Using of Hand Geometry in Biometric Security Systems

Size: px
Start display at page:

Download "Using of Hand Geometry in Biometric Security Systems"

Transcription

1 82 P. VARCHOL, D. LEVICKÝ, USING OF HAND GEOMERY IN BIOMERIC SECURIY SYSEMS Using of Hand Geomery in Biomeric Securiy Sysems Peer VARCHOL, Dušan LEVICKÝ Dep. of Elecronics and Mulimedia Communicaions, echnical Universiy of Košice, Park Komenského 3, Košice, Slovak Republic Absrac. In his paper, biomeric securiy sysem for access conrol based on hand geomery is presened. Biomeric echnologies are becoming he foundaion of an exensive array of highly secure idenificaion and personal verificaion soluions. Experimens show ha he physical dimensions of a human hand conain informaion ha is capable o verify he ideniy of an individual. he daabase creaed for our sysem consiss of 408 hand images from 24 people of young ages and differen sex. Differen paern recogniion echniques have been esed o be used for verificaion. Achieved experimenal resuls FAR=0,82% and FRR=4,583% show he possibiliies of using his sysem in environmen wih medium securiy level wih full accepance from all users. Keywords Biomeric securiy, hand geomery recogniion, Gaussian mixure model, expecaion-maximizaion algorihm.. Inroducion Associaing an ideniy wih an individual is called personal auhenicaion. he person can be recognized by wha he knows (e.g. password, PIN, or piece of personal informaion, by wha he owns (e.g. card key, smar card, or oken like a SecurID card or by his human characerisics (biomerics. Biomeric mehods of person auhenicaion belong in modern approaches in field of access securiy. he main advanage of biomeric is ha human characerisics canno be misplaced or forgoen []. One of he mos dangerous securiy hreas is he impersonaion, in which somebody claims o be somebody else. he securiy services ha couner his hrea are idenificaion and verificaion. Idenificaion is he service where an ideniy is assigned o a specific individual, and verificaion (auhenicaion he service designed o verify a user's ideniy. Biomeric mehods can be generally divided ino wo caegories: behavioral-based mehods physiological-based mehods. Behavioral-based mehods perform he auhenicaion ask by recognizing people s behavioral paerns, such as signaures keyboard yping or voice prin. he main problem wih behavioral mehods is ha hey all have high variaions, which are difficul o cope wih. On he oher hand, while behavioral characerisics can be difficul o measure because of influences such as sress, faigue, or illness, hey are usually more accepable o users and generally cos less o implemen. Physiological-based mehods verify a person s ideniy by means of his or her physiological characerisics such as fingerprin, iris paern, palm geomery, DNA, or facial feaures. In general, rais used in he physiological caegory are more sable han mehods in he behavioral caegory because mos physiological feaures are virually nonalerable wihou severe damage o he individual [3]. 2. Hand Geomery All biomeric echniques differ according o securiy level, user accepance, cos, performance, ec. One of he physiological characerisics for recogniion is hand geomery, which is based on he fac ha each human hand is unique. Finger lengh, widh, hickness, curvaures and relaive locaion of hese feaures disinguish every human being from any oher person. Hand geomery is considered o achieve medium securiy, bu wih several advanages compared o oher echniques: medium cos as i only needs a plaform and medium resoluion reader or camera, i uses low-compuaional cos algorihm, which leads o fas resuls, low emplae size (from 352 o 209 byes, which reduces he sorage needs, very easy and aracive o users leading o grea user accepance, subconscious connecion wih police, jusice, and criminal records. he availabiliy of low cos, high speed processors and solid sae elecronics made i possible o produce hand scanners a a cos ha made hem affordable in he commercial access conrol marke. Environmenal facors such as dry weaher or individual anomalies such as dry skin do no appear o have any negaive effecs on he verificaion

2 RADIOENGINEERING, VOL. 6, NO. 4, DECEMBER accuracy of hand geomery-based sysems. he performance of hese sysems migh be influenced if people wear big rings, have swollen fingers or no fingers. Alhough hand analysis is mos accepable, i was found ha in some counries people do no like o place heir palm where oher people do. Sophisicaed bone srucure models of he auhorized users may deceive he hand sysems. Paralyzed people or people wih Parkinson's disease will no be able o use his biomeric mehod. Since here is no much open lieraure addressing he research issues underlying hand geomery auhenicaion, i is difficul o describe he sae-of-he-ar in using i in biomerics. Insead much of he available informaion is in he form of applicaion-oriened descripion. 3. Sysem Archiecure ypical archiecure of all biomeric sysems consiss of wo phases: enrollmen, recogniion. In he phase of enrollmen, several images of hand are aken from he users. he images, called emplaes, are preprocessed o ener feaure exracion, where a se of measuremen is performed. Final model depends on he mehod used for recogniion. Models for each of he users are hen sored in he daabase. In he phase of recogniion, a single picure is aken, preprocessed, and feaures are obained. In he proposed sysem, he process of verificaion is used, where he inpu emplae is compared only wih he model of claimed person. he feaure vecor is compared wih feaures from he model previously sored in he daabase. he resul is he person is eiher auhorized or no auhorized. o evaluae a biomeric sysem s accuracy he mos commonly adoped merics are he False Rejecion Rae (FRR and False Accepance Rae (FAR. FRR is he percenage of auhorized individuals rejeced by he sysem and FAR is he percenage ha unauhorized persons are acceped by he sysem []. he poin where FAR and FRR have he same value is called Equal Error Rae (ERR. he proposed sysem is dedicaed for verificaion and herefore requires he user o claim ideniy hrough an arificial ID (e.g., magneic card or PIN before he sysem can sar process of enrollmen or auhenicaion. Due o assisance of arificial IDs, verificaion sysems require considerable less compuaional resources bu he FRR may increase slighly. his is because he combined FRR for a sysem ha uses boh arificial IDs and biomeric is: FRR = FRR of ID + FRR of biomeric. ( On he oher hand, he combined FAR can be grealy reduced wih arificial ideniies: FAR = FAR of ID FAR of biomeric. (2 Requiring an arificial ID can minimize casual aacks o he biomeric verificaion sysem because random claims can ofen be rejeced as unknown o he daabase. 4. Enrollmen 4. Image Capure Enrollmen involves a process of adding users o he daabase. he image acquisiion sysem which we have designed (inspired from [4], [5] comprises of a scanner and a fla surface. A user places his righ hand on he surface of he device. he palm is facing downwards and he pegs are used as conrol poins for fixing he appropriae posiion of he hand. o obain an image, scanner is used in he nex sep (Fig.. Before obaining a new hand picure, he user was insruced o remove he whole hand from he surface. his muliple placemens allow he sysem o capure images of he hand in slighly differen posiions. ha s also he oher advanage compared o behavioralbased mehods, because enrollmen can be done in shor ime. For example, in case of voice recogniion sysem, he process of enrollmen mus be realized in a long ime period o include all possible aspecs influencing he voice. Fig.. emplae capured by scanner. he final daabase conains 26 people, where for every user 20 emplaes were capured. Because of possible incorrec placemen of hand during enrolmen, he bes picures have been chosen and 7 emplaes for each of he users lef. he 5 of hem are used for process of raining and 2 of hem for esing he sysem. Daabase consiss of people of differen sex and young ages. 4.2 Preprocessing Afer he image is capured, i is preprocessed o obain only he area informaion of he hand. he firs sep in preprocessing is is ransforming o binary image. Since here is clear disincion in inensiy beween he hand and he background, a binary image is obained hrough MA- LAB funcion im2bw. he oupu binary image has values of 0 (black for all pixels in he inpu image wih lumi-

