Benefit-Cost Analysis of Security Systems for Multiple Protected Assets Based on Information Entropy
|
|
- Howard Lawrence
- 7 years ago
- Views:
Transcription
1 Entropy 2012, 14, ; do: /e Artcle OPEN ACCESS entropy ISSN Beneft-Cost Analyss of Securty Systems for Multple Protected Assets Based on Informaton Entropy Jngjng Da 1, Rumn Hu 1,2, *, Jun Chen 1 and Qng Ca Natonal Engneerng Research Center for Multmeda Software, Wuhan Unversty, Wuhan , Chna; E-Mals: danada2002@gmal.com (J.D.); chenj@whu.edu.cn (J.C.); caqng75@gmal.com (Q.C.) School of Computer, Wuhan Unversty, Wuhan , Chna * Author to whom correspondence should be addressed; E-Mal: hrm1964@163.com. Receved: 18 January 2012; n revsed form: 27 February 2012 / Accepted: 29 February 2012 / Publshed: 14 March 2012 Abstract: Ths artcle proposes a quanttatve rsk assessment for securty systems whch have multple protected assets and a rsk-based beneft-cost analyss for decson makers. The proposed methodology conssts of fve phases: dentfcaton of assets, securty unt and ntruson path, securty unt effectveness estmaton, ntruson path effectveness estmaton, securty system rsk assessment and beneft-cost estmaton. Key nnovatons n ths methodology nclude ts use of effectveness entropy to measure the degree of uncertanty of a securty system to complete a protecton task, and the fact t measures rsk lke nformaton theory measures the amount of nformaton. A notonal example s provded to demonstrate an applcaton of the proposed methodology. Keywords: securty system; effectveness estmaton; entropy; multple assets; beneft-cost 1. Introducton Physcal securty systems are deployed to prevent or mtgate loss of valuable assets (e.g., property or lfe) [1]. Accordng to the Department of Homeland Securty Natonal Infrastructure Protecton Plan of Unted States, bene t-cost analyss s the hallmark of homeland securty decson makng [2]. Beneft-cost analyss requres quantfcaton of the rsk after and before mplementaton of a rsk reducton strategy. The basc theory of rsk evaluaton for securty systems s stll lackng n Chna. Scentsts manly rely on qualtatve assessments of management scence to determne the rsk of the
2 Entropy 2012, system [3 6]. However, f an evaluaton system does not have a deep, comprehensve understandng of the securty system, rsk evaluaton based on management scence wll result n devatons. On an nternatonal scope, scentsts have made some sgnfcant progress on the basc theory for rsk evaluaton of securty systems. In 1970s, the U.S. Department of Energy s Sanda Natonal Laboratores [7] frst ntroduced the basc concepts of physcal protecton systems. At that tme, t proposed the dea that ths system can be appled to the feld of nuclear facltes protecton. Subsequently, the U.S. Department of Energy put forward a model of adversary sequence dagram (ASD) [8]. Ths model can dentfy defcences n physcal protecton systems by analyzng how hypothetcal adversares mght acheve ther objectves through varous barrers. The model dentfed the weakest path n a physcal protecton system where an opponent has the hghest probablty of attackng the system. Subsequently, the U.S. Department of Energy put forward a comprehensve path analyss model based on sngle-path analyss that has a sgnfcant lmtaton n that only one adversary attack path s analyzed [9]. The top ten weakest paths wll be found from among hundreds of probable attack paths. In 2007, Garca [10] gave an ntegrated approach for desgnng physcal securty systems. The measure of effectveness employed for a physcal protecton system s the probablty of nterrupton, whch s defned as the cumulatve probablty of detecton from the start of an adversary path to the pont determned by the tme avalable for response. Hcks et al. [11] presented a cost and performance analyss for physcal protecton systems at the desgn stage. Ther system-level performance measure s rsk, whch they defne as follows: Rsk = P(A) [1 P(E)] C where, P(A) s Probablty of Attack, P(E) s Probablty of System Effectveness, = P(I) P(N), P(I) s Probablty of Interrupton, P(N) s Probablty of Neutralzaton, C s Consequence. Ther dscusson of the cost-performance tradeoff s lmted and heavly weghted toward cost