Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy

Size: px
Start display at page:

Download "Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy"

Transcription

1 Entropy 2012, 14, ; do: /e Artcle OPEN ACCESS entropy ISSN Beneft-Cost Analyss of Securty Systems for Multple Protected Assets Based on Informaton Entropy Jngjng Da 1, Rumn Hu 1,2, *, Jun Chen 1 and Qng Ca Natonal Engneerng Research Center for Multmeda Software, Wuhan Unversty, Wuhan , Chna; E-Mals: danada2002@gmal.com (J.D.); chenj@whu.edu.cn (J.C.); caqng75@gmal.com (Q.C.) School of Computer, Wuhan Unversty, Wuhan , Chna * Author to whom correspondence should be addressed; E-Mal: hrm1964@163.com. Receved: 18 January 2012; n revsed form: 27 February 2012 / Accepted: 29 February 2012 / Publshed: 14 March 2012 Abstract: Ths artcle proposes a quanttatve rsk assessment for securty systems whch have multple protected assets and a rsk-based beneft-cost analyss for decson makers. The proposed methodology conssts of fve phases: dentfcaton of assets, securty unt and ntruson path, securty unt effectveness estmaton, ntruson path effectveness estmaton, securty system rsk assessment and beneft-cost estmaton. Key nnovatons n ths methodology nclude ts use of effectveness entropy to measure the degree of uncertanty of a securty system to complete a protecton task, and the fact t measures rsk lke nformaton theory measures the amount of nformaton. A notonal example s provded to demonstrate an applcaton of the proposed methodology. Keywords: securty system; effectveness estmaton; entropy; multple assets; beneft-cost 1. Introducton Physcal securty systems are deployed to prevent or mtgate loss of valuable assets (e.g., property or lfe) [1]. Accordng to the Department of Homeland Securty Natonal Infrastructure Protecton Plan of Unted States, bene t-cost analyss s the hallmark of homeland securty decson makng [2]. Beneft-cost analyss requres quantfcaton of the rsk after and before mplementaton of a rsk reducton strategy. The basc theory of rsk evaluaton for securty systems s stll lackng n Chna. Scentsts manly rely on qualtatve assessments of management scence to determne the rsk of the

2 Entropy 2012, system [3 6]. However, f an evaluaton system does not have a deep, comprehensve understandng of the securty system, rsk evaluaton based on management scence wll result n devatons. On an nternatonal scope, scentsts have made some sgnfcant progress on the basc theory for rsk evaluaton of securty systems. In 1970s, the U.S. Department of Energy s Sanda Natonal Laboratores [7] frst ntroduced the basc concepts of physcal protecton systems. At that tme, t proposed the dea that ths system can be appled to the feld of nuclear facltes protecton. Subsequently, the U.S. Department of Energy put forward a model of adversary sequence dagram (ASD) [8]. Ths model can dentfy defcences n physcal protecton systems by analyzng how hypothetcal adversares mght acheve ther objectves through varous barrers. The model dentfed the weakest path n a physcal protecton system where an opponent has the hghest probablty of attackng the system. Subsequently, the U.S. Department of Energy put forward a comprehensve path analyss model based on sngle-path analyss that has a sgnfcant lmtaton n that only one adversary attack path s analyzed [9]. The top ten weakest paths wll be found from among hundreds of probable attack paths. In 2007, Garca [10] gave an ntegrated approach for desgnng physcal securty systems. The measure of effectveness employed for a physcal protecton system s the probablty of nterrupton, whch s defned as the cumulatve probablty of detecton from the start of an adversary path to the pont determned by the tme avalable for response. Hcks et al. [11] presented a cost and performance analyss for physcal protecton systems at the desgn stage. Ther system-level performance measure s rsk, whch they defne as follows: Rsk = P(A) [1 P(E)] C where, P(A) s Probablty of Attack, P(E) s Probablty of System Effectveness, = P(I) P(N), P(I) s Probablty of Interrupton, P(N) s Probablty of Neutralzaton, C s Consequence. Ther dscusson of the cost-performance tradeoff s lmted and heavly weghted toward cost as a drver n the decson [1]. Fscher and Green [12] present a qualtatve rsk analyss approach to rankng threats usng a probablty/crtcalty/vulnerablty matrx. Cost effectveness s dscussed as a possble measure of system evaluaton. Oak Rdge Natonal Laboratory [13] establshed a CSG (Combnaton Sold Geometry) model, whch s a powerful descrptve model faclty. Ths model s based on the use of mage processng, dstrbuted computng, geometrc aspects of technology, usng computer-aded desgn methods to establsh facltes n three-dmensonal smulaton model. Ths three-dmensonal smulaton model s close to the actual nstallatons of the model, calculated by dedcated software; the system can do the most detaled analyss. Those researches are manly focused on the rsk evaluaton of securty system by usng probablty statstcs methods and smulaton methods. Probablstc statstcs methods experment wth small statstcal samples of events to get the probablty of attack of a securty system and make debatable assumptons about fxed values for detecton and delay elements [14]. These methods only descrbe scenaros of one asset, and don t extend to collocated assets [14]. In practce, there are many securty systems that protect multple assets, such as museums or schools. Rsk assessment for securty systems for multple assets s needed. Smulaton experments are appled to assess the effectveness of securty systems must establsh completely dfferent facltes models for dfferent facltes, so the complexty of computaton s very large and the development process s extremely complex. The hstorcal data on attacks s lmted. There are enormous uncertantes n rsk evaluaton of securty systems. The most uncertan s the threat tself [15]. A number of researchers have used bounded ntervals [16], game theory [17 19], exogenous dynamcs [20], to characterze uncertanty n

