Evaluating the Network and Information System Security Based on SVM Model

Size: px
Start display at page:

Download "Evaluating the Network and Information System Security Based on SVM Model"

Transcription

1 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha Emal: yagshaome@.com Dogle Lu College of Busess, Agrcultural Uversty of Hebe, Baodg Cty, Cha E-mal: doglelu@.com Zhb Lu Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha Emal: luzhb@.com Abstract Wth more ad more e-busess operatg o le, the etwork ad formato securty problem s ot oly cofed to the cocept of etwork techcal systems, but at the same tme has specal sgfcace beyod etwork tself, whch s ecoomc tes, cultural trasmsso meda, the socal operato ad maagemet way ad so o. Based o the aalyss of the securty mportace ad securty evaluato preset, ths paper establshes a securty evaluato system ad descrbes the evaluato mechasm based o SVM algorthm ad model. The securty evaluato of etwork eterprses Bejg shows that the results gve by ths model are relable, ad ths method to evaluate the etwork ad formato system securty s feasble. dex Terms etwork ad formato system, securty, securty evaluato, SVM. NTHRODUCTON Wth the through computer applcatos, especally the creasg popularty of home computers, o the oe had, t hopes that may users ca share formato resources, o the other had, t also hopes that ca trasmt formato ad commucate wth each other amog the computers. The hardware ad software cofgurato of the persoal computers s relatvely low geeral, ad the fucto s lmted, therefore, t requres that the hardware ad software resources of the large ad super computer ad ther maagemet formato resources should be shared for the large umber of mcro-computers, order to take full advatage of these resources. For these reasos, promote the computer s etwork developmet; coect the dspersed computer to the etwork; ad make up the computer etwork. Network s the combato product of the moder commucatos techology ad computer techology. The so-called computer etwork, s a etwork system of the large scale ad strog fuctos, whch les wth the computer dstrbuted dfferet geographcal regos ad the specalzed exteral equpmet commucato crcut, so that may computers ca trasmt formato to each other expedetly, ad share the resources of the hardware, software, Data formato, ad so o. Popularly, the etwork s the computer collecto whch les wth the cable, telephoe les, or wreless commucatos, ad other. formato system s defed techcally as a terrelated compoets collecto through the formato gatherg, processg, storage ad dstrbuto supported the decso-makg ad cotrol orgazato. Securty evaluato s also sad rsk evaluato. The defto of securty evaluato s: measure ad predct the system securty through usg sythetcally the securty systems egeerg approach, cofrm the possblty ad order of severty of the system dager through the qualtatve ad quattatve aalyss, ad put forward the ecessary measures order to fd the lowest accdet rate, the smallest cdet loss ad the best securty vestmet returs. Wth the emergece of all kds of e-mal spread vruses, people attach mportace to the etwork securty. More ad more customers wat to have a clear uderstadg about the etwork ad formato systems securty whch beg used or wll be used of ther ow, but most of them lack the relevat kowledge, expertse ad resources, who ca t decde whether the cofdece level of the etworks ad formato systems securty s approprate, ad do t hope to rely etrely o the system developer ths regard, so they wat a thrd party to help them aalyze the etwork system securty, that s, coduct securty evaluato. Through evaluato, the users ca judge whether the etworks ad formato systems s adequate securty for ther ow applcatos, ad whether the cocealed securty rsks are acceptable. addto, order to esure atoal formato frastructure securty, the maagemet departmet also 009 ACADEMY PUBLSHER