3 84 P. VARCHOL, D. LEVICKÝ, USING OF HAND GEOMERY IN BIOMERIC SECURIY SYSEMS nance less han a level and (whie for all oher pixels. he level is a normalized inensiy value obained by Osu's mehod, which chooses he hreshold o minimize he inraclass variance of he black and whie pixels. Background lighning effecs and he noise make fake pixels in he image. MALAB funcion imfiler is used o remove hese pixels and o jusify edges of he hand in he nex sep. he funcion provides filering of mulidimensional images. he imfiler funcion compues he value of each oupu pixel using double-precision, floaing-poin arihmeic. Inpu image pixel values ouside he bounds of he image are assumed o equal o he neares array border value. Hand boundary is easily locaed aferwards. 4.3 Feaure Exracion Preprocessing simplifies a measuremen algorihm and enables us o ge feaures of he hand. An algorihm for feaure exracion was creaed in programming environmen MALAB and i is based on couning pixel disances in specific areas of he hand. Since he sysem uses special surface wih pegs o fix he appropriae posiion of he hand, i can obain pixel disance of he given measuremen. he algorihm looks for whie pixels beween wo given poins and compues a disance using geomerical principles. he resul is a vecor of 2 elemens (Fig. 2: Widhs: each of he fingers is measured in 3 differen heighs. hump finger is measured in 2 heighs. Heighs: he heigh of all fingers and humb is obained. Palm: 2 measuremens of palm size. 5. Recogniion he feaure vecor obained by he verificaion should ener a comparison process o deerminae if he person whose hand image was aken is he user who claims o be. his comparison is made agains user model, which will be calculaed depending on he comparison algorihm used. Experimens were made wih differen mehods: Euclidian disance, Hamming disance, and Gaussian mixure model. 5. Euclidian Disance Euclidian disance, considered he mos common echnique of all, performs is measuremens wih following equaion: d = L í = 2 ( x i i (3 where L is he dimension of he feaure vecor, x i is he i-h componen of he emplae feaure vecor, and i is he he i-h componen of he model feaure vecor. Model in his case, is hen represened as he mean of he resuling se of feaure vecors. Fig. 2. Image afer preprocessing and locaion of measuremen poins for feaure exracion. 5.2 Hamming Disance Hamming disance does no measure he difference beween he componens of he feaure vecors, bu he number of componens ha differ in value. As i is ypical ha all he componens differ beween samples of he same user, i is necessary o follow anoher approach for he emplae calculaion differen from one used for he Euclidian disance. Based on he assumpion ha he feaure componens follow normal disribuion, no only he mean of he se of iniial samples is obained, bu also a facor of sandard deviaion of he samples. In he comparison process, he number of componens of he feaure vecor falling ouside he area defined by he model parameers (represened by mean and sandard deviaion is couned, obaining he Hamming disance. 5.3 Gaussian Mixure Model In order o obain beer resuls han in previous approaches, echnique of Gaussian mixure models (GMM has been implemened for recogniion block. GMM is paern recogniion echnique ha uses an approach of he saisical mehods [6]. he vecor of each hand measuremen can be described by normal disribuion, also called Gaussian disribuion. Each hand measuremen may be hen defined by wo parameers (for our case, where measuremen vecor is one dimensional: mean (average and sandard deviaion (variabiliy. Suppose ha he measuremen vecor is he discree random variable x. For he general case, where vecor is mulidimensional, he probabiliy densiy funcion of he normal disribuion is a Gaussian funcion [2]: ( x μ 2 ( x μ p ( x, μ, = exp (4 L (2π where μ is he mean, is he covariance marix and L is he dimension of feaure vecor. Covariance marix is he naural generalizaion o higher dimensions of he concep

4 RADIOENGINEERING, VOL. 6, NO. 4, DECEMBER of he variance of a random variable. If we suppose he random variable measuremen is no characerized only wih simple Gaussian disribuion, we can hen define i wih muliple Gaussian componens. GMM is a probabiliy disribuion ha is a convex combinaion of oher Gaussian disribuions [2]: J j = ( j ( j ( j p( x, μ, p( x = π (5 where J is he number of Gaussian mixures and π (j is he weigh of each of he mixure. Afer GMM is rained, he model of each user will be he final values of π (j, μ (j, (j and J, which grealy increases he daabase size. ab. shows he differences in he size of he model depending on he compuaional mehods used. k h = n x. x k μ =, (7 ( k h = n x ( k ( μ ( x μ ( k k h = n x x k = h = n ( k k = hn ( x = ( k ( x, (8 π. (9 Afer convergency of he main model parameers, he muliple Gaussian disribuions can be described by one single funcion. In he case in Fig.3, he GMM has seven mixures and wo dimensional feaure vecor. Mehod used Raw emplae Euclidian disance Hamming disance GMM 2 mixures Model size,395 MB 352 B 520 B,209 kb ab.. Comparison of he model sizes for differen echniques Expecaion-Maximizaion Algorihm o esimae he densiy parameers of a GMM saisic model, cluser esimaion mehod called Expecaionmaximizaion algorihm (EM is adoped. he EM is he ideal candidae for solving parameer esimaion problems for he GMM. Each of he EM ieraions consiss of wo seps Esimaion (E and Maximizaion (M. he M-sep maximizes a likelihood funcion ha is refined in each ieraion by he E-sep. he GMM parameers can be divided ino wo groups: one conaining π (j s and anoher conaining μ (j s and (j s. he former indicaes he imporance of individual mixure densiies via he prior probabiliies π (j s, whereas he laer is commonly regarded as he kernel parameer defining he form of mixure densiy. Unlike oher opimizaion echnique in which unknown parameers can be arranged in any order, he EM approach effecively makes use of he srucural relaionship among he unknown parameers o simplify he opimizaion process. Afer iniializaion of parameers, he EM ieraion is as follows:. he E-sep deermines he bes guess of he membership funcion h (j n (x, which is he funcion for each elemen of x and each mixure []: ( j ( j ( j ( j p( x δ =, φn π n hn ( x = (6 J ( k ( k ( k = p x = k δ, φn π n where x /δ j = defines ha x is generaed by he j-h mixure, φ j is densiy funcion associaed wih he j-h mixure. 2. he M-sep maximizes funcion o find new parameers π (k*, μ (k*, (k* using (5, (6, (7. Afer ha algorihm incremen n by and repea E-sep unil convergence []. Fig. 3. GMM model - superposiion of seven Gaussian disribuions. Verical axe represens probabiliy densiy, and parameers on he horizonal axes are observaions of 2-dimensional vecor. 6. Experimenal Resuls Sysem has been esed on he daabase described in secion 4. oally wih 408 hand emplaes. Sysem behavior can be managed depending on environmen for is using and securiy policy. his is done by a hreshold, which influences boh values, FAR and FRR. he hreshold for GMM mehod is a value, which is compared o he probabiliy obained from GMM for a given user. If he probabiliy offered by GMM is higher han he hreshold, verificaion of he given user is posiive, and vice versa. Likewise, he hreshold for Euclidian disance or Hamming disance is a value, which is compared o he disance obained from he recogniion process. If he Euclidian or Hamming disance is lower han he hreshold, verificaion is posiive. he bes values of FRR, FAR and ERR achieved for differen compuaional mehods are shown in ab.2. he sysem was esed wih differen hresholds depending on used mehods and he resuls in ab.2 are he bes achieved values.