3 Entropy 2012, terrorsm rsk analyss. There s some mportant recent lterature consderng both adaptve and non-adaptve threats [18,21]. Despte the fact a contrbuton on ths ssue s not wthn the scope of ths artcle, we take the poston that credble expert opnon can compensate for the lack of data to support quanttatve rsk assessments and only consder non-adaptve threats. The prmary objectve of ths artcle s to reference the Informaton Theory of Shannon. Lke nformaton entropy, we use entropy to measure the effectveness uncertanty degree of a securty system s protecton capablty wth regard to protecton of multple assets. Wth a smple llustratve example, we demonstrate the applcaton of securty system rsk assessment and beneft-cost estmaton wth dfferent strateges. 2. Beneft-Cost Estmaton of Securty Systems Based on Informaton Entropy Ths secton develops a quanttatve rsk assessment for securty systems and beneft-cost estmaton for decson makes when the securty system protects multple assets. The proposed rsk-based beneft-cost estmaton method for securty system conssts of fve phases (Fgure 1). Fgure 1. Rsk-based beneft-cost estmaton for decson maker Identfy Assets, Securty Unt and Intruson Path The frst phase begns by dentfyng the key assets whch need protecton and a complete set of plausble ntruson paths leadng to each key asset. Each ntruson path begns at the outsde permeter of a securty system snce t s the frst lne that must be crossed by an ntruder to gan access to a protected asset [22]. A sequence of dscrete securty unts composes an ntruson path. Securty unts have protecton capablty; they may be ether a barrer or a path. The securty system s abstracted nto a securty network dagram whch s shown n Fgure 2. We make some assumptons as follows: (1) Attackers start from the outsde and treat one of protected assets as a target of attack; (2) There exsts at least one path can get to the protected asset; (3) All unts n the path have protecton capablty values; the attacker needs to pay a cost to pass through the securty unt Securty Unt Effectveness Assessment Entropy s a state functon whch was proposed to solve the quantty problem of the second law of thermodynamcs by French scentst Rudolf Clausus n 1865 [23]. Later, entropy became a measure of dsorder or uncertanty about system after Austran physcst Boltzmann s statstcal nterpretaton [24].

