Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding

Size: px
Start display at page:

Download "Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding"

Transcription

1 The Iteratoal Arab Joural of Iformato Tehology, Vol. 8, No., Aprl 0 7 H-Teh Authetato for Palette Images Usg Dgtal Sgature ad Data Hdg Aroka Jasra, Regasvaguruatha Rajesh, Ramasamy Balasubramaa, ad Perumal Eswara Departmet of Computer See ad Egeerg, Maomaam Sudaraar Uversty, Ida Abstrat: A sheme that tegrates dgtal sgature ad data hdg to provde h teh authetato for palette mages s proposed ths paper. The sheme extrats dgtal sgature from the orgal palette mage ad embeds t bak to the same palette mage, avodg addtoal sgature fle. Dgtal sgature geerato s employed usg ellpt urve based publ key ryptosystem. The performae of ellpt urve based publ key ryptosystems s maly appoted by the effey of the uderlyg fte feld arthmet. Istead of dretly sedg a orgal palette mage to repets, oly the embedded opy s set assoated wth sged dgtal sgature. Expermetal results show that seurty s aheved wthout sarfg the mage qualty. Keywords: Dgtal sgature, ellpt urve ryptography, karatsuba multplato, data hdg, palette mage, ad olor mappg futo. Reeved Jue 7, 008; aepted May 7, 009. Itroduto I a deade ago, multmeda doumets are rarely avalable to the mass osumer market. However, as the rapd developmet of the pervasve dgtal formato tehology, everyoe s omputer a have hgh qualty mage ompresso, reasg etwork badwdth ad aessblty, dese portable storage meda, ad ompoudg proessg power. Nevertheless, these tehologal advaes lead to aother rss. Multmeda users had the ablty to tamper wth, produe opes of, ad llegally redstrbute dgtal otets. Wthout solvg ths seurty ssue, dgtal multmeda produts ad serves aot take off a e ommere settg. To solve ths problem, a omprehesve approah for palette mage authetato usg dgtal sgature ad data hdg tehque s trodued here. Palette mages are popular multmeda ad teret applatos. Eah palette mage s omposed of a olor palette ad a set of olor dexes. The olor palette s a lst of etres of represetatve olors the mage, ad the olor dexes are some poters to those palette etres that spefy the redgree-blue RGB) olors the mage. Use of ths type of palette mage format has the effet of mage ompresso, whh helps savg storage spae ad redug trasmsso tme. A example of palette mage s that of the Graphs Iterhage Format GIF) [6]. Dgtal sgature ad ryptography [0] are urretly two stadardzed approahes to protet dgtal otets. Dgtal sgature [4] s a eletro sgature that s used to authetate the detty of the seder of the palette mage ad to esure that the orgal doumet of the palette mage that has bee set s uhaged. Frst the mage seder extrats some formato depedet o the otet of the orgal palette mage ad erypts t to a small sze fle, whh s alled sgature. The the sgature fle s set to the repets alog wth the orgal palette mage. The repets use the same algorthm to extrat the otet-depedet formato of the reeved palette mage. If the repets extrated formato mathes wth the sgature, the owershp ad the tegrty of the reeved palette mage are authetated. A obvous drawbak of ovetoal dgtal sgature shemes s the extra badwdth eeded for trasmsso of the sgature. To overome ths drawbak, the ombed dgtal sgature [4] ad dgtal data hdg [] sheme s proposed for palette mage authetato. The bas dea of the ombato s as follows: The mage provder extrats the otet depedet sgature from the orgal palette mage, ad the embeds t bak to the same mage as a hdde data. These palette mages a oeal seret data wthout arousg suspo whe the resultg stego-mages are speted or trasmtted over the Iteret. The reever extrats the sgature ad the hdde data from the reeved mage at the same tme. If the sgature ad the hdde data math, the reeved palette mage s thought to be authet. Chh-Husa [5] proposed robust data hdg tehque palette mages. Ths dea s exteded to dgtal sgature applatos here, formg the otet-based dgtal

