SIP Threats Detection System

Size: px
Start display at page:

Download "SIP Threats Detection System"

Transcription

1 SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, Ostrava Poruba CZECH REPUBLIC Abstract: - The paper deals with detectio of threats i IP telephoy, the authors developed a peetratio testig system that is able to check up the level of protectio from security threats i IP telephoy. The SIP server is a key kompoet of VoIP ifrastructure ad ofte becomes the aim of attacks ad providers have to esure the appropriate level of security. We have developed web-based peetratio system which is able to check the SIP server if ca face to the most commo attacks.the developed applicatio is distributed as a ope-source ad is equipped with four modules. The result is reported to the particular ad iformatio supplemeted to the report should help to improve the overall protectio of the SIP server. The developed applicatio represets effective tool which is able to poit out the weakesses of the tested system. Key-Words: - IP telephoy, SIP server, Peetratio test, Flood attack, SIPViciouos, Vulerability 1 Itroductio System desiged to test ad moitor etworks or other compoets are quite wide-spread these days. Examples of the priciple oes are Nessus [1], Retia [2], Sort [3] ad other. The majority of these systems allows for testig the whole etwork ifrastructures ad protocols used for commuicatio betwee compoets. Noe of these solutios, however, eables a complex testig of VoIP ifrastructure ad SIP servers which are the key ad most vulerable compoet of the etwork. The system we developed, uder a workig title SPT (SIP Peetratio Testig), was desiged as a peetratio tests simulator for SIP servers. Based o the aalysis of itersectios, the perso who iitiated the testig ( the tester ) receives feedback i the form of test results, as well as recommedatios how to mitigate potetial security risks that were discovered. The advatage of this solutio is that the system simulates real attacks from the exteral etwork, i.e. the system does ot eed to be placed i the same etwork as the target compoet DUT (Device uder Test). This is frequetly oe of prerequisites to be able to use other testig tools. The SPT system was implemeted as a web applicatio accessible through a stadard web browser ad therefore idepedet o the operatio system s platform. As the solutio was developed as a part of the research itet of the CESNET associatio, this system will also be icorporated ito its etwork ad will be accessible after sigig i usig the SSO (Sigle Sig-O) service - Shibboleth [4]. This should also prevet the system beig used for other tha testig purposes. Oce siged i, the tester eters the required data ito a web form ad chooses tests to be ru. The output of the applicatio oce the tests have bee completed is a report to the tester. This paper cotais the results of the tests; ad i case some peetratios were successful it also cotais recommedatios ad measures to mitigate such attacks i the future. Figure 1 illustrates the cocept of the SPT system. The followig chapter describes idividual testig methods i detail, their implemetatio, algorithms used ad the impact o the target SIP server. Fig. 1. SIP Peetratio Tests System Scheme. 2 Methods Although the system is primarily desiged for peetratio tests o SIP servers, i reality it ca perform full-scale attacks o a particular compoet ad provide feedback o it to the tester. Thus, it is ecessary to esure that the developed system caot be abused by a third party. The system was desiged as a LAMP (Liux, Apache, MySQL, PHP) server [8] ad its complete admiistratio icludig the istallatio is carried out via ISSN: ISBN:

