Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: (2015) ISSN:

Size: px
Start display at page:

Download "Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2386-2392 (2015) ISSN: 0975-0290"

Transcription

1 2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P ramanacsecbit@gmail.com Y.Subba Reddy Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P y.subbareddyt@gmail.com G.Rama Subba Reddy Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P subbareddy1227@gmail.com Dr.Pandurangan Ravi Professor & Princial, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P ravi_6971@gmail.com ABSTRACT Traditional comuting techniques and systems consider a main rocess device or main server, and technique details generally serially. They're non-robust and non-adative, and have limited quantity. Indifference, scientific technique details in a very similar and allocated manner, while not a main management. They're exceedingly strong, elastic, and ascendible. This aer offers a short conclusion of however the ideas from biology are will never to style new rocessing techniques and techniques that even have a number of the beneficial qualities of scientific techniques. Additionally, some illustrations are a device given of however these techniques will be used in details security rograms. Keywords Bio-Insired,comuting,networksecurity,Robust,adaitive Date of Submission: January 20, 2015 Date of Accetance: January 23, I. INTRODUCTION The ower and recognition of current comuting systems is basically as a effect of more agile and quicker CPUs and additional and additional memory convenience at low value. Yet, these traditional comuting ways, architectures, systems, and networks largely think about a central rocess unit or a central server, they method data serially, and that they rely uon humans to be rogrammed and told what to try to (and how). It has some serious drawbacks. Foremost, the systems don't seem to be awfully secure. If one a art of a system breaks down, the comlete system is useless. Second, they're not adatations. Most comuting systems don't read (or have solely restricted learning caability), and can't change or adjust to fresh or surrising things while not human intervention. Third, there's solely restricted measurability. The bigger the organization becomes, or the extra nodes are value-added to the network, the uer the emloyment of the C.P.U. Or server becomes, till it cannot method all directions or service requests during a chea time any longer. In comarison, most scientific techniques rocess details in a similar and allocated way, without the lifestyle of a central control. They usually involve a huge variety of relatively easy ersonal units, which act in similar and communicate only regionally. For examle, the mind includes a huge variety of easy nerves (more or less comarative to on-off switches), each of which is connected only to a relatively small ortion of all other nerves. Yet quantity of details handling is going on in the mind, where each neuron works only asect of the handling, but they all do so in alike. In social est hives, such as bugs and bees, a huge variety of relatively easy individuals manage to build comlex nests or find the quickest ath between the home and a food source, again in a similar and allocated way. The human immunity rocesses is another examle, where (simle) ersonal defense cells erform only asect of the comlete task, but there are many of them working together in similar. [1] This arallel and distributed rocessing method makes these systems highly robust. If some individual units in the system break down, the system as a whole will still function. In fact, it is easy to reair or relace broken units without having to shut down the entire system. Furthermore, these systems are highly scalable. As many individual units can be added as desired, since there are only local interactions involved, and there will be no overload on one articular art of the system. Finally, most systems in nature are adative, either through learning (in individual organisms) or through evolution (at the level of oulations or secies). They can adjust to changing situations or even coe with entirely new situations. So, there are many advantages in biological systems that would be desirable to have in our comuting systems. In this aer, a quick summary is given of however ideas from biology are wont to style new comuting strategies. This can be tyically mentioned as biologically galvanized comuting [1]. These strategies overcome a number of the disadvantages of ancient comuting, creating them a lot of strong, adative, and ascendible. Esecially, 3 examles

