Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting

Size: px
Start display at page:

Download "Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting"

Transcription

1 161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN ; ISSN The Italan Assocaton of Chemcal Engneerng Onlne at DOI: 1.333/CET Applcaton of an Improved BP Neural Networ Model n Enterprse Networ Securty Forecastng Xun Chen *a, b, Lsheng Xu a, Meng Xu a a College of Geology and Envronment Central South Unversty, Changsha 4183, Chna; b Changsha Aeronautcal Vocatonal and Techncal College, Changsha 4114, Chna sy115baby@163.com In recent years, wth the rse of the global networ, the Internet technology as the core of large enterprse networ system s developng rapdly. It s wdely used n the feld of electronc commerce, nformaton servce, networ communcaton and other techncal means. At the same tme, the problem of networ securty has become ncreasngly promnent. Due to hstorcal and techncal reasons, the securty system of enterprse networ s stll very wea n Chna. The networ basc software and hardware s stll use a large number of foregn products, and the core of the networ securty technology cannot be fully mastered. So, the securty rss are obvous. Therefore, strengthenng the constructon of enterprse networ securty system and researchng the safe applcaton model has become the top prorty of our country's enterprse nformaton technology. Based on ths, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months. The score s.85,.88 and.91, whch s close to the actual value of networ securty. 1. Introducton In recent years, wth the rse of the global networ, the Internet technology as the core of large enterprse networ system s developng rapdly. It s wdely used n the feld of electronc commerce, nformaton servce, networ communcaton and other techncal means. At the same tme, the problem of networ securty has become ncreasngly promnent. Due to hstorcal and techncal reasons, the securty system of enterprse networ s stll very wea n Chna. The networ basc software and hardware s stll use a large number of foregn products, and the core of the networ securty technology can not be fully mastered. So, the securty rss are obvous. Therefore, strengthenng the constructon of enterprse networ securty system and researchng the safe applcaton model has become the top prorty of our country's enterprse nformaton technology. Networ securty rs predcton s an mportant component of networ securty awareness (Chna Internet Networ Informaton Center 1 and 13). At present, the most common methods of predcton are as follows. Grey theory method. In recent years, the applcaton of gray theory has been etended to many scentfc felds, such as envronment, clmate, health, medcal care, populaton and so on. In the area of networ securty, there are many research results ((Deng Julong (), Wang Cayn (13), Pu Tanyn (9), and Zheng Jelang (5)). The theory uses the sequences whch are generated by the orgnal sequence of the system to determne the best fttng curve, and t can effectvely deal wth the less data sample system. Tme seres method. Tme seres forecastng method reveals the rule of the phenomenon wth tme varaton, and ths rule s etended to the future, so as to realze the predcton of the phenomenon n the future (Yang Zhongjn (6), Guo Mngyue (9), Chang Tahua (1), and Zhang Jnghu (1)). Neural networ method. Neural networ s a nd of method to smulate human's cogntve process, whch s a nd of nonlnear dynamc system of nformaton dstrbuted storage and parallel processng. Its essence s a nd of Please cte ths artcle as: Chen X., Xu L.S., Xu M., 15, Applcaton of an mproved bp neural networ model n enterprse networ securty forecastng, Chemcal Engneerng Transactons, 46, DOI:1.333/CET154611

