IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

Size: px
Start display at page:

Download "IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm"

Transcription

1 Iteratoal Joural of Grd Dstrbuto Computg, pp IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1 1 Northwester Polytechcal Uversty, chool of Electrocs ad Iformato, hax X a, Zhegzhou Isttute of Aeroautcal Idustry Maagemet, Hea Zhegzhou, cheyu3440@gmal.com Abstract Wth the expaso of the IP etwork scale, the topology structure of IP etwork has also chagg. Tradtoal etwork topology research methods by adaptg tools of Pg or Traceroute were used to carry out the actve ed-to-ed detecto from the org router odes to destato router odes. But sometmes, because some routers set the UDP/NMP lmtato, there are some router IP address could ot be detected. I addto, A operator ca adopt router syslog cofgurato fles to obta lk coecto codto, but, these fles have the update lfe-tme, t s hard to obta the formato real-tme. o, we oly obtaed some complete topology formato. Due to the IP etwork has some local formato smlarty, ths artcle adopted the complex lk predcto algorthm based o local formato smlarty algorthm ad desg a kd of mproved method based o the IP etwork characters to realze the ukow lks predcto. Through the expermet, the results expressed that, the predcto dex of local formato commo eghbor algorthm dex of AA, RA obta the most good accuracy, ad the mproved Bayesa CN dex combg the degree value dex of AA ca get more hgher predcto accuracy about Ths artcle cofrmed the lk predcto method based o local formato smlarty algorthm ca be effectvely appled the IP etwork ukow lk predcto. Keywords: IP etwork, topology structure, lk predcto, smlarty dex, local formato smlarty 1. Itroducto IP etwork s composed of multple autoomous area (A), each area usually use teral gateway protocol (IGP) of ICMP, NMP, RIP, OPF, etc. Amog them, usg NMP protocol to buld etwork topology s the more commo way. Through the operatg of the MIB database the maaged devces, operators ca extract the avalable formato to buld topology. [1] However, f the router coecto relato has chaged, Mb lbrary dd ot upgrade, the coecto relato s ot accurate. Wth the ad of hared Rsk Lk Groups (RLGs), operator ca real-tme obta curret IP coecto relatos, but aalyss s laborous. [2] I addto, by examg the router cofgurato fle ca also uderstad the router coecto wth other routers, but update exts lfetme, the formato s o completely accuracy. Based o ICMP protocol of Pg detecto tools to actvely detect router ode etwork, t eed to sed a lot of detecto data packet, whch s boud to crease etwork traffc, ad brg uecessary obstructo to local area etwork (LAN). 1 1 Che Yu s the correspodg author. IN: IJGDC Copyrght c 2015 ERC

2 Iteratoal Joural of Grd Dstrbuto Computg O large IP etwork coecto test, because of usg the A BGP routg protocols for securty reasos, may routers set a lmt to ba the Pg jursdcto, operators uable to obta etwork topology formato. Ad because of the large amout of log data free text format, curret research scholars use router syslog to uderstad the coecto relato of each router s more dffcult to parse. [3] I ths paper, wth the ad of lk predcto algorthm, we explore the IP etwork structure, uder uderstadg part of the relatos of the router coecto, predct the IP etwork topology structure. I ths paper, chapter 2 troduces the IP etwork model buldg ad lk predcto bass, chapter 3 troduces lk predcto algorthm ad related dcators, chapter 4 presets the IP etwork topology predcto expermets by usg the AUC for accurate dagoss, ad descrbes the lk performace betwee the tradtoal algorthm ad the mproved predcto algorthm the IP etwork lk predcto, chapter 5 cocludes the paper ad put forward the further work. 2. IP Network Model Buld ad Predcto Bass 2.1. IP Network Model Each etwork ode o IP etwork ad the coecto relatos amog them cossts a u-drecto coected graph. Each vertex geerally refers to the etwork odes such as router, swtch, host, sub-et. The edge coectg each vertex expresses the lk betwee the equpmet. The ultmate goal of topology dscovery algorthm s as accurately as possble to fd the vertexes ad edges of the u-drecto coected graph. Fgure 1, respectvely presets a IP etwork cotag three A [4]. We use the umbers to detfy the tra-router or ter-doma router, etc, ad express the coecto relato by the dfferet thckess sold le. The order of ID umbers s defed by the router level from the border router to the er router from 1 to 11. Ad the H1 ad H2 s ed-to-ed detecto computer, we ca adopt them to realze the lk coecto state detecto whe the lks are good H1 H Topology Predcto Bass Fgure 1. IP Network Model Dagram Based o the structural feature of IP etwork, we use lk predcto method based o structure smlarty, uder obtaed some router coecto relato; we try to predct the etwork topology relato. To a large IP etwork, we buld a model of a powerless ad u-drecto coected etwork G (V, E). Amog them, V represets a collecto of odes, such as the routers, swtches; E s a collecto of lks. Assumes that a etwork the router ode umber s N, the total lk umber s M. I the etwork, t cossts of N (N - 1) / 2 odes. As show Fgure 1, there are 11 router odes, therefore, all of the odes should have 55 umbers of coecto lks, but ow oly 14 umbers of actual lk coecto. Ad fact, there may be some of lk coectos relatoshp does t 142 Copyrght c 2015 ERC