2 2387 are reviewed: (1) genetic algorithms, (2) neural networks, and (3) artificial immune systems. Moreover, for everyone of those 3 strategies, some actual alications within the sace of knowledge security also are reresented, esecially in crytograhy, life science for security, and lato and network security. The biological ideas and concets underlying the strategies reresented here are often found in any commonlace textbook on biology, like [2] and [3]. 2. Genetic Algorithms in Crytograhy [2] Genetic algorithms were develoed within the 60s and 70s by John Holland and his colleagues and students. They were used each as easy models of evolution and adatation, and as new lato algorithms to seek out sensible solutions to troublesome imrovement issues. Later, they became very fashionable as a general imrovement tool, and that they are alied with success to a good vary of issues. This section offers a quick summary of the algorithmic rule (more details are often found in [4], [5], [6], and [7]), and a few secific alications of genetic algorithms in crytograhy and writing are described. 2.1 Genetic Algorithms A Genetic Algorithm (GA) could be a unique look for technique reinforced concets from genetic and natural rogress and choice. It s one among variety of rocess techniques generally mentioned as natural evolutionary comutation (EC). rather than trying to straight fix a move, an answer is rogressed over time by keeing a oulation of (initially random) candidate alternatives, creating subsequent generations by recombining comletely different comonents of this best alternatives within the oulation. This way, new candidate evaluate tested reinforced based on current samle, wherever the look for is target-hunting by a range method that refers the (currently) best alternatives within the oulation to use to make new ( offsring ) alternatives. Given some otimization disadvantage, first an aroriate crytograhy for alicant alternatives has to be discovered. Usually, this crytograhy requires the way of ersonality ost like bit ost (i.e., ost of 0s and 1s). This is often analogous to the scientific difference between the genotye (the inherited encoding) and also the cosmetics (the real tye and aearance) of a living thing. As an examle, in chart roblems wherever some the best ossible set or artition of the nodes has to be discovered (such as a lowest rotect or most cut set), a little sequence crytograhy are often used wherever every bit lace matches to 1 articular node within the chart. Develoment of the articular alicant quality (henotye) from a given bit sequence (genotye) is finished as follows. For every bit with value one, the corresonding node within the chart is surrounded within the alicant set (or laced on one asect of the alicant artition), and for every bit with value zero, the corresonding node isn't surrounded within the set (or laced on the other asect of the artition). This way, the GA will straight look for the (much simler) lace of bit ost rather than the lace of real alicant alternatives, even as organic rogress haens at the level of genotyes. Next, a fitness function needs to be designed which can be used to evaluate candidate alternatives. The main idea is that this oerate takes as its inut an secured candidate solution (e.g., a bit string), converts this into an actual candidate solution (e.g., a artition of the nodes of a grah), and returns a variety according to how good this candidate solution is for the given issue (e.g., the count of sides between nodes from different sides of the artition for the maximum cut roblem). This number, and fitness value, indicates the goodness of a candidate solution: higher fitness values mean better solution. This way, the GA can erform choice based on these fitness rinciles, just as natural choice haens at the level of the henotyes. Given an aroriate develoment and fitness function (which have to be develoed indeendently for each otimization roblem that is considered), the real criteria is relatively simle. Suosing a bit sequence develoment is used, the rimary GA erforms as follows which is roven in Algorithm 1 (the choice and cross-over & mutation roviders are described below): Algorithm 1: Selection and Mutation rocess [12] 1. Initialize the oulation with N random bit strings ( individuals ), calculate their fitness values, and set gen=1. 2. Create a mating ool by selecting (with relacement) N individuals from the current oulation based on fitness. 3. While still individuals in the mating ool, do: a. Remove the next air of individuals ( arents ) from the mating ool. b. With robability c erform crossover between the arents to create two children. c. With robability m erform mutation on the children. d. Place the children in the new oulation. 4. Relace the revious oulation with the new oulation, calculate the fitness of all individuals, and set gen=gen If gen < M go to ste 2, otherwise sto. There are many ways in which the selection oerator can be imlemented, but the main idea is that individuals with higher fitness values, comared to the rest of the oulation, have a higher chance of being selected than individuals with lower fitness values (i.e., fitness roortionate selection). In other words, the mating ool