as a drver n the decson [1]. Fscher and Green [12] present a qualtatve rsk analyss approach to rankng threats usng a probablty/crtcalty/vulnerablty matrx. Cost effectveness s dscussed as a possble measure of system evaluaton. Oak Rdge Natonal Laboratory [13] establshed a CSG (Combnaton Sold Geometry) model, whch s a powerful descrptve model faclty. Ths model s based on the use of mage processng, dstrbuted computng, geometrc aspects of technology, usng computer-aded desgn methods to establsh facltes n three-dmensonal smulaton model. Ths three-dmensonal smulaton model s close to the actual nstallatons of the model, calculated by dedcated software; the system can do the most detaled analyss. Those researches are manly focused on the rsk evaluaton of securty system by usng probablty statstcs methods and smulaton methods. Probablstc statstcs methods experment wth small statstcal samples of events to get the probablty of attack of a securty system and make debatable assumptons about fxed values for detecton and delay elements [14]. These methods only descrbe scenaros of one asset, and don t extend to collocated assets [14]. In practce, there are many securty systems that protect multple assets, such as museums or schools. Rsk assessment for securty systems for multple assets s needed. Smulaton experments are appled to assess the effectveness of securty systems must establsh completely dfferent facltes models for dfferent facltes, so the complexty of computaton s very large and the development process s extremely complex. The hstorcal data on attacks s lmted. There are enormous uncertantes n rsk evaluaton of securty systems. The most uncertan s the threat tself [15]. A number of researchers have used bounded ntervals [16], game theory [17 19], exogenous dynamcs [20], to characterze uncertanty n
3 Entropy 2012, terrorsm rsk analyss. There s some mportant recent lterature consderng both adaptve and non-adaptve threats [18,21]. Despte the fact a contrbuton on ths ssue s not wthn the scope of ths artcle, we take the poston that credble expert opnon can compensate for the lack of data to support quanttatve rsk assessments and only consder non-adaptve threats. The prmary objectve of ths artcle s to reference the Informaton Theory of Shannon. Lke nformaton entropy, we use entropy to measure the effectveness uncertanty degree of a securty system s protecton capablty wth regard to protecton of multple assets. Wth a smple llustratve example, we demonstrate the applcaton of securty system rsk assessment and beneft-cost estmaton wth dfferent strateges. 2. Beneft-Cost Estmaton of Securty Systems Based on Informaton Entropy Ths secton develops a quanttatve rsk assessment for securty systems and beneft-cost estmaton for decson makes when the securty system protects multple assets. The proposed rsk-based beneft-cost estmaton method for securty system conssts of fve phases (Fgure 1). Fgure 1. Rsk-based beneft-cost estmaton for decson maker Identfy Assets, Securty Unt and Intruson Path The frst phase begns by dentfyng the key assets whch need protecton and a complete set of plausble ntruson paths leadng to each key asset. Each ntruson path begns at the outsde permeter of a securty system snce t s the frst lne that must be crossed by an ntruder to gan access to a protected asset [22]. A sequence of dscrete securty unts composes an ntruson path. Securty unts have protecton capablty; they may be ether a barrer or a path. The securty system s abstracted nto a securty network dagram whch s shown n Fgure 2. We make some assumptons as follows: (1) Attackers start from the outsde and treat one of protected assets as a target of attack; (2) There exsts at least one path can get to the protected asset; (3) All unts n the path have protecton capablty values; the attacker needs to pay a cost to pass through the securty unt Securty Unt Effectveness Assessment Entropy s a state functon whch was proposed to solve the quantty problem of the second law of thermodynamcs by French scentst Rudolf Clausus n 1865 [23]. Later, entropy became a measure of dsorder or uncertanty about system after Austran physcst Boltzmann s statstcal nterpretaton [24].