3 Iteratoal Joural of Grd Dstrbuto Computg be detected whe carryg out the actve ed-to-ed detecto. But a local A, the lk coecto has some smlarty character, so, we cosder a kd of lk predcto algorthm to predct the ukow lk coecto. I order to measure ad evaluate the effect of the lk predcto, amely order to test the accuracy of algorthm, we eed to dvde the ed-to-ed detects lk formato (amely kow lk E) radom to two parts of the trag set E T ad the testg set E P. The codto of trag lk set act as kow formato to use, whe calculatg the score value betwee the two router, we ca oly use the formato of ths set, ad the lk codto to the test set do t act as the kow formato to predct, but order to use them to evaluate the result of the predcto. Itutvely, there are the relatos betwee the set as Formula (1). T E E E, P E T P E (1) We ca see that the lk belogs to the complete set U, but ot belogs to E s exstet lk actual codto. Measurg the accuracy dex of the lk predcto method maly has three kds: respectvely cludes the area uder the recever operatg characterstc curve (AUC) dex, precso dex (PI) ad rakg score dex (RI). [5] Whe measurg the accuracy, the emphass focus s slghtly dfferet, AUC maly measure the accuracy of the algorthm from the overall, PI s a part dex, oly cosder the top umbers L of predct edge whether accurate or ot, RI s more atteto s to sort the predct edge. I ths artcle, we use the AUC dex to vald the accuracy of predctg lk. The AUC ca be defed as Formula (2). accurcy ( ) / (2) We ca see, the value of AUC gets more tha 0.5, whch expresses how much degree the predcto value s superor to the radom selecto. For example, Fgure 1, there are 11 umbers of odes, 14 umbers of lks ca be detected, but the etwork total possbly has 55 umbers of lk coecto relatoshps, so, there are 41 umbers of lks are exstet coecto. I order to test the algorthm precso, we eed to select some umbers of lks from the kow lks of (1,5), (5,6), (1,6), (1,4), (3,4), (2,7), (7,8), (4,9), ad (9,10) as test set, ad the rest umbers of lks as trag test. If we select 6 trag lks, rest 3 umbers of lk ad 46 umbers of ukow lks, t should carry out 46*6=276 tmes of comparsos. Ad whe the score value of kow lk s bgger tha exstet lk, the value of AUC add 1, f the score value of test lk s equal to exstet lk, the value of AUC add 0.5, f the score value of exstet lk s bgger tha test lk, the value of AUC add zero. 3. Lk Predcto based o Local Iformato Cosderg the structure relato of IP etwork, lk predcto method based o structure smlarty s more sutable for the predcto of IP etwork topology. There s a premse of assumpto by usg the smlarty of the router odes to predct lk, whch s f the greater the smlarty betwee two routers odes, the the probablty of coecto relato betwee the two odes s bgger. Here, the smlarty maly refers to the proxmty ot the tradto smlarty. o, the core problem to solve s how to defe the smlarty betwee the two odes. Ad from the pot of the etwork coecto, the er router coectg to the edge router (or swtch) s more; the correspodg degree value s bgger. Itutvely, whe choosg the predcto dex cotag weght value chagg wth the degree value chagg, the predcto effectvely s better. Copyrght c 2015 ERC 143