3 2388 will (on average) contain multile coies of the best individuals in the current oulation and no (or just a few) coies of the worst individuals. The crossover oerator literally chos u the genotyes of the arent individuals and recombines them to create offsring genotyes. The most basic method is one-oint crossover, in which a random crossover oint is first chosen (somewhere between the first and last bit), and the first art of the first arent is recombined with the second art of the second arent to create the first child (and vice versa for the second child). Usually crossover is done with a certain robability c (often set in the range [0.6;0.95]) for each air of arents. If crossover is not erformed, the children will be identical to their arents. Finally, with a usually very low robability m, mutation is erformed, where a bit is flied at random. Examles of (one-oint) crossover and mutation are shown below. In the crossover examle, the crossover oint is (randomly) chosen between the 3 rd and 4 th bit. In the mutation examle, the 0 at the 9 th osition is mutated into a 1 (shown in bold). crossover mutation Finally, the creation of new generations of candidate solutions by selection and crossover & mutation is reeated for a set number M of generations. Other stoing criteria are ossible, of course, such as reaching a certain level of fitness or a maximum amount of comuting time. In short, the main idea of the algorithm is to evolve better and better solutions by reeatedly selecting the best candidate solutions from the current oulation and recombining arts of their genotyes to create subsequent generations of candidate solutions. 2.2 Alications of Genetic Algorithms in Crytograhy and Coding A little summary of the status of the art and of still start issuing in using transformative calculation methods (such as genetic algorithms) in secret writing is resented in [8]. In crytograhy, it is very imortant know how challenging it is to break a security technique. Obviously, methods that are very challenging to crack are recommended over methods that are more quickly damaged. Crytanalysis is all about examining (or attacking ) security methods to distinguish out how comfortable or challenging they are to break. Genetic methods have been alied efficiently in this field, for examle in fighting relacement cihers [9], [10] and transosition cihers [11]. Although this does not straight cause better cihers, it does dislay where their weak oints are, which often can hel in raising them. Furthermore, in [12] an inherited criteria were utilized efficiently to discover Boolean features with good crytograhic qualities, thus dislaying how these methods can also be used straight for building security methods. An essential strategy that is frequently used in crytograhy is that of roducing seudo random numbers. Hither, the aim is to get a random act (by some deterministic method) that is every bit singular as ossible, and which bears a higher interval (i.e., it will not answer it again itself quickly). An exciting scheme, using a transformative strategy just like GAs, was resented in [13], where mobile automata (simle identical and allocated rocessing devices) were advanced to generate seudo unique figures with a higher degree of entroy. As an examle, consider rogramming methods for transmitting information. Next to offering information rotection through rotection, it is likewise imortant that information reduction is reduced during transmitting of secured data. Inherited methods have been alied efficiently to imrove so-called turbo codes [14]. In this situation, the GA was able to find a small bit better rule than what was usable at the time. These rograms are just a selection of the many oortunities of imlementing inherited methods and other transformative calculations techniques in the area of information security. Next, an introduction to sensory systems, another naturally motivated rocessing method, is rovided. 3. Neural Networks in Biometrics for Security [3] The research on neural networks was ioneered by McCulloch and Pitts in 1943 [15]. They gave a logical (mathematical) model of a simle neuron, and demonstrated that a suitably constructed network of such artificial neurons can, in rincile, comute any comutable function. Thusly, a neural network is equivalent (in terms of comutational ower) to a general Turing machine, but with a very different architecture. In this section, first the concet of neural networks is briefly surveyed. A full introduction to comuting with neural networks is rovided in [16], and more detailed info can be found in any standard textbook on neural networks, such as [17] and [18]. Next, an examle of an alication of neural networks in biometrics for security is traced. 3.1 Neural Networks A neural networks (NN) is a arallel distributed rocessing (PDP) structure that is reared after the working of the brain. It can erform calculations, in articular category of information, and rovides an examle of an alternative design of calculations as oosed to serially and centrally based calculations of conventional handling systems.