5 86 P. VARCHOL, D. LEVICKÝ, USING OF HAND GEOMERY IN BIOMERIC SECURIY SYSEMS FRR (% FAR (% ERR (% GMM 4,583 0,82 4,62 ED 0,47 0,272 6,45 HD 2,5 4,076 9,73 ab. 2. Resuls for differen mehods: GMM Gaussian Mixure Model, ED Euclidian disance, HM Hamming disance. As menioned above, radeoff beween FAR and FRR is adjused by a hreshold, which needs o be adjused carefully so ha he wo raes can boh saisfy he prescribed securiy sandards. If a securiy sysem makes users feel uncomforable, eiher psychologically or physically, hen he sysem is inrusive. For example, in compuer nework securiy or access conrol for areas requiring middle or low securiy levels, an inrusive sysem will annoy users and herefore will discourage hem from using i. In high securiy areas, an inrusive sysem someimes can urn ou o be a benefi, since i may appear o be a highly secure recogniion mehod. his elevaed sense of securiy may in iself discourage inruders. ab.3 and Fig. 4 show FRR and FAR values dependen on he adjusable adoped hreshold for mehod GMM. Due o a small value of he hreshold, i is given by a negaive logarihmic value. GMM (2 mixures hreshold (-log FRR (% FAR (% 2,864 6,667 0, ,863 4,583 0,82 87,0676 8,333 3,0797 6,882 0, 6,432 ab. 3 Values FAR and FRR dependen on adjused securiy hreshold. Error (% FRR[%] FAR[%] reshold (-log Fig. 4. FAR and FRR agains hreshold. In order o reach an effecive comparison of differen sysems, he descripion independen of hreshold scaling is required. Receiver Operaing Characerisic (ROC in Fig.5 plos FRR values direcly agains FAR values and eliminaes hreshold parameers. FRR (% , 0, 0 FAR (% Fig. 5. Receiver Operaing Characerisic (ROC. 7. Conclusion Experimens presened show he possibiliies of using hand geomery as he biomeric characerisic for auomaic verificaion sysems. Hand geomery feaures used for he proposed sysem were shown as enough unique o use hem o verify he person s ideniy. From he comparison mehods, Gaussian mixure modeling has been revealed as he one wih he bes performance and became preferred o Euclidean and Hamming disance. he bes resuls achieved GMMs wih 2 mixures: FAR=0,82%, FRR=4,583% and EER=4,62%. All users showed grea accepance and easy of usage of he sysem during process of enrollmen and creaing he daabase. his sysem as designed currenly is considered a good alernaive for securiy applicaions for areas requiring middle or low securiy levels (e.g., aparmens, hospials, sores, aendance. Furher work should be applied o creae mulimodal biomeric sysem wih a fusion of hand geomery and voice prin echniques o ge securiy sysem wih high accuracy. Acknowledgemens he research described in he paper was suppored by he Minisry of Educaion and he Academy of Science of he Slovak republic VEGA under Gran No. /4054/07. References [] KUNG, S. Y., MAK, M. W., LIN, S. H. Biomeric Auhenicaion. Published as Prenice Hall Professional echnical Reference. New Jersey: Firs Prining, Sepember [2] VARCHOL, P., LEVICKY, D. Implemenaion of Gaussian mixure models for biomeric securiy sysem. In Proceedings Komunikacne a informacne echnologie, aranske Zruby(Slovak Republic, 2007.