2 16 nonlnear functon that represents the relatonshp between the nput value and the output value. Forecastng methods based on neural networs have many advantages, such as good nonlnear, dstrbuted and selforganzng learnng. It has good practcal value n mult varable forecastng and nonlnear forecastng. But the neural networ s a blac bo forecastng method, whch can only be used to ft the system's nput and output data. Therefore, the relatonshp between nput value and the output value s not clearly descrbed, and the results cannot be eplaned reasonably (Tang Chenghua (9), Xe La, Ca (13) Zhpng (8) and Xu Fuyong (5)). Based on ths, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months.. Neural networ model BP algorthm not only has the nput layer node, the output layer node, but also has one or more hdden layer nodes. Frstly, the nput sgnal s propagated forward to the hdden layer node. After the functon of the ectaton functon, the output sgnal of the hdden layer node s transmtted to the output layer node. Fnally,we get the output results. The S type functon s usually selected as the node's ectaton functon, whch s shown below; 1 f( ) 1 e Q (1) Here, Q s the Sgmod parameter, whch s prmarly responsble for the form of the ectaton functon. The learnng process of the algorthm s composed of forward propagaton and bacward propagaton. In the process of forward propagaton, the nput nformaton s processed by the hdden layer and the nformaton s transmtted to the output layer. Each layer of neurons only affects the state of the neurons n the net layer. If the output layer cannot get the epected output value, the algorthm s transferred to the process of the bac propagaton. In ths process, the error sgnal s returned along the orgnal path. By modfyng the weghts of each layer, the system error can be mnmzed. Set up any networ contanng n nodes, the characterstcs of each node are Sgmod type. For smplcty, the networ has only one output value whch s y. The output value of th node s O. The number of sample s N, ( 1,,, N) node net. For a node, the nput value s and the output value s O, and the nput of the j th node s: j y, the output value of th W O () We defne the error functon as: 1 E y y N ( ˆ ) (3) 1 Where, y ˆ s the actual output value of the networ. Defne Therefore, E y yˆ ( ), net E E E E O O Wj net Wj net and O f ( net ) net. (4) When j s the output node, O yˆ

3 163 E yˆ ' ( y y ) f ( net ) yˆ net ˆ (5) When j s not the output node, E E O E f ' ( net ) net O net O (6) E E net E E W O W W O net O net O net (7) m m mj m mj m m m m m m m Therefore, f ' ( net ) W m mj m E W j O m (8) 3. Improvement of BP networ The settng of the ntal weght and the threshold of the memory. One of the man problems of the BP neural networ model s the slow convergence speed and the length of the teraton tme. Through a large number of practcal applcatons, the ntal weghts and thresholds of BP neural networ can be randomly selected, the convergence speed of BP neural networ s greatly affected by the method. Some scholars put forward the correspondng ntal weghts and threshold selecton method, and they have acheved some results n the feld of ther research. On ths bass, ths artcle proposes a new method of the ntal smooth weght and threshold of memory. Methods are as follows: w1 ( ) Rnd( ) 1 ( ) Rnd( ) (9) w ( ) Rnd( ) ( ) Rnd( ) (1) w 1( ) w( ) w () 1( ) ( ) () 3,4,, N (11) Where, The ntal weghts for the th BP networ operaton s operaton s, the termnaton weghts for the 1 th BP networ operaton s threshold for the 1 th BP networ operaton s Smulaton eperment and result analyss w, the threshold for the th BP networ w 1, and the termnaton 4.1 Networ securty evaluaton nde system Networ and nformaton system s a comple system engneerng, whch ncludes the eternal factors and the nternal factors, and they are mutually restrcted. Therefore, we must have a standard, unfed, objectve crtera to measure networ securty. Accordng to the domestc and foregn networ securty evaluaton standard, and the basc requrements of the networ and nformaton system securty, we should fully consder the varous factors that affectng the securty of the networ, such as physcal securty factor, operaton safety factor, nformaton securty factors, system securty polcy and safety techncal measures. Therefore, we gve the networ securty evaluaton nde system. As shown n table 1:

4 164 Table 1: The networ securty evaluaton nde system Frst level nde Second level nde safety nde Varable Equpment safety X1 physcal securty Envronmental safety X Meda securty X3 Rs analyss X4 operaton safety Access control measures Audt measures X5 X6 Emergency technology X7 networ securty nformaton securty Informaton transmsson securty Defense Technology Data ntegrty X8 X9 X1 Data encrypton X11 Applcaton software X1 system securty polcy User dentty authentcaton X13 Data remote bacup X14 safety measures techncal Securty audt functon Ant hacng measures X15 X16 4. Data pre-processng of networ securty nde Table 1 reflects the securty of computer networs from dfferent angles. As the dmensons of the varous ndcators are dfferent, so we cannot mae a drect comparson. In order to mae the nde have comparablty, and to speed up the convergence rate of the neural networ, ths paper has carred on the normalzed processng to each nde: 1) for qualtatve ndcators: usng epert scorng method to determne ts data, and we have a normalzed treatment of varous ndcators. ) for quanttatve ndcators: the followng formula s used to normalze. ma mn mn Where, the normalzed values for the th ndcator s, the mnmum value of the th ndcator s the mamum value of the th ndcator s ma. (1) mn, and 4.3 Smulaton eperment In ths paper, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. As the neural networ model of ths paper s a 16-X-1 model, we carry out the tranng of the sample accordng to prncple. The prncple s that the number of nodes n the hdden layer s 3/4 of the number of nodes n the nput layer. We try to set the number of nodes n the hdden layer to 11,1 and 13. From the results of tranng, t can be nown that the number of hdden layer nodes s X=1, and the system fttng resdual s the smallest.

