Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Size: px
Start display at page:

Download "Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks"

Transcription

1 Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab. IESE Departmet Uversty of Illos at Urbaa-Champag {kadloor1,xugog1,kyavash, ttezca, Abstract Ths paper presets a dagerous low-cost traffc aalyss attack packet-based etworks, such as the Iteret. The attack s moutable ay scearo where a shared routg resource exsts amog users. A real-world attack successfully compromsed the prvacy of a user wthout requrg sgfcat resources terms of access, memory, or computatoal power. The effectveess of our attack s demostrated a scearo where the user s DSL router uses FCFS schedulg polcy. Specfcally, we show that by usg a low-rate sequece of probes, a remote attacker ca obta sgfcat traffc-tmg ad volume formato about a partcular user, just by observg the roud trp tme of the probes. We also observe that eve whe the schedulg polcy s chaged to roud-rob, whle the correlato reduces sgfcatly, the attacker ca stll relably deduce user s traffc patter. Most of the router schedulg polces desged to date are evaluated mostly o the metrcs of throughput, delay ad faress. Our work s amed to demostrate a eed for cosderg a addtoal metrc that quatfes the formato leak betwee the dvdual traffc flows through the router. ad measures the roud-trp tme (RTT) of hs probe packets. The DSL has a comg ad a outgog port, for the traffcs addressed to, ad orgatg from Alce s computer. Bob s probe resposes ad Alce s comg traffc share the same queue, hece the delay that Bob observes would vary based o the patter of traffc addressed to Alce. Although the pgs travel through varous termedate routers, ther roudtrp tme s prmarly affected by Alce s traffc. Ths s because of two reasos. Oe, the termedate routers have sgfcatly hgher badwdth compared to the volume of the traffc flowg through them. Also, the termedate routers carry multple traffc flows. These two mply that the delays curred at these routers does ot chage wth tme. Hece, the delay duced by the users traffc s well preserved. I. I NTRODUCTION As more of our daly actvtes are carred out over the Iteret, the cocer for ther secrecy becomes creasgly urget. Ths paper presets a straghtforward, yet powerful traffc aalyss attack that takes advatage of the sde chael that s troduced by shared routg resources wth packetbased etworks, such as the Iteret. To descrbe the sde chael more detal, we wll cosder a example of a user, Alce, usg the Iteret from home. She s coected by a DSL coecto to her Iteret Servce Provder (ISP). The largest threats to the prvacy of Alce s commucato come ether from a compromse of her home computer, or from a uscrupulous employee at her ISP. However, The ISP s boud by at-wretappg laws [1] to ot vade to her prvacy. I ay case, Alce uses cryptographc protecto, such as Trasport Layer Securty (TLS) [2] to protect the most sestve data, such as passwords ad credt card umbers. A attacker, Bob, s curous about Alce s actvtes. He does ot have access to Alce s computer or her ISP. I fact, Bob ca possbly be o aother ISP, possbly aother coutry. However, Bob has access to a resource use by Alce, amely the packet queue sde her DSL router. Ths resource allows hm to create a sde chael that wll leak formato about Alce s traffc. Ths scearo s llustrated Fgure 1. Bob seds a low-badwdth, but hgh frequecy probe to the router Fg. 1. Queueg Sde Chael We wll demostrate that, fact, the delay Bob s traffc patter s strogly correlated wth Alce s traffc patter such that Bob ca fer the actvty Alce egages. The stregth of ths attack les the fact that t does ot requre specal access or prvleges for the attacker. The attacker does ot eve eed hgh computatoal power. Note that our attack ca oly reveal the tmg ad the volume of the traffc, ad ot the actual cotets of the packets. However, recet research has show that sgfcat fereces ca be draw by observg just the traffc patter of a user.