6 RADIOENGINEERING, VOL. 6, NO. 4, DECEMBER [3] VARCHOL, P., LEVICKY, D. Access securiy based on biomeric. In Proceedings Research in elecommunicaion echnology. Nove Meso na Morave (Slovak Republic, [4] SANCHEZ-REILLO, R. Biomeric idenificaion hrough hand geomery measuremens. IEEE ransacions on Paern Analysis and Machine Inelligence. ISSN: Washingon, [5] JAIN, A., ROSS, A. A prooype hand geomery-based verificaion sysem. In Proceedings of 2nd In. Conference on Audio- and Videobased Biomeric Person Auhenicaion. Washingon (USA, 999. [6] YOUNG, S. he HK Book (for HK Version 3.2. Firs published December 995, Revised for HK Version 3.2 December Abou Auhors... Dušan LEVICKÝ for biography see p. 8 of his issue. Peer VARCHOL was born in Sará Ľubovňa, Slovakia, in 980. He graduaed from he echnical Universiy in Košice, Faculy of Elecrical Engineering and Informaics. Since 2004 he has been PhD. suden a he Deparmen of Elecronics and Mulimedia Communicaions, focusing on biomeric securiy, nework echnologies and digial image processing. RADIOENGINEERING REVIEWERS December 2007, Volume 6, Number 4 BAUDOIN, G., ESIEE Paris, France BARDOŇOVÁ, J., Brno Universiy of echnology BÁRÍK, H., Czech echnical Universiy in Prague BILÍK, V., Slovak Universiy of echnology, Braislava, Slovakia ĎAĎO, S., Czech echnical Universiy in Prague DJIGAN, V., ELVEES R&D Cener of Microelecronics, Moscow, Russia DOLEŽEL, I., Czech echnical Universiy in Prague DRUAROVSKÝ, M., echnical Universiy of Košice, Slovakia DŘÍNOVSKÝ, J., Brno Universiy of echnology FRÝZA,., Brno Universiy of echnology HALÁMEK, J., Academy of Sciences of he Czech Republic, Brno HEMZAL, D., Masaryk Universiy, Brno HOZMAN, J., Czech echnical Universiy, Kladno JIŘÍK, R., Brno Universiy of echnology KLÍMA, M., Czech echnical Universiy in Prague KOLÁŘ, R., Brno Universiy of echnology KOULIAKOVÁ, J., Slovak Universiy of echnology, Braislava, Slovakia KOZUMPLÍK, J., Brno Universiy of echnology KRAOCHVÍL,., Brno Universiy of echnology KRŠEK, P., Brno Universiy of echnology KULLA, P., Slovak Universiy of echnology, Braislava, Slovakia LÁČÍK, J., Brno Universiy of echnology LEVICKÝ, D., echnical Universiy of Košice, Slovakia LUKEŠ, Z., Brno Universiy of echnology MACHÁČ, J., Czech echnical Universiy in Prague MARŠÁLEK, R., Brno Universiy of echnology MIHALÍK, J., echnical Universiy of Košice, Slovakia NOVONÝ, V., Brno Universiy of echnology PÁA, P., Czech echnical Universiy in Prague PECHAČ, P., Czech echnical Universiy in Prague PERŽELA, J., Brno Universiy of echnology POLEC, J., Slovak Universiy of echnology, Braislava, Slovakia POLÍVKA, M., Czech echnical Universiy in Prague POMĚNKA, P., hene, Brno PROKEŠ, A., Brno Universiy of echnology PROVAZNÍK, I., Brno Universiy of echnology RAJMIC, P., Brno Universiy of echnology SCHEJBAL, V., Universiy of Pardubice ŠEBESA, V., Brno Universiy of echnology ŠŤASNÝ, J., Czech echnical Universiy in Prague URBANEC,., Brno Universiy of echnology VARGIC, R., Slovak Universiy of echnology, Braislava, Slovakia WIESER, V., Universiy of Žilina, Slovakia ZAVACKÝ, J., echnical Universiy of Košice, Slovakia ZEMČÍK, P., Brno Universiy of echnology ŽALUD, V., Czech echnical Universiy in Prague

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.

More information

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were

More information

Automatic measurement and detection of GSM interferences

Automatic measurement and detection of GSM interferences Auomaic measuremen and deecion of GSM inerferences Poor speech qualiy and dropped calls in GSM neworks may be caused by inerferences as a resul of high raffic load. The radio nework analyzers from Rohde

More information

Real-time Particle Filters

Real-time Particle Filters Real-ime Paricle Filers Cody Kwok Dieer Fox Marina Meilă Dep. of Compuer Science & Engineering, Dep. of Saisics Universiy of Washingon Seale, WA 9895 ckwok,fox @cs.washingon.edu, mmp@sa.washingon.edu Absrac

More information

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya.

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya. Principal componens of sock marke dynamics Mehodology and applicaions in brief o be updaed Andrei Bouzaev, bouzaev@ya.ru Why principal componens are needed Objecives undersand he evidence of more han one

More information

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS Hao Wu and Qinfen Zheng Cenre for Auomaion Research Dep. of Elecrical and Compuer Engineering Universiy of Maryland, College Park, MD-20742 {wh2003, qinfen}@cfar.umd.edu

More information

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt Saisical Analysis wih Lile s Law Supplemenary Maerial: More on he Call Cener Daa by Song-Hee Kim and Ward Whi Deparmen of Indusrial Engineering and Operaions Research Columbia Universiy, New York, NY 17-99

More information

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality A Naural Feaure-Based 3D Objec Tracking Mehod for Wearable Augmened Realiy Takashi Okuma Columbia Universiy / AIST Email: okuma@cs.columbia.edu Takeshi Kuraa Universiy of Washingon / AIST Email: kuraa@ieee.org

More information

Model-Based Monitoring in Large-Scale Distributed Systems

Model-Based Monitoring in Large-Scale Distributed Systems Model-Based Monioring in Large-Scale Disribued Sysems Diploma Thesis Carsen Reimann Chemniz Universiy of Technology Faculy of Compuer Science Operaing Sysem Group Advisors: Prof. Dr. Winfried Kalfa Dr.

More information

Chapter 8: Regression with Lagged Explanatory Variables

Chapter 8: Regression with Lagged Explanatory Variables Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One

More information

CHARGE AND DISCHARGE OF A CAPACITOR

CHARGE AND DISCHARGE OF A CAPACITOR REFERENCES RC Circuis: Elecrical Insrumens: Mos Inroducory Physics exs (e.g. A. Halliday and Resnick, Physics ; M. Sernheim and J. Kane, General Physics.) This Laboraory Manual: Commonly Used Insrumens:

More information

Making a Faster Cryptanalytic Time-Memory Trade-Off

Making a Faster Cryptanalytic Time-Memory Trade-Off Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland philippe.oechslin@epfl.ch

More information

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar Analogue and Digial Signal Processing Firs Term Third Year CS Engineering By Dr Mukhiar Ali Unar Recommended Books Haykin S. and Van Veen B.; Signals and Sysems, John Wiley& Sons Inc. ISBN: 0-7-380-7 Ifeachor

More information

-, On the digital-computer classification of geometric line patterns,

-, On the digital-computer classification of geometric line patterns, IEEE TRANSACTIONS ON PP;ITERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 12, NO. 12, DECEMBER 1990 1217 M. S. El-Wakil and A. A. Shoukry, On-line recogniion of handwrien isolaed Arabic characers, Paern Recogniion,

More information

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees

More information

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer Recen Advances in Business Managemen and Markeing Analysis of Pricing and Efficiency Conrol Sraegy beween Inerne Reailer and Convenional Reailer HYUG RAE CHO 1, SUG MOO BAE and JOG HU PARK 3 Deparmen of

More information

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999 TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision

More information

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS R. Caballero, E. Cerdá, M. M. Muñoz and L. Rey () Deparmen of Applied Economics (Mahemaics), Universiy of Málaga,

More information

Journal Of Business & Economics Research September 2005 Volume 3, Number 9

Journal Of Business & Economics Research September 2005 Volume 3, Number 9 Opion Pricing And Mone Carlo Simulaions George M. Jabbour, (Email: jabbour@gwu.edu), George Washingon Universiy Yi-Kang Liu, (yikang@gwu.edu), George Washingon Universiy ABSTRACT The advanage of Mone Carlo

