Software reliability analysis of laptop computers

Size: px
Start display at page:

Download "Software reliability analysis of laptop computers"

Transcription

1 Software reliability analysis of laptop computers W. Wang* and M. Pecht** *Salford Business School, University of Salford, UK, ** PHM Centre of City University of Hong Kong, Hong Kong, Abstract. Computers freezing to work is a common problem and can cause unexpected damages if the work is important but not saved yet. This kind of problems is often caused by software failures which are hard to predict. This paper focuses on the reliability analysis of laptop computers experiencing multiple occurrences of failures in operation. The failure has been defined as the event that the computer freezes and has to be restarted unintended or by a forced re-start. The failure data was collected during three experiments running on one laptop computer continuously for a period of time under three different running environments. We fit a number of candidate distributions to the time between failures data. The results showed that the conventional Weibull distribution often used in practice is the best choice for all three data sets. However one interesting finding is that the mean time between failures decreases substantially when the computer is heavily stressed. This shows that if the computer is running on a full load, then the work should be frequently saved to avoid the damage.. Introduction Reliability is defined as the ability of a product to perform as intended (without failure and within specified performance limits) for a specified time period, in its life cycle application environment, Pecht et al. (). A product s health is a description of the state under its specified operating environment. Health monitoring is a method for evaluating a product s health as a means to determine whether and when failure will occur, Ramakrishnan and Pecht (3). We focus specifically laptop computers as the product we refer to in this paper since they are now almost household items widely used by both private individuals and companies. For laptop computers, hardware degradation is difficult to detect due to the complexity of the hardware, consisting of various sub-systems assembled together. One approach used by Vichare et al. was to monitor internal temperatures of laptop computers for health and usage monitoring, Vichare et al. (4). However, laptop computers can fail due to hardware or software failures. Hardware failures are rare though they do occur, but software failures as defined in the abstract are common things observed by virtually everyone who has used laptop computers. Because of the complexity associated with various software installed, the laptop computer is treated as a single system and we are interested in the reliability characteristics of software failures of laptop computers. A primary objective of the paper is to identify whether different intensities of usages influence the time to failure and what is the best distribution for describing the software failures. For the above objective, we designed and conducted a number of experiments to verify whether the intensity of the use of laptop computers do influnnce the software failure characteristics. Anoter objective is to find whether the failure rate is increasing, constant or decreasing. We examined eight field-returned laptop computers which were sent back to the manufacturer by the users who reported having problems with them. The manufacturer tested these computers and found no problems. These computers are of different models and have different system configurations such as processor speed, hard drive space, RAM, etc. Different experiments were designed via stressing the computers. Stressing was done by running different applications under different scenarios on these computers. Two of the eight computers showed multiple failures (as defined in the abstract and also in section ), but others did not. The different performance by these 8 laptop computers might be due to the different configurations and quality of hardware. Since we cannot wait to get sufficient data from each of the 8 computers, analysis for one computer that showed repeated failures is performed and shown in this paper. This may limit our conclusions to this type of computers only but the analysis nevertheless showed some interesting finding. Our hypothesis was that each computer would fail when stressed by using a set of specific applications. Applications that use different levels of memory and processing capability were selected for the experiments. Various applications were run at the same time to cause the CPU of the computer to work at diffeent levels of capacity. The belief was that the intensively used CPU would force the computer to restart or freeze more often.. Failure identification and determination For the purposes of this study we have defined the failure of a laptop as an automatic restart or a forced restart after the system freezes. If the laptop was to restart by itself, it would be considered an automatic

2 restart. If the computer was not to respond to the commands given by the user and the user was forced to restart the computer to resume the operation, this would be considered a forced restart. A forced restart can be triggered by a system lockdown. In this study, other types of computer failures such as faulty screen, or faulty keyboard, etc are not considered. The times of failure are determined by failure identifier events. Failure identifier events are event messages that are generated by the event log service, an inbuilt logging service in MS Windows, after a restart. The benchmark event used is the EventSystem, which is logged every time the computer restarts. Hence, the occurrence of this event is determined from the data and a gap in time is manually searched to find the time of failure. To understand this, a sample data record is shown below in Table to illustrate the process. Level Date and Time Source Error 4/9/ 5:9:7 Usbperf Information 4/9/ 5::5 User Profile Service Information 4/9/ 5::5 Security-Licensing- SLC Information 4/9/ 5::5 EventSystem Information 4/9/ 5::55 Desktop Window Manager Table Sample of Event Log Data In Table, EventSystem (or alternatively Microsoft-Windows-EventSystem) is found. The time it logged was not the time of failure, but is the time when the computer restarted. Hence, the time when the computer actually froze is found by scanning the data upwards to see a gap in time. At 4/9/ 5:9:7, a gap of around one and a half minutes occurred after the event usbperf. It is assumed that this was the actual time when the computer froze and is designated as the time of failure. The time stamp occurring after it (4/9/ 5::5. EventSystem) is chosen as the start time for the next lifetime. This is done so that we do not count the durations when the computer froze and there is a big gap in time if the user was not present to manually restart the computer. After determining the start time and end time in the lifetime of a computer, the times to failures and time between failures can be found. 3. Experiments We designed three experiments corresponding to three different user environments. 3. Experiment A specific set of applications were identified for this experiment to simulate a user behavior. The applications include Matlab (mathematical tool), Excel (office tool), Real Player (video playback software), and Internet Explorer (web browsing tool). These applications were initiated manually, and if idle, they were re-run at random. For example, when Excel had finshied an application, it may be re-run some time later by a code set-up by us ramdonly selecting the time to restart the same application. This also applies to other application such as playing video and running a Matlab code. Clearly in this experiment, the applications were not run in any specified order and had various level of stressing at various times. There could be times no application was running or all were running at the same time. This is perhaps the most closed situation to an actual user operation. The test computers were kept in room temperature and humidity. The time of failures were found by scanning the data for failure identifier events. Data were collected between /3/ and 4/6/. This amounted to 7446 minutes for the experiment. During this time period, there were a total of 8 failures in computer Experiment Experiment focused on stressing the computers under a more controlled setting. The test computers were stressed by the Matlab application which ran several specified codes in a loop with various uses of the CPU capacity. The Internet access had been cut off so that other applications running by default in the background could not communicate with the Internet. This experiment simulated a user behavior that ran only one application extensively which used up a lot of memory. The test computers were at room temperature and humidity. Data were collected between 4/8/ and 4/3/. During this time, there were a total of 4 failures from computer 4.

