The test shows that there s a great chance to get a correct predcton for the 8 th value, demandng a reseedng after seven values to not gve an attacker a statstcal advantage. Knowng that a real random value of 3 bts was used to seed the sequence and that seven values correspond to 36.5 bts, the quotent of how many tmes more bts that can be used of the generator s output than the seed, s 1.14,.e. only 1.14 tmes more nformaton can be receved from the Rpley generator than was put n.

5 Usage of LCG/CLCG numbers for electronc gamblng applcatons 5 Number of correct predctons Predctng value no. Random Test1 Test Test3 Fg. 1. How many of 1000 sequences that were rghtly predcted for the Rpley LCG (9), and the expected number of wnnngs f the sequences were truly random. The value m s qute small for the Rpley generators and a brute force attack could be used just as well as the Freze et al. method. The next test uses an LCG wth a much larger m. Ths LCG s taken from [5]: X = X 1 mod (11) By the same reasonng as n equaton (10) 1 values are probably needed to get a unque reconstructon. n 1 (1) = 1 n The generator needs 6 bts of real randomness to be confgured wth each value n the sequence havng the same chance of beng the seed. The results presented n fgure show that more than 14 values should not be output. Ths corresponds to 7.9 bts and a quotent of It can thereby be seen that also for ths larger generator no or not much hgher percentage of bts can be output than was gven to t as seed.

6 6 Anders Knutsson Number of correct predctons Predctng value no. Random Test1 Test Test3 Fg.. How many of 1000 sequences were rghtly predcted for the generator of (11), and the expected number of wnnngs f the sequences were truly random. 3.. Brute force approach Wth the knowledge of Y as defned by (), many values for X cannot be true. Only m/37 dfferent values for X are possble. A brute force approach s to test for every possble X f the followng value X +1 mod 37 s equal to Y +1. If that s true we contnue to test for X + and so on. If t s not, we nvestgate the next possble value for X and se f we have better luck. Ths takes rather long tme even for such a small m as defned by the Rpley generator. The tme can be bettered wth a constant by dong some observatons. Take two values X and X +1 that match Y and Y +1 after a modular reducton wth 37. We wll call the next matchng values nextmatch(x ) and nextmatch(x +1 ). We can make a calculaton on how much larger nextmatch(x ) must be than X. Let nextmatch( X ) = X + 37k (13), then nextmatch( X + 1 ) = ax + 37ka + b X ka mod m (14) We now calculate the smallest k that fulfls the followng congruence: X + 1 mod 37 = ( X ka modm) mod37 (15) The next value to be tested s 37k larger than the last one. Ths decreases the nvestgaton tme, but snce the decrease s by a constant the method wll take to much tme to be of any use f the perod s much larger than the m of the Rpley generator.

7 Usage of LCG/CLCG numbers for electronc gamblng applcatons 7 From equaton (10) we are nclned to suspect that 6 values ought to be enough to have a great chance for a unque suggeston for the next value output by the Rpley generator. But t s not necessary for the attacker to be absolutely sure what the next value s. If we collect statstcs on how large the probablty s for every value from 0 to 36 to be next, we know that t wll be proftable n the long run to play on any value that has larger probablty than 1/36 to be next. Therefore statstcal advantage s had even when predctng the 6 th value, gvng a quotent below 1, meanng fewer bts can safely be used of the generators values than were used n the seed. It would therefore be better to use the real randomness from the seed to decde the roulette values. 4. Chosen Gap Method For the chosen gap method, based on some known weaknesses of the LCG, the attacker must be able to choose a gap n the sequence when he s not playng. Ths gap must not be as large as a perod; then t would be trval to do the predcton. For ths secton t s convenent to rewrte the LCG n the followng way: X = a X j=0 The method s shown usng a small LCG: j a b mod m ( ) mod 6075 = X (16) X (17) The perod s 6075, a full-perod. But f b s changed to be 0, whle keepng the same a and m, the perod s just 405. Ths means that the followng s true. 405 t a 1 mod 6075 for any t (18) Two values at a dstance of 405t are related n the followng way: X = X 405t 1 j 405t + j= 0 a b mod m (19) Wth a, b and m known the dfference between the two values can be calculated. When workng wth the truncated sequence Y as defned by (), the dfference to a value 405t later s calculated to be 405t 1 j a j= 0 When the value 405t 1 b mod m mod 37 or j a b mod m + m mod 37 j= 0 405t 1 j j= 0 a b mod m (0) (1)