4 2389 Our minds involve many (around 10 billion) simle tissues known as nerves. Each neuron includes a mobile whole body, an axon (a ointed transmission line through which substance alerts can travel), and many dendrites (a treelike framework of many branching tentacles ), which end in synases which tye relationshis with the axons of other nerves. Basically ut, each neuron gets information (the existence or lack of signals) from other nerves through the synatic relationshis, which journey down the dendrites of the mobile whole body. Here, the information are added u, and if a certain limit is obtained the neuron delivers out an indication itself through its axon, which is then develoed an feedback to yet other nerves which are linked with its axon. Nevertheless, not all synatic relationshis are equivalent. Some are more owerful than others, and then some information has a greater weight than others. Studying is obtained by modifying the strong oints (weights) of current synatic relationshis, or by rearing new or removing old relationshis. go forward and rovide as information to the first invisible art. These nerves then generate their results which rovide as information to the next invisible art (if resent), until the ultimate, or outcome, art is achieved. The condition of the nerves in the outcome art can then be considered as the answer. For examle, in category issues, if the condition of the first outcome neuron is 1 and that of the second one is 0, the feedback linked with one category. If their last declares are changed (i.e., 0 and 1, resectively), then the feedback linked with the other category (assuming there are two sessions into which to artition the inuts). Other system architectures are of course also ossible, such as reeated systems, where relationshis can nourish returning to ast levels as well, or lines systems, where the nerves are organized in a lines with relationshis between nearby nerves. This will be exalianed in figure 2. A simlified examle of a real neuron is illustrated in the x figure below. A neuron receives inuts ( i ) from other w neurons, which are weighted ( i ) and the en added ( y ). The roduction of a neuron is a function of this weighted sum of inuts, and can in turn constitute the inut to other nerve cells inut to other neurons. In the simlest case, each inut can be either 0 (absence of signal) or 1 (resence of signal), and the outut function is a ste function such that the outut is 0 if the weighted sum of inuts is below a certain threshold value, and 1 if it is above the threshold value. In more realistic cases, the inuts and oututs are real valued numbers within some range, and the outut function is for examle a sigmoidal shae which is shown in figure 1. Figure 1: Neural Network Architecture Any variety of such nerves can be linked with each other to tye an synthetic sensory system. A conventional system structure that is often used is a nourish ahead system. In such a NN, there is one art of feedback nerves, one or more levels of hidden nerves, and one art of outcome nerves, as shown in the determine on the next web age. The nerves in the feedback art are initialized with some feedback design, and the resultss from this art Figure 2: Internal Architecture of Neural Network Given some neural network structure, it is not straight aarent how to set the loads on the relationshis to get a certain system actions. However, several coaching methods have been develoed to imrove these loads. The rimary concet of these methods is to continuously existing the system with examle information for which the aroriate resonse is known. The loads in the system are then modified based on the quantity of mistake between the aroriate resonse and that given by the system. This is recurring until no more mistakes are created, or the quantity of mistake dros below a certain limit. The system can now be said to have discovered the given rocess. At the next level, the system can be used to execute the rocess on new information which it might not have seen before. 3.2 Alications of Neural Networks in Fingerrint Recognition One lace where neural networks have become very oular is icture handling, such as design identification and category, disturbance filtration, advantage recognition, etc. As an rogram in biometrics for rotection, they can be used efficiently for finger marks identification. Finger rint identification is often divided u in two stages: (1) function removal, and (2) category. In the first level, certain functions from a finger marks icture are roduced,