4 Iteratoal Joural of Grd Dstrbuto Computg 3.1. mlarty Idex The dex of eghbor odes s a smlarty method based o the graph topology, f the tersecto betwee the eghbor set Γ (x) ad Γ (y) of the eghbor ode x ad y s greater, the ode x ad y s more smlar. If for ode z, there s the edge of < x, z > ad < z, y >, so more proe to produce the lk betwee ode x ad y. [6] Commo Neghbors Idex: (CN) [7] CN dex s the most smple smlarty dex, at the same tme, t oly eeds to cosder the local formato of etwork, theoretcal bass s: f the two odes have the same umber of eghbors, the more lkely exstg coecto edge betwee the two odes. As show Formula (3). ( x ) ( y ) (3) ( x ) ( y ) I IP etwork, are the other routers coected to the router x, are the other routers coected to the router y, f a router z coects to the router x ad y, the, router x may also coects to the router y alto Idex: [8] alto Idex formula uses commo eghbor ode umber dvded by the product of the ode degrees. Degree of ode refers to the umber of odes coected wth other eghbors odes. If the ode degree value s bg, to some extet that the hgher the mportace to the odes the etwork. Calculato method s show the Formula (4). ( x) ( y) K K x y (4) ørese Idex: [9] ørese dex s obtaed by usg commo eghbor umber dvded by the sum of the ode degree; commo ode umber does ot affect the dex value. 2 ( x) ( y) K K x y (5) Lecht-Holme-Newma Idex: (LHNI) [10] Lecht-Holme-Newma dex focus o that gvg the ode a small weghts f ts adjacet odes has large moderate product. The LHNI dex Formula (6) s lsted below. ( x) ( y) K x K y (6) Hub Promoted Idex: (HPI) [11] HPI s obtaed by commo eghbor umber dvded by the odes degrees small degree umber. I the adjacet odes, small degree wll get greater weght, odes wth bg degree wll have more beefcal. ( x) ( y) m { K, K } x y (7) Hub Depressed Idex: (HDI) HDI s opposte to the HPI, whch s to use commo eghbor umber dvded by the large ode degrees, the ode s eghbor s odes, ode wth bg degrees ca get smaller weghts. Because the deomator take bg ode s degrees, odes wth small degree wll ot be domat, therefore, the odes wth bg degree are dsadvatages. 144 Copyrght c 2015 ERC

5 Iteratoal Joural of Grd Dstrbuto Computg ( x) ( y) m a x { K, K } x y (8) Adamc-Adar Idex: (AA) [12] AA dex gve all commo eghbor odes small degree to a larger weght. 1 lo g K z ( x ) ( y ) z (9) Resource Allocato Idex: (RA) [13] RA dex s smlar to AA dex. 1 K z ( x ) ( y ) z (10) Jaccard Idex: [14] The umber of commo eghbor dvded by the merge set of two odes, whch s dfferet from the ode degree. Whe the ode degree s same, f exstg mult repeated, the hgher the dex s. O the other had, the dex wll reduce. ( x) ( y) ( x) ( y) (11) 3.2. Improvemet Algorthm Desg I chapter 3.1 we troduced the famous lk predcto dex based o the local formato smlarty, order to carry out the IP etwork lk predcto, amog them, commo eghbor smlarty algorthm, cosderg the object s a IP etwork, the router clusterg coeffcet s low, although some odes has o commo eghbors, they are coected by some path, the real smlarty s ot low, but they wll be assged to zero, CN value s sgfcatly lower tha the other dex's AUC. Especally, whe aalyzg the large-scale IP etwork, as the etwork odes s more, usg commo eghbors characters to predct lk by the CN dex, there may be a cosderable umber of odes wth the smlarty score value of 0, whch cause the predcto accuracy s ot hgh. Therefore, assumg the commo eghbor odes wth small degree l ofte larger tha the large degree s more mportat, o the bass of CN, we cosder the fluece of the small commo eghbor odes. o, we adopt the ode of smlarty scores ad combe wth the dex of the AA or RA to the CN dex together to optmze the smlarty dex, combg AA dex wth CN dex s show as follows formula (12). As well as we ca duce the RA dex to the CN dex. Ad s a adjust parameter of (0, 1). ( x ) ( y ) 1 lo g k z ( x ) ( y ) z I addto, the Bayesa classfer may areas have acheved better effect predcto, here, we cosder troduce the ave Bayesa classfer algorthm to the IP etwork lk predcto to judge the IP etwork lk predcto effects. Due to the smple Bayesa classfer s a kd of applcato based o the depedece assumpto of smple Bayesa probablty classfer, order to more accurately descrbe the potetal probablty model as a depedet feature model, a characterstcs set of E(a 1,a 2,...,a ) s (12) Copyrght c 2015 ERC 145

