Suspicious Transaction Detection for Anti-Money Laundering

Size: px
Start display at page:

Download "Suspicious Transaction Detection for Anti-Money Laundering"

Transcription

1 Vol.8, No. (014), pp Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha Abstract Moey lauderg actvtes facal markets have bee creasgly serous recet years. Although efforts o at-moey actvtes started at a early stage, the solutos seem to be restrcted to a strategc level. Besdes, eve some research poeers at employg data mg techques to at-moey lauderg, the stuato Cha s stll dffcult. To ths ed, ths paper, after presetg the systematc vew of the data mg framework of at-moey lauderg, we propose a classfcato based algorthm to effectvely detect suspcous trasactos. Specfcally, we cosder the facal trasactos as a data stream, ad try to costruct a classfer based o a set of med frequet rules. Our expermets o a smulated trasacto dataset based o real world bakg actvtes prove the effcecy of our proposed method. Keywords: Classfcato, Data mg, At-moey lauderg, suspcous trasactos 1. Itroducto As the creasg developmet of teret ad database techologes, the data ca be obtaed has bee more ad more bg [1, ]. I order to uderstad the bg data, data mg methodology s appled throughout varous felds, such as marketg, customer relatoshp maagemet ad facal maagemet. Specfcally, as a emerget techology facal area, efforts o data mg have bee made o baker/customer relatoshp maagemet, credt rsk alert ad market aalyss o face. Oe of the toughest thgs s facal fraud, ad worse stll, moey lauderg. Moey lauderg s the coveto of crmal comes to assets that caot be tracked to the uderlyg crme, where the process of cocealg sources of moey s referred to lauderg [3]. As the moey lauderg actvtes go creasgly wld, the facal growth ad atoal securty have bee crtcally affected. Curret strateges of at-moey lauderg expect laws ad regulatos to be establshed to prevet ad suppress moey lauderg actvtes. For example, possble measures of baks clude valdatg customer detfcato valdato before bakg busess, checkg suspcous foreg exchage cash trasactos, trackg large cash flows, ad blacklstg accouts of suspected moey lauderg, etc. However, exstg at-moey lauderg methods reply o huma terveto, ad applyg moder data mg techques stll remas at a tatg phase. Detectg suspcous facal trasactos s a essetal precodto ad key aspect of at-moey lauderg [4]. Exstg methods are based o the amout of trasactos, ad the detfcato mplemetato process s extremely restrcted to the mechasm of uusual bakg actvtes reportg [5]. Therefore, there are several lmtatos of tradtoal at-moey lauderg efforts, such as arrow coverage of detfcato, log cycle of clue dscovery, ad extesve delay [6]. I order to solve above challeges, we propose a data mg [7] system for at-moey lauderg, ad focus o the suspcous trasacto detecto ths paper. ISSN: IJSIA Copyrght c 014 SERSC

2 Vol.8, No. (014) The overall workflow of the system s as follows, as show Fgure 1. After storg the trasactoal data to data warehouse, some preprocessg work s performed for data cleag ad trasformato. The, related data s selected for data mg ege, where data mg algorthm s appled. After that, dscovered kowledge s the abstracted to a kowledge base, whch wll be further used to vsualzato, recommeder systems ad other busess applcato. Fgure 1. Framework of Data Mg System for At-moey Lauderg The, we focus o the dyamc detecto mechasm of suspcous trasactos. Typcally, the abormal relatoshps betwee trasactoal accouts are deemed as suspcous [5]. Wth a stream of facal trasacto data, dscoverg emergg patters durg varous facal trasactos, exhbted as terestg abormty from chroc or regular behavors, kow as suspcous trasacto patters [5], s a effcet method. For example, Lu et al., [8] proposed a method based o tme seres to detect suspcous trasactos wth the techque of sca statstcs. Also, Keya et al., [9] tred to mprove the accuracy of detectg suspcous trasactos by usg cross valdato ad grd search optmzed support vector etwork model. However, dfferet from exstg works, we regard the facal trasactos as a stream data, ad employ a dyamc mg method to detect suspcous patters o stream trasactos. Specfcally, we propose a classfcato algorthm based o multple class assocato rules o data streams, by costructg a FP-tree to mprove the tme ad space effcecy, ad the reducg frequet rules by usg Hoeffdg boud [10] over dyamc data streams. To sum up, ths paper, our ma cotrbutos are as follows. Frst, we study o the problem of at-moey lauderg ad summarze the overall data mg framework as a soluto, whch ca solve the challeges of tradtoal maual strateges of at-moey lauderg polces. Secod, we propose a classfcato based algorthm to dyamc detect suspcous trasactos over the facal trasactoal data streams. Last, our expermets o a smulated bakg trasacto dataset mprove the effcecy of our method. The rema of ths paper s orgazed as follows. Secto provdes some related work. The overall framework s dscussed Secto 3. The our algorthm for detectg suspcous trasactos s proposed Secto 4. Emprcal expermets are coducted Secto 5. Fally, the paper s cocluded Secto Copyrght c 014 SERSC

