ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method

Size: px
Start display at page:

Download "ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method"

Transcription

1 , pp ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science, Hunan Changde, , China Abstract Feature seection and cassifier design is the key to network intrusion detection. In order to improve network intrusion detection rate for feature seection probem, this paper proposed a network intrusion detection method (ACO-FS -SVM) combining ant coony agorithm to seect the features with a feature weighting SVM. First, the use of support vector machine cassification accuracy and feature subset dimension construct a comprehensive fitness weighting index. Then use the ant coony agorithm for goba optimization and mutipe search capabiities to achieve optima soutions feature subset search feature. And then seected the key feature of network data and cacuated information gain access to various features weights and heavy weights to buid support vector machine cassifier based on the characteristics of network attacks right. At ast, refine the fina design of the oca search methods to make the feature seection resuts without redundant features whie improve the convergence resistance, and verify the data set by KDD1999 effectiveness of the agorithm. The resuts show that ACO-FS-SVM can effectivey reduce the dimension of features, and have improved network intrusion detection accuracy and detection speed. Keywords: Feature Seection, Feature Weighting, Ant Coony Optimization Agorithm, Support Vector Machines, Network Intrusion Detection 1. Introduction In recent years, the Internet scae growing, couped with its open, non-executives and undefended, the compex network intrusions, the number of intrusions and the growing degree of harm, network intrusion detection has been the focus of network security defense research[1]. With the rapid deveopment of information technoogy, government departments, research institutions, enterprises, business organizations dependence of information system is growing, and threats facing information security is aso increasing. Traditiona information security technoogy has been unabe to meet the requirements of modern information security. Information security situation assessment (information Security Situation Awareness, ISSA) came into being. On the basis of the integration of information security eements in macroscopic rea-time assess the security situation of information, and it can estimate the deveopment trend [2]. Network intrusion detection is a pattern recognition cassification probems, incuding feature seection, cassifier seection and optimization modues. Network data is very compex, with a high dimensiona feature. The feature set contains some redundant features and useess features, which wi increase the mode training time and computationa compexity, and have a negative impact intrusion detection resuts[3]. To this end, before network intrusion detection modeing, it often used the feature seection agorithm to seect beneficia feature subset of test resuts, in order to reduce the feature dimension. There are main sequence search agorithm, based on principa component ISSN: IJSIA Copyright c 2015 SERSC

2 anaysis, genetic agorithms, partice swarm optimization and other feature seection method [3,4]. In addition to the feature subset seection, network intrusion detection resuts are aso cosey reated to the cassifier and parameter. The current network intrusion detection mode is mainy Bayesian networks, neura networks and support vector machines and other non-inear cassification agorithm[5,6]. Because the network intrusion detection is a arge sampe cassification probem, SVM training is sow for arge sampe, not conducive to rea-time and onine network intrusion detection. Neura network does not require prior knowedge, it can be non-inear, unimited approximation for the system, especiay radia basis function RBF(Radia Basis Function). Neura network has the advantages of simpe structure, fast earning, etc., which have been in network intrusion detection widey used[7]. In practica appications, RBF neura network cassification performance is cosey reated to its parameters. In order to obtain optima performance network intrusion detection mode, you need to seect the most adapted RBF neura network parameters[8]. In some network intrusion detection mode currenty proposed, many of which are features subset and RBF neura network parameters separatey. The seection sequence is not uncertain. So it usuay adopts randomy determined way, which is difficut to obtain the optima feature subset simutaneousy and RBF neura network parameters. To get the best effect of network intrusion detection, feature seection and RBF neura network parameters shoud be carried out simutaneousy. When the network intrusion modeing, feature seection and cassifier design are critica, which wi directy affect the network intrusion detection performance[9]. Since the origina network intrusion signature contains a number of redundant features and test resuts from the "reactive" noise characteristics. If they are directy input to the cassifier to earn, they have a negative impact on the rate of the attack detection, and the detection efficiency is reduced. So the need to choose the network intrusion detection resuts strongy reated key features to reduce the feature dimension [10]. Network Intrusion cassifier design is another important eement in addition to outside of feature seection. Cassifier wi affect the fina detection accuracy and computationa compexity. There are currenty used widey fisher inear discriminant (FLD), support vector machine (SVM) and neura network cassifiers[11-13]. SVM is a machine earning agorithm based on statistica earning theory and structura risk minimization principe. According to the imited sampe information in the mode, it can find the best compromise between compexity and earning abiity to gain better generaization abiity. Through mapping can sove earning probems of high-dimensiona space, with good generaization abiity to overcome oca minimum, the curse of dimensionaity and other issues. It becomes the major network detection agorithm[14-15]. The traditiona SVM agorithm assumes that a network intrusion feature have the same importance. But if the network data contains weak correation with intrusion detection and even reated features, it wi affect the network intrusion cassifier to some extent on the promotion abiity, resuting in ow precision study[16]. Feature weighting according to the different importance of the features, each feature gives a number [0,1] to indicate the importance of the feature, the more important features of the greater weight was given [17]. In order to increase network intrusion detection effect, the first ant coony optimization agorithm (ACO) to seect features. And then we use the information gain agorithm to cacuate the feature weight. Finay, a feature seection and weighted support vector machines (FS-SVM) network intrusion detection methods (ACO-FS-SVM) is proposed, which is on KDD CUP 99 data set to test the merits of the agorithm. The resuts show that, compared to other intrusion detection method, network intrusion detection rate and efficiency of ACO-FS-SVM has improved significanty. 260 Copyright c 2015 SERSC