5 165 Fgure 1: The number of hdden layer nodes s 11 n neural networ tranng Fgure : The number of hdden layer nodes s 1 n neural networ tranng Fgure 3: The number of hdden layer nodes s 13 n neural networ tranng It can be seen from the test results of fgure 1-3, the node number and the ntal value n ths paper can effectvely shorten the convergence perod, accelerate the tranng speed, and mae the fttng precson of the resdual error reach the hghest. Fnally, we use ths algorthm to predct the networ securty of a certan enterprse n the net three months, the score s.85,.88 and.91, whch s close to the actual value of networ securty.

6 Conclusons In ths artcle, we propose a smoothng method to mprove the ntal weghts and the ntal threshold, and use a test method to select the hdden layer node number of neural networ. So, we can mnmze the fttng error of the tranng. In addton, the computer networ securty data of an enterprse s selected, and all the ndees are scored by the eperts. The result of the scorng s the nput value of the mproved BP neural networ. References Ca Z.P., Lu F., 8, Securty rs probablty forecastng model based on neural networ [J].Computer scence, 35 (1): Chang T.H., Xu R.Z., Lv G.J., 1, Study on the method of networ securty stuaton predcton based on tme seres [J]. Practce and cognton of mathematcs, 4 (1): Chna Internet Networ Informaton Center. 13. Statstcal report on Internet development n Chna. 13. Chna Internet Networ Informaton Center. 1. Statstcal report on Internet development n Chna. 1. Deng J.L.,, Gray Theory [M]. Wuhan: Huazhong Unversty of Scence & Technology Press Co., Ltd. Guo M.Y., Xao Z.H., 9, Tme seres analyss and SAS applcaton [M]. Wuhan: Wuhan Unversty press. Insttute C S. 1/11 CSI Computer Crme and Securty Survey, Natonal Internet Emergency Center. 11 Chna Internet Networ Securty Report. tml. Pu T.Y., 9, Probe on the Networ Securty Stuatonal Awareness Model Based on the Gray Theory [D]. Changsha: Hunan Unversty. Tang C.H., Yu S.Z., 9, Method of Networ Securty Stuaton Predcton Based on Lelhood BP [J]. Computer Scence, 36(11): Wang C.Y., 13, Assessment of Networ Securty Stuaton Based on Grey Relatonal Analyss and Support Vector Machne [J]. Applcaton Research of Computer, 3(6): Xe L.X., Wang Y.C., Yu J.B., 13, Networ Securty Stuaton Awareness Based on Neural Networ [J]. Journal of Tsnghua Unversty: Scence and Technology, 53(1): Xu F.Y., Shen J., L J.Y., 15, based on Delph and ANN networ securty comprehensve evaluaton method research [J]. Mcrocomputer development, 15 (1): Yang Z.J., 6, Analyss and predcton of tme seres [J]. Chna Scence and technology nformaton, (14): Zhang J.H., Wang G., Wu N., 1, Applcaton of networ securty stuaton predcton method [J]. Computer smulaton, 9 (): Zheng J.L., 5, Research on networ nformaton securty assessment model based on Grey Theory [D]. Nanjng Unversty of Informaton Scence and Technology, 5 (5):

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Sequential Optimizing Investing Strategy with Neural Networks

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Sequential Optimizing Investing Strategy with Neural Networks MATHEMATICAL ENGINEERING TECHNICAL REPORTS Sequental Optmzng Investng Strategy wth Neural Networks Ryo ADACHI and Akmch TAKEMURA METR 2010 03 February 2010 DEPARTMENT OF MATHEMATICAL INFORMATICS GRADUATE

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract

Lei Liu, Hua Yang Business School, Hunan University, Changsha, Hunan, P.R. China, 410082. Abstract , pp.377-390 http://dx.do.org/10.14257/jsa.2016.10.4.34 Research on the Enterprse Performance Management Informaton System Development and Robustness Optmzaton based on Data Regresson Analyss and Mathematcal