8 8 Anders Knutsson s close to 0 or m one of the possble values has a greater possblty to be the correct one. But we can always cover both choces by placng a double bet. The method can be used also for CLCG. The problem for the attacker wth the CLCG compared to the LCG s that the whole prevous values are not enough to be able to predct the next value, snce two sequences cover each other. Let a CLCG be made of generators producng sequences V and W respectvely. The output X from the CLCG s defned accordng wth () wth m x as the modulus of sequence X: X = ( V W ) mod m () A usual confguraton of the constants s those presented n [5] or [6]. For these generators t s true that two values half the perod apart added together gve m. Ths follows from Fermat s theorem. a m 1 m 1 m 1 mod m 1 a a x mod m 1 A value half a perod away from X can be calculated to be: X m 1 + = a m 1 X mod m X ( m 1) mod m X mod m = m X If we have two values that are half the perod of the W sequence apart, we add these two values wth m w, the constant m of generator W, to get rd of the nfluence of the W sequence. The result s denoted T. As mw 1 w x mw x (3) (4) T = X + X + m mod m V + V mod m (5) V mw 1 + a mw 1 v V mod m, V can be calculated to be one of three alternatves dependng on how many modular reductons that have occurred n (5), whch s no more than two. ( T + tm V m a x w 1 v mod m + 1 v ) mod m v v,0 t Therefore the whole sequence V can be calculated and by the same method W can also be calculated. However, n the gamblng applcaton we do not get the sequence X but nstead Y as defned by (). The same procedure s used, but as we only get a part of each value more values are needed to be able to make the reconstructon. T s calculated as: T = X + X m 1 mw mod m w + x + mod 37 (6) (7) (8)

9 Usage of LCG/CLCG numbers for electronc gamblng applcatons 9 As before modular reductons wll play a role and the real dfference between two values may be tm x mod 37, for 0 t. Gettng several dfferences a total search could be deployed to go through the complete sequence V taken mod 37 and see f these dfferences could be found somewhere. Havng a number of values at a chosen gap for the CLCG wll therefore enable us to use a total search on the underlyng LCG to fnd future values. The number of values needed on both sdes of the half perod, n, should satsfy the followng: 37 3 n > m The same prncple can be used for CLCGs consstng of more generators. From ths aspect we fnd that t s better to have fewer larger generators than many small generators for the CLCG even f they end up to around the same perod for the CLCG, snce a small generator has a shorter half perod. We must conclude that ths method s of mnor mportance at least for the CLCGs presented n [5] and [6], snce half a perod s a bllon values and the attacker would have to wat a long tme for ths to happen and the applcaton can surely reseed before ths wll happen. x (9) 5. Problems for an attacker Whle the casno cannot stop the attacks by reseedng more often, there are several problems for the attacker that must be taken nto consderaton as the followng lst shows: Values are mssng n the observed sequence. The Freze et. al method demands that the relatons between the values are known. They do not have to be n consecutve order but ther relatve postons must be known,.e. f there are any gaps n the sequence. Gaps can occur for several reasons as for nstance that a value s dsmssed after a certan tme nterval when the game s not used. If the gaps are not known the attacker has to guess. Ths s possble f the gaps are ether small or a short nterval that the gaps are wthn s known. Values are modfed before they are used. The gamblng applcaton may make modfcaton of values as a way of makng t harder for an attacker to predct. A smple substtuton between the values s a possblty as well as a double truncaton of the values. Unknown a and m. It has been assumed that the attacker has knowledge of a and m. If the attacker uses the method by Sterner [9] the knowledge of a and m can also be omtted, wth the cost that more bts are needed for the predcton. Ths method has not been mplemented and how well t performs and how many more bts that are needed can not be gven.