6 Iteratoal Joural of Grd Dstrbuto Computg gve. Amog them, a s the attrbute value, the probablty of a certa category C uder gve characterstcs of E ca be represeted as codtoal probablty P(C E). [15] P ( C E ) P ( C a, a,..., a ) P ( C ) P ( a, a,..., a C ) P ( a, a,..., a ) Accordg to ave Bayesa theory, above formula (13) ca be expressed as formula (14). (13) P( C ) P ( C E ) P ( a C ) P ( a, a,..., a ) 1 (14) We defe the relatoshp of e for a codtoal probablty uder gve a set of eghbor ode propertes based o the ave Bayesa model algorthm. P ( e ( x, y )) P( e) P ( ( x, y ) e ) P ( ( x, y )) (15) The, we ca separately get the codtoal probablty for exstg e or ot exstg e relatoshp. P( e) P ( e ( x, y )) P ( e,,..., ) P ( e ) P ( ( x, y )) P( e ) P ( e ( x, y )) P ( e,,..., ) P ( e ) P ( ( x, y )) 1 1 (16) (17) Amog them, s a gve eghbor odes of ode par (x, y), so, the smlarty degree of (x, y) may be defed as the rato of (13) ad (14). P ( e ) P ( e ) P( e ) 1 P( e) ( ) P ( e ) P e (18) P ( e ) P ( e ) s 1 P( e) P( e ) The left part of formula (18) s pror codto probablty for a gve IP etworks, because P(e) s a rato of etwork lks ad possble lk. The rght R P( e ) P( e ) part of s the cotrbuto for every eghbor user, so, the CN dex based o the ave Bayesa relato formula (19) s lsted as bellow. ( x, y ) lo g s lo g R ( x, y ) (19) 146 Copyrght c 2015 ERC

7 Iteratoal Joural of Grd Dstrbuto Computg mlarly, we ca use ave Bayesa relatoshp easy to mprove the dex of AA or RA, etc. 4. Aalyss of Expermet Result We carry out the A coecto lk predcto chapter 2 A coecto dagram of Fgure 1. A show Fgure 1 there are 11 odes ad get the lk par of 11 * 10/2 = 55, but the actual IP etwork ed-to-ed detecto, the actual coecto lk ode par cossts of (1, 5), (1, 6), (5, 6), (1, 2), (2, 7), (2, 8), (3,8), (1, 4), (3, 4), (4, 9), (9, 10), (4, 10), (7, 8) ad (4, 11). Ad some lks could ot obta ther coecto relatoshp. We dvde these actual kow lks to two set, test lk set ad trag lk set through a certa rato value. By usg the above local formato algorthm ad correspodg mprovemet method, we try to predct the lk coecto character. The trag set s expressed as E T ad testg set as E P, the test lk set E P ad those ot bee observed lk (U - E T ) has a smlarty score values core(x, y), sad the possblty sze of the exstg lk betwee x ad y. Accordg to the smlarty algorthm, we get the smlarty score values to all the odes of (x, y), but we do oly pay atteto to the sze of the dscoecto ode pars smlarty scores. That s to say, whe we carry out the ed-toed detecto, f some lk could ot receve the respose formato ICMP packet, ad mssg ths lk coecto formato, through the local smlarty lk predcto we ca obta the most lkely mssg lk. Durg the expermet, we set a certa rato amog the trag set ad testg set, ad take the average to the data of 100 tmes Result of the mlarty Algorthm based o Tradtoal Commo Neghbor The AUC values to dfferet algorthm dex based o local formato commo eghbor algorthm respectvely s show as Table 2. Table 1. AUC Value based o Local Iformato Commo Neghbor Algorthm dex CN alto Jaccard ørese HPI HDI LHN AA RA AUC From the Table 1 commo eghbor smlarty dex we ca see, the predcto accuracy all ca reach above 0.9, whch ca acheve good results. Ad alto, Jaccard, ørese, LHN, AA, ad RA all ca reach about 0.91, whch shows better predcto accuracy. We ca fd the predcto accuracy of dex of AA ad RA are the best two dexes. The predcto accuracy of the PA dex s the worst less tha 0.5, because the defto of PA dex s to gve greater weght to havg bg value of the two odes degrees product Result of Improved Algorthm Model I chapter 3, we put forward a mprovemet method to the dex of CN based o the Bayesa model. Through the expermet, the result of lk predcto (IM_CN) combg wth the AA dex model s The result s lsted at Table 2, form the test result we ca see a obvous mprove, the org predcto result s Ad uder the Bayesa model, the result of CN dex (Bay_CN) s 0.957, whch has ot obvous mproved. Through usg the same method, we try to mprove the Bay_CN algorthm, ad through expermet, the result of mproved Bay_CN (IM_Bay_CN) s , whch beyod the etre tradtoal local formato predcto dex. Through aalyss because the Bayesa model formula carry out the stroger Bayesa hypothess to the eghbor role R w, whch represets the other user's cotrbuto to the caddate Copyrght c 2015 ERC 147

