Enhanced TCP SYN Attack Detection

Size: px
Start display at page:

Download "Enhanced TCP SYN Attack Detection"

Transcription

1 Enhanced TCP SYN Aack Deecion Vrizlynn L. L. Thing Morris Sloman Naranker Dulay Deparmen of Compuing Imperial College London 80 Queen s Gae, London, SW72AZ Absrac - In his paper, we analyze he saeless SYN- SYN&ACK and SYN-FIN/RST deecion mechanisms for TCP SYN aacks. We indicae he inheren vulnerabiliy of he SYN-FIN/RST deecion mechanism caused by he compuaion of he RST packe couns. We indicae why SYN- SYN&ACK is a more efficien and reliable deecion mechanism han SYN-FIN/RST. We come up wih Bo Buddies for TCP SYN aacks and explain how he use of hem can compromise boh mechanisms. We propose an enhanced deecion mechanism incorporaing he Bloom filer o handle hese variaions of TCP SYN aacks. We show ha our enhanced mechanism overcomes he problems of he use of Bo Buddies and analyse is efficiency. Keywords - Disribued Denial of Service Aacks, TCP SYN Flood, DDoS Deecion, Nework Securiy.. INTRODUCTION Since is firs appearance in 999, Disribued Denial of Service (DDoS) aacks [] have coninued o become more prevalen in he Inerne, wih aacks argeing banking and financial companies, online gambling firms, web reailers and governmens. The 2007 Symanec Threa Repor [2] indicaes ha over 5000 DoS aacks were observed worldwide on a daily basis. In 2006, backscaer analysis [3] was conduced where DDoS aack raffic was capured. I shows ha over a period of 3 years from 200 o 2004, 22 colleced disinc races revealed 68,700 aacks on over 34,700 disinc Inerne hoss, wih 95% of he aacks using TCP as heir choice of proocol. A recen survey [4] of 55 ier, ier 2 and hybrid IP nework operaors in Norh America, Europe and Asia repored ha DDoS aacks remain he mos significan ISP securiy hrea wih TCP SYN aacks leading he pack. Figure (a) TCP 3-way handshake (b) TCP SYN Aack In TCP, o esablish a connecion (before being able o carry ou daa ransmission beween he server and he clien), he clien sends a SYN o he server. The server allocaes a buffer for he clien and replies wih a SYN&ACK packe. A his sage, he connecion remains in he half-open sae while waiing for he ACK reply from he clien o complee he connecion seup, afer which he 3-way handshake is achieved. TCP SYN DDoS aacks exploi he TCP 3-way handshake. The aackers spoof he source IP addresses of he massive amoun of SYN packes hey send o he vicim servers. As a resul, he SYN&ACK response packes do no reach he aackers machines and he final ACK packes are no sen o he vicim server o complee he 3-way handshake. Therefore, resources a he vicim server are ied up for hese half-open sae connecions creaed by he aackers prevening services o be graned o oher legiimae requess. Previous work on miigaing TCP SYN aacks include SYN cache [5], SYN cookie [6], SYNDefender [7] and Synkill [8]. These work aim o miigae he flooding effec on he vicim server. Previous work on deecing SYN aacks include Specral analysis based deecion [9], SYN arrival rae based deecion [0], SYN-SYN&ACK based deecion [], and SYN-FIN/RST based deecion [2]. Deails are in he nex secion. In his paper, we analyze he wo exising saeless and efficien deecion mechanisms, he SYN-SYN&ACK and SYN-FIN/RST schemes, in view of curren and new variaions of TCP SYN aacks. We find ha hese schemes are vulnerable o exising and new forms of aacks, and propose an enhanced SYN aack deecion scheme o overcome hese vulnerabiliies. 2. RELATED WORK In SYN cache [5], a hash able keeps rack of he halfopen sae connecions insead of relying on he backlog queue provided for each applicaion. Therefore, a higher number of half-open sae connecions are possible bu, during an aack, his is sill insufficien. In addiion, iems in he hash able would have o be dropped consanly o allow for new requess and may resul in even higher overhead and overwhelming he vicim server during an aack. SYN&ACK is used o represen ha boh he SYN and ACK flags are se.