2 8 The Iteratoal Arab Joural of Iformato Tehology, Vol. 8, No., Aprl 0 sgature embeddg ad extrato sheme, whh s robust agast ovetoal ompresso algorthms. I ths paper, a effet Ellpt Curve Cryptography ECC) tehque usg a ew Galos feld proessor the mplemetato of ellpt urve groups s used to geerate the dgtal sgature for palette mages ad data hdg tehque usg bary valued olor- mappg futo to embed the geerated dgtal sgature oto the same palette mage. The remader of ths paper s orgazed as follows: seto, a bref desrpto of the dgtal sgature sheme s gve. I the ext seto a overvew of the data hdg tehque s gve. I Seto 4 the proposed arhteture s preseted. Expermetal results are desrbed seto 5. Coluso ad future work s gve seto 6.. Dgtal Sgature Dgtal sgatures are aalogous to the had wrtte sgatures. Dgtal sgatures ad had wrtte sgatures are based o the fat that t s very hard to fd two people wth the same sgature. A major dfferee betwee hadwrtte ad dgtal sgatures s that a dgtal sgature aot be a ostat; People use publ key ryptography to ompute dgtal sgatures by assoatg somethg uque wth eah perso. Whe publ key ryptography s used to ompute dgtal sgatures, the seder erypts the mage wth hs ow prvate key. Ths sgature a later prove the owershp, detfy a msappropratg perso, trae the marked doumet s dssemato through the etwork, or smply form users about the rghts holder or the permtted use of the data. A Dgtal Sgature Algorthm DSA) was spefed a U.S. Govermet Federal Iformato Proessg Stadard FIPS) alled the dgtal sgature stadard DSS). Its seurty [] s based o the omputatoal tratablty of the Dsrete Logarthm Problem DLP) prme order sub groups of Z P *. The Ellpt Curve Dgtal Sgature Algorthm ECDSA) s the ellpt urve aalogue of the DSA. ECDSA was frst proposed 99 by Sott Vastoe respose to Natoal Isttute of Stadards ad Tehology NIST) request for publ ommets o ther frst proposal for DSS. It was aepted 998 as a ISO Iteratoal Stadards Orgazato) stadard ISO 4888-), 999 as a ANSI Amera Natoal Stadards Isttute) stadard ANSI X9.6), 000 as a IEEE Isttute of Eletral ad Eletros Egeers) stadard IEEE 6-000) ad a FIPS stadard FIPS 86-). It s also uder osderato for luso some other ISO stadards. Fgure shows that Ellpt urves are ot ellpses. They are amed so, beause they are desrbed by ub equatos smlar to those used for alulatg the rumferee of a ellpse. A ellpt urve [, ], may be defed as a set of pots o the oordate plaes, satsfyg the equato of the form y [ + xy] = x + ax + b ) The square braket meas that the term s optoal. x ad y are varables, a ad b are ostats. However these quattes are ot eessarly real umbers; stead they may be values from ay feld.e., x, y, a & b are hose from a fte set of dstt values... Ellpt Curves over Galos Feld Ths seto defes a group ostruted from pots o ellpt urves over Galos Feld m ) [7, ] ad the effet mplemetato of operatos ths group. A o sgular ellpt urve E over GF m ), E GF m )) s the set of solutos to the followg equato wth o ordates the algebra losure of E. y + xy= x + ax + b ) where a, b are GF m ), ad b s o-zero. Suh a ellpt urve s a abelo group. The umber of pots ths group s deoted by # E GF m )).The rual property of a ellpt urve [9] s that, the resultat pot obtaed by addg two pots o the urve s also o the urve. The addto rule satsfes the ormal propertes of addto. If P = x, y ) ad Q = x, y ) are pots o the ellpt urve the addto rule has the form where x, y ) + x, y ) = x, ) ) y x = L + L+ x = x + a 4) y = + x + y 5) L x + x ) L = y + y ) / x + ) 6) x & a s GF m ) If x = x ad y = y the x = L + L+ a 7) x = L ) * y = + x 9) L = x + y / ) 0) x Aga there are some speal ases whh must be osdered: f x = x ad y = x + y the the result s zero, ad f ether pot s zero, whereas f P ad Q are ot equal t s alled pot addto. Multplato s defed by repeated addto.e., Q = kp= P+ P+ P+... k tmes ) Ths a be omputed usg pot addto ad pot doublg. I partular for a ellpt urve E, t reles o the fat that t s easy to ompute for k GF m ) ad P, Q E. Q= kp )