4 Entropy 2012, Fgure 2. The securty network dagram. In 1948, Amercan scentst Shannon used nformaton entropy to represent the average uncertanty of an nformaton source and the amount of nformaton s a measure of uncertanty that s mssng before recepton [25]. Informaton entropy s often obtaned from a gven probablty dstrbuton p = {p } of messages or symbols. For a random varable X wth n outcomes {x : = 1,,n}, the Shannon entropy, a measure of uncertanty and denoted by H(X), s defned as: H( X) p( x )log p( x ) (1) n 1 b where p(x ) s the probablty mass functon of outcome x. Due to the source uncertanty, nformaton entropy s used to measure the amount of nformaton n nformaton theory [26]. Smlar to nformaton theory, we use entropy to measure the degree of effectveness uncertanty of the protecton capablty of a securty system. The value of effectveness s measured by the degree of protecton capablty that reduces the uncertanty of the securty system. In a securty system, the effectveness s usually measured by the rato of completon of a task. The larger the rato of completon protecton task, the less the uncertanty assocated wth the effectveness of the securty system s. That means the hgher the effectveness of the securty system, the lower the degree of falures to accomplsh a protecton task wll be. Suppose a unt has n-factors for a certan protecton task. The rato s 1 when fully meetng the task. The rato s 0 when absolutely not meetng the task. The rato of n factors on a unt can be expressed as R ( = 1,2,,n), the weght of each factor s ( = 1,2,,n). For a partcular task, the protecton effectveness of one unt j can be determned as: n 1 U j log ( j 1, 2,, m; 1, 2,, n) (2) 1 R 1
5 Entropy 2012, where U j s the protecton effectveness of unt j. R s the degree of accomplshng a protecton task of factor. 1 R s the degree of fal to accomplsh protecton task of factor. As dfferent factors have dfferent mpacts on the securty system protecton effectveness, denotes the effect weght of n factor-, and Intruson Path Effectveness Assessment The hgher the performance of the unt protecton, the greater cost the attacker must pay through the unt, so we defne unt cost as the value of unt protecton effectveness. The value of unt cost denoted by CU ( )( j 1,2,, m) s equal to the unt effectveness: j We assumed that there are k unts U ( j 1,2,, k) CU ( ) U ( j 1,2,, m) (3) j j n a path, C Path( U, U,, U ) ( 1,2,, k) 1 2 denotes the path cost. The value of the path cost s equal to the sum of unt costs. C PathU (, U,, U) CU ( ) CU ( ) CU ( ) ( 1,2,, k) (4) 2.4. Securty System Rsk Assessment DHS (U.S. Department of Homeland Securty) uses reasonable worst-case condtons to assess terrorsm rsks because ntellgent adversares can choose crcumstances where targets are vulnerable and consequences are maxmzed. The worst-case condton of a securty system s ntellgent adversares who can choose the most vulnerable paths to each asset and destroy all assets. The most vulnerable path s the mnmum cost of ntruson paths for each asset. So the protecton effectveness for each asset can be determned as: E asset Mn C Path1 C Path2 C Path n ( ) ( ), ( ),, ( ) (5) The value of rsk of the securty system can be defned as follows, based on the rsk defnton of securty system that Hcks proposed: Rsk P( A) P( r) C (6) where P(A) s the probablty of attack aganst a crtcal asset durng the tme frame of the analyss whch can be assessed by experts. C s consequence, P(r) s the probablty of successful attack, that s also called the probablty of protecton nvaldaton. In ths formula, P(r) s related to the protecton effectveness of securty system. The hgher the protecton effectveness, the lower the probablty of successful attack P(r). The relatonshp between the two concepts can be expressed as: ( ) log 1 Easset (7) Pr () Suppose a securty system has n protected assets, so the rsk of securty system can be determned as: n 1 Rsk P( A) C E( asset ) 1 e (8)
6 Entropy 2012, where E( asset ) s the protecton effectveness value of asset, PA ( ) s the probablty of attack for asset, t can be determned as the annual rate of occurrence of attack, C s the value of the protecton asset Beneft-Cost Estmaton Bene t-cost analyss determnes the cost effectveness of proposed countermeasures and consequence mtgaton strateges for reducng the rsk assocated wth an asset or portfolo of assets. The bene t-to-cost rato for a gven nvestment alternatve can be calculated as: Beneft Rsk after appled strategy Rsk before appled strategy (9) Cost Cost of strategy 3. An Applcaton of a Museum Scenaro To llustrate a smple applcaton of the proposed method, consder the notonal museum wth two key ancent porcelan assets as shown n Fgure 3. Note that all values used throughout ths example are purely notonal. Fgure 3. Dagram of securty system n a museum scenaro Identfy Assets, Securty Unt and Intruson Path There are two assets n ths example. Consder the example where the adversary ntends to sabotage the target as shown n Fgure 2, there are two paths to the asset 1. Path one: The adversary ntends to