2 a web iterface. For reasos stated above, the system will be icorporated ito the CESNET s etwork ad will oly be accessible to authorised persos oce they pass through the autheticatio.oce the tester fills i the IP adess or domai ame of the cetral SIP server ad the adess to which the test results will be set to. Usig checkboxes, the tester may defie the rage of the modules offered for testig. Idividual modules are described below i detail. 2.1 Scaig ad Moitorig Module I order to be able to carry out a efficiet ad precise attack o a SIP server, the potetial attacker eeds to fid out the most iformatio about a particular compoet. This is why we first developed a Scaig ad Moitorig ( S&M ) module for the SPT system, which is used to test the security of the cetral agaist attacks aimed at obtaiig iformatio by meas of commo ad available tools (Figure 2). Fig. 2. SPT System S&M Module. These tools iclude for istace Nmap [9] or ever more popular SIPvicious [10]. SPT system also uses these testig tools. By meas of these tools, it is possible to obtai a list of listeig ports or a list of user accouts created o the cetral cocered from a usecured server. Where the server is ot secured sufficietly, they ca obtai eve the most importat, that is passwords to idividual accouts. If the tester ticks the test to be carried out, the Nmap applicatio is used first to establish ope ports. Give the time requiremets of the [s] test, the testig is by default restricted oly to several most frequetly used ports. Usig the web form, the tester ca set the rage of the tested ports. However the total time set for testig usig Nmap is 1800s (30 miutes). The list of available ports is subsequetly icluded i the assessmet report together with recommedatios how to miimise such ports scaig. Aother test which the SPT system ca carry out aims at establishig whether SIP server s security allows for obtaiig a list of user accouts. For this purpose, SIPvicious is used. By sedig out OPTION ad ACK requests, the applicatio detects what accouts are defied o the SIP server. By default, the system tries the rage of accouts. TABLE I UDPFLOOD ATTACK TIME DURATION WITH DIFFERENT BANDWIDTH AND NUMBER OF GENERATED PACKETS Badwidth [Mbps] ad the Attack Number of Packets - TimeT P udp [s] ,12 45,25 22,63 11, ,24 90,50 45,26 22, ,36 135,75 67,89 33, , ,52 45, ,60 226,25 113,15 56, ,72 271,5 135,78 67, ,84 316,75 158,41 79, , ,04 90, ,08 407,25 203,67 101, ,20 452,5 226,3 113,1 Agai, the tester may defie ow rage of tested umbers E or import a text file cotaiig strigs of alpha-umeric characters or words E. Time required to check ad create a list of T e [s] accouts ca be expressed by equatio (1) where is a time costat obtaied by repetitive measuremets o a sample of 1000 potetial accouts o differet target SIP servers [7]. T e = ( E + E ) c (1) Number of accouts E is derived from equatio (2) where E i is the umber of accouts that have bee reviewed by the system but ot defied o the SIP server. E = ( E + E ) Ei (2) Oce the system has tested security of the SIP server agaist detectig accouts, possibility to detect passwords for idividual accouts is tested. Agai, this testig is carried out by SIPvicious. Usig a pre-defied rage of possible umeric passwords P or a imported text file with alpha-umeric characters or words P, it obtais a list of passwords for idividual accouts. Time requiremets o this test are expressed by the followig equatio (3). T p sm [ E P + P ] c = ( ) (3) e p T = T + T + T (4) Now we ca determie the estimated time required to carry out the complete S&M test T (4). Usig the sm ISSN: ISBN:

3 module, we ca verify whether the target SIP server is sufficietly secured agaist such scaig ad moitorig attacks. 2.2 Deial of Service Module Oe of the most frequetly occurrig attacks is DoS (Deial of Service). I reality, it cosists of several attacks with the same characteristic feature to lock up or restrict the availability of the attacked service so that it does ot fuctio properly. Several types of DoSs [11] ca be used to achieve this; our system tests the SIP server usig the most frequetly used oe, Flood DoS. The priciple of the attack is to sed a large volume of adjusted or otherwise deformed packets to the target compoet so that it is uable to provide its core services. As a result of the attack, CPU load icreases ad most of the available badwidth is cosumed, resultig i the SIP server beig uable to service regular calls, or oly a miimum amout of them. To geerate Flood DoS, the SPT system uses two applicatios: udpflood ad iviteflood [12]. Whe usig udpflood, the system geerates UDP packets of 1400 bytes which are directed at SIP default port 5060 of the target SIP server. The tester defies the umber of geerated packets ad the system tests whether the packets arrived at the SIP server ad whether they cause some restrictio of the service availability, see Figure 3. Sice we kow the packet s size ad therefore also the size of the Etheret framework Fs, we ca, based o the umber of geerated packets P ad the badwidth provided B, determie time T udp [s] required to carry w out the test (5). udp of today s SIP servers require a autheticatio for INVITE requests. As the INVITE requests geerated by our system do ot cotai ay autheticatio strig, the SIP server returs SIP aswer 407 Proxy Autheticatio Required. With the large volume of icomig requests, the load of SIP server s CPU icreases. The tester ca set the value of a accout i the system maually, or it ca be radomly selected from the previously obtaied list of accouts E. As i the previous case, we ca, based o the umber of geerated packets P ad the badwidth provided B, determie time T [s] required to carry out the test (6). ivite T = ( Fs P ) / B (6) ivite ivite w Figure 4 illustrates the impact of the chage i badwidth o CPU load whe simulatig a udpflood attack. The chart also clearly shows resistace of the two popular ope-source SIP servers, Asterisk PBX [5] ad OpeSIPS [6], to UDP Flood DoS attacks. Both cetrals have bee istalled o the same HW of Dell PowerEdge R510 server to elimiate ay potetial differece i computatioal performace. To chage badwidths, we used HW emulator of the Simea etworks. CPU load o idividual cetrals was measured by meas of dstat [13]. The chart shows that OpeSIPS is may times more resistat to UDP DoS attaks tha Asterisk. Total time required to carry out DoS tests T dos is determied as follows (7). T = T + T (7) dos udp ivite Results ad success rate of DoS tests carried out are icluded i the report for the tester. w Fig. 3. SPT System - DoS Module. T = ( Fs P ) / B (5) udp udp w Table 1 provides a overview of time required for differet umbers of geerated packets P ad differet badwidth B w. Whe the other applicatio, iviteflood, is used for testig, the system geerates INVITE requests at the SIP server which are directed at a existig accout. This method is very successful as most Fig. 4. Impact of chage i badwidth o CPU load i case of udpflood attack. ISSN: ISBN:

4 2.3 Registratio Maipulatio Module Oce the potetial perpetrator obtais iformatio about existig accouts, he ca maipulate these accouts quite easily. The SPT system we developed ca also test SIP servers security, i.e. measures agaist maipulatig the registratio, see Figure 5. Fig. 6. SPT System - SPIT Module. Fig. 5. SPT System - RM Module. To carry out this test, the system uses reghijacker [12] which substitutes the legitimate accout registratio with a fake, o-existig oe. This type of attack ca easily be expaded to a so called MITM, Ma-i-the-Middle [11]. I this attack, a o-existet user is substituted by a SIP registratio ad all icomig sigallig ad media to the legitimate registratio will be re-directed to the ewly created registratio. I this case, the tester eeds to defie the value of the SIP accout which is to be stole i the system ad where autheticatio of REGISTER request is allowed, also a password to this accout. Where the tester fails to defie these values, the system automatically assigs a accout ad its password from the list created while scaig ad moitorig the cetral. Time required to carry out the test is isigificat compared to operatioal times of other modules. 2.4 SPIT Module Today, oe of the most popular attacks o the Iteret is spam. It is estimated that spams accout for 80-90% of total attacks o the Iteret. Security experts predict that Spam over Iteret Telephoy (SPIT) will be a major threat i the future. The level of aoyace is eve greater tha with classical spam. Out team i CESNET had developed SPITFILE [14] which served as a testig tool while developig security agaist such type of attacks. The SPT system uses the core of this applicatio, together with Sipp [14], to simulate a SPIT attack o the target SIP server (Figure 6). I the form, the tester defies the value of a SIP accout the called party to which the SPIT call will be directed ad the the value ad password to a SIP accout the caller through which the call will be iitiated. Where the tester fails to defie these values, the system automatically assigs a accout ad a appropriate password from the list created while scaig ad moitorig the cetral. If the attack was successful, a SIP call is iitiated from the caller s accout, ad the ed device with the registered accout of the called party starts rigig. Oce the call is aswered, a pre-recorded message is played ad the call termiated. Time required to carry out the test T is determied by the legth of the pre-recorded spit message. The fial report o peetratio tests which the tester receives via , will, besides iformatio o all previous tests, also cotai a aalysis ad success rate of the SPIT module s test. Fig. 7. Divisio of the SPT system ito idividual modules. Figure 7 illustrates the divisio of the SPT system ito idividual modules ad shows time itervals ecessary to carry out idividual tests i respective modules. Time requiremets of the whole SPT system ca be expressed by equatio (8). Its value depeds o may factors ad ca radically chage i accordace with the type of tests requested by the tester. Its value is for referece oly. T = T + T + T + T (8) spt sm dos rm spit 3 Results Although the SPT system is still i the phase of itesive testig ad developmet, basic operatioal tests of all available modules were carried out. Each test is accompaied by a short descriptio of coutermeasure s priciples ad methods [12] which should limit or completely mitigate potetial security gaps that were revealed durig SIP servers testig. ISSN: ISBN:

5 Fig. 8. SIP Peetratio Tests System Testbed. Figure 8 describes the basic testig topology. The system is deoted as SPT ad Asterisk as VoIP PBX. Asterisk was istalled at Dell PowerEdge R510 server. 3.1 Scaig ad Moitorig The first step was to record SIP server s IP adess ad the adess to sed the fial report to. Next, the S&M module ad subsequetly Nmap ad SIPvicious applicatios were lauched. Values for Nmap were set by default, value of E for SIPvicious was set to rage betwee The device foud all three registered accouts E ad listed ope TCP ad UDP ports at Asterisk. Oce P was set to ad a text file P cotaiig test ad 7003ab strig, the test to obtai passwords to idividual accouts was also successful. Total time icurred o testig module Tsm 235s. If we had to protect ad prevet SIP server from scaig ad moitorig, the a implemetatio of firewall is the effective solutio or a itrusio detectio system that is able to distiguish scaig ad moitorig. The ext effective solutio is to divide the etwork logical ifrastructure ito VLANs ad decompose the provided services ito more physical servers (TFTP, HTTP servery). The prevetio of accouts ad passwords detectio is difficult, moreover, the tools for detectio apply the stadard SIP methods ad is ot trivial to distiguish legitiamte behaviour from a attack. I this case, there is recommeded to divide the ifrastructure ito iidividual VLANs so that the detectio for itruder was as difficult as possible. 3.2 Deial of Service Usig udpflood, the tester set UDP packets directly to port Badwidth was set to 100Mbps, Asterisk processed 90% calls. Oce the test was completed, Asterisk recovered to a full operatio mode. To be able to compare, we substituted Asterisk by OpeSIPS i this test. Call processig uder the same attack was etirely error-free. Whe testig usig iviteflood o the accout 7001, we foud out that this attack is much more destructive i terms of computatioal power. As early as at INVITE request whe Tivite 9s, CPU load for both Asterisk ad OpeSIPS reached 100% ad failed to process a sigle icomig or outgoig call. Oce the test was completed, both cetrals recovered to a full operatio mode. The possibilities, how to protect from Flood DoS attacks, are the followig: to divide the etowrk ifrastructure ito separate VLANs, to have i use solely TLS, to implemet L2 etwork elemets with DoS detectio or to apply SIP firewall that ca detect DoS attacks ad miimalize their impact. 3.3 Registratio Maipulatio Whe testig possibility for registratio maipulatio, we etered values of accout 7003 ad its password 7003ab maually ito the system. Oce the test was completed, we established whether the attack was successful. The aim of the attack was to de-register accout 7003 ad to direct all icomig calls to a fake accout which does ot exist. Thus, calls were termiated as ucoected. The call to 7003 was ot put through. The TCP protocol is recommeded at trasport level to prevet a registratio hijackig because the maipulatio with TCP requires higher complexity. Next optio, how to miimalize this threat, is to use REGISTER message autheticatio. We could decrease the registratio iterval, as well, it is quite simple but effective. 3.4 Spam over Iteret Telephoy As stated above, we used SPITFILE applicatio, developed by this paper s authors, to test the cetral s vulerability to SPIT attacks. The tester etered maually ito the system the value of a accout 7002 o which a SPIT attack was to be iitiated, as well as the value of a accout 7003 ad password to it (7003ab) which was supposed to iitiate the SPIT call. Oce the test was lauched, SPITFILE registered o the participat 7003 ad the started to geerate a call to accout The ed device registered o 7002 bega rigig, ad oce the call was aswered, a recordig with a advertisemet was played. A few methods exist how to restrict the SPIT propagatio, which are more or less efficiet, but their combiatio brig quit strog protectio agaist the type of attack. Amog these methods the utilizatio of the various automatically or maually editable lists belog, o their base the call is permitted or prohibited, evetually a iteractio with voice meu ca be the effective protectio agaist call ISSN: ISBN:

6 bots. Authors developed ow solutio ANTISPIT [14] that exploits the specific huma behaviour ad automatically modifies the Blacklist table without participatio of called party, the approach is based o the statistical Blacklist. 4 Coclusio The aim of the authors was to develop a tool to carry out peetratio tests o SIP servers. The system that was desiged ad implemeted cosists of several modules that are able to geerate selected types of attacks which the authors deem most popular. The system the aalyses to what extet is the target compoet secured, afts assessmets cotaiig tests results ad proposes factual recommedatios to esure security agaist the threat cocered. The assessmet report is set as a text documet to a . The system is curretly uder itesive testig. It is plaed that i the future, it will be exteded to iclude other testig modules ad fuctios such as for istace testig of the whole VoIP ifrastructure ad heavy testig of idividual compoets. [9] G.F. Lyo, Nmap Network Scaig: The Official Nmap Project Guide to Network Discovery ad Security Scaig. Nmap Project, [10] M. Vozak ad J. Rozho, SIP Ifrastructure Performace Testig, I 9th Iteratioal Coferece o Telecommuicatios a Iformatics, Cataia, Italy, 2010, pp [11] F. Rezac, M. Vozak ad J. Ruzicka, "Security Risks i IP Telephoy", I CESNET Coferece 2008, 2008, Prague, pp [12] D. Edler ad M. Collier, Hackig Exposed VoIP: VoIP Security Secrets ad Solutios. McGraw-Hill Compaies, [13] I. Pravda ad J. Voazka, Voice quality plaig for NGN icludig mobile etworks, 12th Iteratioal Coferece o Persoal Wireless Commuicatios (PWC 2007), 2007, Prague. [14] M. Vozak ad F. Rezac, The implemetatio of SPAM over Iteret telephoy ad defece agaist this attack, preseted at TSP 2009: 32d Iteratioal Coferece o Telecommuicatios ad Sigal Processig, Duakiliti, HUNGARY, Aug 26-27, 2009, pp Ackowledgemet The research leadig to these results has received fudig from the Europea Commuity's Seveth Framework Programme (FP7/ ) uder grat agreemet o Refereces: [1] R. Rogers, Nessus Network Auditig. Sygress, 2d editio, [2] R. Chocheliski ad I. Baroak, "Private Telecommuicatio Network Based o NGN", I 32 d Iteratioal Coferece o Telecommuicatios ad Sigal Processig, 2009, Duakiliti, HUNGARY, pp [3] J. Bates, C. Gallo, M. Bocci, S. Walker ad T. Taylor, "Coverged Multimedia Networks", Wiley, 364 p., [4] M. Vozak, Voice over IP. VSB-Techical Uiversity of Ostrava: College Textbook, 1st. ed., Ostrava, [5] S. Witermezer ad S. Bosch, Practical Asterisk 1.4 ad 1.6: From Begier to Expert. Addiso-Wesley Professioal; 1 editio, [6] F. Gocalves, "Buildig Telephoy Systems with OpeSIPS 1.6", Packt Publishig, 274p., [7] D. Sisalem, J. Floroiu, J. Kutha, U. Abed ad H. Schulzrie, SIP Security, Wiley, 350p., [8] J. Lee ad B. Ware, Ope Source Developmet with LAMP: Usig Liux, Apache, MySQL, Perl, ad PHP, Addiso-Wesley Professioal, ISSN: ISBN:

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

SIP Penetration Testing in CESNET Best Practice Document

SIP Penetration Testing in CESNET Best Practice Document SIP Penetration Testing in CESNET Best Practice Document Produced by CESNET led working group on Multimedia transmissions and collaborative environment (CBPD142) Author: Miroslav Voznak December 2010 TERENA

More information

SIP Penetration Test System

SIP Penetration Test System CESNET Technical Report 10/2010 SIP Penetration Test System FILIP ŘEZÁ, MIROSLAV VOZ ÁK Received 5. 11. 2010 Abstract e SIP server, as well as other servers providing services in exposed network, o en

More information

SECURITY ANALYSIS SYSTEM TO DETECT THREATS ON A SIP VOIP INFRASCTRUCTURE ELEMENTS

SECURITY ANALYSIS SYSTEM TO DETECT THREATS ON A SIP VOIP INFRASCTRUCTURE ELEMENTS SECURITY ANALYSIS SYSTEM TO DETECT THREATS ON A SIP VOIP INFRASCTRUCTURE ELEMENTS Filip REZAC 1, Miroslav VOZNAK 1, Karel TOMALA 1, Jan ROZHON 1, Jiri VYCHODIL 1 1 Department of Telecommunications, Faculty

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Agency Relationship Optimizer

Agency Relationship Optimizer Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

e-trader user guide Introduction

e-trader user guide Introduction User guide e-trader user guide Itroductio At UK Geeral our aim is to provide you with the best possible propositio for you ad your customers. We believe i offerig brokers a choice of how they trade with

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions 3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Ethernet Option Board

Ethernet Option Board Etheret Optio Board Assembly ad Iitializatio Guide for Addig Etheret Commuicatios to a ADP etime Timeclock Documet Part Number: 470552-00 Documet Revisio: B The iformatio i this documet is subject to chage

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

CCH Accountants Starter Pack

CCH Accountants Starter Pack CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

FPO. A global telecom s strategy. for Canada

FPO. A global telecom s strategy. for Canada FPO A global telecom s strategy for Caada A global telecom s strategy for Caada Global telecommuicatios compaies that support multi-atioal corporatios (MNC) are tasked with providig a cosistet cliet experiece

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

Composable Tools For Network Discovery and Security Analysis

Composable Tools For Network Discovery and Security Analysis Composable Tools For Network Discovery ad Security Aalysis Giovai Viga Fredrik Valeur Jigyu Zhou Richard A. Kemmerer Reliable Software Group Departmet of Computer Sciece Uiversity of Califoria Sata Barbara

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

Document Control Solutions

Document Control Solutions Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS

More information

Electrostatic solutions for better efficiency

Electrostatic solutions for better efficiency Electrostatic solutios for better efficiecy idustry for egieers, professioals ad techicias i developmet, productio ad istallatio. www.kerste.de/e Electrostatic solutios kerste has bee the leadig supplier

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

insight reporting solutions

insight reporting solutions reportig solutios Create ad cotrol olie customized score reports to measure studet progress ad to determie ways to improve istructio. isight Customized Reportig empowers you to make data-drive decisios.

More information

Bio-Plex Manager Software

Bio-Plex Manager Software Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable

More information

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology TruStore: The storage system that grows with you Machie Tools / Power Tools Laser Techology / Electroics Medical Techology Everythig from a sigle source. Cotets Everythig from a sigle source. 2 TruStore

More information

Design and Implementation of a Publication Database for the Vienna University of Technology

Design and Implementation of a Publication Database for the Vienna University of Technology Desig ad Implemetatio of a Publicatio Database for the Viea Uiversity of Techology Karl Riedlig Istitute of Idustrial Electroics ad Material Sciece, TU Wie, A-040 Viea karl.riedlig@tuwie.ac.at Abstract:

More information

summary of cover CONTRACT WORKS INSURANCE

summary of cover CONTRACT WORKS INSURANCE 1 SUMMARY OF COVER CONTRACT WORKS summary of cover CONTRACT WORKS INSURANCE This documet details the cover we ca provide for our commercial or church policyholders whe udertakig buildig or reovatio works.