3 H-Teh Authetato for Palette Images Usg Dgtal Sgature ad Data Hdg 9 Fgure. Ellpt urve. The dffulty of the problem depeds o the group, ad at preset, the problem ellpt urve groups s orders of magtude harder tha the same problem a multplatve group of a fte feld. Ths feature s a ma stregth of ellpt urve ryptosystems. To perform multplato[, 8] of large umbers may) fewer operatos tha the usual brute fore tehque of log multplato GF m ) karatsuba Karatsuba ad Ofma 96), multplato of two - dgt umbers a be doe wth a bt omplexty of less tha usg dettes of the form a + b.0 + d.0 ) s equal to a + [ a+ b) + d) a bd]0 + bd.0 ) Proeedg reursvely the gves bt omplexty O log ), where log =.58 < Borwe et al. 989). The best kow boud s Olog) steps for >> Shohage ad Strasse 97, Kuth 98). The steps volved Ellpt Curve Dgtal Sgature Algorthm ECDSA) are key par geerato, sgature geerato ad sgature verfato. For sgature geerato ad verfato, the well kow Hash algorthm s used. For key par geerato Karatsuba multplato ad pot addto are employed. I key par geerato, the radom or pseudoradom teger K S s seleted to be our feld GF m ). P s a pot o the ellpt urve, kow as the geeratg pot ad s obtaed by multplyg two other pots o the ellpt urve by karatsuba multplato. The publ key K P )s obtaed by salar multplato pot addto) of K S ad P whh s aga a pot that les o the ellpt urve. The prvate key s kept as seret whereas the publ key s kow to the seder ad reever. The reever who kows about the seder's publ key a authetate the sgature usg hs prvate key. Ths esures that ayoe wth aess to the publ key of the sger may verfy the sgature. P -,j-) P,j-) P +,j-) P 4 -,j) X, j) Fgure. A Pxel X ad ts four preedet eghbours P).. Color-Orderg Relatoshp ad Color Mappg Futo for Data Hdg The dea of data hdg s to embed the seret formato dgtal sgature) by modfyg the gve palette mage [5] wthout reatg oteable artfats. The repet a orretly extrat the embedded formato from the stego mage, whle the other people are uaware of the exstee of the seret behd the stego mage. Ths s a ew data hdg tehque whh embeds data by modfyg the gve mage attrbutes lke ts olors palette mages lke GIF).Ths tehque s based o the use of a ew type of olor-orderg relatoshp, from whh a olor mappg futo s defed wth bary values as output. Frst, mage pxels are lassfed as data embeddable or oembeddable, ad oly the former oes are used to embed seret data. Whe a seret data bt s to be embedded, the data embeddable pxel s olor s adjusted based o the olor mappg futo output so that the seret formato hdde the stego mage s vsually ad statstally udetetable by the truder. Ths tehque provdes a good balae betwee stegomage qualty ad data-embeddg apaty. Ths adaptve method a be employed to oeal a moderate amout of data ad has the least modfato of pxel values. Gve a pxel X the palette mage, ts preedet eghbors are those four eghbourg pxels, amog the eght eghbourg oes a eghbourhood as show fgure. The olor orderg relatoshp s defed as follows: v > v) or v = v adr > r) or v = v adr = r adg= g) r = r adg = g adb = b ) >, f R o = ) = f <, otherwse where ad be two olors wth RGB values r, g, b ) ad r, g, b ) respetvely. The lumae value V ad V of ad s alulated as V = 0. r V = 0. r g g + 0. b + 0. b 4) Gve a pxel X the palette mage, ts preedet eghbours are defed to be those four eghbourg pxels, amog the eght eghbourg oes a eghbourhood of, whh are vsted sequee before the other four durg the le by le raster sag. More spefally, f t s loated at oordates, j) the put mage, the ts preedet eghbors are the four pxels loated at -, j),, j-), +, j-) ad -, j-). It s show Fgure. The olor mappg futo f e m s defed as:

4 0 The Iteratoal Arab Joural of Iformato Tehology, Vol. 8, No., Aprl 0 f em 0, f >, f > > = 0, f > >, f > > 0, otherwse 4 5) where ¹ through 4 ¹ are the result of sortg the values of to 4 aordg to the olor orderg relatoshp wth ¹ beg the largest. It a be see that the futo depeds o the orderg of the olor of X amog those of the four preedet eghbors of X. I addto, to redug possble qualty degradato the resultg stego mage, the pxels the over mage are lassfed to data embeddable ad oembeddable oes durg the raster sag proess. Oly data embeddable pxels are used for dgtal sgature hdg; oembeddable oes are skpped. Let be the orgal olor of a gve pxel X ad ¹ a possble replaemet for the olor palette. Whe the olor of X s, assume that the orrespodg output of the olormappg futo of X s b, ad that the orrespodg maxmum olor dfferee betwee X ad ts four preedet eghbors s β. Whe the olor of X s replaed by ¹, assume that the orrespodg values of b ad β are haged to be b¹ ad β¹ respetvely. Also assume that the umber of dstt olors of X s four preedet eghbours s α. A pxel s defed to be data embeddable f the followg three odtos are satsfed:. α s larger tha a threshold value T d.. β s smaller tha a threshold value T.. There exsts a olor ¹ wth the orrespodg b¹ beg the verse of b, ad the orrespodg β¹ beg smaller tha the threshold value T d. Or equvaletly, the data embeddablty of a pxel s defed as follows: X s data embeddable, f α>t, β<t d, ad there exsts a ¹ suh that b¹ b ad β¹ <T d. 4. Proposed Work The proposed authetato sheme s a kd of seder reever protool. The seder geerates the sgature ad serts t bak to the orgal palette mage as a hdde data. I the reever s sde, the owershp ad tegrty s verfed by omparg the sgature ad embedded data both extrated from the reeved palette mage. The proedures both seder ad reever sdes are desrbed detal below. 4.. Dgtal Sgature Geerato I sgature geerato, a geerator pot G s a salar multpled wth a ostat k the feld of GF m ) resultg a pot P) o the ellpt urve. The publ key K P ) s omputed usg K P = K P 6) S where, K S s the seret key whh s atually a radom umber from [: -]; s the umber of pxels the palette mage I P. Seret Key K S Fgure. Dgtal sgature geerato. The dgtal sgature D S ) s omputed as follows: D Palette Image I P SHA- DSA sgature geerato { SHA I ) K. K }mod) S q P + Image Dgest = 7) where, SHA s the 60 bt hash futo, K q = x mod), x s the x oordate of the pot P. Fgure shows the geerato of dgtal sgatures. Ths proess uses the hash futo of the palette mage thereby resultg the mage dgest. Hashg may be defed as the trasformato of a strg to a usually shorter ad fxed legth value or a key that represets the put palette mage I P ). Durg sgature geerato, the trasmtter s seret key K S ) s used alog wth the mage dgests to geerate a bt stream D S ). I ths applato, these bts are osdered otet depedet dgtal sgature ad wll be embedded bak to orgal palette mage as a hdde data. Thus the sgature for the mage I p s D S, K q ). 4.. Dgtal Sgature Embeddg Proess The dgtal sgature to be embedded s represeted as a bt stream, deoted as D S = d d.d. The bas dea of the data-embeddg proess s to hek eah pxel of the orgal palette mage I P ) a raster sag maer for ts data embeddablty, ad to embed eah seret bt d of D S sequetally to every data-embeddable pxel utl the bt stream of D S s exhausted. Durg eah seret bt dgtal sgature bt) embeddg step, f the bary output of the olor mappg futo f em s the same as the seret bt value to be embedded, the olor of the urretly heked data embeddable pxel s kept uhaged; otherwse s replaed wth a olor opt, alled the optmal replaemet olor for X, ths proess s show Fgure4. For a partular olor data embeddable pxel olor) the replaemet olor R ) s the olor S q Dgtal Sgature Bt Stream D S )