3 Vol.8, No. (014). Related Work The efforts o at-moey research started at a early stage. Seator et al., [11] frst formally proposed a artfcal tellgece system amed FCEN (Facal Crmes Eforcemet Network) to detfy potetal moey lauderg from reports of large cash trasactos. The evaluato of suspcous trasacto FCEN s mplemeted by a Bayes model. Petrus C va Duye et al., [1] poted out that there s exstg problems the motorg system of suspcous trasactos ad at-moey lauderg strateges. Kgdo et al., [13] developed a system to automatcally detfy uusual behavor customers trasactos. However, oe of above efforts ca be effcetly appled to Chese facal markets, due to the specfc characterstcs of Chese facal trasactos [14]. Therefore, ths paper, we propose a algorthm desged for Chese bakg trasactos. 3. Overall Framework I ths secto, we preset our overall framework of at-moey lauderg usg data mg techques. Typcally, as descrbed Fgure 1, suppose we have a streamg facal trasactos dataset. Frst, we perform preprocessg such as cleag, reducto ad samplg to select relevat sub-dataset for our suspcous trasactos detecto problem. The, we store that data to a data warehouse. Later, feed data to a data mg ege module for suspcous trasactos detecto. Note that for comg streamg data, dyamc data ca be drectly delvered to the data mg ege for real-tme executo. After that, useful formato s extracted ad stored to a kowledge base for further applcatos, whch mght be used by decso makers for data vsualzato, recommeder systems ad other busess applcatos wth respect to at-moey lauderg feld. Specfcally, ths paper, we focus o the data mg ege module, ad study o the problem of detectg suspcous trasacto patters. Frst of all, we wll dscuss the data preprocessg, whch serves as the premse stage of mg Data Preprocessg Typcally, at-moey lauderg actvtes volve multple accouts durg facal trasactos. The data preprocessg clude the followg aspects Attrbutes Flterg: Oly a subset of attrbutes s useful for at-moey lauderg actvtes. For example, the ame of accouts s usually useless, ad ca be removed to reduce the scale of dataset. Suppose the streamg facal trasacto DS { t, t,..., t } t 1 dataset ca be represeted as. Each, 1,,..., s assocated y wth a set of attrbutes A, ad a target attrbute. Now we eed to check whether y attrbute x A s relevat to. A tutve way s, sort all the values of A, ad the get a correspodg dstrbuto of y. Suppose ( x x x ) ( y y ) 1 1 deotes the attrbute x of the -th record, ad 0. Defe to descrbe the dscreteess of the dstrbuto [1]. If t exceeds some threshold, o relevace s exhbted as cosdered. The, attrbute x ca be removed. Copyrght c 014 SERSC 159