3 2. ACO-FS-SVM Network Intrusion Detection Fow ACO-FS-SVM agorithm use wrapper feature to seect mode. It uses the automatic optimization capabiity ACO to goba search in the feature space, gets a different combination of features. According to the resuts of SVM cassification to determine the features of the combination of cassification performance, and constanty update the seected feature sets, unti the search resuts to obtain the best cassification feature combination. First extract the characteristics of network status information, and then send into the ACO-FS-SVM cassification feature seection modue to seect the best feature set for network intrusion detection. ACO-FS-SVM intrusion detection network fow mode is shown in Figure 1. Train set Data preprocessing Feature seection Ant coony agorithm feature seection Support vector machine Optima feature subset NO YES Test set Data preprocessing Network intrusion detection mode Intrusion Norma Figure 1. The Working Fow of ACO-FS-SVM Network Intrusion Detection Mode 3. ACO-FS-SVM Network Intrusion Detection Method Ant Coony Optimization (ACO) is a coective inteigence agorithms, simuated ants foraging information exchange and mutua cooperation, with positive feedback, goba search abiity and distributed computing, etc. The time of the proposed agorithm is athough ate, but deveoped rapidy. It has been widey used in soving the TSP, job-shop scheduing, network route(qos), knapsack and other aspects. And the simuation resuts show that ant coony agorithm has good resuts[18,19]. In network intrusion detection feature seection, the need for network intrusion detection features to be accessed as a pace of ants, which wi be converted feature optimization probem into a path search probem. A. The Fitness Function Estabishment Network intrusion feature seection incude two aspects: 1seect features subset to make the network attack detection accuracy rate higher. 2the feature dimension as far as Copyright c 2015 SERSC 261

4 possibe smaest. But in fact a contradiction between the two. In order to make the baance, this research of fitness function is defined as: d f ( s) Perror (1 ) (1) D Where, d is the dimension of feature seection subset s. D is the dimension of candidate feature set. Perror is cassification error rate. λ is the weighting coefficient of cassification error rate. The computationa formua of weighting coefficient λ is 100 (2) 100 Dx where, x presents the percentage of network intrusion detection reduced error rate when features increase one dimension(x%). B. Feature weighting SVM Use feature weighting kerne function constructed SVM, we ca feature weighting SVM. Weighting function is weighted for one feature. The kerne function kp is defined as T T k ( x, x ) k( x P, x P) (3) p i j i j P is caed feature weighting matrix, where Pii=ωi(1<i<n) means the weighting of ith feature. Generay speaking, ωi is not a equa. If an ωi=0, represents the kth feature has nothing to do with the output of the cassifier. T T xi P x jp k p ( xi, x j ) exp( ) 2 (4) T T (( xi x j ) PP ( xi x j )) exp( ) 2 Feature weighting support vector machine(fs-svm) agorithm is described as foows. 1 min T C i, b, 2 i1 (5) st.. T y ( ( x ) b) 1 i i i i 0, i1,2,, where, C>0 is a penaty parameter. FS-SVM can be described as a quadratic programming probem. In the case of ony the minimum required points, we can use the Lagrange mutipier method for soving minimum ωi: 1 T L(, i, b, i ) Ci 2 i1 (6) i1 T ( y ( ( x ) b) 1 ) i i i i where, i is agrange mutipiers. Partia derivative, b, respectivey, and make them equa 0. L i yi( xi ) 0 i0 L iyi 0 (7) b i0 L Csi i 0 i Copyright c 2015 SERSC