2 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 call the shots that securty evaluato s very ecessary for a varety of etwork ad formato systems, ad to determe the level of safety ad relablty. Clearly, securty evaluato has the mportat sgfcace for the etwork developmet. The etwork ad formato systems securty evaluato s that detfes, aalyzes ad evaluates the securty, detfes all of the securty factors the system ad the lkages betwee them. A comprehesve securty aalyss cludg: descrbe varous levels of the securty probablty ad fluece, gve uform measuremet crtero to evaluate the securty dcators of the factors, ad the gve the securty level throughout the system based o some evaluato methods. The calculato methods of the securty evaluato have qualtatve method ad quattatve method. The ma evaluato methods cludg: AHP, decso tree aalyss, Markov modelg ad so o, however, these methods are subject to stochastc factors the evaluato, ad the evaluato results are flueced by subjectve experece ad kowledge lmtatos easly, whch affect the accuracy ad objectvty of the evaluato results. ths paper, we evaluate securty level usg the method of combg the qualtatve wth the quattatve, ad overcome the subjectvty the evaluato through the applcato of self-adaptg regresso Support Vector Mache (SVM).. THE SECURTY EVALUATON NDEX SYSTEM Accordg to the atoal basc requremets of the etwork ad formato securty system, wth the practcal experece egaged formato securty maagemet work may years, we beleve that should follow the followg prcples whe formulate the system securty evaluato dex system: ()tegrate the laws ad regulatos of the state formato ad formato system securty. ()Satsfy the securty requremets of the users ad applcato evromet to the formato systems. ()Good maeuverablty ad mplemetato expedetly. () Smple, practcal, feasble ad ecoomc. A Ettes ad evromet securty dex The ettes ad evromet securty dex cludes te aspects: Wthout dagerous buldg wth 00m aroud the motor room (U ), dagerous buldg s that the places of exstg flammable, explosve, toxc gases, etc., such as the such as gas statos, gas ppeles ad so o; Motorg system (U ), that s, the motorg mplemetato facltes of the exteral evromet ad operatg evromet durg the system rug; Freproof ad waterproof measures (U ), freproof s that equpped wth automatc fre alarm system the computer room, or the fre-fghtg equpmet, emergecy plas ad related systems appled to the computer room; waterproof s that o water seepage ad leakage the computer room, for example, t eeds waterproof layer f havg water facltes o the upper room; Evromet motorg ad cotrol facltes the motor room (temperature, humdty ad clealess)(u ), temperature cotrol s that the computer room has ar-codtog, ad the temperature mataed at C to C; humdty cotrol s that the relatve humdty remaed at 0% ~ 0%, clealess cotrol s that the computer room ad equpmet should be kept clea ad health, take off shoes to the computer room, the doors ad wdows wth closed performace; Thuder proof measures (havg thuder proof devces, the good groudg)(u ); Stadby power supply ad owed geerators (U ); Usg UPS (U ); At-statc measures (adopt at-statc floorg, equpmet groudg s good)(u ); Specal crcut supply electrcty (separate t from ar-codtog ad lghtg electrcty)(u 9 ); Guard agast theft measures(u 0 ), someoe s o duty, stall at-theft securty doors the mport ad export, stall metal defeded equpmet to the wdow, equp wth the rado-cotrolled at-theft etworkg facltes the computer room. B Orgazato maagemet ad securty system dex The orgazato maagemet ad securty system dex cludes eght aspects: specalzed formato securty orgazatos ad full-tme formato securty persoel (U ), the formato securty orgazatos establshmet ad the formato securty persoel appotmet, whch must have a offcal documet of the relevat uts; Perfect formato securty maagemet rules ad regulatos (U ); Strct maagemet system about formato securty persoel provdg or trasferrg (U ); The maagemet system of equpmet ad data s comprehesve, ad whch s o the wall (U ); The detaled the maual ad the tegrty work records(u ); The emergecy treatmet pla(u ); The tegrty plas ad system of the formato securty trag (U ); The securty resposbltes s clear for all types of employee ad maagers, ad securty maagemet system s strct(u ). C Securty techology dex The securty techology dex cludes seve aspects: dsaster recovery techology coutermeasures (U 9 ); Separato measures of the developmet work ad operatoal work (U 0 ); Havg applcato busess ad system securty audt fucto (U ); Havg the system operato log (U ), that s the wrtte records of opeg ad shuttg dow the computer, ad the equpmet operato codto, etc.; Server backup measures (U ); At-hackg facltes (U ), cludg set up a frewall, have truso detecto ad other facltes; Computer vrus preveto measures (U ), cludg the software ad hardware products of prevetg ad elmatg the vrus, ad the regular upgrades. D Network ad commucato securty dex The etwork ad commucato securty dex cludes fve aspects: havg eye-catchg sgs where placed commucatos facltes (U ); Backup of mportat commucato les ad cotrol devces (U ); Ecrypto measures (U ); Securty audt trackg measures of systems rug (U 9 ); Access cotrol 009 ACADEMY PUBLSHER