4 Vol.8, No. (014) Feature Extracto based o Doma Kowledge: Accordg to doma kowledge, some features such as captal flows ad the frequecy of access accout are closely related to moey lauderg actvtes, ad yet are ot recorded the orgal trasacto dataset. However, we ca calculate them usg statstcal method. The relatos ca be formulated as a lear regresso model. Notate the regstered fud as f, ad the summary amout of access accout wth a certa perod as s. Gve accout, f, s deote the regstered fud ad summary amout of respectvely. Suppose there exsts a lear relatoshp betwee f ad s,.e., f s, where, are costats, ad follows a ormal dstrbuto N (0, ). Parameters, ca be ferred usg the least square method [15] as follows: ˆ f s s s ( 1 s ) f, ˆ f ˆ s. (1) Correlato matrx betwee trade accouts: Calculate the correlato coeffcets betwee trade accouts amog dfferet dustres, ad store as a correlato matrx as features. For example, Table 1 gves the correlato matrx after preprocessg. Import/export Trade Table 1. Correlato Matrx betwee Trade Accouts Steel Mechacs Food Chemstry Steel Mechacs Food Chemstry I ext secto, we wll focus o the data mg ege module, ad especally o the suspcous trasacto detecto fucto. 4. Proposed Algorthm I ths secto, we propose a classfcato based algorthm to dyamc detect suspcous patters for at-moey lauderg. The objectve s to fd out the frequet assocated accouts, whch are deemed as suspcous Problem Formulato Gve a streamg facal trasacto dataset t, 1,,..., par, where DS { t, t,..., t } 1, ad each s assocated wth a set of attrbutes A. Defe patter p as a (, v ) A s the -th attrbute ad v s the correspodg value. Suppose we have a set of patters P p, p,..., p } ad a tuple t. If for each p P, t satsfes { 1 l p ( A, v ), we say that t matches P. Notate P. cout as the umber of objects matched P, ad P.sup p. cout / as the support of P DS. A 160 Copyrght c 014 SERSC

5 Vol.8, No. (014) Let c be the otato of class label. Defe a class assocato rule R : P c, where R. cout s the umber of objects DS matchg patter P. The, R.sup R. cout / s the support of rule R DS, ad R cof R. cout / P. cout. s the cofdece of rule R DS. If R.sup m_sup, where m_sup s the mmum support, the correspodg patter P s called frequet patter or temset, ad R s called frequet assocato rule. Furthermore, f R.cof m_cof, where m_cof s the mmum cofdece, R s called precse rule. For the coveece of descrpto, we term rule R wth patter P of a legth of k as k rule. Besdes, f R s frequet, R s termed as k freqrule. Now the objectve s to fd all the frequet ad precse rules, ad costruct a classfer from above set of rules. 4.. Algorthm Descrpto Geerally, proposed algorthm ths paper s composed of two stages. Frst, dscover all the frequet ad precse rules from the trag data. Secod, based o the rules foud the former stage, model a classfer to lear the class labels ad therefore dstgush the suspcous trasacto patters from the ormal oes Dscoverg Frequet ad Precse Rules: Before costructg a classfer upo assocato rules [], frst of all, we eed to dscover a proper set of rules. Our method s based o FP-tree algorthm [16]. Theorem 1. Gve a data stream DS ad the mmum support m_sup, suppose p as a frequet patter. For ay class label c, f rule R : p c s ot a frequet rule, the p should ot be cluded ay frequet rules. Base o theorem 1, we ca prue those o-frequet tems the geerato of frequet patters whe buldg FP-tree. Sce the streamg data s typcally extremely large ad caot be stored local storage. Therefore, we splt the data stream to segmets wth certa legth, called tme wdow. The, the rule mg algorthm s appled to the dataset wth specfc tme wdow. After that, processed dataset ca be abadoed or trasferred to other places to release memory usage. However, streamg data ca oly be scaed oce, whch meas we should preserve ot oly frequet rules but all rules. But storg all rules ecoutered leads to a huge overhead. Therefore, we troduce Hoeffdg boud [17] to estmate the support of rules. Gve a varable r wth value boudary R, suppose we have depedet observatos, calculate the expectato of r as. Hoeffdg boud dcates that the possblty of expect value of r beg at least R s 1, where: l( 1 / ). () We ca observe that Hoeffdg boud s depedet o the dstrbuto of samples. Suppose we eed to estmate the support of some rule, ad the value boudary R 1. Gve error factor ad the probablty of error, the legth of data stream wth support as ad probablty as 1 s calculated as follows: Copyrght c 014 SERSC 161

6 Vol.8, No. (014) 1 R l l( 1 / ) l( 1 / ) (3) Wth tme wdow of legth, oly rules whose support s larger tha l should be preserved, ad frequet rules wth support larger tha ca be obtaed at the probablty of 1. Accordgly, we have the followg deftos. Defto 1. Gve a rule R : p c wth tme wdow T, the support s R.sup, the mmum support s, ad the maxmum error of support s. If the R s called frequet rule; f rule; f R.sup R.sup, R.sup, the R s potetal frequet, the R s o-frequet rule. From Equato (3), we ca observe that the legth of tme wdow s egatve l related to. Whe s small, wll be very large. For example, f the value of l s 0.001, ad s 0.0, wll be 391 thousads. That meas lots of memory s l eeded for cosumg such a bg dataset, ad the effcecy of algorthm wll be affected. Therefore, should be talzed as a large value, ad the decreases as the data stream comes. I our settgs, we talze Later, after the processg wth each tme wdow, s updated as Equato (). The workflow of geeratg frequet rules s descrbed Algorthm 1. Note that the process of creatg FP-tree s smlar to [18], except that we further add a prug strategy defed by theorem 1. The we merge the rules med by FP-tree P ad our frequet rules set FR as les Fgure. Algorthm of Geeratg Frequet Rules 16 Copyrght c 014 SERSC