7 Entropy 2012, penetrate the vehcle entrance A, travel to the approprate room, force open the door C, destroy the protected asset 1. Path two: The adversary ntends to penetrate the staff entrance B, travel to room, force open the door C, and destroy the protected asset 1. There are two paths to the asset 2. Path one: the adversary ntends to penetrate the vehcle entrance A, travel to the room, force open the door D, destroy the protected asset 2. Path two: the adversary ntends to penetrate the staff entrance B, travel to room, force open the door D, and destroy the protected asset 2. The protecton unts of each ntruson path are shown n Table 1. Table 1. The protecton unts of each ntruson path. Intruson Path Protecton element of Unt 1 Protecton element of Unt 2 Path 1 for asset 1 Vehcle entrance A Door C Path 2 for asset 1 Staff entrance B Door C Path 1 for asset 2 Vehcle entrance A Door D Path 2 for asset 2 Staff entrance B Door D 3.2. The Protecton Effectveness of Securty Unt A securty system s a complex confguraton of detecton, delay, and response elements [27]. So suppose each unt has three factors for the protecton task: detecton, delay and response. Detecton s the dscovery of an adversary acton whch must be followed by an assessment of the alarm to verfy whether there s an actual ntruson. Delay s the functon of slowng down adversary progress durng an ntruson to gve the guards more tme to respond. Response s the actons taken by the response force to prevent adversary success [28]. The rato s 1 when the protecton task s fully met. The rato s 0 when the task s absolutely not met. The effect weghts of each factor are the same. The rato of each factors on a unt are shown n Table 2. From Equaton (2), the effectveness of each unt can be determned as lsted n Table 2. Table 2. The effectveness for each unt. Unt Detecton Delay Response Effectveness Vehcle entrance A Staff entrance B Door C Door D The Protecton Effectveness of an Intruson Path From Equaton (4), the effectveness of each ntruson path can be determned as Table 3. Table 3. The effectveness for each ntruson path. Intruson Path Effectveness Path 1 for asset Path 2 for asset Path 1 for asset Path 2 for asset
8 Entropy 2012, The Rsk Assessment of the Securty System From Equaton (5), the effectveness of the securty system can be calculated: Easset ( 1) 1.30, E( asset2) Suppose that the annual rate of occurrence of attack for the asset 1 s 0.6 and for asset 2 t s 0.4, so PA ( ) 1 0.6, PA ( ) The value of the asset 1 s 100,000 dollars, the value of the asset 2 s 200,000 dollars so C 1 = 100,000, C 2 =200,000. From Equaton (8), the rsk for each asset can be shown as n Table 4. Table 4. The rsk of each asset. Parameter = 1 = 2 E( asset ) PA ( ) C 100, ,000 Rsk From Equaton (8), the rsk he rsk of the museum securty system can be calculated as Rsk = Beneft-Cost Estmaton To reduce the total rsk assocated wth ths securty system, three countermeasure strateges were consdered: frst, mprove the response factor of Staff entrance B to 0.7. Second, mprove the delay factor of Door C to 0.7. Thrd, mprove the detecton factor of Door D to 0.8. Suppose that the costs for each strategy are the same, that s 1,000 dollars. The hgher beneft-cost value means the better the strategy s. From the beneft-cost value of each strategy n Table 5, we can know that strategy 1 and strategy 2 are the same, and the thrd strategy s better than the frst and second strategy. 4. Conclusons Table 5. The beneft-cost value for each strategy. Strategy Rsk Reducton Value Beneft-Cost Value Ths artcle proposes a quanttatve rsk analyss method and beneft-cost estmaton for securty systems that must protect multple assets. Followng four steps of development, ncludng usng effectveness entropy to measure the degree of uncertanty of the securty system, and measurng rsk lke nformaton theory measures the amount of nformaton, a general formula for securty system rsk assessment was obtaned. Beneft-cost estmaton analyses the relatonshp between proposed countermeasure strateges for reducng rsk and cost. As the envronments of securty system are more complex n general, the proposed model s not comprehensve enough to analyze all the factors. As an exploraton of beneft-cost estmaton of securty systems, ths method can help securty system