5 2390 such as variety guidelines, archways and whorls, delta oints, etc. (for a more secific summary, see for examle [19]). In the second level, these functions are used to identify (or classify) the given finger marks icture. Neural systems have been used efficiently in both of these levels, often roviding increase to high correct category rices and low incorrect being rejected rices, and frequently outerforming more conventional methods (see for examle [20], [21], [22], [23], and [24]). Furthermore, sensory systems can be used in the same way for other icture identification rojects in biometrics rotection, such as retina or eye check out categories, or for seech identification. Finally, as a last examle of naturally motivated handling in the lace of information rotection, a brief summary of synthetic immunity rocesses for comuter rotection is rovided in the next section. 4. Artificial Immune Systems for Comuter Security A very recent concet that is still being develoed is that of building a c defense mechanisms. The task of such a rogram is to rovide c and network security based on the technicalities of the individual defense mechanisms. This area first rovides a high-level and somewhat simle summary of the individual defense mechanisms. A good release to this subject can be found in [25]. Next, an examle of an execution of a simle c defense mechanisms is given to demonstrate the usefulness of the concet. 4.1 The human Immune System The individual defense mechanisms is a comlicated and multi-layered rogram. The asect that is of most attention here is the flexible defense reaction. A brief summary of this is given below, with many information remaining out. However, the common qualities of this asect of the defense mechanisms rovide as a lace to start for the style of a synthetic immunity rocesses for comuter and system rotection. The body system includes many different kinds of elements (mostly roteins), which are generally known as self. Everything else, such as things that make us ill, is generally known as non-self. So, the main rocess of the defense mechanisms is to differentiate non-self from self, and induce a reaction whenever non-self necessary rotein are recognized. However, this is not always easy as there are an aroximated non-self necessary rotein that the immunity rocesses needs to identify, in comarison to about self necessary rotein. The way the defense mechanisms resolves this roblem is by using a owerful and allocated rogram. Whenever you want, many detector tissues, such as socalled T-cells, flow through our organizations. These tissues older in a body known as the thymus, where they are revealed to most of the self necessary roteins that create u our systems. If any of the growing T-cells holds to any of these self necessary roteins, that T-cell is transferred. Hence, the only T-cells that revent the thymus are those that do not unite to self necessary roteins. Therefore, if a grew u T-cell does combine to a rotein, it suggests this must be a non-self roteins, and an aroriate defense reaction will be triggered. Nevertheless, not all T-cellular telehones are caable to merge two (or recognize ) entirely ossible non-self necessary roteins, but some T-cells combine to some non-self necessary roteins, other T-cells to others, etc. In this way, the defense mechanisms is an allocated rogram. [4] It is also owerful, as T-cells are consistently changed through an inherited rocess such as the difference (or unique mutations ). This way, the set of non-self necessary rotein that the defense mechanisms is able to identify, changes eventually. Since it is imossible to identify all ossible non-self necessary rotein at any once, this owerful rogram is the next best solution. Furthermore, because of this, no two individuals will have exactly the same set of T-cells at some oint, so what might make me fed u, my next door neighbor might be safe from, and the other way around. [5] Lastly, the defense mechanisms also has a memory. It is able of keeing in mind illness-causing non-self necessary rotein (antigens), so that when a erson gets contaminated with the same antigen, it is identified instantly and an aroriate defense reaction can be activated, avoiding the real sickness from haening again. 4.2 Comuter Immunology Forrest and learners were some of the officers of using concets from the human immunity rocesses to design an attack recognition rogram for comuter systems and systems [26], [27]. In articular, in [28] they show the results of a basic execution based on checking short series of rogram hone calls. Temorarily, the idea is as follows. In the first level, a data source of rogram contact series during normal activities is built. This data source thus contains the series that reresent self. In the next level, rogram contact series are examined during rogram function that might contain attack efforts. These series are then as oosed to available data source, and any series that is not resent in the data source ( non-self ) activates an alarm. This way, irregular activities can be easily recognized, and aroriate activities can be conducted if necessary. Obviously, the data source containing regular actions have to be modified regularly. For examle, including new customers or alication and comonents to the rogram will modify the regular actions, or a user s actions might

6 2391 modify over time (different rojects, different main concerns, etc.). However, with this style, the attack recognition rogram becomes more flexible, as it is able of acknowledging irregular actions that has not been noticed before. In other terms, the rogram can recognize, for examle, new malware or new fighting systems, without the need for installing new malware signatures from some main server first. Furthermore, different comuter systems will have different data source of self actions, so a malware that infects one c, might not be able to contaminate every other c. This way, the system as a whole also has a better (distributed) security. The (small-scale) illustrations and simulator that have been alied so far indicate the stability of these concets, and dislay a aealing ucoming. Currently, the concets and styles are still being designed further, and are also being grabbed by others [29], [30]. Pc immunology and synthetic immunity rocesses are now an effective area of analysis. 5. Conclusion Traditional handling techniques have several drawbacks, such as a lack of sturdiness and flexibility, and limited scalability. In contrast, scientific techniques, being mostly similar allocated handling techniques, are highly effective, convenient, and scalable. Naturally motivated handling includes the design, execution, and alication of new c techniques and techniques that integrate these beneficial qualities of scientific techniques. In this aer, a brief summary of biologically motivated handling has been resented, with some secific examles of how these techniques can be used in details rotection in articular. Many of these techniques have already been alied efficiently, such as inherited methods and sensory networks, and some are still being further develoed, such as c immunology. It is clear that the area of details rotection can benefit greatly from these new and interesting handling techniques. References [1]. L. N. de Castro and F. J. Von Zuben, Recent Develoments in Biologically Insired Comuting. Idea Grou Publishing, [2]. S. Alters, Biology: Understanding Life. Mosby, [3]. N. A. Cambell, L. G. Mitchell, and J. B. Reece, Biology: Concets & Connections, 2 nd edition. Benjamin Cummings, [4]. J. H. Holland, Adatation in Natural and Artificial Systems. University of Michigan Press, [5]. J. H. Holland, Genetic Algorithms, Scientific American, vol. 267 (1), , [6]. D. E. Goldberg, Genetic Algorithms in Search, Otimization, and Machine Learning, Addison- Wesley, [7]. M. Mitchell, An Introduction to Genetic Algorithms. MIT Press, [8]. P. Isasi and J. C. Hernández, Introduction to the alications of evolutionary comutation in comuter security and crytograhy, Comutational Intelligence, vol. 20 (3), , [9]. R. Sillman, M. Janssen, B. Nelson, and M. Kener, Use of a genetic algorithm in the crytanalysis of simle substitution cihers, Crytologica, vol. 17 (1), , [10]. A. Clark and E. Dawson, Otimisation heuristic for the automated crytanalysis of classical cihers, Journal of Combinatorial Mathematics and Combinatorial Comuting, vol. 28, , [11]. R. A. J. Matthews, The use of genetic algorithms in crytanalysis, Crytologica, vol. 17 (2), , [12]. W. Millan, A. Clark, and E. Dawson, An effective genetic algorithm for finding Boolean functions, in Proceedings of the International Conference on Information and Communications Security, [13]. M. Sier and M. Tomassini, Co-evolving arallel random number generators, in Proceedings of the Parallel Problem Solving from Nature Conference, 1996, [14]. N. Durand, J.-M. Alliot, and B. Bartolomé, Turbo codes otimization using genetic algorithms, in Proceedings of the Congress on Evolutionary Comutation, [15]. W. S. McCulloch and W. Pitts, A logical calculus of the ideas immanent in nervous activity, Bulletin of Mathematical Biohysics, vol. 5, , [16]. R. P. Limann, An introduction to comuting with neural nets, IEEE ASSP Magazine, vol. 4,. 4-22, [17]. J. A. Anderson, Introduction to Neural Networks. MIT Press, [18]. S. Haykin, Neural Networks: A Comrehensive Foundation. Prentice-Hall, [19]. N. Ratha and R. Bolle, Eds., Automatic Fingerrint Recognition Systems. Sringer-Verlag, 2004.