7 Vol.8, No. (014) All frequet rules ca be med by Algorthm 1. Accordg to Hoeffdg boud [17], ay rule R has a support of R.sup, ad R.sup wth a probablty of 1. Sce decreases as grows, the probablty teds to be 1 f the support s meas, the support value of all rules satsfes R.sup geerated from Algorthm 1 have a mmum support of cluded the results of Algorthm 1. R.sup. That. Iterestgly, the rules. Therefore, all rules are 4... Costructg the classfer: Now we have med all frequet rules, ad the ext step s to costruct a classfer for further precse classfcato. Because of the dyamc varato of steamg data, we wll ot prue all usatsfactory rules. The tuto s that eve f a rule s ot frequet curretly, t mght be frequet later whe more data comes. Gve a ew trasacto, the objectve s to assg a class label to determe f the trasacto s suspcous or ot. If all the rules matchg the ew trasacto have the same class label, the the trasacto s assged to that class drectly. Otherwse, we get a group of class labels accordg to dfferet rules appled to the ew trasacto. Now we cosder how to combe the effects of a group of class labels. For each rule R : p c, the rule wth hghest s selected, where the upper boud of s computed as follows [19]: max (m{ sup(p),sup (c) } sup(p)sup( c) ) e, (4) where sup(p),sup (c) deotes the umber of objects wth patter p ad label c respectvely. 5. Expermets I order to evaluate the effcecy of our algorthm, ths secto, we coduct some expermets Settgs ad Data The evromet of our expermets s as follows. The PC has a Itel E500 CPU wth 1G memory, 50G hard dsk memory, ad the operato system s Wdows 7. We try to evaluate f our method ca be used to detect suspcous trasactos wth a stream of facal trasactos. Therefore, we smulate a large data stream of facal stream based a real world bakg records, smlar to exstg study [0]. We have geerated 100 mllos records of trasactos, ad the felds of dataset are show as Table. Note that the two sdes of a trasacto deote the ad out of facal stream, whch ca be represeted as a drected edge betwee two odes. Therefore, we otate the trasactos betwee two specfc accouts as (, ), where s the umber of 1 1 trasactos from Accout_0 to Accout_1, ad s the umber of trasactos from Accout_1 to Accout_0. Table. Felds of Bakg Trasacto Dataset Feld ame ID Date Descrpto The detfer of a sgle trasacto The date of trasacto commtted Copyrght c 014 SERSC 163

8 Vol.8, No. (014) Brach_ID_0 Lower_brach_ID_0 Accout_0 Brach_ID_1 Lower_brach_ID_1 Accout_1 Amout Category Brach of bak of the frst accout Lower level of brach of the frst accout The frst accout of trasacto Brach of bak of the secod accout Lower level of brach of the secod accout The secod accout of trasacto The amout of trasacto The sort of trasacto,.e., wthdraw, depost, ad trasfer The parameters used our expermet are set as follows. We set m_sup as 1%, m_cof as 50%, database coverage threshold as 4, error factor for cofdece as 0%, ad error factor for support as Expermetal Results Out of all 100 mllos of trasactos, we detect 317 accouts labeled as suspcous based o the rules med as descrbed our algorthm. Furthermore, each suspcous accout s assocated wth others the form of suspcous trasactos whch are ted to two dfferet accouts. Table 3 gves a partal results of our expermet. Table 3. Partal Results of Suspcous Accouts ad Trasactos Accouts Assocated accouts Suspcous trasactos (19161,564604,84731,...) (0/8,0/1,11/0,...) (116054,165376,40058,..) (0/11,0/5,0/7,...) (116054,165376,...) (8/0,5/0,...) (116054,714340,...) (1/0,0/,...) (84731,...) (7/0,...) (19161,84731,...) (0/5,5/0,...) For example, as show Table 3, accout s suspcous ad assocated wth 19161, ad Besdes, accout s probably a export accout ad s probably a mport accout, gve the fact that trasactos volved are outflowg from , whle the trasactos volved mostly have a comg cash flow. From above observatos, we ca see that our results are cosstet wth the real world facts. Therefore, t s reasoable to clam that determg class labels by the rules geerated from our algorthm to assert the suspco of trasacto s feasble. Next, we evaluate the effcecy of our algorthm as well. Fgure 3 gves the accuracy of our expermet. Note that the labels of trasactos are doe maually by doma kowledge. From the fgure, we ca see that as the umber of trasactos grows, our algorthm performs better. That meas our method s scalable to large dataset. 164 Copyrght c 014 SERSC