2 SYN cookie [6] eliminaes he need for he backlog queue o keep rack of each SYN reques. Insead, a SYN cookie, also used as he iniial sequence number in he SYN&ACK sen back o he clien, is compued based on a couner a he server, he Maximum segmen size in he SYN queue enry and he TCP header of he reques packe. The ACK reurned from he clien mus conain a sequence number of he SYN cookie plus one o be valid. However, he drawbacks of his scheme are he overhead of compuing he cookies during an aack. Reransmission required in he siuaion of los ACK packe is also no possible as he sae of he connecion reques is no sored. In addiion, TCP opions which are no encoded in he SYN cookie are los, denying he use of cerain TCP performance enhancemen. In SYNDefender [7], he firewall inerceps he SYN reques from he clien and sends he SYN&ACK packe on he behalf of he server. Afer he firewall receives he ACK packe, he reques is hen le hrough o he server. In his way, he server does no need o hold he half-open saes and so does no deplee is resources. However, he weakness is he addiional workload and processing wihin he firewall which migh no cope during a high rae aack. In Synkill [8], source IP addresses are classified in a daabase as good or bad based on observed nework raffic and adminisraively supplied inpu. Bad source addresses are sen he RST packe o erminae heir requess while good ones are allowed o carry on wih he handshaking. However, he above mehods only deal wih miigaing he flooding effec of he SYN aacks and mos of hem are saeful mechanisms, which could be subjeced o DDoS aacks hemselves. Specral analysis based SYN aack deecion [9] moniors he arrival raes of he raffic flows as a signal. The power specral of he signal for a normal TCP flow is found o exhibi srong periodiciy around is round-rip ime (RTT) in boh direcions, whereas ha of he DDoS aack raffic flows are no regulaed in such a way. However, he scheme deals wih long TCP flows. For TCP flows wih shor duraions, he effec of heir saisical muliplexing may ouweigh heir inrinsic periodiciy and be deeced as aack flows. RTTs of flows also vary from rip o rip which makes i difficul o obain a reliable model o represen he normal raffic for differen raffic condiions. Anoher limiaion of he scheme is ha i canno idenify TCP flows wih very small RTTs. The SYN arrival rae based deecion scheme [0] models he arrival rae of he normal SYN packes as a normal disribuion. A very reliable model of he normal raffic paern has o be mainained. I allows a high rae SYN aack o be deeced quickly and accuraely. However, compared o non-parameric approaches such as he SYN-FIN/RST deecion [2], i was no able o deec low rae aack (e.g. < 4 SYNs/sec). Therefore, a low rae aack would sill be able o bring down he vicim server wihou being deeced. Non-parameric approaches such as he SYN- SYN&ACK [] and SYN-FIN/RST [2] deecion mechanisms allow aack deecion even in he case of any variance of normal raffic making hem insensiive o sie and access paerns. The SYN-SYN&ACK deecion mechanism is based on he inheren TCP SYN SYN&ACK pairs behavior. Wih a SYN reques sen ou by a clien o a server, i mus also receive a SYN&ACK reply. An aack hos spoofing as a clien would only send ou massive amoun of SYN requess and no receive any SYN&ACK replies from he vicim server due o is spoofed address. The SYN-SYN&ACK agen moniors he difference of he number of ougoing SYN and incoming SYN&ACK packes. I hen uses he non-parameric Cumulaive Sum (CUSUM) approach o deec any abrup rise in he difference. The SYN-FIN/RST approach proposed by he same auhors allows deecion boh a he aackers and vicim s ends. For a normal TCP connecion, a saring SYN reques will be ended by a FIN/RST o close he connecion. Therefore, correlaion is performed beween he number of SYN and FIN/RST packes insead. However, as RST can be classified as acive (i.e. iniiaed o abor TCP connecion) and passive (i.e. ransmied in response o packes desined o a closed por), and could no be easily differeniaed a he monioring agens, he scheme couns 75% of all RST packes o be acive and he res o be passive (i.e. background noise). Non-parameric CUSUM is also used o deec he abrup rise in he difference beween he SYN and he FIN/RST packes. We analyze boh schemes in he nex secion a heir curren sae and in view of proposed new variaions of TCP SYN aacks. 3. SYN-FIN/RST AND SYN-SYN&ACK ANALYSIS In SYN-FIN/RST, SIN, FIN and RST packes in boh direcions are moniored and couned. To address he issue of passive RST packes, only 75% are couned as valid RST. These valid RST are added o he FIN packes and he difference beween he number of SYN and FIN/RST packes for each monioring inerval is compued. Any abrup posiive flucuaion in his difference would signal he occurrence of an aack. We find ha classifying 75% of RST packes as valid ones weaken he deecion mechanism. RST packes can be generaed by a hos for he following evens: i. arrival of daa packes for which no connecion has been esablished ii. arrival of TCP segmens wih inappropriae sequence numbers iii. arrival of SYN&ACK packes for which no SYN has been iniiaed

3 iv. arrival of TCP packes for closed pors In he even of a SYN aack, aackers could arge random pors as in [3]. In his case, he vicim server would generae RST packes due o (iv). In addiion, source address spoofing is used by he aackers. Therefore, he SYN&ACK packes generaed by he vicim server would be delivered o hoss locaed a he spoofed addresses. They would generae RST packes o he vicim server due eiher o he evens in (iii) and (iv) as well. Whichever he case, RST packes generaed by he above evens should no be classified as valid packes. In [3], DDoS aack ools in Bos could send a mixure of SYN and ACK packes o he vicim. Insead, a new variaion of aack could be easily creaed by sending ou a mixure of SYN, FIN and RST packes o he vicim server. This would resul in balancing he SYN and FIN/RST packes, and hus weakens or even defeas he SYN- FIN/RST deecion mechanism. As menioned in he previous secion, he SYN- SYN&ACK approach is applicable a he source of he aack insead of he vicim s end due o he deecion which is based on he behaviour of SYN and SYN&ACK pairs. Having he deecion mechanism closer o he aack sources allows a speedier deecion before a damaging impac could be a he he vicim server. As he aackers send ou SYN packes and do no receive any SYN&ACK from he vicim due o source IP address spoofing, his approach is very efficien in aack deecion. In comparison o he SYN-FIN/RST deecion scheme, he SYN-SYN&ACK scheme also allows a higher degree of correlaion and accuracy deecion due o he shorer round rip ime beween he SYN-SYN&ACK pairs insead of he ime difference beween he SYN-FIN/RST pairs, which las for he whole duraion of he TCP session. Therefore, a shorer monioring inerval and deecion ime could be achieved in he case of he SYN-SYN&ACK deecion approach. As menioned above, i would be possible o creae a new variaion of he aack by sending ou a mixure of SYN and SYN&ACK packes as well. However, as only he ougoing SYN and incoming SYN&ACK packes are couned, even if he aackers were o make such modificaions o he aack code, i would no have any impac on he deecion mechanism. Insead, he SYN&ACK packes would only weaken he aack (by reducing he SYN aack raffic sen o he vicim due o resources used for sending ou SYN&ACK packes). Insead, we come up wih anoher new variaion of coordinaed aack o defea he SYN-SYN&ACK deecion mechanism. We named his aack he Bo Buddy Aack (shown in Figure 2), as i requires he co-operaion of bos wihin he bone carrying ou he SYN aack. For each SYN packe sen ou o he vicim server, a SYN&ACK packe wih he source address spoofed o he vicim server is sen o anoher bo wihin he bone. In his case, each ougoing SYN packe has an incoming SYN&ACK reply. This aack will herefore circumven he SYN- SYN&ACK deecion. Alhough he diagram shows a 2- buddy bone sysem which is he safes case for he aacker, i is also feasible o have bo responsible for sending o muliple bos (i.e. o Many Bo Buddies Aack) as shown in Figure 3. The reason is ha only he ougoing SYN and incoming SYN&ACK couns are moniored. In addiion, as he Bo maser has a lis of all he bos in he bone, his aack could be easily implemened. Figure 2: Bo Buddy Aack SYN Figure 3: o Many Bo Buddies Aack As he SYN-FIN/RST deecion mechanism has an inheren flaw and he SYN-SYN&ACK deecion mechanism proved o be a more efficien and effecive for SYN aack deecion, we propose an enhancemen o he SYN-SYN&ACK deecion mechanism o resolve he above vulnerabiliies. 4. ENHANCED TCP SYN ATTACK DETECTION As in he original SYN-SYN&ACK deecion mechanism, he packe sniffing agens are locaed a he leaf rouers ha connec end hoss o he Inerne. We consider he SYN and SYN&ACK packes sen by he bos. We assume ha he source IP addresses of he SYN packes are randomly spoofed (sysemaic spoofing will be considered in fuure work), wheher all 4 byes or jus he hos suffix of he IP address. Therefore, he following siuaion shown in Figure 4 arises. SYN