More information

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,

More information

Time Delayed Independent Component Analysis for Data Quality Monitoring

Time Delayed Independent Component Analysis for Data Quality Monitoring IWSSIP 1-17th Internatonal Conference on Systems, Sgnals and Image Processng Tme Delayed Independent Component Analyss for Data Qualty Montorng José Márco Faer Sgnal Processng Laboratory, COE/Pol Federal

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

A Study on Secure Data Storage Strategy in Cloud Computing

A Study on Secure Data Storage Strategy in Cloud Computing Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Selecting Best Employee of the Year Using Analytical Hierarchy Process

Selecting Best Employee of the Year Using Analytical Hierarchy Process J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

Development of an intelligent system for tool wear monitoring applying neural networks

Development of an intelligent system for tool wear monitoring applying neural networks of Achevements n Materals and Manufacturng Engneerng VOLUME 14 ISSUE 1-2 January-February 2006 Development of an ntellgent system for tool wear montorng applyng neural networks A. Antć a, J. Hodolč a,

More information

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns

A study on the ability of Support Vector Regression and Neural Networks to Forecast Basic Time Series Patterns A study on the ablty of Support Vector Regresson and Neural Networks to Forecast Basc Tme Seres Patterns Sven F. Crone, Jose Guajardo 2, and Rchard Weber 2 Lancaster Unversty, Department of Management

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

The Network flow Motoring System based on Particle Swarm Optimized

The Network flow Motoring System based on Particle Swarm Optimized The Network flow Motorng System based on Partcle Swarm Optmzed Neural Network Adult Educaton College, Hebe Unversty of Archtecture, Zhangjakou Hebe 075000, Chna Abstract The compatblty of the commercal

More information

León, Monterrey, Nuevo León, MÉXICO 4

León, Monterrey, Nuevo León, MÉXICO 4 Statstcal Characterzaton and Optmzaton of Artfcal Neural Networks n Tme Seres Forecastng: The One-Perod Forecast Case Caracterzacón Estadístca y Optmzacón de Redes Neuronales Artfcales para Pronóstco de

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index

Set. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A spam filtering model based on immune mechanism

A spam filtering model based on immune mechanism Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png

More information

Modelling of Web Domain Visits by Radial Basis Function Neural Networks and Support Vector Machine Regression

Modelling of Web Domain Visits by Radial Basis Function Neural Networks and Support Vector Machine Regression Modellng of Web Doman Vsts by Radal Bass Functon Neural Networks and Support Vector Machne Regresson Vladmír Olej, Jana Flpová Insttute of System Engneerng and Informatcs Faculty of Economcs and Admnstraton,

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

Using Association Rule Mining: Stock Market Events Prediction from Financial News

Using Association Rule Mining: Stock Market Events Prediction from Financial News Usng Assocaton Rule Mnng: Stock Market Events Predcton from Fnancal News Shubhang S. Umbarkar 1, Prof. S. S. Nandgaonkar 2 1 Savtrba Phule Pune Unversty, Vdya Pratshtan s College of Engneerng, Vdya Nagar,

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Partner selection of cloud computing federation based on Markov chains

Partner selection of cloud computing federation based on Markov chains COMPUER MODELLING & NEW ECHNOLOGIES 2014 18(12B) 590-594 Abstract Partner selecton of cloud computng federaton based on Markov chans Lang Hong 1,2, Changyuan Gao 1* 1 School of Management, Harbn Unversty

More information

Sciences Shenyang, Shenyang, China.

Sciences Shenyang, Shenyang, China. Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng

More information

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Optimal allocation of safety and security resources

Optimal allocation of safety and security resources 397 A publcaton of VOL. 31, 2013 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Eddy De Rademaeker, Bruno Fabano, Smberto Senn Buratt Copyrght 2013, AIDIC Servz S.r.l., ISBN 978-88-95608-22-8; ISSN 1974-9791

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

Data Mining Analysis and Modeling for Marketing Based on Attributes of Customer Relationship

Data Mining Analysis and Modeling for Marketing Based on Attributes of Customer Relationship School of athematcs and Systems Engneerng Reports from SI - Rapporter från SI Data nng Analyss and odelng for arketng Based on Attrbutes of Customer Relatonshp Xaoshan Du Sep 2006 SI Report 06129 Väö Unversty