More information

Pre-Installation Network Planning Forms--S8700 Media Server

Pre-Installation Network Planning Forms--S8700 Media Server Pre-Istallatio Network Plaig Forms--S8700 Media Server S8700 Media Server with a Avaya G600 Media Gateways S8700 Media Server with Avaya MCC1/SCC1 Gateways Before you istall ad cofigure a Avaya media server,

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion

Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion Theory ad Aalog-to-Digital Coversio Itroductio/Defiitios Aalog-to-digital coversio Rate Frequecy Aalysis Basic Measuremet Issues Reliability the extet to which a measuremet procedure yields the same results

More information

Advanced Protection for Web Services

Advanced Protection for Web Services RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall Web services deploymet The pricipal reasos which delay the deploymet

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

auction a guide to selling at Residential

auction a guide to selling at Residential Residetial a guide to sellig at auctio Allsop is the market leader for residetial ad commercial auctios i the UK Aually sells up to 700 millio of property at auctio Holds at least seve residetial ad six

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Neolane Leads. Neolane v6.1

Neolane Leads. Neolane v6.1 Neolae Leads Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of this

More information

ni.com/sdr Software Defined Radio

ni.com/sdr Software Defined Radio i.com/sdr Software Defied Radio Rapid Prototypig With Software Defied Radio The Natioal Istrumets software defied radio (SDR) platform provides a itegrated hardware ad software solutio for rapidly prototypig

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Neolane Reporting. Neolane v6.1

Neolane Reporting. Neolane v6.1 Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

A guide to School Employees' Well-Being

A guide to School Employees' Well-Being A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to

More information

CCH Accounts Production

CCH Accounts Production CCH Accouts Productio accouts productio facig today s challeges Preparig statutory ad fiacial accouts is a core activity for our practice, as it is for may professioal firms. Although legislatio ad accoutig

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

SECURITY EVALUATION OF MULTIMEDIA SYSTEMS Jakub SAFARIK, Miroslav VOZNAK, Filip REZAC

SECURITY EVALUATION OF MULTIMEDIA SYSTEMS Jakub SAFARIK, Miroslav VOZNAK, Filip REZAC SECURITY EVALUATION OF MULTIMEDIA SYSTEMS Jakub SAFARIK, Miroslav VOZNAK, Filip REZAC Research paper safarik@cesnet.cz, voznak@cesnet.cz, filip@cesnet.cz Keywords: penetration tests, VoIP attacks, SIP

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Making training work for your business

Making training work for your business Makig traiig work for your busiess Itegratig core skills of laguage, literacy ad umeracy ito geeral workplace traiig makes sese. The iformatio i this pamphlet will help you pla for ad build a successful

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

The Canadian Council of Professional Engineers

The Canadian Council of Professional Engineers The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

A Flexible Web-Based Publication Database

A Flexible Web-Based Publication Database A Flexible Web-Based Publicatio Database Karl Riedlig ad Siegfried Selberherr 2 Istitute of Sesor ad Actuator Systems 2 Istitute for Microelectroics Techische Uiversität Wie Gusshausstrasse 27-29 A-040

More information

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs. ItelliSOURCE Comverge s eterprise software platform provides the foudatio for deployig itegrated demad maagemet programs. ItelliSOURCE Demad maagemet programs such as demad respose, eergy efficiecy, ad

More information

Skytron Asset Manager

Skytron Asset Manager Skytro Asset Maager Meet Asset Maager Skytro Asset Maager is a wireless, pateted RFID asset trackig techology specifically desiged for hospital facilities to deliver istat ROI withi a easy to istall, fully

More information

A Balanced Scorecard

A Balanced Scorecard A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio

More information

Patentability of Computer Software and Business Methods

Patentability of Computer Software and Business Methods WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information