3 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 measures of the etworks ad formato systems (U 0 ), s that, dvde the system user's access based o the work ature ad the rak. E Software ad formato securty dex The software ad formato securty dex cludes fve aspects: access cotrol measures of operatg system ad database (U ); Damage preveto measures of applcato software ad formato system (U ); Motorg faclty of the database ad system state (U ); User detfcato measures (U ); Remote backup of system user formato (U ).. THE PRNCPLE AND MODEL CONSTRUCTON OF SELF- ADAPTNG REGRESSON SVM SVM s a ew mache learg method proposed by Vapk based o the statstcal theory learg, ad s also a regresso method wth the good geeralzato ablty, whch lkes the eural etwork, has the capacty of approxmatg ay cotuous lmted olear fucto, ad SVM method has may advatages that the eural etwork has ot. SVM s from the Optmal Hyperplae uder the crcumstaces of the lear separable. The so-called Optmal Hyper-plae, s such a separatg hyper-plae, whch wll ot oly be able to classfy correctly for all trag sample, but make the dstace (defed as the terval)largest where from the proxmate pot to the Hyper-plae the trag samples. The vector of the dstace Optmal Separatg Hyper-plae s called support vector. A The basc prcple ad learg process of selfadaptg regresso SVM Self-adaptg support vector regresso algorthm based o RBF kerel fucto, wth regard to o sestvty coeffcet ε, value ε = 0.D () Amog them, D s varace of the ose dstrbuto fucto (radom process), durg the terato, the o sestve coeffcet ε remas uchaged. the k-th terato, the wdth coeffcets of pushmet factor ad kerel fucto are recorded as C (k) ad σ (k), usg these parameters, callg SVM learg algorthm, we ca carry o regresso estmato for the trag sample, ad the calculate the relatve fttg error of the trag samples: ( k ) y f ( x ) E = () y The average relatve fttg error s: ME = ( k ) E ( k ) = The regresso relatve accuracy s regard as δ, ad the adjustmet step of the pushmet factor ad wdth coeffcet are regard as C ad σ. Before the trag, frst of all, we should arrage all samples a orderly maer, that s regardg a sample optoally as m dmeso sample x (x, x,, x m ), choose the sample whch has the smallest dstace to x as x from the remag samples except for x, ad the () choose the sample whch has the smallest dstace to x as x from the remag samples except for x ad x, the same toke, wth regard to x, choose the sample whch has the smallest dstace to x as x + from the remag samples except for x,x,,x, at last, we ca arrage all samples a orderly maer as x, x,,x, the sample x + s the adjacet pot of the sample x, ad the meda of the adjacet pots: md x = ( x + 0.( x+ x )) () The dstace betwee the sample adjacet pots: d = x x () + The dstace mea s: d = d () = For orderly sample set {x, y } (=,,, ; x R m ; y R), the regresso fucto s f(x), suppose regresso accuracy s δ>0. As to the sample pot x (=,,,-), f the dstace betwee the adjacet pots s ot too bg, that s d <d, ad the depedet varable betwee the two adjacet pots s ot too close, that s y + - y >δ, we check the adjacet meda value f(x md ) of the regresso fucto, f t s t betwee y ad y +, the the regresso fucto s too complcated, whch ca lead to excessvely fttg. B The partcular steps of self-adaptg regresso SVM algorthm The partcular steps of support vector regresso method based o parameter self-adaptg adjustmet are as follows: () Select the parameters tal value, the terato tal value k=0, the wdth coeffcet tal value s: (0) T σ = ( x x) ( x x) () = the formula, s the umber of samples; x s the mea of put vector, ad the x = x () = The pushmet factor tal value s: (0) C = (max( y ) m( y )) (9) At the same tme value C>0 ad σ <0 by experece, proporto factor β = (0, ). We ca carry o support vector regresso evaluato usg the parameters tal value, ad the obta the average fttg relatve error ME (0). () k=k+, adjust parameters C (k) ad σ (k), carry o support vector regresso evaluato based o the adjusted parameters, ad the obta he average fttg relatve error ME ( k ). Parameters adjustmet formulas are: ( k + ) ( k ) C = C + C ( ) ( ) σ k + = σ k + σ (0) () Check f the average fttg relatve error s to be reduced, that s judgg whether ME (k+ ) <ME (k) s 009 ACADEMY PUBLSHER