More information

DDoS Attacks Detection Model and its Application

DDoS Attacks Detection Model and its Application DDoS Aacks Deecion Model and is Applicaion 1, MUHAI LI, 1 MING LI, XIUYING JIANG 1 School of Informaion Science & Technology Eas China Normal Universiy No. 500, Dong-Chuan Road, Shanghai 0041, PR. China

More information

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005 FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a

More information

Distributing Human Resources among Software Development Projects 1

Distributing Human Resources among Software Development Projects 1 Disribuing Human Resources among Sofware Developmen Proecs Macario Polo, María Dolores Maeos, Mario Piaini and rancisco Ruiz Summary This paper presens a mehod for esimaing he disribuion of human resources

More information

1. BACKGROUND 1-1 Traffic Flow Surveillance

1. BACKGROUND 1-1 Traffic Flow Surveillance Auo-Recogniion of Vehicle Maneuvers Based on Spaio-Temporal Clusering. BACKGROUND - Traffic Flow Surveillance Conduced wih kinds of beacons mouned a limied roadside poins wih Images from High Aliude Plaforms

More information

The Application of Multi Shifts and Break Windows in Employees Scheduling

The Application of Multi Shifts and Break Windows in Employees Scheduling The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance

More information

Individual Health Insurance April 30, 2008 Pages 167-170

Individual Health Insurance April 30, 2008 Pages 167-170 Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve

More information

Capacitors and inductors

Capacitors and inductors Capaciors and inducors We coninue wih our analysis of linear circuis by inroducing wo new passive and linear elemens: he capacior and he inducor. All he mehods developed so far for he analysis of linear

More information

MTH6121 Introduction to Mathematical Finance Lesson 5

MTH6121 Introduction to Mathematical Finance Lesson 5 26 MTH6121 Inroducion o Mahemaical Finance Lesson 5 Conens 2.3 Brownian moion wih drif........................... 27 2.4 Geomeric Brownian moion........................... 28 2.5 Convergence of random

More information

Efficient One-time Signature Schemes for Stream Authentication *

Efficient One-time Signature Schemes for Stream Authentication * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 611-64 (006) Efficien One-ime Signaure Schemes for Sream Auhenicaion * YONGSU PARK AND YOOKUN CHO + College of Informaion and Communicaions Hanyang Universiy

More information

Multiprocessor Systems-on-Chips

Multiprocessor Systems-on-Chips Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,

More information

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary Random Walk in -D Random walks appear in many cones: diffusion is a random walk process undersanding buffering, waiing imes, queuing more generally he heory of sochasic processes gambling choosing he bes

More information

Hedging with Forwards and Futures

Hedging with Forwards and Futures Hedging wih orwards and uures Hedging in mos cases is sraighforward. You plan o buy 10,000 barrels of oil in six monhs and you wish o eliminae he price risk. If you ake he buy-side of a forward/fuures

More information

Time Series Prediction of Web Domain Visits by IF-Inference System

Time Series Prediction of Web Domain Visits by IF-Inference System Time Series Predicion of Web Domain Visis by IF-Inference Sysem VLADIMÍR OLEJ, JANA FILIPOVÁ, PETR HÁJEK Insiue of Sysem Engineering and Informaics Faculy of Economics and Adminisraion Universiy of Pardubice,

More information

INTRODUCTION TO FORECASTING

INTRODUCTION TO FORECASTING INTRODUCTION TO FORECASTING INTRODUCTION: Wha is a forecas? Why do managers need o forecas? A forecas is an esimae of uncerain fuure evens (lierally, o "cas forward" by exrapolaing from pas and curren

More information

Towards Intrusion Detection in Wireless Sensor Networks

Towards Intrusion Detection in Wireless Sensor Networks Towards Inrusion Deecion in Wireless Sensor Neworks Kroniris Ioannis, Tassos Dimiriou and Felix C. Freiling Ahens Informaion Technology, 19002 Peania, Ahens, Greece Email: {ikro,dim}@ai.edu.gr Deparmen

More information

Acceleration Lab Teacher s Guide

Acceleration Lab Teacher s Guide Acceleraion Lab Teacher s Guide Objecives:. Use graphs of disance vs. ime and velociy vs. ime o find acceleraion of a oy car.. Observe he relaionship beween he angle of an inclined plane and he acceleraion

More information

Chapter 7. Response of First-Order RL and RC Circuits

Chapter 7. Response of First-Order RL and RC Circuits Chaper 7. esponse of Firs-Order L and C Circuis 7.1. The Naural esponse of an L Circui 7.2. The Naural esponse of an C Circui 7.3. The ep esponse of L and C Circuis 7.4. A General oluion for ep and Naural

More information

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand 36 Invesmen Managemen and Financial Innovaions, 4/4 Marke Liquidiy and he Impacs of he Compuerized Trading Sysem: Evidence from he Sock Exchange of Thailand Sorasar Sukcharoensin 1, Pariyada Srisopisawa,

More information

Chapter 8 Student Lecture Notes 8-1

Chapter 8 Student Lecture Notes 8-1 Chaper Suden Lecure Noes - Chaper Goals QM: Business Saisics Chaper Analyzing and Forecasing -Series Daa Afer compleing his chaper, you should be able o: Idenify he componens presen in a ime series Develop

More information

User Identity Verification via Mouse Dynamics

User Identity Verification via Mouse Dynamics User Ideniy Verificaion via Mouse Dynamics Clin Feher, Yuval Elovici,, Rober Moskovich, Lior Rokach,, Alon Schclar Deusche Telekom Laboraories a Ben-Gurion Universiy, Ben-Gurion Universiy of he Negev,

More information

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks A Disribued Muliple-Targe Ideniy Managemen Algorihm in Sensor Neworks Inseok Hwang, Kaushik Roy, Hamsa Balakrishnan, and Claire Tomlin Dep. of Aeronauics and Asronauics, Sanford Universiy, CA 94305 Elecrical

More information

Chapter 1.6 Financial Management

Chapter 1.6 Financial Management Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1

More information

How To Calculate Price Elasiciy Per Capia Per Capi

How To Calculate Price Elasiciy Per Capia Per Capi Price elasiciy of demand for crude oil: esimaes for 23 counries John C.B. Cooper Absrac This paper uses a muliple regression model derived from an adapaion of Nerlove s parial adjusmen model o esimae boh

More information

11/6/2013. Chapter 14: Dynamic AD-AS. Introduction. Introduction. Keeping track of time. The model s elements

11/6/2013. Chapter 14: Dynamic AD-AS. Introduction. Introduction. Keeping track of time. The model s elements Inroducion Chaper 14: Dynamic D-S dynamic model of aggregae and aggregae supply gives us more insigh ino how he economy works in he shor run. I is a simplified version of a DSGE model, used in cuing-edge

More information

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b LIFE ISURACE WITH STOCHASTIC ITEREST RATE L. oviyani a, M. Syamsuddin b a Deparmen of Saisics, Universias Padjadjaran, Bandung, Indonesia b Deparmen of Mahemaics, Insiu Teknologi Bandung, Indonesia Absrac.