5 H-Teh Authetato for Palette Images Usg Dgtal Sgature ad Data Hdg wth mmum olor dfferee, seleted from ts palette. Fgure 4. Dgtal sgature hdg wth the same palette mage. Publ Key Fgure 5. Dgtal sgature extrato ad verfato. Ths s gve by, Threshold Color Orderg & Mappg Proess Yes Palette Image I P) Bt Comparso Is Math? = m, where s the olor from palette P that satsfes the odtos: R. together wth ts eghbors as put to f em yelds bary output b 0 that s the same as the dgtal sgature bt b;. X s stll data embeddable whe ts olor s set to. If the olor dfferee Optmal Color Replaemet C r) Stego-Image I s) Embeddable Pxels No Stego-Image I s ) Sha- DSA Sgature Verfato Image Dgest s smaller tha the predefed threshold T C or f N s empty the take R as the desred optmal replaemet olor opt for X ad stop; otherwse, fd the olor amog those N, whose olor dfferee from s the mmum,.e., R Dgtal Sgature Bt Stream D S Color Orderg & Mappg Proess Compare Sgatures Extrated Embedded Data Expeted Sgature R = m ε N, the take R as opt N deotes the subset. That otas the olors of the four preedet eghbors of X. Fgure the olor dfferee betwee two olors ad s the Euldea dstae betwee the RGB values r, g, b) ad r, g, b ) of ad respetvely. where [ r r ) + g g ) + b b ) ] / = 8) The resultat stego mage otas the dgtal sgature embedded to t. 4.. Verfato At the reever, the reeved stego mage I S ) s subjet to two parallel proessg amely, the DSA sgature extrato proess ad the embedded data extrato proess DSA Sgature Extrato Proess The hash futo for the stego mage I S ) s Computed usg r = SHA I ) ad also S DS = D mod ) S s alulated. The sgature s verfed usg the followg: r = r * D mod ) 9) S r = K * D mod ) 0) q S mod ) x = r.p+ r * K p K m = x where ) The sgature s aepted f K m s equal to K q Embedded Data Extrato Proess I ths proess the data embeddable pxels are detfed from the stego mage I S ). These pxels are gve as put to the ext stage.e., the olor of eah embeddable pxel ad those of ts four preedet eghbours are gve as put to the olor orderg ad mappg futo. If the output s the the extrated seret bt s take to be otherwse, 0. The extrated dgtal sgature s ompared wth the extrated embedded data for verfato. The verfato proess s show Fgure Advatages. Ths method does ot mapulate mage palettes, resultg o abormal palette struture.. Prevets the resultg stego-mages from havg outstadg pxels whh are vsually or statstally detetable.. Se ths method does ot alter the palette, t does t lude speal patters suh as Tw peaks).