5 Put formua(13) into formua(12), get the dua probem of formua(11): 1 min y y K( Px, Px ) a 2 st.. i1 i j i j i j j i1 j1 j1 y 0;0 C; i 1,2,, i i i Sove the dua probem to get optima decision function i1 (8) f ( x) sgn( i yik( Pxi, Px j ) b) (9) Network intrusion cassification FW-SVM agorithm is as foows: Step1: Coect network data training sampe set {(x1,y1),,(xi,yi)}, xi=(x1i,x2i,,xdi) is a d-dimensiona vector, yi (+1,-1), i=(1,,) Step2: Seect high-impact features by ACO. Step3: Cacuate weight vaue w of each feature method based on the information gain method, and construct its feature vector β=diag(β1,β2,,βn)t. Step4: Seect the appropriate penaty parameter C> 0, according to formua (14) constructed and soved quadratic programming optimization probem, obtain the optima soution for α=(α1,,α)t. Step5: αj(0<αj<c) is a component of the α. (xi,xj) is its corresponding sampe points. Cacuated b, construct optima cassification Hyperpane(ω x)+b=0, get network intrusion cassification decision function: f(x)=sgn((ω x)+b. C. Determination of ants state transition probabiity Feature is the nodes that each ant must go through. Each compete a cyce, an ant traverse a features. Each feature has a probabiity of seection, each of the ants through a feature node according to the seected characteristics of the probabiity to determine whether features are seected. Ants use feature seection probabiity, the greater the probabiity of seection feature, the greater the ikeihood of being seected. The probabiity of ants from feature i to j is: ij ( t) ij ( t), k j s tabu k p () t ( t) ( t) (10) ij is is 0 otherwise where, ij is inspiring factor determined by the intrusion detection accuracy. The arger is, the greater the ants move to feature j. () t is the pheromone from feature i to ij feature j at t time. Tabuk is the tabu ist of ant k. In the state transition probabiity, α represents the weighting of pheromone, and β represents the weighting of inspiration factor. According to reference [11], α in this study is a constant, β is determined by the formua (11). n 0 1 (11) Nmax Where, n is iterations. β 0 is the initia vaue of inspiration factor weighting. N max is the maximum iteration. ij Copyright c 2015 SERSC 263

6 D. Loca Refine the Search Process After k sub-set of ants important feature search, has got k important feature. In order to prevent some features of the network intrusion detection irreevant or redundant features retained in the feature subset, search for the optima feature uj in k feature to meet: F( S ) min S, i (12) where U is for any feature subset ui, denote Si=Sm ui {fn}. E. Update Pheromone in Path Ant coony agorithm is mainy done through information feedback mechanism. The pheromone update mechanism has two kinds: oca information and goba information. The goba information can speed up the search agorithm, to increase the goba optima feature probabiity. So each competed a search, each round of search path information concentration needs to be updated on every road, specific for k ij ( n1) ij ( n1) ij k k Q (13) ij Fs ( k ) Where, n is iterations. ρ is pheromones residua factor. k is the number of ants. F(s k ) is thefitness vaue. Q is the growth concentration of pheromone. From pheromone update rue can know that, the smaer the fitness function of features subset, the higher the pheromone concentration is. Then it wi attract more ants to the path search. To strengthen the impact of the optima path, for pheromone increase additiona incentive, namey: * Q ij ij (14) Fs ( ) where, F(s opt ) is the fitness function for optima feature subset in this round. The impact of ρ on the convergence of ant coony optimization agorithm is very obvious. The greater ρ is, the convergence is sow. but it is not easy to fa into oca optimum. ρ is smaer, the agorithm converges fast but easy to fa into oca optimum. In this study, based on references [8], ρ vaue is set to: n 0 1 (15) 3 Nmax where, ρ 0 is the initia vaue of information residua factor. F. The ants Search Termination Condition Under norma circumstances it is difficut to determine the dimensions of optima feature subset. The study of ants search termination conditions is 3 consecutive increasing features, F(s) does not happen too much change, said the current round of search termination. 4. Simuation Test A. Data Sources The experimenta data seected KDD CUP 99 data sets, and the data sets of data contained 41-dimensiona features, 34 numeric fieds and seven symboic fied. 41-dimensiona features can be divided into four parts: the basic features of TCP j i i opt 264 Copyright c 2015 SERSC