10 10 Anders Knutsson 6. Conclusons In ths paper t has been shown through tests how dangerous LCG/CLCG s to use n an electronc gamblng applcaton. Not much more bts can be receved from the generator than was gven as nput as a seed before a reseedng s necessary to keep the attacker from gettng a statstcally advantage. It can also be concluded that for small generators such as the classcal Rpley generator a brute force method could be used gvng statstcally advantage even earler. The chosen gap method based on weaknesses of the LCG, showed another way of predctng values. It dd however not mprove the results compared to the other methods. Ths paper was motvated by the recommendaton n [7] to use the Rpley generator for gamng mplementatons. Nothng s sad about how many f any real casnos use ths knd of generator. 7. References [1] J. Boyar, Inferrng Sequences Produced by Pseudo-Random Number Generators, Journal of ACM, Vol. 36, p , 1989 [] A.M Freze, J. Håstad, R. Kannan, J. C. Lagaras and A. Shamr, Reconstructng Truncated Integer Varables Satsfyng Lnear Congruences, Sam J. of Computng, Vol 17, p 6-80, 1988 [3] D.E. Knuth, The Art of Computer Programmng, Volume : Semnumercal Algorthms Addson-Wesley Publshng, 1980 [4] H. Krawczyk, How to Predct Congruental Generators, CRYPTO 89, Sprngers Verlag, 1990 [5] P. L Ecuyer, S. Tezuka, Structural Propertes for two classes of combned random number generators, [6] P. L Ecuyer, Effcent and portable combned number generators, Comm. ACM 31, p , 774, 1989 [7] Lotternspektonen (Swedsh Lottery Authorty), Lotternspektonens vllkor för lotter och slumptalsgeneratorer (The Swedsh Lottery Authortes condtons for lotteres and random number generators), 00 [8] J. Stern, Secret Lnear Congruental Generators Are Not Cryptographcally secure, Proceedng of the 8 th Symposum of FOCS 1987 [9] B.A. Wchmann and I.D. Hll, An effcent and portable pseudo-random number generator, Appled Statstcs 31, , 1984 [10] H. Zesel, A remark on algorthm AS183, Appled Statstcs35, 1986

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Joe Pimbley, unpublished, 2005. Yield Curve Calculations

Joe Pimbley, unpublished, 2005. Yield Curve Calculations Joe Pmbley, unpublshed, 005. Yeld Curve Calculatons Background: Everythng s dscount factors Yeld curve calculatons nclude valuaton of forward rate agreements (FRAs), swaps, nterest rate optons, and forward

More information

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt

Examensarbete. Rotating Workforce Scheduling. Caroline Granfeldt Examensarbete Rotatng Workforce Schedulng Carolne Granfeldt LTH - MAT - EX - - 2015 / 08 - - SE Rotatng Workforce Schedulng Optmerngslära, Lnköpngs Unverstet Carolne Granfeldt LTH - MAT - EX - - 2015

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

SIMPLE LINEAR CORRELATION

SIMPLE LINEAR CORRELATION SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143 1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Finite Math Chapter 10: Study Guide and Solution to Problems

Finite Math Chapter 10: Study Guide and Solution to Problems Fnte Math Chapter 10: Study Gude and Soluton to Problems Basc Formulas and Concepts 10.1 Interest Basc Concepts Interest A fee a bank pays you for money you depost nto a savngs account. Prncpal P The amount

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Implied (risk neutral) probabilities, betting odds and prediction markets

Implied (risk neutral) probabilities, betting odds and prediction markets Impled (rsk neutral) probabltes, bettng odds and predcton markets Fabrzo Caccafesta (Unversty of Rome "Tor Vergata") ABSTRACT - We show that the well known euvalence between the "fundamental theorem of

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression.

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression. Lecture 3: Annuty Goals: Learn contnuous annuty and perpetuty. Study annutes whose payments form a geometrc progresson or a arthmetc progresson. Dscuss yeld rates. Introduce Amortzaton Suggested Textbook

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

STAMP DUTY ON SHARES AND ITS EFFECT ON SHARE PRICES

STAMP DUTY ON SHARES AND ITS EFFECT ON SHARE PRICES STAMP UTY ON SHARES AN ITS EFFECT ON SHARE PRICES Steve Bond Mke Hawkns Alexander Klemm THE INSTITUTE FOR FISCAL STUIES WP04/11 STAMP UTY ON SHARES AN ITS EFFECT ON SHARE PRICES Steve Bond (IFS and Unversty

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

A statistical approach to determine Microbiologically Influenced Corrosion (MIC) Rates of underground gas pipelines.