8 Iteratoal Joural of Grd Dstrbuto Computg user are depedet, whch s sutable to the IP etwork ode lk structure, the depedece assumpto coform to the coecto propertes of IP etwork. Therefore, the result after Bayesa hypothess s better tha the tradtoal CN dex, ad through mproved aga, the motor accuracy s hgher tha others. o, the local formato smlarty algorthm based o Bayesa model ad ts mproved s most sutable for the IP etwork lk predcto. Table 2. AUC Value of Improved Algorthm From the Table 2, IM_CN, Bay_CN ad IM_Bay_CN respectvely get mprovemet compare wth the dex of tradtoal local formato predcto dex. The same, the Bayesa model adoptg the mproved method combg wth the dex of AA ca also get some degree mprovemet. I the future work, we wll focus o the complex largescale IP etwork lk predcto, ad verfy the predcto accuracy. I addto, to fd f the method ca be used to the IP etwork mssg lk recovers. 5. Cocluso Through the aalyss ad research to the lk predcto algorthm ad correspodg dex, ad the smulato expermet o the IP etwork model, we ca see from the expermetal results that the local formato smlarty dexes ad ther optmzed dex ca accurately predct the lk coecto. Ad based o the Bayesa depedece assumpto s also sutable to the structure of the IP etwork propertes, ad after troducg mproved dex based o dex of AA or RA to CN, Bay_CN, ad the predcto accuracy ca gas a certa degree mprovemet. Ths paper oly dscuss a kd of fxed A model expermet of IP etwork, from the predcto accuracy ad stablty, the algorthm based o the commo eghbor dex ad ther mproved dex has hgher predcto accuracy, the predcto accuracy ca reach more tha As a result, the eghbor algorthm based o the local formato lk predcto dex s sutable to the IP etwork lk predcto. But cosderg the IP etwork structure wth complex coecto, ad especally large-scale IP etwork, t s hard to judge, whether the lk predct ca also obta good results s the future research drecto. Refereces Idex IM_CN Bay_CN IM_Bay_CN AUC [1] R. Rao Kompella, J. Yates, A. Greeberg, A. C. oere, IP Fault Localzato Va Rsk Modelg, 2d ymposum o Networked ystems Desg ad Implemetato, Bosto, Massachusetts, UA, (2005) May 2-4. [2]. Kadula, D. Katab, J-P Vasseur, hrk: A Tool for Falure Dagoss IP Network, IGCOMM'05 Workshops, Phladelpha, PA, UA, (2005) August [3] T. Qu, Z. Ge, D. Pe, What Happeed my Network? Mg Network Evets from Router yslogs, IMC 10, Melboure, Australa, (2010) Nov.1-3. [4] X. Xre, Computer Network, Dala Uversty of Techology Press, Dala (2000). p [5] L. Lyua, Lk Predcto o Complex Networks, Joural of Uversty of Electroc cece ad Techology of Cha,vol. 39, o.5, (2010). pp [6] R. Albert, A L, Barabás, tatstcal mechacs of complex etworks, Revews of moder physcs, vol. 74, o. 1, (2002). p. 47. [7] L.Lu, C.H. J, T. Zhou, mlarty dex based o Local paths for lk predcto of complex etwork, Phys. Rev. E, 80, (2009). [8] G. alto, M J McGll, Itroducto to Moder Iformato Retreval, New York: McDraw-Hll Co., (1983), pp [9] T. øreso, A method of establshg groups of equal ampltude plat socology based o smlarty of speces cotet ad ts applcato to aalyses of the vegetato o Dash commos, Bol kr, vol. 5, o.4, (1948). pp Copyrght c 2015 ERC