7 connections (1 ~ 9 No. features), content features of TC connections(10 to 22 No. features), network traffic statistics feature based on time(23 to 31 No. features), network traffic statistics feature based on host (32 to 41 No. features). The data set divided into four types of intrusions: Probe (scanning and detection), DoS (denia of service attack), U2R (unauthorized access to oca super user) and R2L (unauthorized remote access), see Tabe 1. In P4 dua-core 2.8G CPU, 1G RAM, Windows XP operating system for the simuation environment, using VC agorithm Tabe 1. The 41 Data Features of Network Connection Basic features Connections content features Network traffic statistics feature based on time Network traffic statistics feature based on host 1. duration C 10. hot C 23. count C 32. dst_host_count C 2. protoco_type D 11. num_faied_ogins C 24. serror_rate C 33. dst_host_srv_count C 3.service D 12. ogged_in D 25. rerror_rate C 34. dst_host_same_srv_rate C 4. src_bytes 13. num_compromised 26. same_srv_rate C 35. dst_host_diff_srv_rate C C 5. dst_bytes C 14. root_she D 27. diff_srv_rate C 36. dst_host_same_src_port_rate C 6. fagd 15. su_attempted D 28. srv_count C 37. dst_host_srv_diff_host_rate C 7. and D 16. num_root C 29. srv_serror_rate C 38. dst_host_serror_rate C num_fie_creations 30. srv_rerror_rate C 39. dst_host_srv_serror_rate C wrong_fragment C C 9. urgent C 18. num_shes C 31. srv_diff_host_rate C 40. dst_host_rerror_rate C 19. num_access_fies C 41. dst_host_srv_rerror_rate C 20. num_outbound_cmds C 21. is_hot_ogin D 22. is_guest_ogin D A. Resuts and Anaysis Performance comparison before and after feature seection (1) Because the origina data set is too arge, a sma portion of this was chosen as the experimenta data of the data set. The training set of randomy seected 5000 and 1000 test set, and they are normaized characteristics, reduced into [0, 1] range. (2) The training set is input to the SVM for training and test sets for testing. Feature seection before the intrusion detection resuts are obtained. (3) The training set is input to the SVM. Use ACO agorithm combining SVM feature to seect. Optima features as shown in Tabe 2. (4) According to the resuts of the step (3) feature seection for screening training set and testing set (5) The step (4) obtained the training set put into the SVM for training and test sets for testing, intrusion detection resut obtained after the feature seection. (6) Comparison the detection resut and the running time of step (2) and step (5). Copyright c 2015 SERSC 265

8 Tabe 2. ACO Feature Seection intrusion type feature subset probe 2,4,9,21,29,32,33,34,35 Dos 2,3,7,9,16,20,27,32,37,40 U2R 2,4,9,20,31,21,29,32,33,34,35 R2L 1,2,3,4,6,7,9,11,16,20,21,23,27 Norma 2,3,4,7,8,9,10,15,16,21,22,23, 25 Using 5 experiments to take the average of the test resuts. It can obtain intrusion detection rates before and after feature seection are shown in Tabe 3, the running time shown in Tabe 4. As apparent from Tabe 3, the average rate of intrusion detection after feature seection network increased by 3.10%. The resuts show, feature seection can be more accuratey depicts the network status change information, eiminated redundant and useess information. Intrusion detection performance of feature seection improved significanty. Tabe 3. Comparative the Average Rate of a Intrusion Detection before and after Feature Seection (%) Intrusion type Origina features After seection features Increasing vaue probe Dos U2R R2L Norma Average vaue From Tabe 4, the feature seection greaty reduced run-time network intrusion detection mode. It indicates that the network through ACO feature seection can be achieved by a number of key features, which eiminate unwanted features, reduce the number of SVM input dimension and computing time, speed up the detection speed. Network feature seection to meet rea-time requirements can be more network intrusion detection. Tabe 4. Comparison Running Time (ms) before and after Feature Seection Intrusion type Origina features After seection feature Reduction vaues Probe DoS U2R R2L Norma Copyright c 2015 SERSC

