The Popularity Parameter in Unstructured P2P File Sharing Networks

Size: px
Start display at page:

Download "The Popularity Parameter in Unstructured P2P File Sharing Networks"

Transcription

1 The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN Abstract: - Sce P2P became extremely popular betwee Iteret users, may researchers have tred to model those P2P etworks. Oe of the parameters, used these models, s the popularty of a fle. Some artcles demostrate that, f a fle s so popular, the probablty to fd ths fle sde the P2P fle sharg etwork s bgger. Ths artcle deals wth popularty parameter P2P fle sharg etworks. I order to do so, the ustructured publc doma Peer-to-Peer etworks Gutella,,,, Soulseek ad have bee measured. The authors have establshed a relatoshp betwee some flms, sogs, programs ad documets foud web search eges ad the same fles foud publc doma P2P fle sharg etworks. If all these aalyzed Peer-To-Peer fle-sharg etworks were tercoected, the probablty to fd a desred fle wll be cremeted. O the other had, those aalyzed P2P etworks seems to be specalzed dfferet type of fles as t s show the paper. Key-Words: - Peer to peer, Fle Popularty, Fle Search, Peer-To-Peer Itercoecto. Itroducto Sce Iteret became accessble to the world, oe of the frst users cocers s to fd the fle or the formato s lookg for. A measuremet study [] of the deep Web reveals that t cotas early 55 bllo of pages ad t s doublg each year. O the other had, the surface Web cotas a estmated 2.5 bllo documets, growg at a rate of 7.5 mllo documets per day, ad the deep Web s approxmately 5 tmes greater tha that vsble to covetoal search eges. Nowadays there are a lot of web search eges [2] ad a lot of them have bllos of textual documets dexed [3]. The Web search eges ca be classfed three types: - Crawler-Based Search Eges, such as Google, whch create ther lstgs automatcally. They "crawl" or "spder" documets by followg oe hypertext lk to aother, the people search through what they have foud. - Huma-Powered Drectores, such as Ope Drectory. It depeds o humas for ts lstgs. People have to submt a short descrpto to the drectory for ther etre ste. A search looks for matches oly the descrptos submtted. - Hybrd Search Eges, such as MSN search. It s mataed by a combato of prevous types ad preset both results. The Web search eges employ some kd of cetralzed algorthm. I order to have the best results, these algorthms use locato/frequecy method (search eges check to see f the search keywords appear ear the top of a web page ad how ofte keywords appear relato to other words a web page) ad the off-the-page factor (lke clckthrough measuremet). They are the major factor how search eges determe the popularty of a documet. Habtually, search results are sorted popularty order. Curretly there are a lot of P2P fle-sharg etworks exstece, ad may of them have mllos of o-le users ad mllos of data shared [4]. I ths type of etworks, what a user really wats s to fd the fle s lookg for to dowload t. The probablty to fd a desred fle, the etwork where a user s searchg, s assocated to the popularty of the fle. Some other parameters lke the type of fle t ca be shared, the avalablty of the fle ad ts replcato are also cosdered. I order to have real search measuremets about some flms, sogs, programs ad documets, we have selected some of the most popular publc doma P2P fle-sharg etworks. Those selected etworks are Gutella [5], [6], Opeap [7], Edokey [8], Soulseek [9] ad []. Although there are other etworks [], we have selected ths oes because they are so popular betwee Iteret users.