2 Based o hs observatos, Bob ca perform traffc aalyss: recovery of secret data based o packet couts, tmgs, ad szes. Recet research has demostrated that traffc aalyss ca be used for a umber of attacks: detfcato of web stes vsted [3], [4], guesses at passwords typed [5], ad recovery of phrases spoke over VoIP [6]. However, t was prevously assumed that such attacks requred access to oe of the routers alog the path of Alce s traffc. We wll show that ayoe who ca sed probe traffc to oe of these routers ca use the shared router queue as a sde chael to carry out traffc aalyss. Ths dramatcally creases the attack surface avalable for traffc aalyss. Eve teral commucato wholly cotaed wth a etwork a eterprse or mltary base may be subject to traffc aalyss, f the etwork s coected to the publc Iteret. Lkewse, eve o a closed etwork, a lowclearace sder may be able to carry out such probes from a remote locato. Remote traffc aalyss ca be appled to a wde varety of cotexts, so we beg by dscussg a few mportat attack scearos. 1) Cyberstalkg: A attacker may put a partcular user uder survellace order to lear more about that user s behavor o the Iteret. The motves for such dvdual survellace ca vary wdely. A attacker may wat to determe whether a user s actve or ot, whch wll help hm determe whether someoe s lkely to be home at a gve tme. A attacker may also wsh to costruct a profle of the user: Is the user lkely to be affluet? What s the user s geder? Are there chldre the home? Aother possblty for attack s to de-aoymze a user pseudoym, used o a blog or a dscusso board. By correlatg user actvty wth the tmes that updates are posted o the blog/board, t wll evetually be possble to obta statstcal evdece that mplcates the user. Fally, as stated before, some ecrypted traffc aalyss techques reveal the actual cotets of a user s commucato: statstcal models ca recover characters typed based o keystroke tmgs, whle others ca recover features from ecrypted VoIP calls, such as the laguage beg spoke, or test for the presece of specfc phrases. 2) Umaskg Relatoshps: Remote traffc aalyss ca also be used to detect whether two users are commucatg, thus ferrg socal or professoal relatoshps betwee them. Such commucatos may take the form of a drect etwork coecto betwee them va TCP or VoIP, or drect coversato by stat message. I both cases, correlato of messages leavg the computer of oe user ad arrvg at the computer of the other ca gve evdece of commucato. 3) Motorg at Scale: Because each probe requres oly a low volume of traffc, t s possble for attackers to motor multple routers at oce. I addto to beg able to motor multple people, more pervasve survellace ca provde ew opportutes for motorg. For example, whe deaoymzg a pseudoym or fdg coectos betwee users, cyberstalkg allows oly cofrmato attacks, where a exstg suspco ca be cofrmed or dsproved, whereas more pervasve motorg ca dscover prevously ukow relatoshps. Havg dscussed how our attack ca be used to vade to a user s prvacy o the Iteret, we ow dscuss some of the other attacks proposed the lterature. Followg that, Secto III, we formulate mathematcally the problem at had. We the preset the results of our smulato ad the expermet Secto IV. We coclude by descrbg a lst of potetal research problems Secto V, that arse out of the observatos made ths paper. II. RELATED WORK Perhaps the most related work to our proposed attack s the cloggg attack proposed by Back et al. [7], whch was proposed as a attack agast low-latecy aoymty schemes. As the ame suggests, aoymous commucato schemes allow ther users to commucate wth oe aother whle maskg the relatoshps betwee the users,.e. cocealg who commucates wth whom. The majorty of these schemes forward ed-user traffc though redrectg relays, usg multlayered ecrypto betwee the source ad every termedate relay. Ths s doe to rebuff traffc aalyss ad guaratee edto-ed prvacy. The layered ecrypto s mplemeted through a seres of relay odes creatg a vrtual aoymous tuel. I the cloggg attack proposed [7], a adversary at oe ed of a aoymous tuel ca determe whch odes partcpate the tuel by sequetally cloggg each of the possble relays ad lookg for a correspodg drop the throughput across the tuel. However, gve the curret archtecture of the Iteret, lauchg such a attack s feasble because t would requre very hgh badwdth ad tme. Murdoch ad Daezs [8] proposed a dramatcally lowercost form of ths attack ad valdated the Tor etwork [9]. I ther attack, a malcous server, through a o-off traffc patter, systematcally clogs a aoymous tuel, whle measurg the latecy of the coectos that ru across all relays. The relays wth latecy fuctos that are most correlated to the cloggg perods are detfed as the members of the tuel. Evas et al. [10] exteded ths attack to requre less badwdth by usg log paths the Tor etwork. Fally, Chakravarty et al. [11] showed that smlar attacks ca be used to detect ormal Iteret routers that forward Tor paths, as opposed to just Tor odes, by usg avalable badwdth estmato techques [12]. These attacks are structurally smlar to our attack, but the probes are used to detect the presece of a attacker-cotrolled flow order to volate aoymty guaratees. I our attack, the flow of terest s ot uder the attackers cotrol, thus our problem explots a sde chael, rather tha a covert oe. I partcular, prevous work has used coarse-graed o-off patters to detect flow presece, whereas we show that t s possble to fer fegraed formato about a user flow. III. MATHEMATICAL FORMULATION We wll cosder a tme slotted system. I each tme slot, we wll assume that there ca be at most oe packet arrval from each stream. Ths assumpto s vald f we sample the