More information

Distributed Echo Cancellation in Multimedia Conferencing System

Distributed Echo Cancellation in Multimedia Conferencing System Disribued Echo Cancellaion in Mulimedia Conferencing Sysem Balan Sinniah 1, Sureswaran Ramadass 2 1 KDU College Sdn.Bhd, A Paramoun Corporaion Company, 32, Jalan Anson, 10400 Penang, Malaysia. sbalan@kdupg.edu.my

More information

GoRA. For more information on genetics and on Rheumatoid Arthritis: Genetics of Rheumatoid Arthritis. Published work referred to in the results:

GoRA. For more information on genetics and on Rheumatoid Arthritis: Genetics of Rheumatoid Arthritis. Published work referred to in the results: For more informaion on geneics and on Rheumaoid Arhriis: Published work referred o in he resuls: The geneics revoluion and he assaul on rheumaoid arhriis. A review by Michael Seldin, Crisopher Amos, Ryk

More information

Particle Filtering for Geometric Active Contours with Application to Tracking Moving and Deforming Objects

Particle Filtering for Geometric Active Contours with Application to Tracking Moving and Deforming Objects Paricle Filering for Geomeric Acive Conours wih Applicaion o Tracking Moving and Deforming Objecs Yogesh Rahi Namraa Vaswani Allen Tannenbaum Anhony Yezzi Georgia Insiue of Technology School of Elecrical

More information

SEASONAL ADJUSTMENT. 1 Introduction. 2 Methodology. 3 X-11-ARIMA and X-12-ARIMA Methods

SEASONAL ADJUSTMENT. 1 Introduction. 2 Methodology. 3 X-11-ARIMA and X-12-ARIMA Methods SEASONAL ADJUSTMENT 1 Inroducion 2 Mehodology 2.1 Time Series and Is Componens 2.1.1 Seasonaliy 2.1.2 Trend-Cycle 2.1.3 Irregulariy 2.1.4 Trading Day and Fesival Effecs 3 X-11-ARIMA and X-12-ARIMA Mehods

More information

ESIGN Rendering Service

ESIGN Rendering Service Markeing maerials on demand wihou phoo shoos or se-up Wih he ESIGN Rendering Service, we produce new, prinready markeing maerials for you in a cos-efficien and imely manner for he design of brochures,

More information

LEASING VERSUSBUYING

LEASING VERSUSBUYING LEASNG VERSUSBUYNG Conribued by James D. Blum and LeRoy D. Brooks Assisan Professors of Business Adminisraion Deparmen of Business Adminisraion Universiy of Delaware Newark, Delaware The auhors discuss

More information

Appendix A: Area. 1 Find the radius of a circle that has circumference 12 inches.

Appendix A: Area. 1 Find the radius of a circle that has circumference 12 inches. Appendi A: Area worked-ou s o Odd-Numbered Eercises Do no read hese worked-ou s before aemping o do he eercises ourself. Oherwise ou ma mimic he echniques shown here wihou undersanding he ideas. Bes wa

More information

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation A Noe on Using he Svensson procedure o esimae he risk free rae in corporae valuaion By Sven Arnold, Alexander Lahmann and Bernhard Schwezler Ocober 2011 1. The risk free ineres rae in corporae valuaion

More information

Why Did the Demand for Cash Decrease Recently in Korea?

Why Did the Demand for Cash Decrease Recently in Korea? Why Did he Demand for Cash Decrease Recenly in Korea? Byoung Hark Yoo Bank of Korea 26. 5 Absrac We explores why cash demand have decreased recenly in Korea. The raio of cash o consumpion fell o 4.7% in

More information

Module 3 Design for Strength. Version 2 ME, IIT Kharagpur

Module 3 Design for Strength. Version 2 ME, IIT Kharagpur Module 3 Design for Srengh Lesson 2 Sress Concenraion Insrucional Objecives A he end of his lesson, he sudens should be able o undersand Sress concenraion and he facors responsible. Deerminaion of sress

More information

DC-DC Boost Converter with Constant Output Voltage for Grid Connected Photovoltaic Application System

DC-DC Boost Converter with Constant Output Voltage for Grid Connected Photovoltaic Application System DC-DC Boos Converer wih Consan Oupu Volage for Grid Conneced Phoovolaic Applicaion Sysem Pui-Weng Chan, Syafrudin Masri Universii Sains Malaysia E-mail: edmond_chan85@homail.com, syaf@eng.usm.my Absrac

More information

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor Deecion of DDoS Aac in SIP Environmen wih Non-parameric CUSUM Sensor Luigi Alcuri Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering luigi.alcuri@i.unipa.i Piero Cassarà

More information

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783 Sock raing wih Recurren Reinforcemen Learning (RRL) CS9 Applicaion Projec Gabriel Molina, SUID 555783 I. INRODUCION One relaively new approach o financial raing is o use machine learning algorihms o preic

More information

Making Use of Gate Charge Information in MOSFET and IGBT Data Sheets

Making Use of Gate Charge Information in MOSFET and IGBT Data Sheets Making Use of ae Charge Informaion in MOSFET and IBT Daa Shees Ralph McArhur Senior Applicaions Engineer Advanced Power Technology 405 S.W. Columbia Sree Bend, Oregon 97702 Power MOSFETs and IBTs have

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR The firs experimenal publicaion, which summarised pas and expeced fuure developmen of basic economic indicaors, was published by he Minisry

More information

Distributed Online Localization in Sensor Networks Using a Moving Target

Distributed Online Localization in Sensor Networks Using a Moving Target Disribued Online Localizaion in Sensor Neworks Using a Moving Targe Aram Galsyan 1, Bhaskar Krishnamachari 2, Krisina Lerman 1, and Sundeep Paem 2 1 Informaion Sciences Insiue 2 Deparmen of Elecrical Engineering-Sysems

More information

Internet Engineering. Jacek Mazurkiewicz, PhD Softcomputing. Part 1: Introduction, Elementary ANNs

Internet Engineering. Jacek Mazurkiewicz, PhD Softcomputing. Part 1: Introduction, Elementary ANNs Inerne Engineering Jacek azurkieicz, PhD Sofcompuing Par : Inroducion, Elemenary As Formal Inroducion conac hours, room o. 5 building C-3: onday: :45-5:5, Friday: 4:30-6:00, slides:.zsk.ic.pr.roc.pl Professor