4 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 teable, f teable, the go to step (); f ot teable, order C (k+) = C (k), σ (k+) = σ (k), ad the go to step (). () Adjust parameter steps C ad σ, the parameter step adjustmet formula are: C = β C σ = β σ () Determe whether the step s less tha the mmum level, f ot, go to step (); f so, the go to steps (). () Judge whether ME (k+) <δ s teable, f ot, go to step (); f so, the go to step (). ()Determe whether the regresso fucto s too complcated. Check the adjacet meda value f(x md ) of the regresso fucto, f the value s betwee y ad y +, f ot, the the regresso fucto s too complcated, whle the umber of teratos s t the maxmum, order C (k+) = C (k), σ (k+) = σ (k), ad the go to step (); f the regresso fucto s t complcated or the umber of teratos s the maxmum, the go to step (). () The terato termato, at ths tme the regresso estmato fucto s the fal result. V. APPLCATON EXAMPLES We take the securty evaluato based o etwork eterprses survey data Bejg as a example, ad select eterprses data as the sample, cludg the excellet level, the good level Ⅱ, the geeral level Ⅲ, the poor level Ⅳ, take - samples as the trag set, the four resdual samples as testg samples. order to ehace the speed ad accuracy, we treat all samples data dfferetally. Costruct a four levels SVM classfcato; use the RBF kerel fucto, the fucto wdth σ=0., value C=000, use Matlab. programmg, treat the four levels SVM classfcato wth the trag samples show table, the trag tme s less tha 0.09S. We test the traed SVM classfer through usg test samples, the test results are table. order to check the method fucto, frstly, we evaluate the test sample based o the fuzzy eural etwork (FNN) method, ad the result s the exact same as the self-adaptg regresso SVM; the desg a BP artfcal eural etwork (ANN) category, the put layer euros s, whch correspodg separately securty evaluato parameters, the output layer euros s, whch correspodg separately four securty evaluato levels, the hdde layer ode umber s 0. We tra ad test base o the same samples ad the same cofgurato computer, the results show that ANN classfer has a msjudgmet whch takes a Ⅲ level securty sample as Ⅱ, ad other classfcatos are correct, the ANN classfcato ecessary trag tme s.s, whch s much hgher tha the SVM classfer trag tme. TABLE. NETWORK AND NFORMATON SYSTEM SECURTY EVALUATON DATA V CONTNUED TABLE No Level U U U U 9 U 0 V CONTNUED TABLE No Level U U U U U V CONTNUED TABLE No Level U U U U 9 U No Level U U U U U ACADEMY PUBLSHER

5 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER V CONTNUED TABLE No Level U U U U U V , -, -, -,-, -,-, -,-,-, TABLE. THE ACTUAL EVALUATON RESULTS COMPARED WTH THE NETWORK TRANNG RESULTS AND CLASSFCATON No SVM SVM SVM SVM V CONTNUED TABLE No Level U U U U 9 U CONTNUED TABLE No Evaluato results FNN ANN V V V V CONTNUED TABLE No Level U U U U V CONTNUED TABLE No Level U Decso V. CONCLUSONS SVM s a commo learg method based o VC dmeso theory of the statstcal learg theory ad the structure rsk mmze (SRM) prcple, through the lmted sample formato, whch ca explore the best compromse betwee the complexty ad learg ablty of the model, ad the, order to receve the best outreach capacty. Accordg to the aalyss, qure to the mpact whch dfferet parameters to SVM regresso fucto, ths paper put forward regresso SVM method based o parameter self-adaptg adjustmet, order to avod select the best parameters through the complcated cross-certfcato steps. By the applcato of self-adaptg regresso SVM the etwork ad formato system securty evaluato, make up for the shortcomgs whch the sample data s few, ad the overcome the defects whch the tradtoal eural etworks may coverge to the local mmum pots ad the etwork structure determato ca oly deped o experece, ehace the geeralzato ablty, so mprove the system covergece speed ad evaluato accuracy. Examples show that self-adaptg SVM s a effectve method to securty evaluato, ad the t wll be good developmet prospects other areas. 009 ACADEMY PUBLSHER