9 权 值 权 值 权 值 权 值 Internationa Journa of Security and Its Appications Network intrusion performance comparison before and after feature weighting Firsty, use information gain method to cacuate the weight of each feature, the resuts shown in Figure 3. And then dea with the weight of the feature and buid weighted support vector machine cassifier network intrusion, get test resuts are shown in Tabe Weight 特 征 编 号 The feature seria number (a) The Probe feature subset weight distribution Weight 特 征 编 号 The feature seria number (b) The DoS feature subset weight distribution Weight 特 征 编 号 The feature seria number (c) The U2R feature subset weight distribution Weight 特 征 编 号 The feature seria number (d) The R2L feature subset weight distribution Copyright c 2015 SERSC 267

10 权 值 Internationa Journa of Security and Its Appications Weight The feature 特 seria 征 编 号 number (e) The Norma feature subset weight distribution Figure 2. A Kinds of Invasion of the Feature Subset of Weight Distribution From Tabe 5, under the same experimenta conditions, the network intrusion detection methods ACO-FS-SVM, both in terms of time efficiency or network intrusion detection rates are higher than the origina SVM method. Intrusion detection reached for Norma of 99.13%, which was mainy due to the increased vaue of the cassification affect more significant characteristic quantities. The origina in the network data sampes near the cassification surface is miscassified been corrected, and the origina cassified correct network data sampe basicay did not happen change. Therefore, by the weighting network intrusion of a kinds of intrusion detection accuracy have varying degrees increase. Tabe 5. The Intrusion Detection Rate(%) Comparison before and after Weighting invasion type Before weighting (ACO- SVM) after weighting (ACO-FS-SVM) increasing vaue probe Dos U2R R2L Norma average vaue Because support vector (SV) can fuy characterize the training dataset, the division of the set of SV equivaent to the division of the entire training data set. In order to further iustrate the effectiveness and advantages of ACO-FS-SVM, further comparative anaysis of support vector set before and after the feature weighting, the resuts shown in Figure Copyright c 2015 SERSC

11 加 权 前 加 权 后 The number of support vector Wrong points sampe number 支 持 向 量 数 BSV 错 分 样 本 数 Figure 3. Support Vector Set Comparison before and after Feature Weighted Figure 3 shows that after weighting, the tota number of support vectors dropped from 915 to 578. It indicates that ACO-FS-SVM generaization is better, border support vector (bounded support vector, BSV) number dropped from 855 to 255, decreased by70.17%. Wrong points sampe aso decined dramaticay. The resut showed that before weighting, the data sampes at the network boundary hyperpane are many. By weighting processing, significanty reducing the data sampes in the cassification of these networks poygon boundaries. It indicates that ACO -FS-SVM on feature weighted, can increase network intrusion detection. 5. Concusion For today's compex network robustness evauation mode ony consider the robustness of the network topoogy and the defect of oca effect of the faied node, so this paper proposes compex network function evauation agorithm based on node efficiency. The agorithm overa consider the goba infuence of node faiure, and use the efficiency of the node on network to define the oad of each node, Limit oad and faiure mode, with the rate of striking the utimate faiure nodes on network to measure the functionaity of the network, the resut of robustness experiment proofs: the agorithm is suitabe for assessing the robustness of arge-scae and sma-word network function, the compexity of agorithm time is O (n2). Acknowedgements This work was supported by.hunan Province Natura Science Foundation Project No. 14JJ2124. References [1] Andrew R,Peters G P, Lennox J. Approximation and regiona aggregation in muti-regiona input-output anaysis for nationa carbon footprint accounting. Economic Systems Research, 2009, 21 (3): [2] Boyd J P,Fitzgerad W J,Mahutga M C,Smith D A. Computing continuous core/periphery structures for socia reations data with MINRES/SVD, Socia Networks, 2010, 32 (2): [3] Dietzenbacher E. More on Mutipiers. Journa of Regiona Science, 2005, 45 (2): , [4] Houb H W,Schnab H. Quaitative input-output anaysis and structura information. Economic Modeing, 2012, 2(1): [5] Houb H W? Tappeiner G. A genera quaitative technique for the comparison of economic structures. Quaity & Quantity, 2010, 22 (3): Copyright c 2015 SERSC 269