More information

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS Hong Mao, Shanghai Second Polyechnic Universiy Krzyszof M. Osaszewski, Illinois Sae Universiy Youyu Zhang, Fudan Universiy ABSTRACT Liigaion, exper

More information

A Novel Approach to Improve Diverter Performance in Liquid Flow Calibration Facilities

A Novel Approach to Improve Diverter Performance in Liquid Flow Calibration Facilities A Novel Approach o Improve Diverer Performance in Liquid Flow Calibraion Faciliies R. Engel Physikalisch-Technische Bundesansal (PTB) Braunschweig, Germany U. Klages Universiy of Applied Sciences a Wolfenbüel,

More information

Improving Unreliable Mobile GIS with Swarm-based Particle Filters

Improving Unreliable Mobile GIS with Swarm-based Particle Filters Improving Unreliable Mobile GIS wih Swarm-based Paricle Filers Fama Hrizi, Jérôme Härri, Chrisian Bonne EURECOM, Mobile Communicaions Deparmen Campus SophiaTech, 450 Roue des Chappes Bio, France {hrizi,

More information

Risk Modelling of Collateralised Lending

Risk Modelling of Collateralised Lending Risk Modelling of Collaeralised Lending Dae: 4-11-2008 Number: 8/18 Inroducion This noe explains how i is possible o handle collaeralised lending wihin Risk Conroller. The approach draws on he faciliies

More information

Stochastic Optimal Control Problem for Life Insurance

Stochastic Optimal Control Problem for Life Insurance Sochasic Opimal Conrol Problem for Life Insurance s. Basukh 1, D. Nyamsuren 2 1 Deparmen of Economics and Economerics, Insiue of Finance and Economics, Ulaanbaaar, Mongolia 2 School of Mahemaics, Mongolian

More information

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test ABSTRACT Time Series Analysis Using SAS R Par I The Augmened Dickey-Fuller (ADF) Tes By Ismail E. Mohamed The purpose of his series of aricles is o discuss SAS programming echniques specifically designed

More information

COMPARISON OF AIR TRAVEL DEMAND FORECASTING METHODS

COMPARISON OF AIR TRAVEL DEMAND FORECASTING METHODS COMPARISON OF AIR RAVE DEMAND FORECASING MEHODS Ružica Škurla Babić, M.Sc. Ivan Grgurević, B.Eng. Universiy of Zagreb Faculy of ranspor and raffic Sciences Vukelićeva 4, HR- Zagreb, Croaia skurla@fpz.hr,

More information

Bid-ask Spread and Order Size in the Foreign Exchange Market: An Empirical Investigation

Bid-ask Spread and Order Size in the Foreign Exchange Market: An Empirical Investigation Bid-ask Spread and Order Size in he Foreign Exchange Marke: An Empirical Invesigaion Liang Ding* Deparmen of Economics, Macaleser College, 1600 Grand Avenue, S. Paul, MN55105, U.S.A. Shor Tile: Bid-ask

More information

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m Chaper 2 Problems 2.1 During a hard sneeze, your eyes migh shu for 0.5s. If you are driving a car a 90km/h during such a sneeze, how far does he car move during ha ime s = 90km 1000m h 1km 1h 3600s = 25m

More information

Chapter 6: Business Valuation (Income Approach)

Chapter 6: Business Valuation (Income Approach) Chaper 6: Business Valuaion (Income Approach) Cash flow deerminaion is one of he mos criical elemens o a business valuaion. Everyhing may be secondary. If cash flow is high, hen he value is high; if he

More information

µ r of the ferrite amounts to 1000...4000. It should be noted that the magnetic length of the + δ

µ r of the ferrite amounts to 1000...4000. It should be noted that the magnetic length of the + δ Page 9 Design of Inducors and High Frequency Transformers Inducors sore energy, ransformers ransfer energy. This is he prime difference. The magneic cores are significanly differen for inducors and high

More information

Form measurement systems from Hommel-Etamic Geometrical tolerancing in practice DKD-K-02401. Precision is our business.

Form measurement systems from Hommel-Etamic Geometrical tolerancing in practice DKD-K-02401. Precision is our business. Form measuremen sysems from Hommel-Eamic Geomerical olerancing in pracice DKD-K-02401 Precision is our business. Drawing enries Tolerance frame 0.01 0.01 Daum leer Tolerance value in mm Symbol for he oleranced

More information

Information Theoretic Evaluation of Change Prediction Models for Large-Scale Software

Information Theoretic Evaluation of Change Prediction Models for Large-Scale Software Informaion Theoreic Evaluaion of Change Predicion Models for Large-Scale Sofware Mina Askari School of Compuer Science Universiy of Waerloo Waerloo, Canada maskari@uwaerloo.ca Ric Hol School of Compuer

More information

INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES

INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES INTEREST RATE FUTURES AND THEIR OPTIONS: SOME PRICING APPROACHES OPENGAMMA QUANTITATIVE RESEARCH Absrac. Exchange-raded ineres rae fuures and heir opions are described. The fuure opions include hose paying

More information

9. Capacitor and Resistor Circuits

9. Capacitor and Resistor Circuits ElecronicsLab9.nb 1 9. Capacior and Resisor Circuis Inroducion hus far we have consider resisors in various combinaions wih a power supply or baery which provide a consan volage source or direc curren

More information

Supplementary Appendix for Depression Babies: Do Macroeconomic Experiences Affect Risk-Taking?

Supplementary Appendix for Depression Babies: Do Macroeconomic Experiences Affect Risk-Taking? Supplemenary Appendix for Depression Babies: Do Macroeconomic Experiences Affec Risk-Taking? Ulrike Malmendier UC Berkeley and NBER Sefan Nagel Sanford Universiy and NBER Sepember 2009 A. Deails on SCF

More information

Niche Market or Mass Market?

Niche Market or Mass Market? Niche Marke or Mass Marke? Maxim Ivanov y McMaser Universiy July 2009 Absrac The de niion of a niche or a mass marke is based on he ranking of wo variables: he monopoly price and he produc mean value.