2 O the other had, we have selected two crawlerbased search eges, Google ad Altavsta, ad oe search drectory, Yahoo!, order to fd the same fles Web search eges. Later o, t s establshed a relatoshp betwee the results obtaed web search eges ad the results obtaed the peer-to-peer fle-sharg etworks aforemetoed. It wll gve us the popularty of those fles. Ths paper s structured as follows. Secto 2 dscusses the search techques used Peer-To- Peer fle-sharg etworks. I secto 3, t s descrbed the popularty parameter. Secto 4 shows the measuremets take the Peer-To-Peer flesharg etworks ad Web search eges selected. It s also show the relatoshp betwee them. I secto 5, t s dscussed how ca be creased the probablty to fd a desred fle Peer-To-Peer fle-sharg etworks. Fally, Secto 6, there are coclusos ad future works. 2 Search Techques Peer to Peer Fle Sharg Networks I order to fd a fle a P2P etwork, a search s eeded. The mplemeted search algorthm every etwork depeds o the type of the etwork (cetralzed P2P, decetralzed P2P ad partally cetralzed). There are several types of searchg algorthms ad they ca be classfed as follows: 2. Loosely cotrolled P2P search algorthms. They are used decetralzed Peer-To-Peer etworks. The data placemet s ot defed because the odes of the etwork decde what fles they wat to share. There are two kd of loosely cotrolled P2P search algorthms: 2.. Broadcast search techque The query search s set to all drectly coected eghbours ad they forward the query to all ther eghbours. The query s propagated to suffcet umber of odes to match the etry or utl a TTL value. If the eghbour has the cotet, t reples, otherwse f floods the query to ts eghbours. Ths type of search s used by Gutella etwork Selectve search techque The query search s set to some odes called superodes that act as a cetral odes. Ths superodes wll perform the search to other superodes order to fd the requested fle. The clets wth a hgher badwdth ad process capacty wll be cosdered automatcally superodes. Those clets wth less badwdth wll be superode clets. Ths type of system uses a flow cotrol algorthm for sedg queres ad reples. It also has a dagram of prortes used to dscard some messages. Ths type of search s used by ad Gutella 2 [2] Radomly search techque The query s set to k umber of radomly selected eghbours. Each of these eghbours forward the query to ay of ther radomly selected eghbours. The query s propagated to suffcet umber of odes to match the etry or utl a TTL value. Ths techque s descrbed [3] Probably search techque I ths case, the queres are set to specfc clets whch are cosdered to have the greater probablty fdg the request. Each ode matas a probablty value correspodg to each eghbour whch defes the chaces that a query wll be forwarded to that eghbour. A example of ths type of search s APS [4]. 2.2 Strogly cotrolled P2P search algorthms. I structured P2P etworks, data placemet ad topology wth the P2P fle-sharg etwork s tghtly cotrolled. These etworks are based Dstrbutes Hash Tables (DHT), ad the odes do ot decde what they store ad share wth other peers the etwork. The data placemet s defed by the algorthm. Whe a documet s publshed, t s routed to the clet whose ID s the most smlar to the documet s ID. I order to fd a fle, the queres are set to the clet whose ID s the most smlar to the documet s ID. The process s repeated utl a close match s foud. The ma search problem ths type of etworks s that they are ot very effcet for keyword based search. Ths type of search s used by Freeet [5], CAN [6], Chord [7], Pastry [8] ad Tapestry[9]. 2.3 Server-cetrally cotrolled P2P search algorthms. They are used peer-to-peer etworks where there s a server or a group of servers. Ths type of search s very smple ad has short query tme. There are two kd of server-cetrally cotrolled P2P search algorthms:

3 2.3. Sgle-Server search techque Itally, P2P clets coect to a cetral server where they publsh ther shared fles (the fles ames, ther szes, etc). Whe a search query s set to the server, t looks up ts dex database. If there s a matchg etry, the IP address of the ode that shares the fle s set to the oe that requested t, ad the, the drect coecto ad dowload takes place. Ths techque s used by the Soulseek etwork Farm-of-Servers search techque I ths type of P2P etworks, there s a group of avalable servers called brokers. P2P clets must be authetcated to oe of those cetral servers. Each broker has the dexes of the local clets ad some cases the dexes of some fles from eghbour brokers. Whe a clet performs a query to a broker, ths oe searches ts local database ad f t does t fd a match, t uses the local dex order to fd a eghbour broker that ca sed the request. The server dexes are ot statc ad t ca chage accordg to the fles the system. The etworks, ad use ths techque. 3 The Popularty Parameter There are dfferet ways to measure the popularty parameter, t depeds o where ths parameter s eeded. The followg are some ways to measure the popularty parameter: - I Web search eges, as such Google, t s gve a lot of mportace to the umber of webstes that lk to a webste, so the popularty parameter s measured by the umber of comg lks to the ste. Wth ths popularty parameter t s bult the PageRak. - The popularty of a fle ca be related to the umber of tmes the fle has bee retreved from the surveyed archve durg a certa perod of tme. It s used web servers. - The popularty of a fle ca be determed by the umber of users that have requested ts dowload. It s used to measure how may users use a certa software. - The popularty parameter moves ca be related wth the audece t have had cemas, the umber of DVD sold or the umber of reted moves by vdeoclubs. - The popularty parameter sogs ca be related wth rado or web top lsts. - I structured peer-to-peer etworks, the popularty of a fle or a servce s measured by the umber of tmes the fle s requested. It also affects to the probablty that t s replcated by other peers. The popularty of a fle govers how log t stays the etwork ad how ofte t s replcated. I peer-to-peer fle-sharg etworks, the popularty ca be mathematcally expressed as follows. Objects a peer-to-peer fle-sharg etworks do ot have the same popularty. Assumg that there are m fles of terest oe P2P etwork ad q represets ther ormalzed relatve popularty (umber of queres ssued for t), t s verfed: m = q = () All selected etworks are ustructured publc doma peer-to-peer etworks. So, there s o cotrol over etwork topology or data placemet ay of them. Some of those etworks are Zpf-lke dstrbutos, as such Gutella ad Napster [2][2]. m α = q = (2) α Where α s a Zpf coeffcet ad s the -th most popular fle. Ths Zpf dstrbuto ca be further used to determe the probablty for a query to be assocated wth the -th most requested fle q. Other studes demostrates that ad other P2P fle-sharg systems are o-zpf behavor [22][23]. Assumg that each fle s replcated o r odes, the total umber of terestg fles stored the etwork s R: R = m r = (3) We ca assume that the most popular fle s also the most replcated. Aalyzed P2P fle-sharg etworks have rgd assumptos o how replcatos of objects happe the system. Oly odes that request a fle makes copes of the fle. O the other had, some etworks, as such Gutella (decetralzed) ad (partally decetralzed), search cossts of radomly probg stes utl the desred fle s foud. Thus, the probablty to fd a fle Pr(k) o the k th probe s gve by [24]: k r = r Pr ( k ) (4) Where s the umber of odes the etwork.