6 0 JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 ACKNOWLEDGMENT Ths research was supported by the Scetfc Research Foudato for Youg Teachers of North Cha Electrc Power Uversty. The tem No. s 000. Ths research was supported by the Phlosophy ad Socal Scece Research Topcs of Baodg Cty. The tem s Research o Curret Stuato ad Coutermeasures of Agrcultural formato Degree Based o New Rural Costructo Baodg Cty, ad the tem No. s 000. REFERENCES [] Jgwe Ta, Mejua Gao, The research ad applcato o artfcal eural etwork algorthm[m], Bejg sttute of techology press, Beg, 00,, pp.-9. [] Weqg Cheg, Ja Gog, Network Securty Evaluato [J], Computer Egeerg, February 00, pp: -. [] Zhem GUO, Xuelog HU, Hulag JANG, Securty Evaluato of Network ad formato System ad ts dex System S Research [J], moder electro techology Sep 00, pp:9-. [] Dogme ZHAO, Hafeg LU, Cheguag LU, Rsk assessmet of formato securty based o BP eural etwork[j], Computer Egeerg ad Applcatos, 00, (), pp: 9-. [] Yaopg Jag, Research o Space Network Securty Evaluato dex System Cha [J], maagemet world, 00,, pp: -. [] Zhhu Wag, Fuhua Shu, The mproved SVM model ad ts applcato o coal me securty evaluato system [J], Mg dustry securty ad evrometal protecto, 00,,pp:-,. [] Graham Fracs, Matthew Hto, Jacky Hollo way, et a. Best practce bechmarkg: a route to compettveess [J], Joural of Ar Trasport Maagemet, 999 (), pp.0-l. [] Jl Xu, Applcato of Support Vector Mache Water qualty Evaluato [J], Cha coutrysde water coservacy ad hydraulc power geerato, 00,,pp:- 9. [9] KEERTH S, CHH J, Asymptotc behavor of support vector maches wth gaussa kerel[j], Neural Computato, 00,,pp: -9. [0] CHAPELE O, VAPNK V N, Choosg multple parameters for support vector maches [J], Mache Learg, 00,, pp: -9. [] Brow, M, H. G. Lews, S. R. Gu, Lear spectral mxture models ad support vector maches for remote sesg, (submtted to) EEE Tras, Geoscece ad Remote Sesg [] Dog X ad Zhaohu W, Speaker recogto usg cotuous desty support vector maches, Electrocs letters, 00,(-), pp: [] Bahlma C, B. Haasdok ad H. Burkhardt, O-le hadwrtg recogto wth support vector machesa kerel approach, Proceedgs of Eghth teratoal Workshop o Froters Hadwrtg Recogto, 00, pp: 9-. [] Km K., Jm ad K. Jug, Recogto of facal mages usg support vector mache, Proceedgs of the th EEE Sgal Processg Workshop o Statstcal Sgal Processg, Sgapore, 00, pp: -. [] Jufeg Gao, Wegag Sh, Jaxu Ta et al, Support vector maches based approach for fault dagoss of valves recprocatg pumps, Proceedgs of EEE Coferece o Electrcal ad Computer Egeerg, Caada, 00,, pp: -. Shaome Yag, was bor Hada Cty, Cha, ad graduated from the agrcultural uversty of Hebe 00, gaed the master's degree of maagemet. The author s major feld of study s the busess maagemet. Sce 00, she s always workg at the North Cha Electrc Power Uversty, Baodg Cty, Cha. Ad she has publshed more tha papers ad book. Such as the Electrc Power Eterprse Maagemet (Bejg: Chese Electrc Power Publshg Compay). Dogle Lu, was bor Baodg Cty, Cha, ad graduated from the agrcultural uversty of Hebe 00, gaed the master's degree of maagemet. The author s major feld of study s the maagemet. Sce 00, she s always workg at the agrcultural uversty of Hebe, Baodg Cty, Cha. Ad she has publshed more tha 0 papers ad books. Zhb Lu, was bor Luaa Couty, Cha, ad graduated from the agrcultural uversty of Hebe 00, gaed the master's degree of maagemet. The author s major feld of study s the formato maagemet. Sce 00, he s always workg at the North Cha Electrc Power Uversty, Baodg Cty, Cha. Ad he has publshed more tha 0 papers ad books. Such as the Research o the Advacg Frot Topc of Asset Valuato (Bejg: Chese Face ad Ecoomcal Publshg Compay). 009 ACADEMY PUBLSHER

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance

Research on Matching Degree of Resources and Capabilities of Enterprise Transformation Based on the Spatial Points Distance Sed Orders for Reprts to reprts@bethamscece.ae The Ope Cyberetcs & Systemcs Joural, 05, 9, 77-8 77 Ope Access Research o Matchg Degree of Resources ad Capabltes of Eterprse Trasformato Based o the Spatal