More information

Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Mining Web User Behaviors to Detect Application Layer DDoS Attacks JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 985 Mining Web User Behaviors o Deec Applicaion Layer DDoS Aacks Chuibi Huang Deparmen of Auomaion, USC Key laboraory of nework communicaion sysem and conrol

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is he auhor s version of a work ha was submied/acceped for publicaion in he following source: Debnah, Ashim Kumar & Chin, Hoong Chor (2006) Analysis of marine conflics. In Proceedings of he 19h KKCNN

More information

Exploring Imputation Techniques for Missing Data in Transportation Management Systems

Exploring Imputation Techniques for Missing Data in Transportation Management Systems Exploring Impuaion Techniques for Missing Daa in Transporaion Managemen Sysems Brian L. Smih Assisan Professor Universiy of Virginia Deparmen of Civil Engineering P. O. Box 400742 Charloesville, VA 22904-4742

More information

The Greek financial crisis: growing imbalances and sovereign spreads. Heather D. Gibson, Stephan G. Hall and George S. Tavlas

The Greek financial crisis: growing imbalances and sovereign spreads. Heather D. Gibson, Stephan G. Hall and George S. Tavlas The Greek financial crisis: growing imbalances and sovereign spreads Heaher D. Gibson, Sephan G. Hall and George S. Tavlas The enry The enry of Greece ino he Eurozone in 2001 produced a dividend in he

More information

The Torsion of Thin, Open Sections

The Torsion of Thin, Open Sections EM 424: Torsion of hin secions 26 The Torsion of Thin, Open Secions The resuls we obained for he orsion of a hin recangle can also be used be used, wih some qualificaions, for oher hin open secions such

More information

Towards a Generic Trust Model Comparison of Various Trust Update Algorithms

Towards a Generic Trust Model Comparison of Various Trust Update Algorithms Towards a Generic Trus Model Comparison of Various Trus Updae Algorihms Michael Kinaeder, Erneso Baschny, and Kur Rohermel Insiue of Parallel and Disribued Sysems (IPVS) Universiä Sugar Universiässr. 38

More information

Permutations and Combinations

Permutations and Combinations Permuaions and Combinaions Combinaorics Copyrigh Sandards 006, Tes - ANSWERS Barry Mabillard. 0 www.mah0s.com 1. Deermine he middle erm in he expansion of ( a b) To ge he k-value for he middle erm, divide

More information

Hotel Room Demand Forecasting via Observed Reservation Information

Hotel Room Demand Forecasting via Observed Reservation Information Proceedings of he Asia Pacific Indusrial Engineering & Managemen Sysems Conference 0 V. Kachivichyanuul, H.T. Luong, and R. Piaaso Eds. Hoel Room Demand Forecasing via Observed Reservaion Informaion aragain

More information

Option Put-Call Parity Relations When the Underlying Security Pays Dividends

Option Put-Call Parity Relations When the Underlying Security Pays Dividends Inernaional Journal of Business and conomics, 26, Vol. 5, No. 3, 225-23 Opion Pu-all Pariy Relaions When he Underlying Securiy Pays Dividends Weiyu Guo Deparmen of Finance, Universiy of Nebraska Omaha,

More information

Vector Autoregressions (VARs): Operational Perspectives

Vector Autoregressions (VARs): Operational Perspectives Vecor Auoregressions (VARs): Operaional Perspecives Primary Source: Sock, James H., and Mark W. Wason, Vecor Auoregressions, Journal of Economic Perspecives, Vol. 15 No. 4 (Fall 2001), 101-115. Macroeconomericians

More information

System Performance Improvement By Server Virtualization

System Performance Improvement By Server Virtualization Sysem Performance Improvemen By Server Virualizaion Hioshi Ueno, Tomohide Hasegawa, and Keiichi Yoshihama Absrac Wih he advance of semiconducor echnology, microprocessors become highly inegraed and herefore

More information

A Bayesian framework with auxiliary particle filter for GMTI based ground vehicle tracking aided by domain knowledge

A Bayesian framework with auxiliary particle filter for GMTI based ground vehicle tracking aided by domain knowledge A Bayesian framework wih auxiliary paricle filer for GMTI based ground vehicle racking aided by domain knowledge Miao Yu a, Cunjia Liu a, Wen-hua Chen a and Jonahon Chambers b a Deparmen of Aeronauical

More information

Switching Regulator IC series Capacitor Calculation for Buck converter IC

Switching Regulator IC series Capacitor Calculation for Buck converter IC Swiching Regulaor IC series Capacior Calculaion for Buck converer IC No.14027ECY02 This applicaion noe explains he calculaion of exernal capacior value for buck converer IC circui. Buck converer IIN IDD

More information

Inductance and Transient Circuits

Inductance and Transient Circuits Chaper H Inducance and Transien Circuis Blinn College - Physics 2426 - Terry Honan As a consequence of Faraday's law a changing curren hrough one coil induces an EMF in anoher coil; his is known as muual

More information

Mortality Variance of the Present Value (PV) of Future Annuity Payments

Mortality Variance of the Present Value (PV) of Future Annuity Payments Morali Variance of he Presen Value (PV) of Fuure Annui Pamens Frank Y. Kang, Ph.D. Research Anals a Frank Russell Compan Absrac The variance of he presen value of fuure annui pamens plas an imporan role

More information

Load Prediction Using Hybrid Model for Computational Grid

Load Prediction Using Hybrid Model for Computational Grid Load Predicion Using Hybrid Model for Compuaional Grid Yongwei Wu, Yulai Yuan, Guangwen Yang 3, Weimin Zheng 4 Deparmen of Compuer Science and Technology, Tsinghua Universiy, Beijing 00084, China, 3, 4

More information

The Complete VoIP Telecom Service Provider

The Complete VoIP Telecom Service Provider The Complee VoIP Telecom Service Provider 1 Overview Company Overview SIP Trunking Produc Overview Technical Specificaions Pricing Why SIP Trunking? Benefis over radiional elecom Ideal cusomer 2 Company

More information

Term Structure of Prices of Asian Options

Term Structure of Prices of Asian Options Term Srucure of Prices of Asian Opions Jirô Akahori, Tsuomu Mikami, Kenji Yasuomi and Teruo Yokoa Dep. of Mahemaical Sciences, Risumeikan Universiy 1-1-1 Nojihigashi, Kusasu, Shiga 525-8577, Japan E-mail:

More information

Forecasting Model for Crude Oil Price Using Artificial Neural Networks and Commodity Futures Prices

Forecasting Model for Crude Oil Price Using Artificial Neural Networks and Commodity Futures Prices (IJCSIS) ernaional Journal of Compuer Science and formaion Securiy, Forecasing Model for Crude Oil Price Using Arificial Neural Neworks and Commodiy Fuures Prices Siddhivinayak Kulkarni Graduae School

More information

Random Scanning Algorithm for Tracking Curves in Binary Image Sequences

Random Scanning Algorithm for Tracking Curves in Binary Image Sequences Vol., No., Page 101 of 110 Copyrigh 008, TSI Press Prined in he USA. All righs reserved Random Scanning Algorihm for Tracking Curves in Binary Image Sequences Kazuhiko Kawamoo *1 and Kaoru Hiroa 1 Kyushu

More information

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS Shuzhen Xu Research Risk and Reliabiliy Area FM Global Norwood, Massachuses 262, USA David Fuller Engineering Sandards FM Global Norwood, Massachuses 262,

More information