4 Gutella SoulSeek Average umber of users 8 * Average umber of shared fles * /t Average sze of total shared data,294 GB* GB GB /t GB /t Max. Varato of users (%) 4,49 2,33 42,2 39,3 5,5,7 Max. Varato of shared fles (%) 26,35 8,63 53,65 36,76 5,47 /t Max. Varato of shared data (%) 349,49 5,72 34,58 /t 5,79 /t Table. Comparatve of the 6 archtectures measured (* o total etwork values, /t: measured ot take) 5% % % 83% 5% % % 2% % 37% 37% 59% % % 2% 83% 59% 2% Fgure : Moves percetage Fgure 2: Sogs percetage % % 8% 9% 9% 8% % % % 4% 95% 95% % 4% Fgure 3: Software percetage Fgure 4: Documets percetage 4 Search results We have measured the average umber ad the maxmum varato of peers, shared fles ad total amout of data shared of the sx selected etworks order to kow how may peers ad formato are sde the selected etworks. Those data are show Table. It has to be take to accout that Gutella,, Opeap, Edokey, ad Soulseek etworks permt to search every type of fle, but oly permts audo fles (mp3, ogg, wma, etc.). I order to establsh whch etwork s more probably to fd moves, sogs, software ad documets, we have measured the umber of peers that have fles wth keywords of 2 moves, 24 sogs, 2 software programs ad 8 documets. Ths measures have bee take every oe of the sx etworks. To avod wrog results our searches we have employed ext methodology: - To lmt the results to the type of fle we were lookg for, the type of fle was added (av, mpg, exe, pdf, doc, etc.) to they keywords of the search. - The umber of software versos were ot cluded the keyword of the search. - The ame of moves that have secod delveres (shreck 2, Spderma 2 ad so o) were ot cluded. Although there are peers tercoected to more tha oe peer-to-peer etwork, they are sgfcat compared wth the total umber of peers of every etwork. O the other had, the fles shared by those peers could ot be the same for all coected etworks. If all aalyzed etworks were tercoected, the type of fles shared by every etwork to the other are dfferet. Although all of them supports every type of etwork (except ), those etworks seems to be specalzed dfferet type of fles, as t s show Fgures to 4. The table 2 shows whch s the rakg for those sx etworks I order to kow the popularty of those moves, sogs, software ad documets, results have bee compared wth two search eges, Google ad Altavsta, ad oe search drectory, Yahoo!.