3 tme fe eough. Let x (k) {0, 1} deote the umber of comg packets from stream k {1, 2} tme slot. Let y (k) {0, 1} deote the umber of packets of stream k served the tme slot. LetQ (k) represet the umber of packets of stream k whch have ot bee served utl tme. It follows the recurso Q (k) = Q (k) 1 + x(k) y (k) (1) Let stream 1 deote the strg of pgs, ad let stream 2 deote the traffc patter of the other user. Defe the arrvg tme of the th packet the k th queue as T (k) = f : j=1 x (k) j ad defe the departure tme of the th packet from the k th queue as T (k) = f : y (k) j (3) j=1 The the roudtrp tme of the th packet s T (k) = T (k) (2) T (k) (4) Also, we defe the umber of arrvg packets oe queue betwee two cosecutve arrvals the other queue, x k. = T (2) j=t (2) 1 x (1) j (5) The correlato betwee the roudtrp tmes of the pgs ad the traffc patter the other stream s 1 N T (2) 1 N 1 N T (2) (6) We wll aalyze the performace of frst come frst served, ad the roud-rob polcy agast our attack terms of the correlato metrc the followg secto. IV. PERFORMANCE RESULTS To estmate the effectveess of our attack, we frst ra a seres of smulato expermets. We captured both the tme of arrval of the packets ad the packet szes of real traffc arrvg to our computer usg Wreshark. These captured packets represet the user s traffc, about whch the attacker wats to lear. The packets were captured two scearos, oe whle browsg the Iteret, ad secod whle playg a vdeo o Youtube. The average traffc data rate s vastly dfferet these two scearos, t s 21.8 KBps whle browsg ad 105 KBps whle watchg the vdeo. We the geerate a stream of equally spaced pgs, each of sze 74 Bytes, ad compute the roudtrp tme of these pgs as see by the attacker. Roudtrp tmes are calculated both for the case whe FCFS polcy s mplemeted at the router ad Fg. 2. Pg rate = 5 pgs/sec whe the polcy used s roud-rob. We vary the frequecy of these pgs: 5, 50, ad 500 pgs/sec, whch correspod to a pg data rate of 0.37, 3.7, ad 37 kbps, respectvely. These rates are too small for the router to suspect the presece of a attack. The router s servce rate was fxed at 296 kbps. Fgures 2, 3, ad 4 plot the roud trp tme of each pg frequecy for FCFS ad roud-rob polcy. The top plot each fgure depcts the user s traffc, sampled at the arrval tmes of the pgs. The mddle plot s the roud trp tme of attacker s pgs whe FCFS polcy s used ad the bottom plot the roud trp

4 Fg. 3. Pg rate = 50 pgs/sec Fg. 4. Pg rate = 500 pgs/sec tme whe roud-rob s used. It s clearly see that as log as the pg s ot too frequet, there s a hgh correlato betwee the put traffc ad the roud trp tmes. Whle the roud-rob polcy oly reveals whether the user s actve or ot, the FCFS polcy reveals the exact patter. Ths s however ot true at hgh pg frequeces whe roud-rob polcy reveals as much formato as the FCFS polcy, ad hece s vulerable. The smulatos above demostrate the potetal of our proposed attack to ucover the traffc patter of a remote user. Ca ths attack be used practce? To aswer ths questo, we setup a testbed. We observed traffc of a home DSL user Illos, whle smultaeously sedg a pg probe from a computer New Jersey at a frequecy of 100 per secod. Roud trp tmes were calculated ad were later compared wth the actual traffc patter of the home user. Fgure 5 shows the results of our expermet. The user s traffc s show gree, ad the roud-trp tmes of the pg probe are show red. It s qute clear from the fgure that there s a correlato betwee the two. Note that the data rate of the pgs s less tha 50 Kbps of badwdth, ad s ulkely to be otced.