9 Vol.8, No. (014) 6. Cocluso I ths paper, we propose a data mg system for detectg at-moey lauderg actves, ad focus o the dscoverg of suspcous trasactos facal trasactos stream. Specfcally, the proposed algorthm employs a classfcato method based o a set of frequet rules. Our expermets o a smulated trasacto dataset based o real work bakg actvtes show both feasblty ad effcecy of our method. Future work mght clude: (1) further mprovemet of the algorthm to support varous data sources; ad () addg more fuctos to our data mg system for at-moey lauderg besdes suspcous trasacto detecto. Fgure 3. Precso of Proposed Algorthm o Varous Sze of Dataset Ackowledgemets The authors would lke to recogze the others who helped them ad thak all our revewers. Refereces [1] S. LaValle, Bg data, aalytcs ad the path from sghts to value, MIT Sloa Maagemet Revew, vol. 5, o., (011), pp [] P. Zkopoulos ad C. Eato, Uderstadg bg data: Aalytcs for eterprse class hadoop ad streamg data, McGraw-Hll Osbore Meda, (011). [3] P. Reuter ad E. M. Truma, Chasg drty moey: The fght agast moey lauderg, Peterso Isttute, (004). [4] R. Baroe ad D. Mascadaro, Worldwde at-moey lauderg regulato: estmatg the costs ad beefts, Global Busess ad Ecoomcs Revew, vol. 10, o. 3, (008), pp [5] R. Meo ad S. Kuma, Uderstadg the role of techology at-moey lauderg complace, Ifosys Techology Ltd, (005). [6] B. Zagars, Problems applyg tradtoal at-moey lauderg procedures to o-facal trasactos, parallel bakg systems ad Islamc facal systems, Joural of moey lauderg cotrol, vol. 10, o., (007), pp [7] J. Ha, M. Kamber ad J. Pe, Data mg: cocepts ad techques, Morga kaufma, (006). [8] X. Lu ad P. Zhag, A sca statstcs based Suspcous trasactos detecto model for At-Moey Lauderg (AML) facal sttutos, Multmeda Commucatos (Medacom), 010 Iteratoal Coferece o. IEEE, (010). [9] L. Keya ad Y. Tgtg, A Improved Support-Vector Network Model for At-Moey Lauderg. Maagemet of e-commerce ad e-govermet (ICMeCG), 011 Ffth Iteratoal Coferece o. IEEE, (011). [10] O. Bousquet, S. Bouchero ad G. Lugos, Itroducto to statstcal learg theory. Advaced Lectures o Mache Learg, Sprger Berl Hedelberg, (004), pp [11] T. E. Seator, The FCEN Artfcal Itellgece System: Idetfyg Potetal Moey Lauderg from Reports of Large Cash Trasactos, IAAI, (1995). [1] P. C. va Duye ad H. de Mrada, The emperor's cloths of dsclosure: Hot moey ad suspect Copyrght c 014 SERSC 165