3 Time between failures Experiment 3 Experiment 3 was an extension of experiment. In experiment 3, the computer automatically started the Matlab application and ran a specified code in a loop whenever the compute was rebooted. This code was taken from experiment, which has the highest use of the CPU capacity. The aim of experiment 3 was to generate failures that were all associated with the same stressing as a result of running Matlab with a more intensive use of the CPU than experiment. This gave the computer continuous stressing at the same but higher level of processing usage. Data were collected between 5/7/ and 5//. During this period, Time to failure there were a total of 9 failures in computer Failure analysis In this study, we fitted the following four distributions to the time between failure (TBF) data of three experiments using the maximum likelihood estimation method. They are Weibull,, and Exponential. The best suited distribution may be selected by the AIC measure, Akaike (98), which is given by AIC = l + N, () where l is the log-likelihood function value at the maximum and N is the number of estimated parameters. The use of AIC balances the log-likelihood value with the number of parameters. The one gives the lowest AIC is the best distribution fitted to the data. 4. Experiment Table shows the result from the data of experiment. Distribution Weibull β x α α β x β α e x α x e β α α β Γ( ) log( ) x α β e xβ π Exponential x e α α Estimated α = α =.5 α = α = parameter values β =.657 β = β =.9388 Mean Loglikelihood AIC χ Cannot be Cannot be Cannot be Can be rejected rejected rejected rejected Table : Estimated parameter values, means and goodness of fit measures from experiment From table we can see that the distribution is the best in terms of the AIC. It is obviously since it has the highest log-likelihood which is another measure of the goodness of fit. The total duration of the experiment is 7446 minutes and there were 8 failures for experiment. If we use the independent and identical PDF assumption for the TBF, then using the renewal theory, Cox (96), the expected number of failures over the experiment period can be approximated by 7446 divided by the mean time between failures. From Table, we have E(TBF)=98.45 from the chosen distribution and therefore, the expected number of failures over 7446 minutes is which is not far from the observed number of 8. However, if we choose the exponential distribution we even get a better fit in terms of the difference between the fitted and observed mean numbers of failures. This is because the mean produced by the exponential distribution will be the same to the averaged mean time between failures from the data. However, it can be miss- leading if we only look at the mean numbers. Now we use another goodness of fit test to decide which distribution should be chosen. This is the Chi-Squared test of goodness of fit given below, Corder and Foreman (9), n i χ = = ( Oi Ei ) / Ei (), where the observed failure data is arranged into bins to form a histogram and O i and Ei denote the observed and expected number of failures within the ith bin and n is the number of total bins. We used the statistical tool box in the Matlab to perform this task and the result showed that the exponential distribution can be

4 rejected at the 5% confidence level, see Table. The other three distributions cannot be rejected but the Weibull produced the smallest Chi-Squared value, and therefore from this statistic, we choose the Weibull distribution. It is clearly that different criterions produced different results, but it is generally accepted that Chi-Squared statistic is a better measure for goodness of fit than the AIC since it uses more information from the data. Using the Weibull distribution we have E(TBF)=93.63 and then the mean number of failures over the experiment period is 79.9 which is very close to the observed 8 failures. Figure shows the Probability Density Functions (PDF) of these four fitted distributions x -3 4 Weibull Exponen Figure. PDFs of TBF of four distributions for experiment The, Weibull and PDFs showed similar shapes but the exponential PDF is no near closer to them. 4. Experiment Table 3 shows the result of the parameter estimation based on the data of experiment. Distribution Weibull Exponential Estimated α =.893 α =.3 α = α = parameter value β =.47 β =.5 β =.7846 Mean Loglikelihood AIC χ Cannot be Cannot be Cannot be Cannot be rejected rejected rejected rejected Table 3: Estimated parameter values, means and goodness of fit measures from experiment From table 3 we can see that also produced the best fit in terms of the AIC. But the same as experiment and if we use the Chi-Squared measure then Weibull is again the best choice as seen from Table 3. The experiment lasted 453 minutes and produced 4 failures. Following the same way we did for experiment and using the mean of 54.4 from the Weribull distribution, we have the expected number of failures over the experiment period is 56., which is not very good since we have observed 4 failures from the data. However, we have to note the sample size is small in this experiment and comparing just with means can be misleading as we have said before since an exponential distribution will always produce the best fit in terms of the means. We show the PDFs of these four distributions in Figure which shows that again the exponential distribution is singled out from the competition.