9 Iteratoal Joural of Grd Dstrbuto Computg [10] E A Lecht, P. Holme, Newma M E J. Vertex smlarty etworks, Physcal Revew E, vol.73, o.2. (2006). [11] E. Ravasz, A L omera, D A Mogru, et al. Herarchcal orgazato of modularty metabolc etworks, scece, ( 2002), vol. 297, o. 5586, pp [12] Adamc L A, Adar E. Freds ad eghbors o the web. ocal Networks, vol. 25, o. 3, (2003), pp [13] T. Zhou, L. Lü, Y C. Zhag, Predctg mssg lks va local formato, The Europea Physcal Joural B, vol. 71, o. 4, ( 2009). pp [14] P. Jaccard, Etude comparatve de la dstrbuto florale das ue porto des Alpes et des Jura, Bullet de la ocete Vaudose des cece Naturelles, o. 37, (1901). pp [15] W. Je-hua, Z. A-qg, C. Xue-la, Z. Xao-la, Hdde ave Bayesa model for socal relato recommedato, Applcato Research of Computers, vol. 31, o. 5, (2014). pp Authors Che Yu, he s curretly pursug Ph.D. degree from Northwester Polytechcal Uversty, chool of Electrocs ad Iformato. ce 2001, he has bee workg as a teacher Zhegzhou Isttute of Aeroautcal Idustry Maagemet, Departmet of Electroc Commucato ad Egeerg, assstat professor. Hs research terests are crcut ad system, data collecto ad sgal process, etwork formato ad etwork securty, etc. Dua Zhem, he s a professor Northwester Polytechcal Uversty, chool of Electrocs ad Iformato. I 2011, he was awarded a prze of atoal teachg masters. Hs electroc seres basc course teachg team was amed the atoal teachg team Hs research terests are crcut ad system, data collecto ad sgal process, tegrated crcut aalyss ad desg, electrcal theory ad ew techology, etc. Copyrght c 2015 ERC 149

10 Iteratoal Joural of Grd Dstrbuto Computg 150 Copyrght c 2015 ERC

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Resource Management Model of Data Storage Systems Oriented on Cloud Computing

Resource Management Model of Data Storage Systems Oriented on Cloud Computing Resorce Maagemet Model of Data Storage Systems Oreted o Clod Comptg Elea Kaa, Yry Korolev Sat Petersbrg Electrotechcal Uversty "LETI" (ETU), Sat Petersbrg, Rssa {leaaa, yryg}@gmalcom Abstract Ths artcle

More information

Report 19 Euroland Corporate Bonds

Report 19 Euroland Corporate Bonds Rep19, Computed & Prted: 17/06/2015 11:38 Report 19 Eurolad Corporate Bods From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Bechmark 100% IBOXX Euro Corp All Mats. TR Defto of the frm ad

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Algorithm Optimization of Resources Scheduling Based on Cloud Computing

Algorithm Optimization of Resources Scheduling Based on Cloud Computing JOURNAL OF MULTIMEDIA, VOL. 9, NO. 7, JULY 014 977 Algorm Optmzato of Resources Schedulg Based o Cloud Computg Zhogl Lu, Hagu Zhou, Sha Fu, ad Chaoqu Lu Departmet of Iformato Maagemet, Hua Uversty of Face

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

A system to extract social networks based on the processing of information obtained from Internet

A system to extract social networks based on the processing of information obtained from Internet A system to extract socal etworks based o the processg of formato obtaed from Iteret av CANALETA a, Pablo ROS a, Alex VALLEJO b, Davd VERNET c, ad Agustí ZABALLOS b a Grup de Recerca e Sstemes Dstrbuïts

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

The Popularity Parameter in Unstructured P2P File Sharing Networks

The Popularity Parameter in Unstructured P2P File Sharing Networks The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Bayesian Network Representation

Bayesian Network Representation Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory

More information

Three Dimensional Interpolation of Video Signals

Three Dimensional Interpolation of Video Signals Three Dmesoal Iterpolato of Vdeo Sgals Elham Shahfard March 0 th 006 Outle A Bref reve of prevous tals Dgtal Iterpolato Bascs Upsamplg D Flter Desg Issues Ifte Impulse Respose Fte Impulse Respose Desged

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Common p-belief: The General Case

Common p-belief: The General Case GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment , pp.199-210 http://dx.do.org/10.14257/uesst.2015.8.6.19 Fuzzy Task Assget Model of Web Servces Suppler Collaboratve Developet Evroet Su Ja 1,2, Peg Xu-ya 1, *, Xu Yg 1,3, Wag Pe-e 2 ad Ma Na- 4,2 1. College

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Business Bankruptcy Prediction Based on Survival Analysis Approach

Business Bankruptcy Prediction Based on Survival Analysis Approach Busess Bakruptcy Predcto Based o Survval Aalyss Approach ABSTRACT Mg-Chag Lee Natoal Kaohsug Uversty of Appled Scece, Tawa Ths study sampled compaes lsted o Tawa Stock Exchage that examed facal dstress

More information