5 I the most geeral formulato of the problem, the goal of the attacker s to maxmze the mutual formato I(Y ; X Z) where X deotes the traffc patter of terest, Y s the observed watg tme of the probe sgal, ad Z deotes the probe sgal. The queug polcy s modeled by the trasto probablty p(y X, Z). Fdg a optmal prvacy-preservg polcy terms of ether mmzg the correlato metrc or the codtoal mutual formato wll be the focus of our future work. Fg. 5. Real traffc o a DSL le vs. observed probe RTTs V. DISCUSSION We have successfully demostrated a efarous attack that takes advatage of the sde chael troduced by shared routg resources wth packet-based etworks, such as the Iteret. The performace of the attack was show usg real traffc ad smulato of FCFS ad roud-rob polces. Ths smple attack s so powerful because the queug polces are ot desged wth purpose of preservg prvacy of the users. Rather, they are desged havg delay-throughput trade-offs md. Ths work llustrates the urgecy for developmet of prvacy preservg schedulg polces. The objectve of such a polcy wll be to mmze the correlatos betwee the traffc patters of oe user ad the roudtrp tmes (or the watg tmes) of the packets of the other user. Moreover, whle correlato-based metrcs such as (6) are commoly used for determg the amout of formato a adversary ca lear va the sde chael, formato-theoretcally oe would lke to determe the maxmum rate of formato a attacker ca relably lear based o the observatos avalable to her/hm. Thus, a prvacy-preservg schedulg polcy must fact crease the ucertaly of the adversary. REFERENCES [1] Wre ad electroc commucatos tercepto ad tercepto of oral commucatos, Uted States Code, Ttle 18, Part I, Chapter 119. [2] T. Derks ad C. Alle, The TLS protocol verso 1.0, RFC2246, Ja [3] G. Bssas, M. Lberatore, D. Jese, ad B. Leve, Prvacy vulerabltes ecrypted HTTP streams, Prvacy Ehacg Techologes, 2006, pp [Ole]. Avalable: / \ 1 [4] M. Lberatore ad B. N. Leve, Iferrg the source of ecrypted HTTP coectos, CCS 06: Proceedgs of the 13th ACM coferece o Computer ad commucatos securty. New York, NY, USA: ACM Press, 2006, pp [Ole]. Avalable: [5] D. X. Sog, D. Wager, ad X. Ta, Tmg aalyss of keystrokes ad SSH tmg attacks, USENIX Securty Symposum, [6] C. V. Wrght, L. Ballard, S. E. Coull, F. Morose, ad G. M. Masso, Spot me f you ca: Ucoverg spoke phrases ecrypted VoIP coversatos, SP 08: Proceedgs of the 2008 IEEE Symposum o Securty ad Prvacy. Washgto, DC, USA: IEEE Computer Socety, 2008, pp [7] A. Back, U. Moller, ad A. Stglc, Traffc aalyss attacks ad tradeoffs aoymty provdg systems, Lecture Notes Computer Scece, vol. 2137, o , p. 76, [8] S. Murdoch ad G. Daezs, Low-cost traffc aalyss of tor, 2005 IEEE Symposum o Securty ad Prvacy, 2005, pp [9] R. Dglede, N. Mathewso, ad P. Syverso, Tor: The secodgeerato oo router, USENIX Securty Symposum, 2004, pp [10] N. S. Evas, R. Dglede, ad C. Grothoff, A practcal cogesto attack o Tor usg log paths, USENIX Securty Symposum, Aug [11] S. Chakravarty, A. Stavrou, ad A. D. Keromyts, Idetfyg proxy odes a Tor aoymzato crcut, Workshop o Securty ad Prvacy Telecommucatos ad Iformato Systems, Dec. 2008, pp [12] J. Strauss, D. Katab, ad F. Kaashoek, A measuremet study of avalable badwdth estmato tools, IMC 03: Proceedgs of the 3rd ACM SIGCOMM coferece o Iteret measuremet. New York, NY, USA: ACM, 2003, pp

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães [email protected] Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess

More information

On the impact of heterogeneity and back-end scheduling in load balancing designs

On the impact of heterogeneity and back-end scheduling in load balancing designs O the mpact of heterogety ad back-ed schedulg load balacg desgs Ho-L Che Iformato Scece ad Techology Calfora Isttute of Techology Pasadea CA 925 Jaso R Marde Iformato Scece ad Techology Calfora Isttute

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

Regression Analysis. 1. Introduction

Regression Analysis. 1. Introduction . Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used

More information

The Popularity Parameter in Unstructured P2P File Sharing Networks

The Popularity Parameter in Unstructured P2P File Sharing Networks The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN

More information

Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks

Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks Coteto-Free Perodc Message Sceduler Medum Access Cotrol Wreless Sesor / Actuator Networks Tomas W. Carley ECE Departmet Uversty of Marylad [email protected] Moussa A. Ba Embedded Researc Solutos [email protected]

More information

Beta. A Statistical Analysis of a Stock s Volatility. Courtney Wahlstrom. Iowa State University, Master of School Mathematics. Creative Component

Beta. A Statistical Analysis of a Stock s Volatility. Courtney Wahlstrom. Iowa State University, Master of School Mathematics. Creative Component Beta A Statstcal Aalyss of a Stock s Volatlty Courtey Wahlstrom Iowa State Uversty, Master of School Mathematcs Creatve Compoet Fall 008 Amy Froelch, Major Professor Heather Bolles, Commttee Member Travs

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 [email protected]

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

How To Value An Annuity

How To Value An Annuity Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel

CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel CHAPTER 3 Smple Lear Regresso USING STATISTICS @ Suflowers Apparel 3 TYPES OF REGRESSION MODELS 3 DETERMINING THE SIMPLE LINEAR REGRESSION EQUATION The Least-Squares Method Vsual Exploratos: Explorg Smple

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja [email protected] eywords:

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

Numerical Comparisons of Quality Control Charts for Variables

Numerical Comparisons of Quality Control Charts for Variables Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information