5 4.5 5 x -3 4 Weibull Exponen Figure. PDFs of TBF of four distributions for experiment 3.3 Experiment 3 In a similar way, Table 4 shows the fitted result based on the data of experiment 3. In this case lognormal should be chosen since it has the smallest AIC. But in terms of the Chi-Squared statistic, we have again the Weibull which produced the smallest χ so we chose Weibull as our distribution. Using the same method as before we have that the expected number of failures using the Weibull distribution is 6.8. Distribution Weibull Exponential Estimated α = α =.667 α = α = 5. parameter value β =.787 β = β =.84 Mean Loglikelihood AIC χ Cannot be Cannot be Cannot be Cannot be rejected rejected rejected rejected Table 4. Estimated parameter values, means and goodness of fit measures We plot the PDFs of these four distributions in Figure x -3 4 Weibull Exponen

6 Figure 3. PDFs of the TBF of four distributions for experiment 3 In this case all PDFs are similar but the means are considerably shorter than the ones in Figures and. We then examined the hazard for the chosen PDF from each experiment. They are shown in Figure Expt Expt Expt Figure 9. Hazard plot for the chosen PDF of each experiment We can see clearly that the hazards from all experiments decrease. This is not surprising since the hazard for the Weibull distribution when the shape parameter α< is always decreasing. This implies that the probability of the chance failure when the laptop already survived a while is getting smaller and smaller as the time goes. However, the hazard of experiment 3 is larger than experiment which is larger than experiment. This shows that intensive use of CPU will produce more failures. 5. Conclusions Experiments were designed to study the reliability of laptop computers. It was hypothesized that stressing the computers using various applications would cause it to restart or freeze, resulting in a failure. These failures were analyzed. The model parameters were estimated using the maximum likelihood method and two measures of the model fit were used to select the best model. It turned out that AIC is not a informative measure in this analysis since all models were not involved with a large number of unknown parameters. Eventually we used the Chi-Squared statistic to select the best model. From the analysis, Weibull was chosen for all three experiments since this distribution produced the smallest Chi-Squared values in all three experiments. However, the analysis shows that applying different stressing at different levels did produce different results with notable differences. The expected time to failures from the fitted model and observations show a clear trend in that the means are getting shorter when the stress increases. References Pecht, M., Das, D., and Ramakrishnan, A., (), The IEEE standards on reliability program and reliability prediction methods for electronic equipment, Microelectronics Reliability, 4, Ramakrishnan, A., and Pecht, M., (3), A life consumption monitoring methodology for electronic systems, IEEE Trans. Components and Packaging Technologies, 6, Vichare, N., Rodgers, P., Eveloy, V., and Pecht, M., (4), In situ temperature measurement of a notebook computer A case study in health and usage monitoring of electronics, IEEE Trans. Device and Materials Reliability, 4, Akaike, H., (98), Likelihood and the Bayes procedure, Bayesian Statistics, Ed. Bernardo et. al., University Press. Cox, D.R., 96, Renewal theory, Methuen. Corder, G.W., and Foreman, D.I. (9), Nonparametric Statistics for Non-Statisticians: A Step-by-Step Approach, Wiley

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Topics in Assurance Related Technologies Table of Contents Introduction Some Statistical Background Fitting a Normal Using the Anderson Darling GoF Test Fitting a Weibull Using the Anderson

More information

Chapter 3 RANDOM VARIATE GENERATION

Chapter 3 RANDOM VARIATE GENERATION Chapter 3 RANDOM VARIATE GENERATION In order to do a Monte Carlo simulation either by hand or by computer, techniques must be developed for generating values of random variables having known distributions.

More information

Hardware Recommendations

Hardware Recommendations Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at

More information

Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania

Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania Modeling Individual Claims for Motor Third Party Liability of Insurance Companies in Albania Oriana Zacaj Department of Mathematics, Polytechnic University, Faculty of Mathematics and Physics Engineering

More information

ACTUARIAL MODELING FOR INSURANCE CLAIM SEVERITY IN MOTOR COMPREHENSIVE POLICY USING INDUSTRIAL STATISTICAL DISTRIBUTIONS

ACTUARIAL MODELING FOR INSURANCE CLAIM SEVERITY IN MOTOR COMPREHENSIVE POLICY USING INDUSTRIAL STATISTICAL DISTRIBUTIONS i ACTUARIAL MODELING FOR INSURANCE CLAIM SEVERITY IN MOTOR COMPREHENSIVE POLICY USING INDUSTRIAL STATISTICAL DISTRIBUTIONS OYUGI MARGARET ACHIENG BOSOM INSURANCE BROKERS LTD P.O.BOX 74547-00200 NAIROBI,

More information

Simple Linear Regression Inference

Simple Linear Regression Inference Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation

More information

Fairfield Public Schools

Fairfield Public Schools Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity

More information

DETERMINATION OF THE PERFORMANCE

DETERMINATION OF THE PERFORMANCE DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Determination of the Performance of Android Anti-Malware Scanners...