10 Vol.8, No. (014) dsclosures, Crme, Law ad Socal Chage, vol. 31, o. 3, (1999), pp [13] J. Kgdo, AI fghts moey lauderg, Itellget Systems, IEEE, vol. 19, o. 3, (004), pp [14] J. Z. Xao, H. Yag ad C. W. Chow, The determats ad characterstcs of volutary teret-based dsclosures by lsted Chese compaes, Joural of accoutg ad publc polcy, vol. 3, o. 3 (004), pp [15] N. A. Wess ad C. A. Wess, Itroductory statstcs, Pearso Educato, (01). [16] J. Ha, J. Pe ad Y. Y, Mg frequet patters wthout caddate geerato, ACM SIGMOD Record, ACM, vol. 9, o., (000). [17] M. Medhat Gaber, A. Zaslavsky ad S. Krshaswamy, Mg data streams: a revew, ACM Sgmod Record, vol. 34, o., (005), pp [18] J. Ha, Mg frequet patters wthout caddate geerato: A frequet-patter tree approach, Data mg ad kowledge dscovery, vol. 8, o. 1, (004), pp [19] W. L, J. Ha ad J. Pe, CMAR: Accurate ad effcet classfcato based o multple class-assocato rules, Data Mg, 001. ICDM 001, Proceedgs IEEE Iteratoal Coferece o. IEEE, (001). [0] J. Tag ad J. Y, Developg a tellget data dscrmatg system of at-moey lauderg based o SVM, Mache Learg ad Cyberetcs, 005. Proceedgs of 005 Iteratoal Coferece, IEEE, vol. 6, (005). [1] G. H. Joh, R. Kohav ad K. Pfleger, Irrelevat Features ad the Subset Selecto Problem, ICML, vol. 94, (1994). [] R. Agrawal, T. Imelńsk ad A. Swam, Mg assocato rules betwee sets of tems large databases, ACM SIGMOD Record, ACM, vol., o., (1993). Author Xgrog Luo. Male, he was bor Esh cty, Hube Provce. Now, he s servcg Vocatoal ad techcal college Esh as a assocate Professor, ad hs research terests are computer software developmet ad database techologes. 166 Copyrght c 014 SERSC

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Business Bankruptcy Prediction Based on Survival Analysis Approach

Business Bankruptcy Prediction Based on Survival Analysis Approach Busess Bakruptcy Predcto Based o Survval Aalyss Approach ABSTRACT Mg-Chag Lee Natoal Kaohsug Uversty of Appled Scece, Tawa Ths study sampled compaes lsted o Tawa Stock Exchage that examed facal dstress

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability

The Reliable Integrated Decision for Stock Price by Multilayer Integration Time-series of Coverage Reasonability Proceedgs of the Iteratoal MultCoferece of Egeers ad Computer Scetsts 009 Vol I The Relable Itegrated Decso for Stock Prce by Multlayer Itegrato Tme-seres of Coverage Reasoablty Chu-M Hug ad Chu-Wu Yeh*

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Report 19 Euroland Corporate Bonds

Report 19 Euroland Corporate Bonds Rep19, Computed & Prted: 17/06/2015 11:38 Report 19 Eurolad Corporate Bods From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Bechmark 100% IBOXX Euro Corp All Mats. TR Defto of the frm ad

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

A Framework of Business Intelligence-driven Data Mining for e-business

A Framework of Business Intelligence-driven Data Mining for e-business A Framework of Busess Itellgece-drve Data Mg for e-busess Yag Hag, Smo Fog Dept. of Computer ad Iformato Scece Uversty of Macau Macau SAR ma76562@umac.mo, ccfog@umac.mo Abstract Ths paper proposes a data

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

Report 05 Global Fixed Income

Report 05 Global Fixed Income Report 05 Global Fxed Icome From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Rep05, Computed & Prted: 17/06/2015 11:24 New Performace Idcator (01/01/12) 100% Barclays Aggregate Global Credt

More information

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia.

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia. Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof AaNEvas@vrga.edu http://people.vrga.edu/~as5k/

More information

A Single Machine Scheduling with Periodic Maintenance

A Single Machine Scheduling with Periodic Maintenance A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco

More information

A NON-PARAMETRIC COPULA ANALYSIS ON ESTIMATING RETURN DISTRIBUTION FOR PORTFOLIO MANAGEMENT: AN APPLICATION WITH THE US AND BRAZILIAN STOCK MARKETS 1

A NON-PARAMETRIC COPULA ANALYSIS ON ESTIMATING RETURN DISTRIBUTION FOR PORTFOLIO MANAGEMENT: AN APPLICATION WITH THE US AND BRAZILIAN STOCK MARKETS 1 Ivestmet Maagemet ad Facal Iovatos, Volume 4, Issue 3, 007 57 A NON-PARAMETRIC COPULA ANALYSIS ON ESTIMATING RETURN DISTRIBUTION FOR PORTFOLIO MANAGEMENT: AN APPLICATION WITH THE US AND BRAZILIAN STOCK

More information