4 availabiliy of sorage space on he leaf rouer. The Bloom filer has a zero false negaive (i.e. if an elemen has been sored, i will be found in he filer) bu a non-zero false posiive (i.e. if an elemen has no been sored, i migh sill reurn he saus of found ). Assuming ha he hash funcions spread he elemens evenly across he filer array, le p 0 be he probabiliy ha a bi in he array is no se (i.e. 0) by any of he hash funcions afer soring n elemens. Le p be he probabiliy ha he bi is se (i.e. ). Figure 4: Aack Packe s Header Since he source IP address used in he SYN packe does no mach he desinaion IP address in he SYN&ACK packe received a Bo_, we could perform SYN-SYN&ACK pair maching o eliminae he effec caused by he Bo Buddy Aack on he SYN-SYN&ACK deecion mechanism. Insead of soring he flow addresses o perform maching, we propose using Bloom filers [4] o achieve space and ime efficiency. We describe he algorihm of our mechanism as follows. In our deecion mechanism, we define our Bloom filer, F[0 m-], as an m-bi array which is iniialized o 0. We define each elemen o be sored in he filer as e ou, which corresponds o he SYN packe being sen ou. e ou = src des k hash funcions, h () h k (), are used o compue k key values for e ou and e ou is sored ino he filer by, F[ h ( e ) mod m] =, for i 0o k i ou = () (2) For he incoming SYN&ACK packe, he same equaion () o compue e ou is used o compue he corresponding elemen, e in. In a normal TCP 3-way handshake, here will be an ougoing SYN wih elemen value of e ou which is equal o an incoming SYN&ACK wih elemen value of e in. To be couned as a valid SYN&ACK packe for inclusion ino he CUSUM deecion algorihm, all he bis a posiions, { hi ( ein ) mod m} in he filer array mus be se o. In he nex secion, we perform evaluaions and analysis of our deecion mechanism. 5. EVALUATION AND ANALYSIS Using he Bloom filer o validae he SYN&ACK replies allows space and ime efficiency. The ime required o sore and search for an elemen in he filer is a fixed consan, O(k), which is independen of he size of he filer and he number of sored elemens. The space allocaed o he Bloom filer is m bis. This allocaion depends on he p 0 p = m = p0 kn (3) (4) For a false posiive error o occur, during a search of an elemen, each of he k array posiions compued by he hash funcions for he elemen mus be se o. Therefore, he probabiliy of a false posiive error, p e, is given by: k p = ( p ) (5) e We see ha, as m, he array size, increases, p e will decrease. However, as n, he number of elemens o be sored, increases, p e will increase oo. Oher han he false posiive error from he Bloom filer, we may consider he possibiliy of error coming from he address spoofing algorihm. Tha is, if he spoofed source IP address of he ougoing SYN packe happens o be he same as he desinaion of he incoming SYN&ACK reply generaed by he Bo Buddy. This address would also be he real address of he Bo sending ou he SYN aack packe. Alhough he SYN packe would no consiue an aack packe in his case as a SYN&ACK reply would be received from he vicim hus compleing he 3-way handshake and esablishing he connecion, we have o ake ino consideraion he addiional SYN&ACK reply ha would come from he bo buddy. Assuming ha all 32 bis of address are spoofed, he probabiliy of collision (wih he real source address) is given as: p c = 32 2 (6) However, if parial address spoofing whereby nework prefix of he real address is preserved when performing spoofed address generaion, and q is he number of bis of he preserved nework prefix, pc = 2 32 q (7) We now analyze our enhanced deecion mechanism aking ino consideraion he false posiive error of he Bloom filer and he collision of he spoofed address. As in he original SYN-SYN&ACK deecion mechanism, le {, =0,, } be he number of ougoing SYN packes

5 minus ha of he incoming SYN&ACK packes colleced from each sampling period. = SYN SYN & ACK (8) To alleviae is dependence on he ime, access paern and size of he nework, { } is normalized by he average number K of incoming SYN&ACK packes during he sampling period. The recursive esimaion of K is given by: K = α K + ( α) SYN & ACK (9) where is he discree ime index and α is a consan beween 0 and o represen he memory in he esimaion. We define X = / K whereby he mean of X, denoed by c, is much less han. In general, E( X ) = c <. A parameer a > c is chosen ~ and X = X a is defined so ha a negaive mean is achievable during normal operaion. When an aack occurs, X ~ quickly become a large posiive number. The abrup rise deecion is based on he observaion of h >> c, whereby he increase in he mean of X ~ can be lower bounded by h. y y 0 = 0 ~ X = ( + y ) + (0) () y is defined as he maximum coninuous incremen unil ime n. A large y is a srong indicaion of an aack. ~ Equaion () indicaes ha y is se o ( y + X ) if his value is 0 else i is se o 0. N is defined as he aack hreshold, i.e. y N indicaes an aack is deeced. Taking ino consideraion he false posiive errors in he Bloom filer search and he collision error of he spoofed address, we ge = SYN, norm SYN & ACK, norm + SYN, a Err, a (2) during a Bo Buddy SYN aack. SYN,norm are he number of SYN packes and SYN&ACK,norm are he number of SYN&ACK packes from he legiimae raffic respecively, in inerval. SYN,a are he number of SYN packes and Err,a are he number of SYN&ACK packes from he Bo Buddy aack respecively, a inerval. Noe ha in he original SYN-SYN&ACK deecion mechanism, Err,a will be large (i.e. SYN,a ) and he aack will no be deecable. In our deecion approach, Err,a is given by: Err SYN, a, a = i= (2 p c + ( p c )( p e )) (3) As in he case of collision, 2p c represens one SYN&ACK reurned from he vicim server and he oher from he Bo Buddy. Only when here is no collision is here a possibiliy of false posiive error in he Bloom filer (i.e. here is no maching SYN elemen sored bu searching reurns rue). This is represened by (-p c )(p e ) in he equaion. n in equaion (3), which is used o derive p e, refers o he number of sored elemens already presen in he bloom filer. A he beginning of he firs sampling period, n sars wih 0. Subsequenly, n is incremened as SYN packes, boh legiimae and aack, arrive. We will consider elemen removal in he fuure work (plan in Secion 6). Using he experimen parameers in he paper describing he original SYN-SYN&ACK deecion mechanism, he sampling period is se o 20 seconds. We choose he aack rae o be 60 SYN packes/second. In [], he normal raffic races daed Sepember 2000, of he ougoing SYN and incoming SYN&ACK were obained from he Universiy of Norh Carolina (moniored on he high-speed OC-2, 622Mbps link connecing is Chapel Hill campus nework o he res of he world). The races show ha he normal ougoing SYN packes flucuaed from around 200 o 900, while he incoming SYN&ACK packes flucuaed from around 050 o 700, in 0-second sampling inervals. The races show consisen synchronizaion beween he SYN and SYN&ACK packes. Therefore, is consisenly around 200 during normal operaions in 0 seconds, which is 400 in 20 seconds, he deecion mechanism s sampling period. As for our mechanism, we se k= (i.e. one hash funcion), m=33,554,432 (i.e. Bloom filer size of 4MB) and assume ha he bo spoofs 32 bis of he source address. In [5], he RTTs for FTP downloads a 6 differen Inerne sies have been found o average o 65.27ms. Therefore, we assume ha each SYN&ACK packe would ake 65.27ms o reach he leaf rouer of he aack bo. The ougoing SYN packes would no incur much delay as he leaf rouer is locaed very close o he aack source. The aack arrival raes are se o 60 packes/second (i.e. around 3 packes every 50ms assuming 5.27ms incurred for he generaion of he aack packes and minor rip ime o he leaf rouer), and he normal SYN raffic arrival rae is averaged a 55 packes/second (i.e. ( )/(2*0)) or around 0 packes every 65.27ms; no delay is assumed here as he daa is obained from races and is he acual arrival rae a he leaf rouer). Therefore, we assume ha n a each arrival of a Bo Buddy SYN&ACK o be 20x550=3000 (i.e. legiimae SYN packes in sampling period) plus he ime slos of 65.27ms ha have passed