More information

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL

More information

How To Check For Differences In The One Way Anova

How To Check For Differences In The One Way Anova MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. One-Way

More information

Introduction to nonparametric regression: Least squares vs. Nearest neighbors

Introduction to nonparametric regression: Least squares vs. Nearest neighbors Introduction to nonparametric regression: Least squares vs. Nearest neighbors Patrick Breheny October 30 Patrick Breheny STA 621: Nonparametric Statistics 1/16 Introduction For the remainder of the course,

More information

Survival Analysis of Left Truncated Income Protection Insurance Data. [March 29, 2012]

Survival Analysis of Left Truncated Income Protection Insurance Data. [March 29, 2012] Survival Analysis of Left Truncated Income Protection Insurance Data [March 29, 2012] 1 Qing Liu 2 David Pitt 3 Yan Wang 4 Xueyuan Wu Abstract One of the main characteristics of Income Protection Insurance

More information

Statistics in Retail Finance. Chapter 6: Behavioural models

Statistics in Retail Finance. Chapter 6: Behavioural models Statistics in Retail Finance 1 Overview > So far we have focussed mainly on application scorecards. In this chapter we shall look at behavioural models. We shall cover the following topics:- Behavioural

More information

How To Calculate The Power Of A Cluster In Erlang (Orchestra)

How To Calculate The Power Of A Cluster In Erlang (Orchestra) Network Traffic Distribution Derek McAvoy Wireless Technology Strategy Architect March 5, 21 Data Growth is Exponential 2.5 x 18 98% 2 95% Traffic 1.5 1 9% 75% 5%.5 Data Traffic Feb 29 25% 1% 5% 2% 5 1

More information

MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables

MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables Tony Pourmohamad Department of Mathematics De Anza College Spring 2015 Objectives By the end of this set of slides,

More information

VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View

VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View Page 1 of 16 Introduction A Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end user experience and

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

Chapter 8 Hypothesis Testing Chapter 8 Hypothesis Testing 8-1 Overview 8-2 Basics of Hypothesis Testing

Chapter 8 Hypothesis Testing Chapter 8 Hypothesis Testing 8-1 Overview 8-2 Basics of Hypothesis Testing Chapter 8 Hypothesis Testing 1 Chapter 8 Hypothesis Testing 8-1 Overview 8-2 Basics of Hypothesis Testing 8-3 Testing a Claim About a Proportion 8-5 Testing a Claim About a Mean: s Not Known 8-6 Testing

More information

Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics

Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics For 2015 Examinations Aim The aim of the Probability and Mathematical Statistics subject is to provide a grounding in

More information

LOGISTIC REGRESSION ANALYSIS

LOGISTIC REGRESSION ANALYSIS LOGISTIC REGRESSION ANALYSIS C. Mitchell Dayton Department of Measurement, Statistics & Evaluation Room 1230D Benjamin Building University of Maryland September 1992 1. Introduction and Model Logistic

More information

Permutation Tests for Comparing Two Populations

Permutation Tests for Comparing Two Populations Permutation Tests for Comparing Two Populations Ferry Butar Butar, Ph.D. Jae-Wan Park Abstract Permutation tests for comparing two populations could be widely used in practice because of flexibility of

More information

Statistical Analysis of Life Insurance Policy Termination and Survivorship

Statistical Analysis of Life Insurance Policy Termination and Survivorship Statistical Analysis of Life Insurance Policy Termination and Survivorship Emiliano A. Valdez, PhD, FSA Michigan State University joint work with J. Vadiveloo and U. Dias Session ES82 (Statistics in Actuarial

More information

Gamma Distribution Fitting

Gamma Distribution Fitting Chapter 552 Gamma Distribution Fitting Introduction This module fits the gamma probability distributions to a complete or censored set of individual or grouped data values. It outputs various statistics

More information

Modeling and Analysis of Call Center Arrival Data: A Bayesian Approach

Modeling and Analysis of Call Center Arrival Data: A Bayesian Approach Modeling and Analysis of Call Center Arrival Data: A Bayesian Approach Refik Soyer * Department of Management Science The George Washington University M. Murat Tarimcilar Department of Management Science

More information

SUMAN DUVVURU STAT 567 PROJECT REPORT

SUMAN DUVVURU STAT 567 PROJECT REPORT SUMAN DUVVURU STAT 567 PROJECT REPORT SURVIVAL ANALYSIS OF HEROIN ADDICTS Background and introduction: Current illicit drug use among teens is continuing to increase in many countries around the world.