4 Entropy 2012, Fgure 2. The securty network dagram. In 1948, Amercan scentst Shannon used nformaton entropy to represent the average uncertanty of an nformaton source and the amount of nformaton s a measure of uncertanty that s mssng before recepton [25]. Informaton entropy s often obtaned from a gven probablty dstrbuton p = {p } of messages or symbols. For a random varable X wth n outcomes {x : = 1,,n}, the Shannon entropy, a measure of uncertanty and denoted by H(X), s defned as: H( X) p( x )log p( x ) (1) n 1 b where p(x ) s the probablty mass functon of outcome x. Due to the source uncertanty, nformaton entropy s used to measure the amount of nformaton n nformaton theory [26]. Smlar to nformaton theory, we use entropy to measure the degree of effectveness uncertanty of the protecton capablty of a securty system. The value of effectveness s measured by the degree of protecton capablty that reduces the uncertanty of the securty system. In a securty system, the effectveness s usually measured by the rato of completon of a task. The larger the rato of completon protecton task, the less the uncertanty assocated wth the effectveness of the securty system s. That means the hgher the effectveness of the securty system, the lower the degree of falures to accomplsh a protecton task wll be. Suppose a unt has n-factors for a certan protecton task. The rato s 1 when fully meetng the task. The rato s 0 when absolutely not meetng the task. The rato of n factors on a unt can be expressed as R ( = 1,2,,n), the weght of each factor s ( = 1,2,,n). For a partcular task, the protecton effectveness of one unt j can be determned as: n 1 U j log ( j 1, 2,, m; 1, 2,, n) (2) 1 R 1

5 Entropy 2012, where U j s the protecton effectveness of unt j. R s the degree of accomplshng a protecton task of factor. 1 R s the degree of fal to accomplsh protecton task of factor. As dfferent factors have dfferent mpacts on the securty system protecton effectveness, denotes the effect weght of n factor-, and Intruson Path Effectveness Assessment The hgher the performance of the unt protecton, the greater cost the attacker must pay through the unt, so we defne unt cost as the value of unt protecton effectveness. The value of unt cost denoted by CU ( )( j 1,2,, m) s equal to the unt effectveness: j We assumed that there are k unts U ( j 1,2,, k) CU ( ) U ( j 1,2,, m) (3) j j n a path, C Path( U, U,, U ) ( 1,2,, k) 1 2 denotes the path cost. The value of the path cost s equal to the sum of unt costs. C PathU (, U,, U) CU ( ) CU ( ) CU ( ) ( 1,2,, k) (4) 2.4. Securty System Rsk Assessment DHS (U.S. Department of Homeland Securty) uses reasonable worst-case condtons to assess terrorsm rsks because ntellgent adversares can choose crcumstances where targets are vulnerable and consequences are maxmzed. The worst-case condton of a securty system s ntellgent adversares who can choose the most vulnerable paths to each asset and destroy all assets. The most vulnerable path s the mnmum cost of ntruson paths for each asset. So the protecton effectveness for each asset can be determned as: E asset Mn C Path1 C Path2 C Path n ( ) ( ), ( ),, ( ) (5) The value of rsk of the securty system can be defned as follows, based on the rsk defnton of securty system that Hcks proposed: Rsk P( A) P( r) C (6) where P(A) s the probablty of attack aganst a crtcal asset durng the tme frame of the analyss whch can be assessed by experts. C s consequence, P(r) s the probablty of successful attack, that s also called the probablty of protecton nvaldaton. In ths formula, P(r) s related to the protecton effectveness of securty system. The hgher the protecton effectveness, the lower the probablty of successful attack P(r). The relatonshp between the two concepts can be expressed as: ( ) log 1 Easset (7) Pr () Suppose a securty system has n protected assets, so the rsk of securty system can be determned as: n 1 Rsk P( A) C E( asset ) 1 e (8)

6 Entropy 2012, where E( asset ) s the protecton effectveness value of asset, PA ( ) s the probablty of attack for asset, t can be determned as the annual rate of occurrence of attack, C s the value of the protecton asset Beneft-Cost Estmaton Bene t-cost analyss determnes the cost effectveness of proposed countermeasures and consequence mtgaton strateges for reducng the rsk assocated wth an asset or portfolo of assets. The bene t-to-cost rato for a gven nvestment alternatve can be calculated as: Beneft Rsk after appled strategy Rsk before appled strategy (9) Cost Cost of strategy 3. An Applcaton of a Museum Scenaro To llustrate a smple applcaton of the proposed method, consder the notonal museum wth two key ancent porcelan assets as shown n Fgure 3. Note that all values used throughout ths example are purely notonal. Fgure 3. Dagram of securty system n a museum scenaro Identfy Assets, Securty Unt and Intruson Path There are two assets n ths example. Consder the example where the adversary ntends to sabotage the target as shown n Fgure 2, there are two paths to the asset 1. Path one: The adversary ntends to