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Capturing Dynamics in the Power Grid: Formulation of Dynamic State Estimation through Data Assimilation

Capturing Dynamics in the Power Grid: Formulation of Dynamic State Estimation through Data Assimilation PNNL-2323 Prepared for the U.S. Department of Energy under Contract DE-AC5-76RL83 Capturng Dynamcs n the Power Grd: Formulaton of Dynamc State Estmaton through Data Assmlaton N Zhou Z Huang D Meng S Elbert

More information

Resource Sharing Models and Heuristic Load Balancing Methods for

Resource Sharing Models and Heuristic Load Balancing Methods for Resource Sharng Models and Heurstc Load Balancng Methods for Grd Schedulng Problems Wanneng Shu 1,2, Lxn Dng 2,3,*, Shenwen Wang 2,3 1 College of Computer Scence, South-Central Unversty for Natonaltes,

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Binomial Link Functions. Lori Murray, Phil Munz

Binomial Link Functions. Lori Murray, Phil Munz Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

Preventive Maintenance and Replacement Scheduling: Models and Algorithms

Preventive Maintenance and Replacement Scheduling: Models and Algorithms Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the

More information

A Study on Security Technique of Cloud Data Processing in Electronic Commerce

A Study on Security Technique of Cloud Data Processing in Electronic Commerce Internatonal Journal of Securty and Its Applcatons, pp.283-290 http://dx.do.org/10.14257/sa.2014.8.2.29 A Study on Securty Technque of Cloud Data Processng n Electronc Commerce We Da 1, Xuefang Zhang 2

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

CONSTRUCTING A SALES FORECASTING MODEL BY INTEGRATING GRA AND ELM:A CASE STUDY FOR RETAIL INDUSTRY

CONSTRUCTING A SALES FORECASTING MODEL BY INTEGRATING GRA AND ELM:A CASE STUDY FOR RETAIL INDUSTRY Internatonal Journal of Electronc Busness Management, Vol. 9, o. 2, pp. 107-121 (2011) 107 COSTRUCTIG A SALES FORECASTIG MODEL BY ITEGRATIG GRA AD ELM:A CASE STUDY FOR RETAIL IDUSTRY Fe-Long Chen and Tsung-Yn

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

Product Quality and Safety Incident Information Tracking Based on Web

Product Quality and Safety Incident Information Tracking Based on Web Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,

More information

Automobile Demand Forecasting: An Integrated Model of PLS Regression and ANFIS

Automobile Demand Forecasting: An Integrated Model of PLS Regression and ANFIS Automoble Demand Forecastng: An Integrated Model of PLS Regresson and ANFIS 1 SUN Bao-feng, 2 L Bo-ln, 3 LI Gen-dao, 4 ZHANG Ka-mng 1. College of Transportaton, sunbf@jlu.edu.cn 2. College of Transportaton,

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System

Mining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System Mnng Feature Importance: Applyng Evolutonary Algorthms wthn a Web-based Educatonal System Behrouz MINAEI-BIDGOLI 1, and Gerd KORTEMEYER 2, and Wllam F. PUNCH 1 1 Genetc Algorthms Research and Applcatons

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Study on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model

Study on the Competitiveness of the Software Outsourcing Industry in Jilin Province Based on Diamond Model Study on the Compettveness of the Software Outsourcng Industry n Jln Provnce Based on Damond Model LIU Lqn School of Busness Admnstraton, Changchun Unversty of Technology, Changchun, 130012 lulqn2002@xnhuanet.com

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols

An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Different Methods of Long-Term Electric Load Demand Forecasting; A Comprehensive Review

Different Methods of Long-Term Electric Load Demand Forecasting; A Comprehensive Review Dfferent Methods of Long-Term Electrc Load Demand Forecastng; A Comprehensve Revew L. Ghods* and M. Kalantar* Abstract: Long-term demand forecastng presents the frst step n plannng and developng future

More information

Improved Mining of Software Complexity Data on Evolutionary Filtered Training Sets

Improved Mining of Software Complexity Data on Evolutionary Filtered Training Sets Improved Mnng of Software Complexty Data on Evolutonary Fltered Tranng Sets VILI PODGORELEC Insttute of Informatcs, FERI Unversty of Marbor Smetanova ulca 17, SI-2000 Marbor SLOVENIA vl.podgorelec@un-mb.s

More information