5 altavsta altavsta Selected Fles Selected Fles Fgure 5: Number of results of Moves Fgure 6: Number of results of Sogs altavsta Selected Fles altavsta Selected Fles Fgure 7: Number of results of Software Fgure 8: Number of results of Documets P2P Network Moves Sogs Software Documets st 2 d st st 2 d st 2 d 3 rd 4 th 4 th 3 rd 2 d 3 rd 3 rd 4 th 4 th Soulseek 5 th 6 th 5 th 5 th X 5 th X X Table 2. Rakg moves, sogs, software ad documets To avod wrog results web searches ad to lmt the results to the type of fle we are lookg for, we have employed ext methodology: - For move searches we have added the word move to the search. - For sog searches, we have added ot oly the ame of the sog, but the ame of the group. - For documets searches we have added the type of the documet (pdf, doc, etc.). - For software searches we have searched oly specfc maufacturers software. I order to aalyze the P2P data collected ad compare t wth Web search eges we have scaled ad data results wth a x5 factor ad, ad wth x factor. These factors have bee used moves, sogs ad software. Fgures 5 to 8 shows the data collected. Ths measures have bee take oly for comparatve popularty purposes, t s preteded to kow f a popular fle Web search eges wll gve a popular fle peer-to-peer flesharg etworks. As t ca be see those fgures, there s o result of moves, software ad documets for due to ts oly-sogs mplemetato. 5 Icreasg the Probablty to Fd the Desred Fle The fles are ot always the peer-to-peer etwork where the user s searchg. Most of the etworks mplemeted owadays support ay fletype, but there are some that oly supports audo fles. What s eeded s a system whch wll allow to search every P2P etwork ad dowload from every peer of every etwork. The uo of Peer-To-Peer fle-sharg etworks, by the creato of a Peer-To-Peer fle-sharg etworks Itercoecto System, wll gve greater probablty to fd the desred fle. If there s Peer- To-Peer fle-sharg etworks, the total probablty wll be: P Eα = + P α P P ( ) Pα Pβ... Pη ( ) PP 2... P η>... > β> α β β> + P P P +... α β γ γ> β> (5) As t ca be see, the total probablty to fd the desred fle wll be greater tha the probablty of oe them oly, but less tha the sum of all of them. 6 Cocluso Sx ustructured publc doma Peer-to-Peer etworks have bee measured order to kow what s the P2P fle sharg etwork wth most search results moves, sogs, software ad documets. As a result of our measuremets, those etworks seems to be specalzed dfferet type of fles.

6 The search results have bee compared wth those obtaed Web search eges. We have checked that f a fle s popular Web search eges, t s also popular P2P fle-sharg etworks. Future works wll try to fd the mathematcal relatoshp betwee the fle popularty Web searches eges ad the fle popularty P2P fle-sharg etworks. ackowledgemets Authors wat to ackowledge to Mr. Mguel A. Graados from Polytechc School of Gada for hs data collecto. Refereces: [] Mchael K. Bergma, The Deep Web: Surfacg Hdde Value, The Joural of Electroc Publshg, Volume 7, Issue. August, 2. [2] Day Sullva, Nelse NetRatgs Search Ege Ratgs, July 4, 24. Avalable at: p/25645 [3] Day Sullva, Search Ege Szes, September 2, 23. Avalable at: p/25648 [4] J. Lloret Maur, B. Mola Moreo, C. Palau Salvador y M. Esteve Domgo. Publc Peer- To-Peer Flesharg Networks Evaluato. The 2d Iasted Iteratoal Coferece O Commucato Ad Computer Networks. MIT Cambrdge, MA, USA. November 24. [5] Eyta Adar ad Berardo Huberma. Free rdg o gutella. Frst Moday, 5(), October 2. [6] Nathael Lebowtz, Mate Rpeau, ad Adam Werzbck. Decostructg the Kazaa Network, 3rd IEEE Workshop o Iteret Applcatos, Sa Jose, USA Jue 23. [7] [8] Olver Heckma ad Axel Bock. The 2 Protocol. Techcal Report KOM-TR-8-22, Multm. Commucatos Lab, Darmstadt Uversty of Techology, December 22. [9] Soulseek [] [] Wkpeda [2] [3] Chrstos Gkatsds, Mlea Mhal, ad Am Saber, Radom Walks Peer-to-Peer Networks, The 23rd Coferece of the IEEE Commucatos Socety (Ifocom 24), Hog Kog, March 24 [4] D. Tsoumakos ad N. Roussopoulos: Adaptve Probablstc Search for Peer-to-Peer Networks. I Proceedgs of the 3rd IEEE Iteratoal Coferece o P2P Computg, Lkopg, Swede, September 23. [5] I. Clarke et al. Freeet: A dstrbuted aoymous formato storage ad retreval system, ICSI Workshop o Desg Issues Aoymty ad Uobservablty, It'l Computer Scece Ist., 2. [6] S. Ratasamy, P. Fracs, M. Hadley, R. Karp, S. Sheker, A Scalable Cotet- Adressable Network, ACM Sgcomm 2, Sa Dego, CA, USA, August 2, [7] I. Stoca, R. Morrs, D.Karger, F.Kaashoek, H. Balakrsha, Chord: A Scalable Peer-To-Peer Lookup Servce for Iteret Applcatos, ACM Sgcomm 2, Sa Dego, USA, August 2, [8] A. Rowstro ad P. Druschel, Pastry: Scalable, dstrbuted object locato ad routg for large-scale peer-to-peer systems, IFIP/ACM Iteratoal Coferece o Dstrbuted Systems Platforms (Mddleware), hedelberg, Germay, pages , November, 2 [9] B. Zhou, D.A. Joseph, J. Kubatowcz, Tapestry: a fault tolerat wde area etwork fraestructure, UC Berkeley techcal report UCB/CSD--4 [2] Kuwadee Srpadkulcha, the popularty of gutella queres ad ts mplcatos o scalablty. I O Relly s February 2 [2] Zhu Ge, Dael R. Fgueredo, Sharad Jaswal, Jm Kurose, Do Towsley. Modelg Peer-Peer Fle Sharg Systems, Proceedgs IEEE INFOCOM 23, Sa Fracsco, March- Aprl 23. [22] Krsha P. Gummad, Rchard J. Du, Stefa Sarou, Steve D. Grbble, Hery M. Levy, Joh Zahorja, Measuremet, Modelg, ad Aalyss of a Peer-to-Peer Fle-Sharg Workload, Proceedgs of the eteeth ACM symposum o Operatg systems prcples, 23, p [23] J. Chu, K. Labote, ad B. N. Leve. Avalablty ad localty measuremets of peerto-peer fle-sharg systems. I Proceedgs of SPIE ITCom: Scalablty ad Traffc Cotrol IP Networks, volume 4868, July 22. [24] Q Lv, Pe Cao, Edth Cohe, Ka L, ad Scott Sheker, Search ad replcato ustructured peer-to- peer etworks, Proceedgs of the 6th teratoal coferece o Supercomputg, ACM Press, 22, p