6 The Iteratoal Arab Joural of Iformato Tehology, Vol. 8, No., Aprl 0 4. Ths tehque provdes a good balae betwee stego mage qualty ad data-embeddg apaty. 5. Stego mage s vsually ad statstally udetetable by the truder. 5. Expermetal Results Ths paper demostrates the feasblty of ostrutg very fast ad very seure publ key systems wth the use of karatsuba log for multplato. Some expermets are desged to prove the effey of the proposed sheme. Frst, the palette mage qualty after dgtal sgature serto s vestgated. Seodly, the maxmum umber of bts that a be embedded to the gve palette mage s alulated. The 47 7 Grl. GIF mage s used for expermets. The Peak Sgal to Nose Rato PSNR) s omputed to evaluate the embedded mage qualty. PSNR s gve by, PSNR = 0 log 0 55 / σ ) where σ s the mea square of the dfferee betwee the orgal palette mage ad the embedded oe. Fgure 6 shows the Grl mages before ad after dgtal sgature serto. No obvous degradato s observed Fgure 6 b) who s PSNR s 5.6. a) Orgal grl mage. b) Grl mage after embeddg dgtal sgature. Fgure x 7 Grl.GIF mage. Table. Maxmum umber of embeddable pxels ad quattatve. Measuremet for Varous Images. Image Total embeddable pxels T =,T d=0 T =,T d=0 PSNR Grl 47 7) Fsh 0 9) Veus 56 56) Chrome_ 0 0) Veus 5 56) From Table, t s observed that the umber of bts that a be embedded s reased, whe T s dereased ad T d s reased. Also t s lear that ths method provdes good trade-off betwee embeddg apaty ad mage qualty, ad so s qute flexble. Whe palette mages ota lmted olors that are vsually uorrelated, the proposed method a yeld embeddg results wth better vsual qualty. From the PSNR values, t s observed that ths tehque does t trodue ay vsual artfats ad the sgature a be extrated orretly. 6. Colusos ad Future Work Dgtal sgature ad data hdg are two tehques used for opyrght proteto ad authetato, respetvely. I ths paper, a ombed sgature ad watermark sheme s proposed for mage authetato. Covetoal dgtal sgature shemes usually eode the sgature a fle separate from the orgal mage, thus requre extra badwdth to trasmt t. The proposed sheme extrats sgature from the orgal mage ad embeds them bak to the mage as hdde data, avodg addtoal sgature fle. Furthermore, the sheme ot oly a verfy the authetty ad the tegrty of mages, but also a loate the llegal modfatos. Expermets show that our sheme s robust to reasoable ompresso rate whle preservg good mage qualty, ad apable to authetato. Future work wll be foused o more robust sgature extrato method ad possble ways to reover the llegally modfed stego mage. Se ths adaptve tehque does ot mapulate mage palettes, the truder aot arouse suspo for abormal palette struture ad speal patters lke tw peaks). It also prevets outstadg pxels. Ths tehque provdes good embeddg apablty keepg the stego mage qualty. But the T ad T d values should be take to aout aordg to the legth of dgtal sgature. Referees [] Agew G., Mull R., Oyszhuk I., ad Vastoe S., A Implemetato for a Fast Publ-Key Crypto Systems, Computer Joural of Cryptology, vol., o., pp. 6-79, 99. [] Agew G., Mull R., ad Vastoe S., A Implemetato of Ellpt Curve Cryptosystems over F 55, Computer Joural of IEEE o Seleted Areas Commuato, vol., o. 5, pp , 99. [] Cetrom Researh, The Ellpt Curve Cryptosystem, Certom, /dex.php/e, Last Vsted 008. [4] Elgamal T., A Publ Key Crypto Systems ad a Sgature Sheme Based o Dsrete Logarthms, Computer Joural of IEEE

7 H-Teh Authetato for Palette Images Usg Dgtal Sgature ad Data Hdg Trasatos o Iformato Theory, vol., o. 4, pp , 985. [5] Frdrh J. ad Du R., Seure Stegograph Methods For Palette Images, Proeedgs of rd Iteratoal Workshop o Iformato Hdg, Germay, pp.47-60,999. [6] GIF Color Map Stegography, www. darksde.om.au/gfshuffle, Last Vsted 008. [7] Hakerso D., Heradez J., ad Meezes J., Software Implemetato of Ellpt Curve Cryptography over Bary Felds, Proeedgs of Workshop o Cryptograph Hardware ad Embedded Systems, pp. -4, 000. [8] Karu P, Pratal Comparso of Fast Publ-Key Cryptosystems, rypto/fast_pk_rypto.pdf, Last Vsted 008. [9] Kobltz N., Ellpt Curve Cryptosystems, Proeedgs of Mathamats of Computato, pp. 0-09, 987. [0] Meezes J., Oorshot C., Vastoe S., Hadbook of Appled Cryptography, CRC press, 997. [] Mller V., Use of Ellpt Curve Cryptography, Proeedgs of CRYPTO 85, Sprger Verlag Leture Notes Computer See, pp , 986. [] Pettoals F., Aderso R., ad Kuh M., Iformato Hdg: A Survey, Proeedgs of the IEEE Speal Issue o Proteto of Multmeda Cotet, pp , 999. [] Potheval D. ad Ster J., Seurty Proofs for Sgatures, Proeedgs of Eurorypt, pp. 59-6, 996. [4] Rvest R., Shamr A., ad Adlema L., A Method for Obtag Dgtal Sgatures ad Publ-Key Cryptosystems, Computer Joural of Commuatos of the ACM, vol., o. 5, pp. 0-6, 978. [5] Tzeg C., Yag Z., ad Tsa W., Adaptve Data Hdg Palette Images by Color Orderg ad Mappg wth Seurty Proteto, Computer Joural of IEEE Tras. o Commuato, vol. 5, o. 5, pp , 004. Aroka Jasra reeved the BS ad MS degrees eletros ad ommuato egeerg 996, ad 00, respetvely, from Maomaam Sudaraar Uversty, Ida. I 997, she joed the Departmet of Eletros ad Commuato Egeerg, Karuya Isttute of Tehology, Taml Nadu ad worked for a perod of two years. I Deember 00, she joed Maomaam Sudaraar Uversty, Taml Nadu, where she s urretly workg as assstat professor the Departmet of Computer See ad Egeerg. Her researh terests lude dgtal Image Proessg, Neural etworks, data mg, mage seurty, wavelets, ad vetor quatzato. Regasvaguruatha Rajesh reeved hs BS ad MSC degrees eletros ad ommuato egeerg from Madura Kamaraj Uversty, Ida the year 988 ad 989, respetvely. He ompleted hs PhD omputer see ad egeerg from Maomaam Sudaraar Uversty the year 004. I September 99, he joed Maomaam Sudaraar Uversty where he s urretly workg as assoate professor the Computer See ad Egeerg Departmet. Hs researh terests lude dgtal mage proessg, wreless etworks, pervasve omputg, ad parallel omputg. Ramasamy Balasubramaa reeved the BS degree omputer see ad egeerg, from Bharathdasa Uversty, Truh, Ida ad MS omputer see & egeerg, from Regoal Egeerg College, Truh. Cretlly, he s dog PhD degree at Maomaam Sudaraar Uversty, Ida. Se 994, he s workg as assoate professor the Departmet of Computer See ad Egeerg, Maomaam Sudaraar Uversty. He has authored oe omputer etworks book, more tha 0 oferee papers. Hs researh terests lude mage segmetato, mage ompresso, otet-based mage retreval, ad Data Mg. Perumal Eswara reeved the MS degree omputer see ad formato tehology from Madura Kamaraj Uversty, Ida 00, ad the MS degree omputer ad formato tehology from Maomaam Sudaraar Uversty, Ida 005. He s urretly pursug the PhD the Departmet of Computer See ad Egeerg of Maomaam Sudaraar Uversty. Hs researh terests lude dgtal mage proessg, fousg o olor mage edge deteto, data mg, ad omputer vso.