More information

Detection of changes in variance using binary segmentation and optimal partitioning

Detection of changes in variance using binary segmentation and optimal partitioning Detection of changes in variance using binary segmentation and optimal partitioning Christian Rohrbeck Abstract This work explores the performance of binary segmentation and optimal partitioning in the

More information

Likelihood: Frequentist vs Bayesian Reasoning

Likelihood: Frequentist vs Bayesian Reasoning "PRINCIPLES OF PHYLOGENETICS: ECOLOGY AND EVOLUTION" Integrative Biology 200B University of California, Berkeley Spring 2009 N Hallinan Likelihood: Frequentist vs Bayesian Reasoning Stochastic odels and

More information

Anti Virus Software: Norton, McAfee, Trend Micro, or Hauri?

Anti Virus Software: Norton, McAfee, Trend Micro, or Hauri? Anti Virus Software: Norton, McAfee, Trend Micro, or Hauri? By: Relevant Technologies Executive Summary During the last several years, viruses have become increasingly more sophisticated. At the same time,

More information

MS SQL Performance (Tuning) Best Practices:

MS SQL Performance (Tuning) Best Practices: MS SQL Performance (Tuning) Best Practices: 1. Don t share the SQL server hardware with other services If other workloads are running on the same server where SQL Server is running, memory and other hardware

More information

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Performance analysis and comparison of virtualization protocols, RDP and PCoIP Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Sample Size and Power in Clinical Trials

Sample Size and Power in Clinical Trials Sample Size and Power in Clinical Trials Version 1.0 May 011 1. Power of a Test. Factors affecting Power 3. Required Sample Size RELATED ISSUES 1. Effect Size. Test Statistics 3. Variation 4. Significance

More information

Improved metrics collection and correlation for the CERN cloud storage test framework

Improved metrics collection and correlation for the CERN cloud storage test framework Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report

More information

Time Series Analysis

Time Series Analysis Time Series Analysis hm@imm.dtu.dk Informatics and Mathematical Modelling Technical University of Denmark DK-2800 Kgs. Lyngby 1 Outline of the lecture Identification of univariate time series models, cont.:

More information

Inference of Probability Distributions for Trust and Security applications

Inference of Probability Distributions for Trust and Security applications Inference of Probability Distributions for Trust and Security applications Vladimiro Sassone Based on joint work with Mogens Nielsen & Catuscia Palamidessi Outline 2 Outline Motivations 2 Outline Motivations

More information

A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic

A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic A Study to Predict No Show Probability for a Scheduled Appointment at Free Health Clinic Report prepared for Brandon Slama Department of Health Management and Informatics University of Missouri, Columbia

More information

7.1 The Hazard and Survival Functions

7.1 The Hazard and Survival Functions Chapter 7 Survival Models Our final chapter concerns models for the analysis of data which have three main characteristics: (1) the dependent variable or response is the waiting time until the occurrence

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

Technical Appendix to accompany Real-Time Evaluation of Email Campaign Performance

Technical Appendix to accompany Real-Time Evaluation of Email Campaign Performance Technical Appendix to accompany Real-Time Evaluation of Email Campaign Performance André Bonfrer, Xavier Drèze 1. Selecting the hazard function Researchers in marketing have used various specifications

More information

CHAPTER 14 NONPARAMETRIC TESTS

CHAPTER 14 NONPARAMETRIC TESTS CHAPTER 14 NONPARAMETRIC TESTS Everything that we have done up until now in statistics has relied heavily on one major fact: that our data is normally distributed. We have been able to make inferences

More information

Maximum Likelihood Estimation

Maximum Likelihood Estimation Math 541: Statistical Theory II Lecturer: Songfeng Zheng Maximum Likelihood Estimation 1 Maximum Likelihood Estimation Maximum likelihood is a relatively simple method of constructing an estimator for

More information

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written

More information

Exam C, Fall 2006 PRELIMINARY ANSWER KEY

Exam C, Fall 2006 PRELIMINARY ANSWER KEY Exam C, Fall 2006 PRELIMINARY ANSWER KEY Question # Answer Question # Answer 1 E 19 B 2 D 20 D 3 B 21 A 4 C 22 A 5 A 23 E 6 D 24 E 7 B 25 D 8 C 26 A 9 E 27 C 10 D 28 C 11 E 29 C 12 B 30 B 13 C 31 C 14

More information

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop

VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent

More information

Ready Time Observations

Ready Time Observations VMWARE PERFORMANCE STUDY VMware ESX Server 3 Ready Time Observations VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified

More information

Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7

Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7 Citrix EdgeSight for Load Testing User s Guide Citrx EdgeSight for Load Testing 2.7 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.

More information

Confidence Intervals for Exponential Reliability

Confidence Intervals for Exponential Reliability Chapter 408 Confidence Intervals for Exponential Reliability Introduction This routine calculates the number of events needed to obtain a specified width of a confidence interval for the reliability (proportion

More information

APTA approach: Analysis of accelerated prototype test data based on small data volumes within a car door system case study

APTA approach: Analysis of accelerated prototype test data based on small data volumes within a car door system case study APTA approach: Analysis of accelerated prototype test data based on small data volumes within a car door system case study Marcin Hinz a*, Philipp Temminghoff a, and Stefan Bracke a a University of Wuppertal,

More information

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area

More information

Simulation of DNS(Domain Name System) Using SimLib

Simulation of DNS(Domain Name System) Using SimLib Simulation of DNS(Domain Name System) Using SimLib Submitted by Prem Tamang Submitted to Dr. Lawrence J. Osborne Table of Contents 1. Introduction 3 2. Motivation and Challenges. 5 3. Assumptions 5 4.