7 Entropy 2012, penetrate the vehcle entrance A, travel to the approprate room, force open the door C, destroy the protected asset 1. Path two: The adversary ntends to penetrate the staff entrance B, travel to room, force open the door C, and destroy the protected asset 1. There are two paths to the asset 2. Path one: the adversary ntends to penetrate the vehcle entrance A, travel to the room, force open the door D, destroy the protected asset 2. Path two: the adversary ntends to penetrate the staff entrance B, travel to room, force open the door D, and destroy the protected asset 2. The protecton unts of each ntruson path are shown n Table 1. Table 1. The protecton unts of each ntruson path. Intruson Path Protecton element of Unt 1 Protecton element of Unt 2 Path 1 for asset 1 Vehcle entrance A Door C Path 2 for asset 1 Staff entrance B Door C Path 1 for asset 2 Vehcle entrance A Door D Path 2 for asset 2 Staff entrance B Door D 3.2. The Protecton Effectveness of Securty Unt A securty system s a complex confguraton of detecton, delay, and response elements [27]. So suppose each unt has three factors for the protecton task: detecton, delay and response. Detecton s the dscovery of an adversary acton whch must be followed by an assessment of the alarm to verfy whether there s an actual ntruson. Delay s the functon of slowng down adversary progress durng an ntruson to gve the guards more tme to respond. Response s the actons taken by the response force to prevent adversary success [28]. The rato s 1 when the protecton task s fully met. The rato s 0 when the task s absolutely not met. The effect weghts of each factor are the same. The rato of each factors on a unt are shown n Table 2. From Equaton (2), the effectveness of each unt can be determned as lsted n Table 2. Table 2. The effectveness for each unt. Unt Detecton Delay Response Effectveness Vehcle entrance A Staff entrance B Door C Door D The Protecton Effectveness of an Intruson Path From Equaton (4), the effectveness of each ntruson path can be determned as Table 3. Table 3. The effectveness for each ntruson path. Intruson Path Effectveness Path 1 for asset Path 2 for asset Path 1 for asset Path 2 for asset

8 Entropy 2012, The Rsk Assessment of the Securty System From Equaton (5), the effectveness of the securty system can be calculated: Easset ( 1) 1.30, E( asset2) Suppose that the annual rate of occurrence of attack for the asset 1 s 0.6 and for asset 2 t s 0.4, so PA ( ) 1 0.6, PA ( ) The value of the asset 1 s 100,000 dollars, the value of the asset 2 s 200,000 dollars so C 1 = 100,000, C 2 =200,000. From Equaton (8), the rsk for each asset can be shown as n Table 4. Table 4. The rsk of each asset. Parameter = 1 = 2 E( asset ) PA ( ) C 100, ,000 Rsk From Equaton (8), the rsk he rsk of the museum securty system can be calculated as Rsk = Beneft-Cost Estmaton To reduce the total rsk assocated wth ths securty system, three countermeasure strateges were consdered: frst, mprove the response factor of Staff entrance B to 0.7. Second, mprove the delay factor of Door C to 0.7. Thrd, mprove the detecton factor of Door D to 0.8. Suppose that the costs for each strategy are the same, that s 1,000 dollars. The hgher beneft-cost value means the better the strategy s. From the beneft-cost value of each strategy n Table 5, we can know that strategy 1 and strategy 2 are the same, and the thrd strategy s better than the frst and second strategy. 4. Conclusons Table 5. The beneft-cost value for each strategy. Strategy Rsk Reducton Value Beneft-Cost Value Ths artcle proposes a quanttatve rsk analyss method and beneft-cost estmaton for securty systems that must protect multple assets. Followng four steps of development, ncludng usng effectveness entropy to measure the degree of uncertanty of the securty system, and measurng rsk lke nformaton theory measures the amount of nformaton, a general formula for securty system rsk assessment was obtaned. Beneft-cost estmaton analyses the relatonshp between proposed countermeasure strateges for reducng rsk and cost. As the envronments of securty system are more complex n general, the proposed model s not comprehensve enough to analyze all the factors. As an exploraton of beneft-cost estmaton of securty systems, ths method can help securty system