A Hierarchical Fuzzy Linear Regression Model for Forecasting Agriculture Energy Demand: A Case Study of Iran

A Hierarchical Fuzzy Linear Regression Model for Forecasting Agriculture Energy Demand: A Case Study of Iran 3rd Iteratoal Coferee o Iformato ad Faal Egeerg IPEDR vol. ( ( IACSIT Press, Sgapore A Herarhal Fuzz Lear Regresso Model for Foreastg Agrulture Eerg Demad: A Case Stud of Ira A. Kazem, H. Shakour.G, M.B.

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Fuzzy Risk Evaluation Method for Information Technology Service

Fuzzy Risk Evaluation Method for Information Technology Service Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg Qasheg Zhag Yrog Huag Fuzzy Rsk Evaluato Method for Iformato Tehology Serve Outsourg 1 Qasheg Zhag 2 Yrog Huag 1 Shool of Iformats Guagdog

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Spatial Keyframing for Performance-driven Animation

Spatial Keyframing for Performance-driven Animation Eurographs/ACSIGGRAPH Symposum o Computer Amato (25) K. Ajyo, P. Faloutsos (Edtors) Spatal Keyframg for Performae-drve Amato T. Igarash,3, T. osovh 2, ad J. F. Hughes 2 The Uversty of Tokyo 2 Brow Uversty

More information

Chapter 7 Dynamics. 7.1 Newton-Euler Formulation of Equations of Motion

Chapter 7 Dynamics. 7.1 Newton-Euler Formulation of Equations of Motion Itroduto to Robots,. arry Asada Chapter 7 Dyams I ths hapter, we aalyze the dyam behavor of robot mehasms. he dyam behavor s desrbed terms of the tme rate of hage of the robot ofgurato relato to the ot

More information

Improving website performance for search engine optimization by using a new hybrid MCDM model

Improving website performance for search engine optimization by using a new hybrid MCDM model Improvg webste performae for searh ege optmzato by usg a ew hybrd MDM model Ye-hag he Isttute of ha ad Asa-Paf Studes, Natoal Su Yat-se Uversty, awa, R.O.. [email protected] Yu-Sheg Lu Departmet of