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

Entropy-Based Link Analysis for Mining Web Informative Structures

Entropy-Based Link Analysis for Mining Web Informative Structures Etropy-Based Lk Aalyss for Mg Web Iformatve Structures Hug-Yu Kao, Sha-Hua L *, Ja-Mg Ho *, Mg-Sya Che Electrcal Egeerg Departmet Natoal Tawa Uversty Tape, Tawa, ROC E-Mal: {bobby@arbor.ee.tu.edu.tw, msche@cc.ee.tu.edu.tw}

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Group Nearest Neighbor Queries

Group Nearest Neighbor Queries Group Nearest Neghbor Queres Dmtrs Papadas Qogmao She Yufe Tao Kyrakos Mouratds Departmet of Computer Scece Hog Kog Uversty of Scece ad Techology Clear Water Bay, Hog Kog {dmtrs, qmshe, kyrakos}@cs.ust.hk

More information

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv

More information

A Framework of Business Intelligence-driven Data Mining for e-business

A Framework of Business Intelligence-driven Data Mining for e-business A Framework of Busess Itellgece-drve Data Mg for e-busess Yag Hag, Smo Fog Dept. of Computer ad Iformato Scece Uversty of Macau Macau SAR ma76562@umac.mo, ccfog@umac.mo Abstract Ths paper proposes a data

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

A Smart Machine Vision System for PCB Inspection

A Smart Machine Vision System for PCB Inspection A Smart Mache Vso System for PCB Ispecto Te Q Che, JaX Zhag, YouNg Zhou ad Y Lu Murphey Please address all correspodece to Departmet of Electrcal ad Computer Egeerg Uversty of Mchga - Dearbor, Dearbor,

More information

Questions? Ask Prof. Herz, herz@ucsd.edu. General Classification of adsorption

Questions? Ask Prof. Herz, herz@ucsd.edu. General Classification of adsorption Questos? Ask rof. Herz, herz@ucsd.edu Geeral Classfcato of adsorpto hyscal adsorpto - physsorpto - dsperso forces - Va der Waals forces - weak - oly get hgh fractoal coerage of surface at low temperatures

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information