7 2392 [20]. P. A. Hughes and A. D. P. Green, The use of neural network for fingerrint classification, in Proceedings of the 2 nd International Conference on Neural Networks, 1991, [21]. M. Kamijo, Classifying fingerrint images using neural networks: Deriving the classification state, in Proceedings of the 3 rd International Conference on Neural Networks, 1993, [22]. C. L. Wilson, G. T. Candela, and C. I. Watson, Neural network fingerrint classification, Journal of Artificial Neural Networks, vol. 1 (2), , [23]. H. V. Neto and D. L. Borges, Fingerrint classification with neural networks, in Proceedings of the 4 th Brazilian Symosium on Neural Networks, 1997, [24]. A Ceguerra and I. Korinska, Automatic fingerrint verification using neural networks, in Proceedings of the International Conference on Artificial Neural Networks, 2002, [25]. C. A. Janeway and P. Travers, Immunobiology: The Immune System in Health and Disease. Current Biology Ltd., 2 nd edition, [26]. S. Forrest, S. A. Hofmeyr, and A. Somayaji, Comuter Immunology, Communications of the ACM, vol. 40 (10), , [27]. A. Somayaji, S. A. Hofmeyr, and S. Forrest, Princiles of a comuter immune system, in New Security Paradigms Worksho, 1998, [28]. S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, A sense of self for Unix rocesses, in Proceedings of the IEEE Symosium on Comuter Security and Privacy, [29]. J. Kim and P. Bentley, The human immune system and network intrusion detection, in Proceedings of the 7 th Euroean Conference on Intelligent Techniques and Soft Comuting, [30]. J. Kim and P. Bentley, Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection, in Proceedings of the Congress on Evolutionary Comutation, 2002,

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

C-Bus Voltage Calculation

C-Bus Voltage Calculation D E S I G N E R N O T E S C-Bus Voltage Calculation Designer note number: 3-12-1256 Designer: Darren Snodgrass Contact Person: Darren Snodgrass Aroved: Date: Synosis: The guidelines used by installers

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

Failure Behavior Analysis for Reliable Distributed Embedded Systems

Failure Behavior Analysis for Reliable Distributed Embedded Systems Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.uni-kl.de Deartment of Comuter Science, University of

More information

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION

CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical

More information

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS

ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs

Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems

More information

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE

Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist

Sage HRMS I Planning Guide. The HR Software Buyer s Guide and Checklist I Planning Guide The HR Software Buyer s Guide and Checklist Table of Contents Introduction... 1 Recent Trends in HR Technology... 1 Return on Emloyee Investment Paerless HR Workflows Business Intelligence