9 Entropy 2012, techncal staff to carry out quanttatve rsk assessment of securty systems whch have multple protected assets and make decsons about the choce of countermeasure strateges. Acknowledgments Thanks for the assstance from Natonal Scence Foundaton of Chna ( ), the major natonal scence and technology specal projects (2010ZX ), Natonal Nature Scence Foundaton of Chna (No ) and Natonal Natural Scence Foundaton of Chna ( ). We would also lke to thank knowledgeable revewers for ther constructve and thoughtful comments. References and Notes 1. Graves, G.H. Analytcal foundatons of physcal securty system assessment. Ph.D. Thess, Texas A&M Unversty: College Staton, TX, USA, August US Department of Homeland Securty. Natonal nfrastructure protecton plan. Avalable onlne: (accessed on 20 February 2009). 3. Chen, Z.H. Research and practce of effectveness evaluaton of securty system (n Chnese). Chna Securty & Protecton 2007, 11, Sun, Y.-H.; L, S.-J.; L, B. Quanttatve assessment of physcal protecton system for nuclear power plant (n Chnese). Nuclear Power Engneerng 2009, 30, Wu, Q.; Yan, L.L. The rsk assessment model for enterprse securty (n Chnese). Safety & Securty Technology 2010, 10, L, J.-S. Inqury on the desgn of museum buldng securty preventon system (n Chnese). Shanx Archtecture 2011, 37, Bennett, H.A. The EASI approach to physcal securty evaluaton; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 January 1977; pp Chapman, L.D.; Harlan, C.P. EASI estmate of adversary sequence nterrupton on an IBM PC; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 October 1985; pp Matter, J.C. SAVI: APC-based vulnerablty assessment program; SAND ; Sanda Labs.: Albuquerque, NM, USA, 1 July 1988; pp Garca, M.L. Desgn and Evaluaton of Physcal Protecton Systems; Butterworth-Henemann: Burlngton, MA, USA, Hcks, M.J.; Snell, M.S.; Sandoval, J.S.; Potter, C.S. Physcal protecton systems Cost and performance analyss: A case study. IEEE Aero. Electron. Syst. Mag. 1999, 14, Fscher, R.J.; Green, G. Introducton to Securty, 7th ed.; Elsever: Boston, MA, USA, Shen, N. Desgn and development of physcal protecton system. Master Thess, Chna Insttute of Atomc Energy, Bejng, Chna, July Cummngs, M.C.; Mcgarvey, D.C.; Vnch, P.M. Homeland securty rsk assessment. Volume. Methods, technques, and tools. RP a. Homeland Securty Insttute: Arlngton, VA, USA, 16 June 2006; pp Keeney, R.L. Modelng values for ant-terrorsm analyss. Rsk Anal. 2007, 27, Nkoofal, M.; Zhuang, J. Robust allocaton of a defensve budget consderng an attacker s prvate nformaton. Rsk Anal. 2011, do: /j x.
10 Entropy 2012, Golalkhan, M.; Zhuang, J. Modelng arbtrary layers of contnuous level defenses n facng wth a strategc attacker. Rsk Anal. 2011, 31, Zhuang, J.; Ber, V.M. Balancng terrorsm and natural dsasters Defensve strategy wth endogenous attack effort. Oper. Res. 2007, 55, Zhuang, J., Ber, V.M.; Alagoz, O. Modelng secrecy and decepton n a multple-perod attackerdefender sgnalng game. Eur. J. Oper. Res. 2010, 203, Hausken, K.; Zhuang, J. The tmng and deterrence of terrorst attacks due to exogenous dynamcs. Eur. J. Oper. Res. 2011, do: /jors Hao, M.; Jn, S.; Zhuang, J. Robustness of optmal defensve resource allocatons n the face of less than fully ratonal attackers. In Proceedngs of the 2009 Industral Engneerng Research Conference, Mam, FL, USA, 30 May 3 June 2009; pp Fsscher, R.J.; Green, G. Introducton to Securty, 7th ed.; Elsever: Burlngton, MA, USA, Clausus, R. The Mechancal Theory of Heat Wth Its Applcatons to the Steam Engne and to Physcal Propertes of Bodes; John van Voorst: London, UK, Sandler, S.I. Chemcal and Engneerng Thermodynamcs, 3rd ed.; Wley: New York, NY, USA, Shannon, C.E. A mathematcal theory of communcaton. Bell Syst. Tech. J. 1948, 27, , Golan, A.; Maasoum, E. Informaton theoretc and entropy methods: An overvew. Economet. Rev. 2008, 27, Daves, S.J.; Mnon, R.R. Securty Supervson: Theory and Practce of Asset Protecton, 3rd ed.; Butterworth-Henemann: Jordan Hll, Oxford, UK, Rco, G.; Beasley, J.S. Physcal protecton systems: Concepts, analyss, and practce n the ET classroom. Avalable onlne: (accessed on 27 September 2006) by the authors; lcensee MDPI, Basel, Swtzerland. Ths artcle s an open access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton lcense (
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationRisk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationOverview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationCapacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
More informationPhysical Security and Vulnerability Modeling for Infrastructure Facilities
Proceedngs of the 39th Hawa Internatonal Conference on System Scences - 2006 Physcal Securty and Vulnerablty Modelng for Infrastructure Facltes Dean A. Jones Chad E. Davs Sanda Natonal Laboratores Albuquerque,
More informationThe Current Employment Statistics (CES) survey,
Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationFragility Based Rehabilitation Decision Analysis