More information

Comparison of resampling method applied to censored data

Comparison of resampling method applied to censored data International Journal of Advanced Statistics and Probability, 2 (2) (2014) 48-55 c Science Publishing Corporation www.sciencepubco.com/index.php/ijasp doi: 10.14419/ijasp.v2i2.2291 Research Paper Comparison

More information

MATH4427 Notebook 2 Spring 2016. 2 MATH4427 Notebook 2 3. 2.1 Definitions and Examples... 3. 2.2 Performance Measures for Estimators...

MATH4427 Notebook 2 Spring 2016. 2 MATH4427 Notebook 2 3. 2.1 Definitions and Examples... 3. 2.2 Performance Measures for Estimators... MATH4427 Notebook 2 Spring 2016 prepared by Professor Jenny Baglivo c Copyright 2009-2016 by Jenny A. Baglivo. All Rights Reserved. Contents 2 MATH4427 Notebook 2 3 2.1 Definitions and Examples...................................

More information

Nonparametric adaptive age replacement with a one-cycle criterion

Nonparametric adaptive age replacement with a one-cycle criterion Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: Pauline.Schrijner@durham.ac.uk

More information

Server Load Prediction

Server Load Prediction Server Load Prediction Suthee Chaidaroon (unsuthee@stanford.edu) Joon Yeong Kim (kim64@stanford.edu) Jonghan Seo (jonghan@stanford.edu) Abstract Estimating server load average is one of the methods that

More information

Intro to Data Analysis, Economic Statistics and Econometrics

Intro to Data Analysis, Economic Statistics and Econometrics Intro to Data Analysis, Economic Statistics and Econometrics Statistics deals with the techniques for collecting and analyzing data that arise in many different contexts. Econometrics involves the development

More information

HOW TO DO A SCIENCE PROJECT Step-by-Step Suggestions and Help for Elementary Students, Teachers, and Parents Brevard Public Schools

HOW TO DO A SCIENCE PROJECT Step-by-Step Suggestions and Help for Elementary Students, Teachers, and Parents Brevard Public Schools HOW TO DO A SCIENCE PROJECT Step-by-Step Suggestions and Help for Elementary Students, Teachers, and Parents Brevard Public Schools 1. Get an Idea for Your Project Find an area that interests you. You

More information

PARALLELS CLOUD STORAGE

PARALLELS CLOUD STORAGE PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...

More information

AgencyPortal v5.1 Performance Test Summary Table of Contents

AgencyPortal v5.1 Performance Test Summary Table of Contents AgencyPortal v5.1 Performance Test Summary Table of Contents 1. Testing Approach 2 2. Server Profiles 3 3. Software Profiles 3 4. Server Benchmark Summary 4 4.1 Account Template 4 4.1.1 Response Time 4

More information

SOFTWARE MANAGEMENT PROGRAM. Software Testing Checklist

SOFTWARE MANAGEMENT PROGRAM. Software Testing Checklist SOFTWARE MANAGEMENT PROGRAM Software Testing Checklist The following checklist is intended to provide system owners, project managers, configuration managers, and other information system development and

More information

Likelihood Approaches for Trial Designs in Early Phase Oncology

Likelihood Approaches for Trial Designs in Early Phase Oncology Likelihood Approaches for Trial Designs in Early Phase Oncology Clinical Trials Elizabeth Garrett-Mayer, PhD Cody Chiuzan, PhD Hollings Cancer Center Department of Public Health Sciences Medical University

More information

White Paper. Lessons Learned from User Acceptance Testing. M. Glenn Newkirk Helen A. Sims. June 15, 2002

White Paper. Lessons Learned from User Acceptance Testing. M. Glenn Newkirk Helen A. Sims. June 15, 2002 White Paper Lessons Learned from User Acceptance Testing M. Glenn Newkirk Helen A. Sims June 15, 2002 InfoSENTRY Services, Inc. www.infosentry.com 919.838.8570 2002-2003. InfoSENTRY Services, Inc. All

More information

Hypothesis Testing for Beginners

Hypothesis Testing for Beginners Hypothesis Testing for Beginners Michele Piffer LSE August, 2011 Michele Piffer (LSE) Hypothesis Testing for Beginners August, 2011 1 / 53 One year ago a friend asked me to put down some easy-to-read notes

More information

Acer LCD Monitor Driver Installation Guide

Acer LCD Monitor Driver Installation Guide 1 Contents 1 Contents... 1 2 Introduction... 2 3 Installation Guide... 2 3.1 PC requirements... 2 3.2 Installing the Acer LCD Monitor Driver on Windows Vista... 3 3.2.1 Hardware first install... 3 3.2.2