6 muliplied by 3, as we assume saring he aack one sampling period laer han he legiimae raffic. The firs compuaion of Err,a will begin only afer he arrival of he firs SYN&ACK packe (i.e. comes afer SYN packes and n will be > 0). Figure 5 shows he Err,a for he samples. We observed ha afer 0 minues of aack, he number of incorrecly validaed SYN&ACK packes is jus abou. Therefore, we can be assured ha our enhanced deecion mechanism will deec SYN aacks effecively even in he face of he Bo Buddy aack. Error Raes (packes) Error Raes for he Sampling Periods Sampling Periods (secs) Figure 5: Error Raes Compuaion 6. FUTURE WORK Boh developmen of he original SYN/SYN&ACK deecion mechanism and our enhanced deecion mechanism is near compleion. We plan o run experimens o compare he performance of boh approaches in he siuaions of he original TCP SYN aack and new variaions of he aack. As hash funcions are used o compue he key values for sorage of he elemens in he Bloom filer, we would like o find ou he overhead incurred in an experimenal scenario. The selecion of k (he number of hash funcions) and m (he size of he Bloom filer), and heir effec on he deecion speed and false posiive rae will also be sudied. We have no considered he removal of elemens from he Bloom filer, which is an essenial feaure of he scheme, in his paper. We will include he sudy in our fuure work as well, considering Couning Bloom Filer. efficien and reliable compared o he SYN-FIN/RST, i fails o deec our Bo Buddy aack. We proposed an enhanced deecion mechanism incorporaing he Bloom filer o handle he aack. We analyzed and evaluaed our enhanced mechanism and found i o work as effecively as he original SYN&ACK, as if he Bo Buddy aack is no presen. 8. ACKNOWLEDGEMENTS This research is coninuing hrough paricipaion in he Inernaional Technology Alliance sponsored by he U.S. Army Research Laboraory and he U.K. Minisry of Defence. 9. REFERENCES. Diane E. Levine and Gary C. Kessler, "Chaper - Denial of Service Aacks, Compuer Securiy Handbook, 4 h Ediion", Ediors - Seymour Bosworh, Michel E. Kabay, Symanec Inerne Securiy Threa Repor, Volume XI, Mar David Moore, e al., "Inferring Inerne Denial-of-Service Aciviy ", ACM Transacions on Compuer Sysem (TOCS), May 2006, 24(2), pp Arbor Neworks, "Worldwide ISP Securiy Repor", Sep Jonahan Lemon, "Resising SYN flood DoS aacks wih a SYN cache", USENIX BSDCon, Daniel J. Bernsein and Eric Shenk, hp://cr.yp.o/syncookies.hml, Check Poin Sofware Technologies Ld., SynDefender, hp:// 8. Chrisoph L. Schuba, e al., "Analysis of a Denial of Service Aack on TCP", IEEE SYmposium on Securiy and Privacy, May Chen-Mou Cheng, e al., "Use of Specral Analysis in Defense Agains DoS Aacks", IEEE GLOBECOM, Yuichi Ohsia, e al., "Deecing Disribued Denial-of-Service Aacks by Analyzing TCP SYN Packes Saisically", IEICE Trans. Comm, Oc. 2006, E89-B(0), pp Haining Wang, e al., "SYN-dog: Sniffing SYN Flooding Sources", Inernaional Conference on Disribued Compuing Sysems, Jul Haining Wang, e al., "Deecing SYN flooding aacks", IEEE INFOCOM, Jun Vrizlynn L. L. Thing, e al., "A Survey of Bos Used for Disribued Denial of Service Aacks", IFIP Inernaional Informaion Securiy Conference (SEC), May Buron H. Bloom, "Space/ime rade-offs in hash coding wih allowable errors", Communicaions of he ACM, Jul. 970, 3(7), pp Bryan Veal, e al., "New Mehods for Passive Esimaion of TCP Round-Trip Times", Passive and Acive Measuremens (PAM), CONCLUSION We have analyzed he saeless SYN-SYN&ACK and SYN-FIN/RST deecion mechanisms. We discover he inheren vulnerabiliy of he SYN-FIN/RST deecion mechanism caused by he RST packe couns. Boh mechanisms also suffered in erms of reliabiliy in view of our new variaions of TCP aacks. Alhough, he SYN- SYN&ACK deecion mechanism is found o be more

Trends in TCP/IP Retransmissions and Resets

Trends in TCP/IP Retransmissions and Resets Trends in TCP/IP Reransmissions and Reses Absrac Concordia Chen, Mrunal Mangrulkar, Naomi Ramos, and Mahaswea Sarkar {cychen, mkulkarn, msarkar,naramos}@cs.ucsd.edu As he Inerne grows larger, measuring