12 [6] Kranich J. Aggomeration, vertica speciaization, and the strength of industria inkages. Papers in Regiona Science, 2011, 90 (1): [7] Muhammad J. Mirza, Nadeem Anjum. Association of Moving Objects Across Visua Sensor Networks. Journa of Mutimedia, Vo 7, No 1 (2012) pp. 2-8 [8] Phakpoom T. Custering and Industria Deveopment: Evidence from Thaiand. Nagoya University, [9] Kwak S J,Yoo S H,Chang J I. The roe of the maritime industry in the Korean nationa economy: an input-output anaysis. Marine Poicy, 2011, 29(4): [10] Labaj M. Quaitative input-output anaysis and nationa innovation system in Sovakia. Internationa Journa of Transitions and Innovation Systems, 2011, 1 (2): [11] Lahr M L,Mesnard L D. Biproportiona Techniques in Input-Output Anaysis: Tabe Updating and Structura Anaysis. Economic Systems Research, 2009, 16 (2): [12] Lee S,Yooka S H,Kimb Y. Centraity measure of compex networks using biased random waks. The European Physica Journa, 2010, 68 (2): [13] Midmore P,Munday M,Roberts A. Assessing industry inkages using regiona input-output tabes. Regiona Studies, 2006, 40 (3): [14] Muniz A S G,Raya A M,Carvaja C R. Core periphery vaued modes in input-output fied: A scope from network theory. Regiona Science, 2011, 90 (1): [15] OosterhavenJ, Cardenoso F E. A new method to estimate input-output tabes by means of structura ags,tested on Spanish regions. Papers in Regiona Science, 2011, 90 (4): [16] Roepke H,Adams D,Wiseman R. A new approach to the identification of industria compexes using input-output data. Journa of Regiona Science, 2000, 14 (1): [17] S. Li, Y. Geng, J. He, K. Pahavan,Anaysis of Three-dimensiona Maximum Likeihood Agorithm for Capsue Endoscopy Locaization, th Internationa Conference on Biomedica Engineering and Informatics (BMEI), Chongqing, China Oct (page ) [18] Y. Geng, J. He, H. Deng and K. Pahavan, Modeing the Effect of Human Body on TOA Ranging for Indoor Human Tracking with Wrist Mounted Sensor, 16th Internationa Symposium on Wireess Persona Mutimedia Communications (WPMC), Atantic City, NJ, Jun [19] San C J R,Biezma M V. The mining industry in the European Union: Anaysis of inter-industry inkages using input-output anaysis. Resources Poicy, 2006, 31(1):1-6. [20] Sanchez C J, Duarte R. Production Chains and Linkage Indicators. Economic Systems Research, 2003, 15 (4): Authors Wang Xingzhu, mae, was born in 1974, in Hunan province. He is an associate professor in Furong Coege Hunan, University of Arts and Science. His Main research area is network security. 270 Copyright c 2015 SERSC

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

ONE of the most challenging problems addressed by the

ONE of the most challenging problems addressed by the IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

ICAP CREDIT RISK SERVICES. Your Business Partner

ICAP CREDIT RISK SERVICES. Your Business Partner ICAP CREDIT RISK SERVICES Your Business Partner ABOUT ICAP GROUP ICAP Group with 56 miion revenues for 2008 and 1,000 empoyees- is the argest Business Services Group in Greece. In addition to its Greek

More information

Assessing Network Vulnerability Under Probabilistic Region Failure Model

Assessing Network Vulnerability Under Probabilistic Region Failure Model 2011 IEEE 12th Internationa Conference on High Performance Switching and Routing Assessing Networ Vunerabiity Under Probabiistic Region Faiure Mode Xiaoiang Wang, Xiaohong Jiang and Achie Pattavina State

More information

Research on Risk of Supply Chain Finance of Small and Medium-Sized Enterprises Based on Fuzzy Ordinal Regression Support Vector Machine

Research on Risk of Supply Chain Finance of Small and Medium-Sized Enterprises Based on Fuzzy Ordinal Regression Support Vector Machine www.ccsenet.org/ibm Internationa Journa of Business and Management Vo. 7, No. 8; Apri 202 Research on Risk of Suppy Chain Finance of Sma and Medium-Sized Enterprises Based on Fuzzy Ordina Regression Support

More information

Packet Classification with Network Traffic Statistics

Packet Classification with Network Traffic Statistics Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Protection Against Income Loss During the First 4 Months of Illness or Injury *