A statistical approach to determine Microbiologically Influenced Corrosion (MIC) Rates of underground gas pipelines. A statstcal approach to determne Mcrobologcally Influenced Corroson (MIC) Rates of underground gas ppelnes. by Lech A. Grzelak A thess submtted to the Delft Unversty of Technology n conformty wth the requrements

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Understanding the Impact of Marketing Actions in Traditional Channels on the Internet: Evidence from a Large Scale Field Experiment

Understanding the Impact of Marketing Actions in Traditional Channels on the Internet: Evidence from a Large Scale Field Experiment A research and educaton ntatve at the MT Sloan School of Management Understandng the mpact of Marketng Actons n Tradtonal Channels on the nternet: Evdence from a Large Scale Feld Experment Paper 216 Erc

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 Proceedngs of the Annual Meetng of the Amercan Statstcal Assocaton, August 5-9, 2001 LIST-ASSISTED SAMPLING: THE EFFECT OF TELEPHONE SYSTEM CHANGES ON DESIGN 1 Clyde Tucker, Bureau of Labor Statstcs James

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz

More information

The Mathematical Derivation of Least Squares

The Mathematical Derivation of Least Squares Pscholog 885 Prof. Federco The Mathematcal Dervaton of Least Squares Back when the powers that e forced ou to learn matr algera and calculus, I et ou all asked ourself the age-old queston: When the hell

More information

A frequency decomposition time domain model of broadband frequency-dependent absorption: Model II

A frequency decomposition time domain model of broadband frequency-dependent absorption: Model II A frequenc decomposton tme doman model of broadband frequenc-dependent absorpton: Model II W. Chen Smula Research Laborator, P. O. Box. 134, 135 Lsaker, Norwa (1 Aprl ) (Proect collaborators: A. Bounam,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

How Large are the Gains from Economic Integration? Theory and Evidence from U.S. Agriculture, 1880-2002

How Large are the Gains from Economic Integration? Theory and Evidence from U.S. Agriculture, 1880-2002 How Large are the Gans from Economc Integraton? Theory and Evdence from U.S. Agrculture, 1880-2002 Arnaud Costnot MIT and NBER Dave Donaldson MIT, NBER and CIFAR PRELIMINARY AND INCOMPLETE August 15, 2011

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

IN THE UNITED STATES THIS REPORT IS AVAILABLE ONLY TO PERSONS WHO HAVE RECEIVED THE PROPER OPTION RISK DISCLOSURE DOCUMENTS.

IN THE UNITED STATES THIS REPORT IS AVAILABLE ONLY TO PERSONS WHO HAVE RECEIVED THE PROPER OPTION RISK DISCLOSURE DOCUMENTS. http://mm.pmorgan.com European Equty Dervatves Strategy 4 May 005 N THE UNTED STATES THS REPORT S AVALABLE ONLY TO PERSONS WHO HAVE RECEVED THE PROPER OPTON RS DSCLOSURE DOCUMENTS. Correlaton Vehcles Technques

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Estimation of Dispersion Parameters in GLMs with and without Random Effects

Estimation of Dispersion Parameters in GLMs with and without Random Effects Mathematcal Statstcs Stockholm Unversty Estmaton of Dsperson Parameters n GLMs wth and wthout Random Effects Meng Ruoyan Examensarbete 2004:5 Postal address: Mathematcal Statstcs Dept. of Mathematcs Stockholm

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

8.4. Annuities: Future Value. INVESTIGATE the Math. 504 8.4 Annuities: Future Value

8.4. Annuities: Future Value. INVESTIGATE the Math. 504 8.4 Annuities: Future Value 8. Annutes: Future Value YOU WILL NEED graphng calculator spreadsheet software GOAL Determne the future value of an annuty earnng compound nterest. INVESTIGATE the Math Chrstne decdes to nvest $000 at

More information

Transition Matrix Models of Consumer Credit Ratings

Transition Matrix Models of Consumer Credit Ratings Transton Matrx Models of Consumer Credt Ratngs Abstract Although the corporate credt rsk lterature has many studes modellng the change n the credt rsk of corporate bonds over tme, there s far less analyss

More information

Student Performance in Online Quizzes as a Function of Time in Undergraduate Financial Management Courses

Student Performance in Online Quizzes as a Function of Time in Undergraduate Financial Management Courses Student Performance n Onlne Quzzes as a Functon of Tme n Undergraduate Fnancal Management Courses Olver Schnusenberg The Unversty of North Florda ABSTRACT An nterestng research queston n lght of recent

More information

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation Exhaustve Regresson An Exploraton of Regresson-Based Data Mnng Technques Usng Super Computaton Antony Daves, Ph.D. Assocate Professor of Economcs Duquesne Unversty Pttsburgh, PA 58 Research Fellow The

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information