9 Entropy 2012, techncal staff to carry out quanttatve rsk assessment of securty systems whch have multple protected assets and make decsons about the choce of countermeasure strateges. Acknowledgments Thanks for the assstance from Natonal Scence Foundaton of Chna ( ), the major natonal scence and technology specal projects (2010ZX ), Natonal Nature Scence Foundaton of Chna (No ) and Natonal Natural Scence Foundaton of Chna ( ). We would also lke to thank knowledgeable revewers for ther constructve and thoughtful comments. References and Notes 1. Graves, G.H. Analytcal foundatons of physcal securty system assessment. Ph.D. Thess, Texas A&M Unversty: College Staton, TX, USA, August US Department of Homeland Securty. Natonal nfrastructure protecton plan. Avalable onlne: (accessed on 20 February 2009). 3. Chen, Z.H. Research and practce of effectveness evaluaton of securty system (n Chnese). Chna Securty & Protecton 2007, 11, Sun, Y.-H.; L, S.-J.; L, B. Quanttatve assessment of physcal protecton system for nuclear power plant (n Chnese). Nuclear Power Engneerng 2009, 30, Wu, Q.; Yan, L.L. The rsk assessment model for enterprse securty (n Chnese). Safety & Securty Technology 2010, 10, L, J.-S. Inqury on the desgn of museum buldng securty preventon system (n Chnese). Shanx Archtecture 2011, 37, Bennett, H.A. The EASI approach to physcal securty evaluaton; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 January 1977; pp Chapman, L.D.; Harlan, C.P. EASI estmate of adversary sequence nterrupton on an IBM PC; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 October 1985; pp Matter, J.C. SAVI: APC-based vulnerablty assessment program; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 July 1988; pp Garca, M.L. Desgn and Evaluaton of Physcal Protecton Systems; Butterworth-Henemann: Burlngton, MA, USA, Hcks, M.J.; Snell, M.S.; Sandoval, J.S.; Potter, C.S. Physcal protecton systems Cost and performance analyss: A case study. IEEE Aero. Electron. Syst. Mag. 1999, 14, Fscher, R.J.; Green, G. Introducton to Securty, 7th ed.; Elsever: Boston, MA, USA, Shen, N. Desgn and development of physcal protecton system. Master Thess, Chna Insttute of Atomc Energy, Bejng, Chna, July Cummngs, M.C.; Mcgarvey, D.C.; Vnch, P.M. Homeland securty rsk assessment. Volume. Methods, technques, and tools. RP a. Homeland Securty Insttute: Arlngton, VA, USA, 16 June 2006; pp Keeney, R.L. Modelng values for ant-terrorsm analyss. Rsk Anal. 2007, 27, Nkoofal, M.; Zhuang, J. Robust allocaton of a defensve budget consderng an attacker s prvate nformaton. Rsk Anal. 2011, do: /j x.

10 Entropy 2012, Golalkhan, M.; Zhuang, J. Modelng arbtrary layers of contnuous level defenses n facng wth a strategc attacker. Rsk Anal. 2011, 31, Zhuang, J.; Ber, V.M. Balancng terrorsm and natural dsasters Defensve strategy wth endogenous attack effort. Oper. Res. 2007, 55, Zhuang, J., Ber, V.M.; Alagoz, O. Modelng secrecy and decepton n a multple-perod attackerdefender sgnalng game. Eur. J. Oper. Res. 2010, 203, Hausken, K.; Zhuang, J. The tmng and deterrence of terrorst attacks due to exogenous dynamcs. Eur. J. Oper. Res. 2011, do: /jors Hao, M.; Jn, S.; Zhuang, J. Robustness of optmal defensve resource allocatons n the face of less than fully ratonal attackers. In Proceedngs of the 2009 Industral Engneerng Research Conference, Mam, FL, USA, 30 May 3 June 2009; pp Fsscher, R.J.; Green, G. Introducton to Securty, 7th ed.; Elsever: Burlngton, MA, USA, Clausus, R. The Mechancal Theory of Heat Wth Its Applcatons to the Steam Engne and to Physcal Propertes of Bodes; John van Voorst: London, UK, Sandler, S.I. Chemcal and Engneerng Thermodynamcs, 3rd ed.; Wley: New York, NY, USA, Shannon, C.E. A mathematcal theory of communcaton. Bell Syst. Tech. J. 1948, 27, , Golan, A.; Maasoum, E. Informaton theoretc and entropy methods: An overvew. Economet. Rev. 2008, 27, Daves, S.J.; Mnon, R.R. Securty Supervson: Theory and Practce of Asset Protecton, 3rd ed.; Butterworth-Henemann: Jordan Hll, Oxford, UK, Rco, G.; Beasley, J.S. Physcal protecton systems: Concepts, analyss, and practce n the ET classroom. Avalable onlne: (accessed on 27 September 2006) by the authors; lcensee MDPI, Basel, Swtzerland. Ths artcle s an open access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton lcense (