.171. Fraglty Based Rehabltaton Decson Analyss Cagdas Kafal Graduate Student, School of Cvl and Envronmental Engneerng, Cornell Unversty Research Supervsor: rcea Grgoru, Professor Summary A method s presented
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationProperties of Indoor Received Signal Strength for WLAN Location Fingerprinting
Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,prashk@ptt.edu
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationESTABLISHING TRADE-OFFS BETWEEN SUSTAINED AND MOMENTARY RELIABILITY INDICES IN ELECTRIC DISTRIBUTION PROTECTION DESIGN: A GOAL PROGRAMMING APPROACH
ESTABLISHIG TRADE-OFFS BETWEE SUSTAIED AD MOMETARY RELIABILITY IDICES I ELECTRIC DISTRIBUTIO PROTECTIO DESIG: A GOAL PROGRAMMIG APPROACH Gustavo D. Ferrera, Arturo S. Bretas, Maro O. Olvera Federal Unversty
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationERP Software Selection Using The Rough Set And TPOSIS Methods
ERP Software Selecton Usng The Rough Set And TPOSIS Methods Under Fuzzy Envronment Informaton Management Department, Hunan Unversty of Fnance and Economcs, No. 139, Fengln 2nd Road, Changsha, 410205, Chna
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationSQUARE Project: Cost/Benefit Analysis Framework for Information Security Improvement Projects in Small Companies
SQUARE Project: Cost/Beneft Analyss Framework for Informaton Securty Improvement Projects n Small Companes System Qualty Requrements Engneerng (SQUARE) Team Nck (Nng) Xe Nancy R. Mead, Advsor Contrbutors:
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationSelecting Best Employee of the Year Using Analytical Hierarchy Process
J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy
More informationDistributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
More informationDsaster Management and Network Analysis
A Smulaton Study for Emergency/Dsaster Management by Applyng Complex Networks Theory L Jn 1, Wang Jong 2 *, Da Yang 3, Wu Huapng 4 and Dong We 5 1,4 Earthquake Admnstraton of Guangdong Provnce Key Laboratory
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationTuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationTesting and Debugging Resource Allocation for Fault Detection and Removal Process
Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton
More informationAn Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
More informationThe Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise
V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended
More informationMAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11
Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de
More informationM-applications Development using High Performance Project Management Techniques
M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationResearch Article A Time Scheduling Model of Logistics Service Supply Chain with Mass Customized Logistics Service
Hndaw Publshng Corporaton Dscrete Dynamcs n Nature and Socety Volume 01, Artcle ID 48978, 18 pages do:10.1155/01/48978 Research Artcle A Tme Schedulng Model of Logstcs Servce Supply Chan wth Mass Customzed
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationA Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece
More informationDetermination of Integrated Risk Degrees in Product Development Project
Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationOperational risk quantification for loss frequency using fuzzy simulation
COMPUTER MODELLIG & EW TECHOLOGIES 04 8(C) 577-58 Lu Shuxa, M Haje Operatonal rs quantfcaton for loss frequency usng fuzzy smulaton Shuxa Lu,*, Haje M School of Busness Admnstraton, Hebe ormal Unversty
More informationAn Empirical Study of Search Engine Advertising Effectiveness
An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationRobust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationPerformance attribution for multi-layered investment decisions
Performance attrbuton for mult-layered nvestment decsons 880 Thrd Avenue 7th Floor Ne Yor, NY 10022 212.866.9200 t 212.866.9201 f qsnvestors.com Inna Oounova Head of Strategc Asset Allocaton Portfolo Management
More informationTHE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
More informationUsing Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
More informationInvestment Portfolio Evaluation by the Fuzzy Approach
Investment Portfolo Evaluaton by the Fuzzy Approach Lambovska Maya, Marchev Angel Abstract Ths paper presents a new fuzzy approach for the evaluaton of nvestment portfolo, where the approach s vewed by
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationLAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary
chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More information7.5. Present Value of an Annuity. Investigate
7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More information