More information

Modeling the Claim Duration of Income Protection Insurance Policyholders Using Parametric Mixture Models

Modeling the Claim Duration of Income Protection Insurance Policyholders Using Parametric Mixture Models Modeling the Claim Duration of Income Protection Insurance Policyholders Using Parametric Mixture Models Abstract This paper considers the modeling of claim durations for existing claimants under income

More information

An Introduction to Modeling Stock Price Returns With a View Towards Option Pricing

An Introduction to Modeling Stock Price Returns With a View Towards Option Pricing An Introduction to Modeling Stock Price Returns With a View Towards Option Pricing Kyle Chauvin August 21, 2006 This work is the product of a summer research project at the University of Kansas, conducted

More information

Amazon EC2 XenApp Scalability Analysis

Amazon EC2 XenApp Scalability Analysis WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2

More information

A Statistical Analysis of Popular Lottery Winning Strategies

A Statistical Analysis of Popular Lottery Winning Strategies CS-BIGS 4(1): 66-72 2010 CS-BIGS http://www.bentley.edu/csbigs/vol4-1/chen.pdf A Statistical Analysis of Popular Lottery Winning Strategies Albert C. Chen Torrey Pines High School, USA Y. Helio Yang San

More information

Upgrading from Windows XP to Windows 7

Upgrading from Windows XP to Windows 7 Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom

More information

1 Sufficient statistics

1 Sufficient statistics 1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =

More information

DSS. Diskpool and cloud storage benchmarks used in IT-DSS. Data & Storage Services. Geoffray ADDE

DSS. Diskpool and cloud storage benchmarks used in IT-DSS. Data & Storage Services. Geoffray ADDE DSS Data & Diskpool and cloud storage benchmarks used in IT-DSS CERN IT Department CH-1211 Geneva 23 Switzerland www.cern.ch/it Geoffray ADDE DSS Outline I- A rational approach to storage systems evaluation

More information

HYPOTHESIS TESTING: POWER OF THE TEST

HYPOTHESIS TESTING: POWER OF THE TEST HYPOTHESIS TESTING: POWER OF THE TEST The first 6 steps of the 9-step test of hypothesis are called "the test". These steps are not dependent on the observed data values. When planning a research project,

More information

Dell Client Energy Savings Calculator. General description of energy consumption in computer systems:

Dell Client Energy Savings Calculator. General description of energy consumption in computer systems: Dell Client Energy Savings Calculator Purpose: The Dell Client Energy Savings Calculator is intended to provide a tool that will allow customers to estimate the energy consumed by a computer over a year

More information

11. Analysis of Case-control Studies Logistic Regression

11. Analysis of Case-control Studies Logistic Regression Research methods II 113 11. Analysis of Case-control Studies Logistic Regression This chapter builds upon and further develops the concepts and strategies described in Ch.6 of Mother and Child Health:

More information

CHI-SQUARE: TESTING FOR GOODNESS OF FIT

CHI-SQUARE: TESTING FOR GOODNESS OF FIT CHI-SQUARE: TESTING FOR GOODNESS OF FIT In the previous chapter we discussed procedures for fitting a hypothesized function to a set of experimental data points. Such procedures involve minimizing a quantity

More information

Before you install ProSeries software for network use

Before you install ProSeries software for network use Before you install ProSeries software for network use The following pages describe system requirements and other information you need to know before installing ProSeries software for network use. Important:

More information

Tested product: Auslogics BoostSpeed

Tested product: Auslogics BoostSpeed Software Tested Tested product: Auslogics BoostSpeed www.softwaretested.com CONTENTS 1 Contents Background... 3 Purpose of the Tests... 5 Testing Environment... 6 Test Results... 10 Windows Startup Time...

More information

A New Extension of the Exponential Distribution

A New Extension of the Exponential Distribution Revista Colombiana de Estadística Junio 2014, volumen 37, no. 1, pp. 25 a 34 A New Extension of the Exponential Distribution Una nueva extensión de la distribución exponencial Yolanda M. Gómez 1,a, Heleno

More information

NAS 249 Virtual Machine Configuration with VirtualBox

NAS 249 Virtual Machine Configuration with VirtualBox NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you

More information

Lecture 15 Introduction to Survival Analysis

Lecture 15 Introduction to Survival Analysis Lecture 15 Introduction to Survival Analysis BIOST 515 February 26, 2004 BIOST 515, Lecture 15 Background In logistic regression, we were interested in studying how risk factors were associated with presence

More information

Least Squares Estimation

Least Squares Estimation Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David

More information

Universal Push2TV HD Adapter PTVU1000 Installation Guide

Universal Push2TV HD Adapter PTVU1000 Installation Guide Universal Push2TV HD Adapter PTVU1000 Installation Guide 2011 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or

More information

Solutions Lab. AXIS Barcode Reader Beta 0.3

Solutions Lab. AXIS Barcode Reader Beta 0.3 AXIS Barcode Reader Beta 0.3 Please note that this software has only been subject to limited testing and that you cannot expect full support regarding the software. The software is to be considered as

More information

Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for On-Premises Single Tenant Deployments

Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for On-Premises Single Tenant Deployments Microsoft Dynamics NAV 2013 R2 Sizing Guidelines for On-Premises Single Tenant Deployments July 2014 White Paper Page 1 Contents 3 Sizing Recommendations Summary 3 Workloads used in the tests 3 Transactional

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Configuration Manager 1.6

Configuration Manager 1.6 Configuration Manager 1.6 en Manual Configuration Manager 1.6 Table of Contents en 1 Table of Contents 1 Introduction 3 1.1 About this manual 3 1.2 Conventions in this manual 3 1.3 System requirements

More information

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida

Power Management in Cloud Computing using Green Algorithm. -Kushal Mehta COP 6087 University of Central Florida Power Management in Cloud Computing using Green Algorithm -Kushal Mehta COP 6087 University of Central Florida Motivation Global warming is the greatest environmental challenge today which is caused by

More information

BA 275 Review Problems - Week 6 (10/30/06-11/3/06) CD Lessons: 53, 54, 55, 56 Textbook: pp. 394-398, 404-408, 410-420

BA 275 Review Problems - Week 6 (10/30/06-11/3/06) CD Lessons: 53, 54, 55, 56 Textbook: pp. 394-398, 404-408, 410-420 BA 275 Review Problems - Week 6 (10/30/06-11/3/06) CD Lessons: 53, 54, 55, 56 Textbook: pp. 394-398, 404-408, 410-420 1. Which of the following will increase the value of the power in a statistical test

More information

A Primer on Mathematical Statistics and Univariate Distributions; The Normal Distribution; The GLM with the Normal Distribution

A Primer on Mathematical Statistics and Univariate Distributions; The Normal Distribution; The GLM with the Normal Distribution A Primer on Mathematical Statistics and Univariate Distributions; The Normal Distribution; The GLM with the Normal Distribution PSYC 943 (930): Fundamentals of Multivariate Modeling Lecture 4: September

More information

Mac computer configurations & OS X optimizations (Updated: November 2012)

Mac computer configurations & OS X optimizations (Updated: November 2012) Mac computer configurations & OS X optimizations (Updated: November 2012) A fast processor and a good amount of memory are important, but do not necessarily guarantee that a computer will perform well

More information

Tests for Two Survival Curves Using Cox s Proportional Hazards Model

Tests for Two Survival Curves Using Cox s Proportional Hazards Model Chapter 730 Tests for Two Survival Curves Using Cox s Proportional Hazards Model Introduction A clinical trial is often employed to test the equality of survival distributions of two treatment groups.

More information

Computational Statistics and Data Analysis

Computational Statistics and Data Analysis Computational Statistics and Data Analysis 53 (2008) 17 26 Contents lists available at ScienceDirect Computational Statistics and Data Analysis journal homepage: www.elsevier.com/locate/csda Coverage probability

More information

BNG 202 Biomechanics Lab. Descriptive statistics and probability distributions I

BNG 202 Biomechanics Lab. Descriptive statistics and probability distributions I BNG 202 Biomechanics Lab Descriptive statistics and probability distributions I Overview The overall goal of this short course in statistics is to provide an introduction to descriptive and inferential

More information

Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008 Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task

More information

BitDefender Security for Exchange

BitDefender Security for Exchange Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the

More information

UNDERSTANDING BATTERY LIFE IN PORTABLE COMPUTERS. Gary Verdun, Technology Strategist, Office of the Chief Technology Officer

UNDERSTANDING BATTERY LIFE IN PORTABLE COMPUTERS. Gary Verdun, Technology Strategist, Office of the Chief Technology Officer White Paper April 2005 t TM UNDERSTANDING BATTERY LIFE IN PORTABLE COMPUTERS Gary Verdun, Technology Strategist, Office of the Chief Technology Officer Many factors affect the amount of time that a portable

More information

Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm

Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm Mgt 540 Research Methods Data Analysis 1 Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm http://web.utk.edu/~dap/random/order/start.htm

More information

Unit 26 Estimation with Confidence Intervals

Unit 26 Estimation with Confidence Intervals Unit 26 Estimation with Confidence Intervals Objectives: To see how confidence intervals are used to estimate a population proportion, a population mean, a difference in population proportions, or a difference

More information

Improve Business Productivity and User Experience with a SanDisk Powered SQL Server 2014 In-Memory OLTP Database

Improve Business Productivity and User Experience with a SanDisk Powered SQL Server 2014 In-Memory OLTP Database WHITE PAPER Improve Business Productivity and User Experience with a SanDisk Powered SQL Server 2014 In-Memory OLTP Database 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Executive

More information

Implications of Alternative Operational Risk Modeling Techniques *

Implications of Alternative Operational Risk Modeling Techniques * Implications of Alternative Operational Risk Modeling Techniques * Patrick de Fontnouvelle, Eric Rosengren Federal Reserve Bank of Boston John Jordan FitchRisk June, 2004 Abstract Quantification of operational

More information

An Introduction to. Metrics. used during. Software Development

An Introduction to. Metrics. used during. Software Development An Introduction to Metrics used during Software Development Life Cycle www.softwaretestinggenius.com Page 1 of 10 Define the Metric Objectives You can t control what you can t measure. This is a quote

More information