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Performance Management and Evaluation Research to University Students

Performance Management and Evaluation Research to University Students 631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Capacity-building and training

Capacity-building and training 92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng

More information

Physical Security and Vulnerability Modeling for Infrastructure Facilities

Physical Security and Vulnerability Modeling for Infrastructure Facilities Proceedngs of the 39th Hawa Internatonal Conference on System Scences - 2006 Physcal Securty and Vulnerablty Modelng for Infrastructure Facltes Dean A. Jones Chad E. Davs Sanda Natonal Laboratores Albuquerque,

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Fragility Based Rehabilitation Decision Analysis

Fragility Based Rehabilitation Decision Analysis .171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

ESTABLISHING TRADE-OFFS BETWEEN SUSTAINED AND MOMENTARY RELIABILITY INDICES IN ELECTRIC DISTRIBUTION PROTECTION DESIGN: A GOAL PROGRAMMING APPROACH

ESTABLISHING TRADE-OFFS BETWEEN SUSTAINED AND MOMENTARY RELIABILITY INDICES IN ELECTRIC DISTRIBUTION PROTECTION DESIGN: A GOAL PROGRAMMING APPROACH ESTABLISHIG TRADE-OFFS BETWEE SUSTAIED AD MOMETARY RELIABILITY IDICES I ELECTRIC DISTRIBUTIO PROTECTIO DESIG: A GOAL PROGRAMMIG APPROACH Gustavo D. Ferrera, Arturo S. Bretas, Maro O. Olvera Federal Unversty

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

ERP Software Selection Using The Rough Set And TPOSIS Methods

ERP Software Selection Using The Rough Set And TPOSIS Methods ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies

SQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Selecting Best Employee of the Year Using Analytical Hierarchy Process

Selecting Best Employee of the Year Using Analytical Hierarchy Process J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Dsaster Management and Network Analysis

Dsaster Management and Network Analysis A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Testing and Debugging Resource Allocation for Fault Detection and Removal Process

Testing and Debugging Resource Allocation for Fault Detection and Removal Process Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton

More information

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style

An Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture

More information

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise

The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

M-applications Development using High Performance Project Management Techniques

M-applications Development using High Performance Project Management Techniques M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA

More information

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises

Research on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises 3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service

Research Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

Determination of Integrated Risk Degrees in Product Development Project

Determination of Integrated Risk Degrees in Product Development Project Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Operational risk quantification for loss frequency using fuzzy simulation

Operational risk quantification for loss frequency using fuzzy simulation COMPUTER MODELLIG & EW TECHOLOGIES 04 8(C) 577-58 Lu Shuxa, M Haje Operatonal rs quantfcaton for loss frequency usng fuzzy smulaton Shuxa Lu,*, Haje M School of Busness Admnstraton, Hebe ormal Unversty

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Performance attribution for multi-layered investment decisions

Performance attribution for multi-layered investment decisions Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Investment Portfolio Evaluation by the Fuzzy Approach

Investment Portfolio Evaluation by the Fuzzy Approach Investment Portfolo Evaluaton by the Fuzzy Approach Lambovska Maya, Marchev Angel Abstract Ths paper presents a new fuzzy approach for the evaluaton of nvestment portfolo, where the approach s vewed by

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary

LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information