More information

Chapter 7. Response of First-Order RL and RC Circuits

Chapter 7. Response of First-Order RL and RC Circuits Chaper 7. esponse of Firs-Order L and C Circuis 7.1. The Naural esponse of an L Circui 7.2. The Naural esponse of an C Circui 7.3. The ep esponse of L and C Circuis 7.4. A General oluion for ep and Naural

More information

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999 TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision

More information

DDoS Attacks Detection Model and its Application

DDoS Attacks Detection Model and its Application DDoS Aacks Deecion Model and is Applicaion 1, MUHAI LI, 1 MING LI, XIUYING JIANG 1 School of Informaion Science & Technology Eas China Normal Universiy No. 500, Dong-Chuan Road, Shanghai 0041, PR. China

More information

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt Saisical Analysis wih Lile s Law Supplemenary Maerial: More on he Call Cener Daa by Song-Hee Kim and Ward Whi Deparmen of Indusrial Engineering and Operaions Research Columbia Universiy, New York, NY 17-99

More information

The Application of Multi Shifts and Break Windows in Employees Scheduling

The Application of Multi Shifts and Break Windows in Employees Scheduling The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance

More information

Improvement of a TCP Incast Avoidance Method for Data Center Networks

Improvement of a TCP Incast Avoidance Method for Data Center Networks Improvemen of a Incas Avoidance Mehod for Daa Cener Neworks Kazuoshi Kajia, Shigeyuki Osada, Yukinobu Fukushima and Tokumi Yokohira The Graduae School of Naural Science and Technology, Okayama Universiy

More information

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.

More information

Acceleration Lab Teacher s Guide

Acceleration Lab Teacher s Guide Acceleraion Lab Teacher s Guide Objecives:. Use graphs of disance vs. ime and velociy vs. ime o find acceleraion of a oy car.. Observe he relaionship beween he angle of an inclined plane and he acceleraion

More information

11/6/2013. Chapter 14: Dynamic AD-AS. Introduction. Introduction. Keeping track of time. The model s elements

11/6/2013. Chapter 14: Dynamic AD-AS. Introduction. Introduction. Keeping track of time. The model s elements Inroducion Chaper 14: Dynamic D-S dynamic model of aggregae and aggregae supply gives us more insigh ino how he economy works in he shor run. I is a simplified version of a DSGE model, used in cuing-edge

More information

CHARGE AND DISCHARGE OF A CAPACITOR

CHARGE AND DISCHARGE OF A CAPACITOR REFERENCES RC Circuis: Elecrical Insrumens: Mos Inroducory Physics exs (e.g. A. Halliday and Resnick, Physics ; M. Sernheim and J. Kane, General Physics.) This Laboraory Manual: Commonly Used Insrumens:

More information

Making a Faster Cryptanalytic Time-Memory Trade-Off

Making a Faster Cryptanalytic Time-Memory Trade-Off Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland [email protected]

More information

Automatic measurement and detection of GSM interferences

Automatic measurement and detection of GSM interferences Auomaic measuremen and deecion of GSM inerferences Poor speech qualiy and dropped calls in GSM neworks may be caused by inerferences as a resul of high raffic load. The radio nework analyzers from Rohde

More information

Towards Intrusion Detection in Wireless Sensor Networks

Towards Intrusion Detection in Wireless Sensor Networks Towards Inrusion Deecion in Wireless Sensor Neworks Kroniris Ioannis, Tassos Dimiriou and Felix C. Freiling Ahens Informaion Technology, 19002 Peania, Ahens, Greece Email: {ikro,dim}@ai.edu.gr Deparmen

More information

Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Mining Web User Behaviors to Detect Application Layer DDoS Attacks JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 985 Mining Web User Behaviors o Deec Applicaion Layer DDoS Aacks Chuibi Huang Deparmen of Auomaion, USC Key laboraory of nework communicaion sysem and conrol

More information

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005 FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a

More information

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS Hao Wu and Qinfen Zheng Cenre for Auomaion Research Dep. of Elecrical and Compuer Engineering Universiy of Maryland, College Park, MD-20742 {wh2003, qinfen}@cfar.umd.edu

More information

Task is a schedulable entity, i.e., a thread

Task is a schedulable entity, i.e., a thread Real-Time Scheduling Sysem Model Task is a schedulable eniy, i.e., a hread Time consrains of periodic ask T: - s: saring poin - e: processing ime of T - d: deadline of T - p: period of T Periodic ask T

More information

Chapter 8: Regression with Lagged Explanatory Variables

Chapter 8: Regression with Lagged Explanatory Variables Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One

More information

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor Deecion of DDoS Aac in SIP Environmen wih Non-parameric CUSUM Sensor Luigi Alcuri Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering [email protected] Piero Cassarà

More information

4. International Parity Conditions

4. International Parity Conditions 4. Inernaional ariy ondiions 4.1 urchasing ower ariy he urchasing ower ariy ( heory is one of he early heories of exchange rae deerminaion. his heory is based on he concep ha he demand for a counry's currency

More information

Model-Based Monitoring in Large-Scale Distributed Systems

Model-Based Monitoring in Large-Scale Distributed Systems Model-Based Monioring in Large-Scale Disribued Sysems Diploma Thesis Carsen Reimann Chemniz Universiy of Technology Faculy of Compuer Science Operaing Sysem Group Advisors: Prof. Dr. Winfried Kalfa Dr.

More information

The naive method discussed in Lecture 1 uses the most recent observations to forecast future values. That is, Y ˆ t + 1

The naive method discussed in Lecture 1 uses the most recent observations to forecast future values. That is, Y ˆ t + 1 Business Condiions & Forecasing Exponenial Smoohing LECTURE 2 MOVING AVERAGES AND EXPONENTIAL SMOOTHING OVERVIEW This lecure inroduces ime-series smoohing forecasing mehods. Various models are discussed,

More information

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were

More information

Performance Center Overview. Performance Center Overview 1

Performance Center Overview. Performance Center Overview 1 Performance Cener Overview Performance Cener Overview 1 ODJFS Performance Cener ce Cener New Performance Cener Model Performance Cener Projec Meeings Performance Cener Execuive Meeings Performance Cener

More information

AP Calculus AB 2013 Scoring Guidelines

AP Calculus AB 2013 Scoring Guidelines AP Calculus AB 1 Scoring Guidelines The College Board The College Board is a mission-driven no-for-profi organizaion ha connecs sudens o college success and opporuniy. Founded in 19, he College Board was