Protection Against Income Loss During the First 4 Months of Illness or Injury * Protection Against Income Loss During the First 4 Months of Iness or Injury * This note examines and describes the kinds of income protection that are avaiabe to workers during the first 6 months of iness

More information

CUSTOM. Putting Your Benefits to Work. COMMUNICATIONS. Employee Communications Benefits Administration Benefits Outsourcing

CUSTOM. Putting Your Benefits to Work. COMMUNICATIONS. Employee Communications Benefits Administration Benefits Outsourcing CUSTOM COMMUNICATIONS Putting Your Benefits to Work. Empoyee Communications Benefits Administration Benefits Outsourcing Recruiting and retaining top taent is a major chaenge facing HR departments today.

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Overview of Health and Safety in China

Overview of Health and Safety in China Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

A quantum model for the stock market

A quantum model for the stock market A quantum mode for the stock market Authors: Chao Zhang a,, Lu Huang b Affiiations: a Schoo of Physics and Engineering, Sun Yat-sen University, Guangzhou 5175, China b Schoo of Economics and Business Administration,

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

Sage Accounts Production Range

Sage Accounts Production Range Sage Accounts Production Range The abiity to dri-down from the face of the accounts makes reviewing accounts so easy. Sage Accounts Production Software As individua as you and your cients Jim O Leary,

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

University of Southern California

University of Southern California Master of Science in Financia Engineering Viterbi Schoo of Engineering University of Southern Caifornia Dia 1-866-469-3239 (Meeting number 924 898 113) to hear the audio portion, or isten through your

More information

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation Design of Foow-Up Experiments for Improving Mode Discrimination and Parameter Estimation Szu Hui Ng 1 Stephen E. Chick 2 Nationa University of Singapore, 10 Kent Ridge Crescent, Singapore 119260. Technoogy

More information

Niagara Catholic. District School Board. High Performance. Support Program. Academic

Niagara Catholic. District School Board. High Performance. Support Program. Academic Niagara Cathoic District Schoo Board High Performance Academic Support Program The Niagara Cathoic District Schoo Board, through the charisms of faith, socia justice, support and eadership, nurtures an

More information

Oracle Hyperion Tax Provision. User's Guide Release 11.1.2.2

Oracle Hyperion Tax Provision. User's Guide Release 11.1.2.2 Orace Hyperion Tax Provision User's Guide Reease 11.1.2.2 Tax Provision User's Guide, 11.1.2.2 Copyright 2013, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment Team Orace

More information

History of Stars and Rain Education Institute for Autism (Stars and Rain)

History of Stars and Rain Education Institute for Autism (Stars and Rain) History of Education Institute for Autism () Estabished:: March 15. 1993 in Beijing Founder:: Ms. Tian Huiping (mother of a boy with autism) STARS AND RAIN was founded in 1993 by a parent and is China

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

Management Accounting

Management Accounting Management Accounting Course Text Professiona, Practica, Proven www.accountingtechniciansireand.ie Tabe of Contents FOREWORD...v SYLLABUS: MANAGEMENT ACCOUNTING...vii PART 1 INTRODUCTION Chapter 1: Introduction

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction Spatio-Tempora Asynchronous Co-Occurrence Pattern for Big Cimate Data towards Long-Lead Food Prediction Chung-Hsien Yu, Dong Luo, Wei Ding, Joseph Cohen, David Sma and Shafiqu Isam Department of Computer

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

Risk Assessment Methods and Application in the Construction Projects

Risk Assessment Methods and Application in the Construction Projects Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

STRATEGIC PLAN 2012-2016

STRATEGIC PLAN 2012-2016 STRATEGIC PLAN 2012-2016 CIT Bishopstown CIT Cork Schoo of Music CIT Crawford Coege of Art & Design Nationa Maritime Coege of Ireand Our Institute STRATEGIC PLAN 2012-2016 Cork Institute of Technoogy (CIT)

More information

Accreditation: Supporting the Delivery of Health and Social Care

Accreditation: Supporting the Delivery of Health and Social Care Accreditation: Supporting the Deivery of Heath and Socia Care PHARMACY E F P T O L P E D P E C M F D T G L E F R Accreditation: Supporting the Deivery of Heath and Socia Care June 9, 2015 marks Word Accreditation