More information

Drinking water systems are vulnerable to

Drinking water systems are vulnerable to 34 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129 PAGES 34-4 OCTOBER 24 Use of Systems Analysis to Assess and Minimize Water Security Risks James Uber Regan Murray and Robert Janke U. S. Environmental

More information

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models

Design of A Knowledge Based Trouble Call System with Colored Petri Net Models 2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung

More information

Provable Ownership of File in De-duplication Cloud Storage

Provable Ownership of File in De-duplication Cloud Storage 1 Provable Ownershi of File in De-dulication Cloud Storage Chao Yang, Jian Ren and Jianfeng Ma School of CS, Xidian University Xi an, Shaanxi, 710071. Email: {chaoyang, jfma}@mail.xidian.edu.cn Deartment

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

An Associative Memory Readout in ESN for Neural Action Potential Detection

An Associative Memory Readout in ESN for Neural Action Potential Detection g An Associative Memory Readout in ESN for Neural Action Potential Detection Nicolas J. Dedual, Mustafa C. Ozturk, Justin C. Sanchez and José C. Princie Abstract This aer describes how Echo State Networks

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm

Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm The Oen Alied Mathematics Journal, 2008, 2, 95-03 95 Oen Access Multistage Human Resource Allocation for Software Develoment by Multiobjective Genetic Algorithm Feng Wen a,b and Chi-Ming Lin*,a,c a Graduate

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

One-Chip Linear Control IPS, F5106H

One-Chip Linear Control IPS, F5106H One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm

http://www.ualberta.ca/~mlipsett/engm541/engm541.htm ENGM 670 & MECE 758 Modeling and Simulation of Engineering Systems (Advanced Toics) Winter 011 Lecture 9: Extra Material M.G. Lisett University of Alberta htt://www.ualberta.ca/~mlisett/engm541/engm541.htm

More information

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems

An Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco

More information

The Magnus-Derek Game

The Magnus-Derek Game The Magnus-Derek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions.

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis

Beyond the F Test: Effect Size Confidence Intervals and Tests of Close Fit in the Analysis of Variance and Contrast Analysis Psychological Methods 004, Vol. 9, No., 164 18 Coyright 004 by the American Psychological Association 108-989X/04/$1.00 DOI: 10.1037/108-989X.9..164 Beyond the F Test: Effect Size Confidence Intervals

More information

Learning Human Behavior from Analyzing Activities in Virtual Environments

Learning Human Behavior from Analyzing Activities in Virtual Environments Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Project Management and. Scheduling CHAPTER CONTENTS

Project Management and. Scheduling CHAPTER CONTENTS 6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method

More information

Expert Systems with Applications

Expert Systems with Applications Exert Systems with Alications 38 (2011) 11984 11997 Contents lists available at ScienceDirect Exert Systems with Alications journal homeage: www.elsevier.com/locate/eswa Review On the alication of genetic

More information

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State

Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY CALIFORNIA THESIS SYMMETRICAL RESIDUE-TO-BINARY CONVERSION ALGORITHM PIPELINED FPGA IMPLEMENTATION AND TESTING LOGIC FOR USE IN HIGH-SPEED FOLDING DIGITIZERS by Ross

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

Sage Timberline Office

Sage Timberline Office Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Computational Finance The Martingale Measure and Pricing of Derivatives

Computational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives

Modeling and Simulation of an Incremental Encoder Used in Electrical Drives 10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Interaction Expressions A Powerful Formalism for Describing Inter-Workflow Dependencies

Interaction Expressions A Powerful Formalism for Describing Inter-Workflow Dependencies Interaction Exressions A Powerful Formalism for Describing Inter-Workflow Deendencies Christian Heinlein, Peter Dadam Det. Databases and Information Systems University of Ulm, Germany {heinlein,dadam}@informatik.uni-ulm.de

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4

Bravo Software Group e.commerce enablers... 2 RemoteDesk... 4 Table of Contents Bravo Software Grou e.commerce enablers... 2 RemoteDesk... 4 A suite of roducts for entering orders or invoices remotely, for direct osting to your central accounting system. RemoteDesk