More information

Behavior Analysis of a Biscuit Making Plant using Markov Regenerative Modeling

Behavior Analysis of a Biscuit Making Plant using Markov Regenerative Modeling Behavior Analysis of a Biscui Making lan using Markov Regeneraive Modeling arvinder Singh & Aul oyal Deparmen of Mechanical Engineering, Lala Lajpa Rai Insiue of Engineering & Technology, Moga -, India

More information

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees

More information

A Probability Density Function for Google s stocks

A Probability Density Function for Google s stocks A Probabiliy Densiy Funcion for Google s socks V.Dorobanu Physics Deparmen, Poliehnica Universiy of Timisoara, Romania Absrac. I is an approach o inroduce he Fokker Planck equaion as an ineresing naural

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

How To Calculate Price Elasiciy Per Capia Per Capi

How To Calculate Price Elasiciy Per Capia Per Capi Price elasiciy of demand for crude oil: esimaes for 23 counries John C.B. Cooper Absrac This paper uses a muliple regression model derived from an adapaion of Nerlove s parial adjusmen model o esimae boh

More information

Real-time Particle Filters

Real-time Particle Filters Real-ime Paricle Filers Cody Kwok Dieer Fox Marina Meilă Dep. of Compuer Science & Engineering, Dep. of Saisics Universiy of Washingon Seale, WA 9895 ckwok,fox @cs.washingon.edu, [email protected] Absrac

More information

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1 Absrac number: 05-0407 Single-machine Scheduling wih Periodic Mainenance and boh Preempive and Non-preempive jobs in Remanufacuring Sysem Liu Biyu hen Weida (School of Economics and Managemen Souheas Universiy

More information

Multiprocessor Systems-on-Chips

Multiprocessor Systems-on-Chips Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,

More information

Module 4. Single-phase AC circuits. Version 2 EE IIT, Kharagpur

Module 4. Single-phase AC circuits. Version 2 EE IIT, Kharagpur Module 4 Single-phase A circuis ersion EE T, Kharagpur esson 5 Soluion of urren in A Series and Parallel ircuis ersion EE T, Kharagpur n he las lesson, wo poins were described:. How o solve for he impedance,

More information

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m

Chapter 2 Problems. 3600s = 25m / s d = s t = 25m / s 0.5s = 12.5m. Δx = x(4) x(0) =12m 0m =12m Chaper 2 Problems 2.1 During a hard sneeze, your eyes migh shu for 0.5s. If you are driving a car a 90km/h during such a sneeze, how far does he car move during ha ime s = 90km 1000m h 1km 1h 3600s = 25m

More information

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR The firs experimenal publicaion, which summarised pas and expeced fuure developmen of basic economic indicaors, was published by he Minisry

More information

DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR

DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR Invesmen Managemen and Financial Innovaions, Volume 4, Issue 3, 7 33 DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR Ahanasios

More information

Task-Execution Scheduling Schemes for Network Measurement and Monitoring

Task-Execution Scheduling Schemes for Network Measurement and Monitoring Task-Execuion Scheduling Schemes for Nework Measuremen and Monioring Zhen Qin, Robero Rojas-Cessa, and Nirwan Ansari Deparmen of Elecrical and Compuer Engineering New Jersey Insiue of Technology Universiy

More information

Option Put-Call Parity Relations When the Underlying Security Pays Dividends

Option Put-Call Parity Relations When the Underlying Security Pays Dividends Inernaional Journal of Business and conomics, 26, Vol. 5, No. 3, 225-23 Opion Pu-all Pariy Relaions When he Underlying Securiy Pays Dividends Weiyu Guo Deparmen of Finance, Universiy of Nebraska Omaha,

More information

Morningstar Investor Return

Morningstar Investor Return Morningsar Invesor Reurn Morningsar Mehodology Paper Augus 31, 2010 2010 Morningsar, Inc. All righs reserved. The informaion in his documen is he propery of Morningsar, Inc. Reproducion or ranscripion

More information

MTH6121 Introduction to Mathematical Finance Lesson 5

MTH6121 Introduction to Mathematical Finance Lesson 5 26 MTH6121 Inroducion o Mahemaical Finance Lesson 5 Conens 2.3 Brownian moion wih drif........................... 27 2.4 Geomeric Brownian moion........................... 28 2.5 Convergence of random

More information

Supplementary Appendix for Depression Babies: Do Macroeconomic Experiences Affect Risk-Taking?

Supplementary Appendix for Depression Babies: Do Macroeconomic Experiences Affect Risk-Taking? Supplemenary Appendix for Depression Babies: Do Macroeconomic Experiences Affec Risk-Taking? Ulrike Malmendier UC Berkeley and NBER Sefan Nagel Sanford Universiy and NBER Sepember 2009 A. Deails on SCF

More information

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer Recen Advances in Business Managemen and Markeing Analysis of Pricing and Efficiency Conrol Sraegy beween Inerne Reailer and Convenional Reailer HYUG RAE CHO 1, SUG MOO BAE and JOG HU PARK 3 Deparmen of

More information

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework Applied Financial Economics Leers, 2008, 4, 419 423 SEC model selecion algorihm for ARCH models: an opions pricing evaluaion framework Savros Degiannakis a, * and Evdokia Xekalaki a,b a Deparmen of Saisics,

More information

How To Optimize Time For A Service In 4G Nework

How To Optimize Time For A Service In 4G Nework Process Opimizaion Time for a Service in 4G Nework by SNMP Monioring and IAAS Cloud Compuing Yassine El Mahoi Laboraory of Compuer Science, Operaions Research and Applied Saisics. Téouan, Morocco Souad

More information

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 OPERAION MANUAL Indoor uni for air o waer hea pump sysem and opions EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1 EKHBRD011ABY1 EKHBRD014ABY1 EKHBRD016ABY1 EKHBRD011ACV1 EKHBRD014ACV1 EKHBRD016ACV1 EKHBRD011ACY1

More information

Impact of scripless trading on business practices of Sub-brokers.

Impact of scripless trading on business practices of Sub-brokers. Impac of scripless rading on business pracices of Sub-brokers. For furher deails, please conac: Mr. T. Koshy Vice Presiden Naional Securiies Deposiory Ld. Tradeworld, 5 h Floor, Kamala Mills Compound,

More information

II.1. Debt reduction and fiscal multipliers. dbt da dpbal da dg. bal

II.1. Debt reduction and fiscal multipliers. dbt da dpbal da dg. bal Quarerly Repor on he Euro Area 3/202 II.. Deb reducion and fiscal mulipliers The deerioraion of public finances in he firs years of he crisis has led mos Member Saes o adop sizeable consolidaion packages.