More information

Sentiment Analysis with Global Topics and Local Dependency

Sentiment Analysis with Global Topics and Local Dependency Proceedings of the Tenty-Fourth AAAI Conference on Artificia Inteigence (AAAI-10) Sentiment Anaysis ith Goba Topics and Loca Dependency Fangtao Li, Minie Huang, Xiaoyan Zhu State Key Laboratory of Inteigent

More information

Software Quality - Getting Right Metrics, Getting Metrics Right

Software Quality - Getting Right Metrics, Getting Metrics Right Software Quaity - Getting Right Metrics, Getting Metrics Right How to set the right performance metrics and then benchmark it for continuous improvement? Whie metrics are important means to quantify performance

More information

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015 Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com

More information

Informatica PowerCenter

Informatica PowerCenter Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

Frequently Asked Questions

Frequently Asked Questions Community Heathcare Organisations Report & Recommendations of the Integrated Service Area Review Group Frequenty Asked Questions 1. What are Community Heathcare Services? Community Heathcare Services are

More information

Chapter 2 Developing a Sustainable Supply Chain Strategy

Chapter 2 Developing a Sustainable Supply Chain Strategy Chapter 2 Deveoping a Sustainabe Suppy Chain Strategy Bakan Cetinkaya Learning Goas. By reading this chapter you wi: Know the basics of competitive strategy and suppy chain strategy and understand their

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

THE IMPACT OF AN EXECUTIVE LEADERSHIP DEVELOPMENT PROGRAM

THE IMPACT OF AN EXECUTIVE LEADERSHIP DEVELOPMENT PROGRAM Leadership THE IMPACT OF AN EXECUTIVE LEADERSHIP DEVELOPMENT PROGRAM n Jay S. Grider, DO, PhD, Richard Lofgren, MD and Raph Weicke In this artice A eadership deveopment program at an academic medica center

More information

A Comparison of Software Packages for X-Ray Fluorescence Analysis of Silicates on Fusion Disks

A Comparison of Software Packages for X-Ray Fluorescence Analysis of Silicates on Fusion Disks 743 A Comparison of Software Packages for X-Ray Fuorescence Anaysis of Siicates on Fusion Disks HCC Coete Counci for Geoscience, Private Bag X 12, Pretoria, 0001, South Africa Abstract A fixed set of corrected

More information

ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS

ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS Prepared by: Lambert Advisory, LLC Submitted to: St. Marks Waterfronts Forida Partnership St. Marks Conference Center Contents Executive Summary... 1 Section

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

SCHOOL OF BUSINESS MANAGEMENT Information Brochure 2014

SCHOOL OF BUSINESS MANAGEMENT Information Brochure 2014 WANT MORE INFO? If you have any questions, contact us at the address, phone numbers or mai ids mentioned beow. We aso invite you to visit our institute to see the faciities and discuss the courses on offer.

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

Optimizing QoS-Aware Semantic Web Service Composition

Optimizing QoS-Aware Semantic Web Service Composition Optimizing QoS-Aware Semantic Web Service Composition Freddy Lécué The University of Manchester Booth Street East, Manchester, UK {(firstname.astname)@manchester.ac.uk} Abstract. Ranking and optimization

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Creat-Poreen Power Electronics Co., Ltd

Creat-Poreen Power Electronics Co., Ltd (STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

SPOTLIGHT. A year of transformation

SPOTLIGHT. A year of transformation WINTER ISSUE 2014 2015 SPOTLIGHT Wecome to the winter issue of Oasis Spotight. These newsetters are designed to keep you upto-date with news about the Oasis community. This quartery issue features an artice

More information

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com Big projects and use cases Caus Samuesen IBM Anaytics, Europe csa@dk.ibm.com IBM Sofware Overview of BigInsights IBM BigInsights Scientist Free Quick Start (non production): IBM Open Patform BigInsights

More information

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey by Linda Drazga Maxfied and Virginia P. Rena* Using data from the New Beneficiary Survey, this artice examines

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

Sketch-based Network-wide Traffic Anomaly Detection

Sketch-based Network-wide Traffic Anomaly Detection Sketch-based Network-wide Traffic Anomay Detection Yang Liu, Linfeng Zhang, and Yong Guan Department of Eectrica and Computer Engineering Iowa State University, Ames, Iowa 500 Emai: {yang, zhangf, guan}@iastate.edu

More information