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning

CIS603 - Artificial Intelligence. Logistic regression. (some material adopted from notes by M. Hauskrecht) CIS603 - AI. Supervised learning CIS63 - Artfcal Itellgece Logstc regresso Vasleos Megalookoomou some materal adopted from otes b M. Hauskrecht Supervsed learg Data: D { d d.. d} a set of eamples d < > s put vector ad s desred output

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are : Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6) Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:

More information

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process JOURNAL OF SOFTWARE, VOL. 8, NO. 8, AUGUST 20 4 ERP System Flexblty Measuremet Based o Fuzzy Aalytc Netork Process Xaoguag Zhou ad Bo Lv Doglg School of Ecoomcs ad Maagemet, Uversty of Scece ad Techology

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

AP Statistics 2006 Free-Response Questions Form B

AP Statistics 2006 Free-Response Questions Form B AP Statstcs 006 Free-Respose Questos Form B The College Board: Coectg Studets to College Success The College Board s a ot-for-proft membershp assocato whose msso s to coect studets to college success ad

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years 2009 2011 Scetfc Jourals Martme Uversty of Szczec Zeszyty Naukowe Akadema Morska w Szczece 2012, 32(104) z. 2 pp. 162 166 2012, 32(104) z. 2 s. 162 166 Aalyss of real uderkeel clearace for Śwoujśce Szczec waterway

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Application of improved analytic hierarchy process in SME s competitiveness evaluation

Application of improved analytic hierarchy process in SME s competitiveness evaluation COMPUTER MODELLING & NEW TECHNOLOGIES 04 8(C) 083-088 Wag Xawu Applcato of mproved aalytc herarchy process SME s compettveess evaluato Xawu Wag * Ahu Busess Vocatoal College, Hefe Ahu, PR Cha Abstract

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Maximization of Data Gathering in Clustered Wireless Sensor Networks

Maximization of Data Gathering in Clustered Wireless Sensor Networks Maxmzato of Data Gatherg Clustere Wreless Sesor Networks Taq Wag Stuet Member I We Hezelma Seor Member I a Alreza Seye Member I Abstract I ths paper we vestgate the maxmzato of the amout of gathere ata

More information

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Trend Projection using Predictive Analytics

Trend Projection using Predictive Analytics Iteratoal Joural of Computer Applcatos (0975 8887) Tred Projecto usg Predctve Aalytcs Seema L. Vadure KLS Gogte Isttute of Techology, Udyambag, Belgaum Karataka, Ida Majula Ramaavar KLS Gogte Isttute of

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Report 19 Euroland Corporate Bonds

Report 19 Euroland Corporate Bonds Rep19, Computed & Prted: 17/06/2015 11:38 Report 19 Eurolad Corporate Bods From Dec 1999 to Dec 2014 31/12/1999 31 December 1999 31/12/2014 Bechmark 100% IBOXX Euro Corp All Mats. TR Defto of the frm ad

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data

Using Data Mining Techniques to Predict Product Quality from Physicochemical Data Usg Data Mg Techques to Predct Product Qualty from Physcochemcal Data A. Nachev 1, M. Hoga 1 1 Busess Iformato Systems, Cares Busess School, NUI, Galway, Irelad Abstract - Product qualty certfcato s sometmes

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES Nadezhda Koleda 1, Natalja Lace 2 1 Rga Techcal Uversty, Latva, adezhda.koleda@ge.com 2 Rga Techcal Uversty, Latva, atalja.lace@rtu.lv

More information

The premium for mandatory house insurance in Romania considerations regarding its financial solvability

The premium for mandatory house insurance in Romania considerations regarding its financial solvability Avalable ole at www.scecedrect.com Proceda Ecoomcs ad Face 3 ( 202 ) 829 836 Emergg Markets Queres Face ad Busess The premum for madatory house surace Romaa cosderatos regardg ts facal solvablty Raluca

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Report 06 Global High Yield Bonds

Report 06 Global High Yield Bonds Rep06, Computed & Prted: 17/06/2015 11:25 Report 06 Global Hgh Yeld Bods From Dec 2000 to Dec 2014 31/12/2000 31 December 1999 31/12/2014 New Bechmark (01/01/13) 80% Barclays Euro HY Ex Facals 3% Capped

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk

More information