More information

Signal Rectification

Signal Rectification 9/3/25 Signal Recificaion.doc / Signal Recificaion n imporan applicaion of juncion diodes is signal recificaion. here are wo ypes of signal recifiers, half-wae and fullwae. Le s firs consider he ideal

More information

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS Shuzhen Xu Research Risk and Reliabiliy Area FM Global Norwood, Massachuses 262, USA David Fuller Engineering Sandards FM Global Norwood, Massachuses 262,

More information

Mortality Variance of the Present Value (PV) of Future Annuity Payments

Mortality Variance of the Present Value (PV) of Future Annuity Payments Morali Variance of he Presen Value (PV) of Fuure Annui Pamens Frank Y. Kang, Ph.D. Research Anals a Frank Russell Compan Absrac The variance of he presen value of fuure annui pamens plas an imporan role

More information

An Agent-based Bayesian Forecasting Model for Enhanced Network Security

An Agent-based Bayesian Forecasting Model for Enhanced Network Security An Agen-based Forecasing Model for Enhanced Nework Securiy J. PIKOULAS, W.J. BUCHANAN, Napier Universiy, Edinburgh, UK. M. MANNION, Glasgow Caledonian Universiy, Glasgow, UK. K. TRIANTAFYLLOPOULOS, Universiy

More information

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS Hong Mao, Shanghai Second Polyechnic Universiy Krzyszof M. Osaszewski, Illinois Sae Universiy Youyu Zhang, Fudan Universiy ABSTRACT Liigaion, exper

More information

Journal Of Business & Economics Research September 2005 Volume 3, Number 9

Journal Of Business & Economics Research September 2005 Volume 3, Number 9 Opion Pricing And Mone Carlo Simulaions George M. Jabbour, (Email: [email protected]), George Washingon Universiy Yi-Kang Liu, ([email protected]), George Washingon Universiy ABSTRACT The advanage of Mone Carlo

More information

AP Calculus BC 2010 Scoring Guidelines

AP Calculus BC 2010 Scoring Guidelines AP Calculus BC Scoring Guidelines The College Board The College Board is a no-for-profi membership associaion whose mission is o connec sudens o college success and opporuniy. Founded in, he College Board

More information

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation A Noe on Using he Svensson procedure o esimae he risk free rae in corporae valuaion By Sven Arnold, Alexander Lahmann and Bernhard Schwezler Ocober 2011 1. The risk free ineres rae in corporae valuaion

More information

Stability. Coefficients may change over time. Evolution of the economy Policy changes

Stability. Coefficients may change over time. Evolution of the economy Policy changes Sabiliy Coefficiens may change over ime Evoluion of he economy Policy changes Time Varying Parameers y = α + x β + Coefficiens depend on he ime period If he coefficiens vary randomly and are unpredicable,

More information

BALANCE OF PAYMENTS. First quarter 2008. Balance of payments

BALANCE OF PAYMENTS. First quarter 2008. Balance of payments BALANCE OF PAYMENTS DATE: 2008-05-30 PUBLISHER: Balance of Paymens and Financial Markes (BFM) Lena Finn + 46 8 506 944 09, [email protected] Camilla Bergeling +46 8 506 942 06, [email protected]

More information

Why Did the Demand for Cash Decrease Recently in Korea?

Why Did the Demand for Cash Decrease Recently in Korea? Why Did he Demand for Cash Decrease Recenly in Korea? Byoung Hark Yoo Bank of Korea 26. 5 Absrac We explores why cash demand have decreased recenly in Korea. The raio of cash o consumpion fell o 4.7% in

More information

Efficient One-time Signature Schemes for Stream Authentication *

Efficient One-time Signature Schemes for Stream Authentication * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 611-64 (006) Efficien One-ime Signaure Schemes for Sream Auhenicaion * YONGSU PARK AND YOOKUN CHO + College of Informaion and Communicaions Hanyang Universiy

More information

INTRODUCTION TO FORECASTING

INTRODUCTION TO FORECASTING INTRODUCTION TO FORECASTING INTRODUCTION: Wha is a forecas? Why do managers need o forecas? A forecas is an esimae of uncerain fuure evens (lierally, o "cas forward" by exrapolaing from pas and curren

More information

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary Random Walk in -D Random walks appear in many cones: diffusion is a random walk process undersanding buffering, waiing imes, queuing more generally he heory of sochasic processes gambling choosing he bes

More information

Vector Autoregressions (VARs): Operational Perspectives

Vector Autoregressions (VARs): Operational Perspectives Vecor Auoregressions (VARs): Operaional Perspecives Primary Source: Sock, James H., and Mark W. Wason, Vecor Auoregressions, Journal of Economic Perspecives, Vol. 15 No. 4 (Fall 2001), 101-115. Macroeconomericians

More information

Strategic Optimization of a Transportation Distribution Network

Strategic Optimization of a Transportation Distribution Network Sraegic Opimizaion of a Transporaion Disribuion Nework K. John Sophabmixay, Sco J. Mason, Manuel D. Rossei Deparmen of Indusrial Engineering Universiy of Arkansas 4207 Bell Engineering Cener Fayeeville,

More information

4 Convolution. Recommended Problems. x2[n] 1 2[n]

4 Convolution. Recommended Problems. x2[n] 1 2[n] 4 Convoluion Recommended Problems P4.1 This problem is a simple example of he use of superposiion. Suppose ha a discree-ime linear sysem has oupus y[n] for he given inpus x[n] as shown in Figure P4.1-1.

More information

Risk Modelling of Collateralised Lending

Risk Modelling of Collateralised Lending Risk Modelling of Collaeralised Lending Dae: 4-11-2008 Number: 8/18 Inroducion This noe explains how i is possible o handle collaeralised lending wihin Risk Conroller. The approach draws on he faciliies

More information

Analysis and Design of a MAC Protocol for Wireless Sensor etworks with Periodic Monitoring Applications

Analysis and Design of a MAC Protocol for Wireless Sensor etworks with Periodic Monitoring Applications Analysis and Design of a MAC roocol for Wireless Sensor eworks wih eriodic Monioring Applicaions Miguel A. razo, Yi Qian, Keie u, and Domingo Rodríguez Deparmen of lecrical and Compuer ngineering Universiy

More information

Hedging with Forwards and Futures

Hedging with Forwards and Futures Hedging wih orwards and uures Hedging in mos cases is sraighforward. You plan o buy 10,000 barrels of oil in six monhs and you wish o eliminae he price risk. If you ake he buy-side of a forward/fuures

More information

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand 36 Invesmen Managemen and Financial Innovaions, 4/4 Marke Liquidiy and he Impacs of he Compuerized Trading Sysem: Evidence from he Sock Exchange of Thailand Sorasar Sukcharoensin 1, Pariyada Srisopisawa,

More information

Appendix A: Area. 1 Find the radius of a circle that has circumference 12 inches.