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Secure synthesis and activation of protocol translation agents

Secure synthesis and activation of protocol translation agents Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see

More information

Forensic Science International

Forensic Science International Forensic Science International 214 (2012) 33 43 Contents lists available at ScienceDirect Forensic Science International jou r nal h o me age: w ww.els evier.co m/lo c ate/fo r sc iin t A robust detection

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab

A Novel Architecture Style: Diffused Cloud for Virtual Computing Lab A Novel Architecture Style: Diffused Cloud for Virtual Comuting Lab Deven N. Shah Professor Terna College of Engg. & Technology Nerul, Mumbai Suhada Bhingarar Assistant Professor MIT College of Engg. Paud

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

Migration to Object Oriented Platforms: A State Transformation Approach

Migration to Object Oriented Platforms: A State Transformation Approach Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,

More information

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition

A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

The predictability of security returns with simple technical trading rules

The predictability of security returns with simple technical trading rules Journal of Emirical Finance 5 1998 347 359 The redictability of security returns with simle technical trading rules Ramazan Gençay Deartment of Economics, UniÕersity of Windsor, 401 Sunset, Windsor, Ont.,

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems

Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,

More information

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS

COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly Lecture 0: Monooly. c 009 Je rey A. Miron Outline. Introduction. Maximizing Pro ts. Examles: Linear Demand Curves and Monooly. The Ine ciency of Monooly. The Deadweight Loss of Monooly. Price Discrimination.

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN

THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari

More information

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer

Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer 4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra

More information

17609: Continuous Data Protection Transforms the Game

17609: Continuous Data Protection Transforms the Game 17609: Continuous Data Protection Transforms the Game Wednesday, August 12, 2015: 8:30 AM-9:30 AM Southern Hemishere 5 (Walt Disney World Dolhin) Tony Negro - EMC Rebecca Levesque 21 st Century Software

More information

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation

Pressure Drop in Air Piping Systems Series of Technical White Papers from Ohio Medical Corporation Pressure Dro in Air Piing Systems Series of Technical White Paers from Ohio Medical Cororation Ohio Medical Cororation Lakeside Drive Gurnee, IL 600 Phone: (800) 448-0770 Fax: (847) 855-604 info@ohiomedical.com

More information

Estimation of Reliability of a Interleaving PFC Boost Converter

Estimation of Reliability of a Interleaving PFC Boost Converter SRBIAN JOURNAL OF LCTRICAL NGINRING Vol. 7, No. 2, November 2010, 205-216 UDK: 621.314.6 stimation of Reliability of a Interleaving PFC Boost Converter Gulam Amer Sandeudi 1, Srinivasa Rao 2 Abstract:

More information

Alpha Channel Estimation in High Resolution Images and Image Sequences

Alpha Channel Estimation in High Resolution Images and Image Sequences In IEEE Comuter Society Conference on Comuter Vision and Pattern Recognition (CVPR 2001), Volume I, ages 1063 68, auai Hawaii, 11th 13th Dec 2001 Alha Channel Estimation in High Resolution Images and Image

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

A highly-underactuated robotic hand with force and joint angle sensors

A highly-underactuated robotic hand with force and joint angle sensors A highly-underactuated robotic hand with force and joint angle sensors Long Wang*, Joseh DelPreto**, Sam Bhattacharyya*, Jonathan Weisz***, Peter K. Allen*** *Mechanical Engineering, **Electrical Engineering,

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

Factoring Variations in Natural Images with Deep Gaussian Mixture Models

Factoring Variations in Natural Images with Deep Gaussian Mixture Models Factoring Variations in Natural Images with Dee Gaussian Mixture Models Aäron van den Oord, Benjamin Schrauwen Electronics and Information Systems deartment (ELIS), Ghent University {aaron.vandenoord,

More information

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling

From Simulation to Experiment: A Case Study on Multiprocessor Task Scheduling From to Exeriment: A Case Study on Multirocessor Task Scheduling Sascha Hunold CNRS / LIG Laboratory Grenoble, France sascha.hunold@imag.fr Henri Casanova Det. of Information and Comuter Sciences University

More information

Simulink Implementation of a CDMA Smart Antenna System

Simulink Implementation of a CDMA Smart Antenna System Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly Deartment of Economics Working aer No. 0309 htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information