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Relaxation Methods for Iterative Solution to Linear Systems of Equations

Relaxation Methods for Iterative Solution to Linear Systems of Equations Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet [email protected] Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Compiler back end design for translating multiradio descriptions to operating system-less asynchronous processor datapaths

Compiler back end design for translating multiradio descriptions to operating system-less asynchronous processor datapaths JOURNAL OF COMPUTERS, VOL. 3, NO. 1, JANUARY 2008 7 Comler ak ed desg for traslatg multrado desrtos to oeratg system-less asyhroous roessor dataaths Daraya Guha Cetre for Hgh Performae Emedded Systems,

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Checking Out the Doght Stadard Odors in Polygamy

Checking Out the Doght Stadard Odors in Polygamy Cosstey Test o Mass Calbrato of Set of Weghts Class ad Lowers Lus Oar Beerra, Igao Herádez, Jorge Nava, Fél Pezet Natoal Ceter of Metrology (CNAM) Querétaro, Meo Abstrat: O weghts albrato oe by oe there

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

Experiencing SAX: a Novel Symbolic Representation of Time Series

Experiencing SAX: a Novel Symbolic Representation of Time Series Expereg SAX: a Novel Symbol Represetato of Tme Seres JESSIA LIN [email protected] Iformato ad Software Egeerg Departmet, George Maso Uversty, Farfax, VA 030 EAMONN KEOGH [email protected] LI WEI [email protected]

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

STATISTICAL ANALYSIS OF WIND SPEED DATA

STATISTICAL ANALYSIS OF WIND SPEED DATA Esşehr Osmagaz Üerstes Müh.Mm.Fa.Dergs C. XVIII, S.2, 2005 Eg.&Arh.Fa. Esşehr Osmagaz Uersty, Vol. XVIII, No: 2, 2005 STATISTICAL ANALYSIS OF WIND SPEED DATA Veysel YILMAZ, Haydar ARAS 2, H.Eray ÇELİK

More information

Single machine stochastic appointment sequencing and scheduling

Single machine stochastic appointment sequencing and scheduling Sgle mahe stohast aotmet sequeg ad shedulg We develo algorthms for a sgle mahe stohast aotmet sequeg ad shedulg roblem th atg tme, dle tme, ad overtme osts. Ths s a bas stohast shedulg roblem that has

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

MDM 4U PRACTICE EXAMINATION

MDM 4U PRACTICE EXAMINATION MDM 4U RCTICE EXMINTION Ths s a ractce eam. It does ot cover all the materal ths course ad should ot be the oly revew that you do rearato for your fal eam. Your eam may cota questos that do ot aear o ths

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Curve Fitting and Solution of Equation

Curve Fitting and Solution of Equation UNIT V Curve Fttg ad Soluto of Equato 5. CURVE FITTING I ma braches of appled mathematcs ad egeerg sceces we come across epermets ad problems, whch volve two varables. For eample, t s kow that the speed

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

FINANCIAL MATHEMATICS 12 MARCH 2014

FINANCIAL MATHEMATICS 12 MARCH 2014 FINNCIL MTHEMTICS 12 MRCH 2014 I ths lesso we: Lesso Descrpto Make use of logarthms to calculate the value of, the tme perod, the equato P1 or P1. Solve problems volvg preset value ad future value autes.

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Session 4: Descriptive statistics and exporting Stata results

Session 4: Descriptive statistics and exporting Stata results Itrduct t Stata Jrd Muñz (UAB) Sess 4: Descrptve statstcs ad exprtg Stata results I ths sess we are gg t wrk wth descrptve statstcs Stata. Frst, we preset a shrt trduct t the very basc statstcal ctets

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Mathematics of Finance

Mathematics of Finance CATE Mathematcs of ace.. TODUCTO ths chapter we wll dscuss mathematcal methods ad formulae whch are helpful busess ad persoal face. Oe of the fudametal cocepts the mathematcs of face s the tme value of

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes Covero of No-Lear Stregth Evelope to Geeralzed Hoek-Brow Evelope Itroducto The power curve crtero commoly ued lmt-equlbrum lope tablty aaly to defe a o-lear tregth evelope (relatohp betwee hear tre, τ,

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information