Appendix A: Area. 1 Find the radius of a circle that has circumference 12 inches. Appendi A: Area worked-ou s o Odd-Numbered Eercises Do no read hese worked-ou s before aemping o do he eercises ourself. Oherwise ou ma mimic he echniques shown here wihou undersanding he ideas. Bes wa

More information

Permutations and Combinations

Permutations and Combinations Permuaions and Combinaions Combinaorics Copyrigh Sandards 006, Tes - ANSWERS Barry Mabillard. 0 www.mah0s.com 1. Deermine he middle erm in he expansion of ( a b) To ge he k-value for he middle erm, divide

More information

Chapter 1.6 Financial Management

Chapter 1.6 Financial Management Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1

More information

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783 Sock raing wih Recurren Reinforcemen Learning (RRL) CS9 Applicaion Projec Gabriel Molina, SUID 555783 I. INRODUCION One relaively new approach o financial raing is o use machine learning algorihms o preic

More information

S&P 500 Dynamic VIX Futures Index Methodology

S&P 500 Dynamic VIX Futures Index Methodology S&P 500 Dynamic VIX Fuures Index Mehodology April 2014 S&P Dow Jones Indices: Index Mehodology Table of Conens Inroducion 2 Highlighs 2 Family 2 Index Consrucion 3 Consiuens 3 Allocaions 3 Excess Reurn

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is he auhor s version of a work ha was submied/acceped for publicaion in he following source: Debnah, Ashim Kumar & Chin, Hoong Chor (2006) Analysis of marine conflics. In Proceedings of he 19h KKCNN

More information

A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT

A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT by Hui Zhang B.Sc., Insiuion of Informaion and Communicaion, Dong Hua Universiy, P. R. China, 1 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE

More information

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS R. Caballero, E. Cerdá, M. M. Muñoz and L. Rey () Deparmen of Applied Economics (Mahemaics), Universiy of Málaga,

More information

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya.

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya. Principal componens of sock marke dynamics Mehodology and applicaions in brief o be updaed Andrei Bouzaev, [email protected] Why principal componens are needed Objecives undersand he evidence of more han one

More information

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches A Scalable and Lighweigh QoS Monioring Technique Combining Passive and Acive Approaches On he Mahemaical Formulaion of CoMPACT Monior Masai Aida, Naoo Miyoshi and Keisue Ishibashi NTT Informaion Sharing

More information

Chapter 8 Student Lecture Notes 8-1

Chapter 8 Student Lecture Notes 8-1 Chaper Suden Lecure Noes - Chaper Goals QM: Business Saisics Chaper Analyzing and Forecasing -Series Daa Afer compleing his chaper, you should be able o: Idenify he componens presen in a ime series Develop

More information

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment Vol. 7, No. 6 (04), pp. 365-374 hp://dx.doi.org/0.457/ijhi.04.7.6.3 Research on Invenory Sharing and Pricing Sraegy of Mulichannel Reailer wih Channel Preference in Inerne Environmen Hanzong Li College

More information

Full-wave rectification, bulk capacitor calculations Chris Basso January 2009

Full-wave rectification, bulk capacitor calculations Chris Basso January 2009 ull-wave recificaion, bulk capacior calculaions Chris Basso January 9 This shor paper shows how o calculae he bulk capacior value based on ripple specificaions and evaluae he rms curren ha crosses i. oal

More information

9. Capacitor and Resistor Circuits

9. Capacitor and Resistor Circuits ElecronicsLab9.nb 1 9. Capacior and Resisor Circuis Inroducion hus far we have consider resisors in various combinaions wih a power supply or baery which provide a consan volage source or direc curren

More information

cooking trajectory boiling water B (t) microwave 0 2 4 6 8 101214161820 time t (mins)

cooking trajectory boiling water B (t) microwave 0 2 4 6 8 101214161820 time t (mins) Alligaor egg wih calculus We have a large alligaor egg jus ou of he fridge (1 ) which we need o hea o 9. Now here are wo accepable mehods for heaing alligaor eggs, one is o immerse hem in boiling waer

More information

The Grantor Retained Annuity Trust (GRAT)

The Grantor Retained Annuity Trust (GRAT) WEALTH ADVISORY Esae Planning Sraegies for closely-held, family businesses The Granor Reained Annuiy Trus (GRAT) An efficien wealh ransfer sraegy, paricularly in a low ineres rae environmen Family business

More information

Mathematics in Pharmacokinetics What and Why (A second attempt to make it clearer)

Mathematics in Pharmacokinetics What and Why (A second attempt to make it clearer) Mahemaics in Pharmacokineics Wha and Why (A second aemp o make i clearer) We have used equaions for concenraion () as a funcion of ime (). We will coninue o use hese equaions since he plasma concenraions

More information

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar Analogue and Digial Signal Processing Firs Term Third Year CS Engineering By Dr Mukhiar Ali Unar Recommended Books Haykin S. and Van Veen B.; Signals and Sysems, John Wiley& Sons Inc. ISBN: 0-7-380-7 Ifeachor

More information

Cointegration: The Engle and Granger approach

Cointegration: The Engle and Granger approach Coinegraion: The Engle and Granger approach Inroducion Generally one would find mos of he economic variables o be non-saionary I(1) variables. Hence, any equilibrium heories ha involve hese variables require

More information

A Resource Management Strategy to Support VoIP across Ad hoc IEEE 802.11 Networks

A Resource Management Strategy to Support VoIP across Ad hoc IEEE 802.11 Networks A Resource Managemen Sraegy o Suppor VoIP across Ad hoc IEEE 8.11 Neworks Janusz Romanik Radiocommunicaions Deparmen Miliary Communicaions Insiue Zegrze, Poland [email protected] Pior Gajewski, Jacek

More information

Individual Health Insurance April 30, 2008 Pages 167-170

Individual Health Insurance April 30, 2008 Pages 167-170 Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve

More information